Crack

Application.ProcessHacker.1 removal

Malware Removal

The Application.ProcessHacker.1 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.ProcessHacker.1 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Anomalous file deletion behavior detected (10+)
  • Guard pages use detected – possible anti-debugging.
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • A named pipe was used for inter-process communication
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Transacted Hollowing
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • Detects Bochs through the presence of a registry key
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Application.ProcessHacker.1?


File Info:

name: 5F90EE94DCDA8F480649.mlw
path: /opt/CAPEv2/storage/binaries/a4aaea311bc7118b14fdb58dc01b8d39f13fb708ccd90487fcce0d833507a301
crc32: B6BAA7CC
md5: 5f90ee94dcda8f48064940369ad6d4dc
sha1: 928d047003be4ff7ee306cbc3dbab52ab6f8c743
sha256: a4aaea311bc7118b14fdb58dc01b8d39f13fb708ccd90487fcce0d833507a301
sha512: 7638b80199174323a6e1c767c3f417645a475b81624f8b1bef626b0e7b4b452b6ba3905be4c2567cd296ce52cbaae8d98de90c0a8028de5639caefe3b0b35e92
ssdeep: 98304:RtrbTA1JLQ0jMqk7EGdHCDSx4e7BDX+oRhaH2L+h3xb0EzC:Dc1u0jMdXdiDSxv7BDX/RJexbJzC
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19AF52322B9D59036C1F323B15E7EF7AA9639A93A4337C1DB27C41E714E60581272DB23
sha3_384: 51cdd7483171454f4838723a620a0df7e77a16586722fbbb51b4d7a7217e4c0146cc3b904e298d47093ca06e3bf19bbf
ep_bytes: e816900000e989feffffcccccccccc55
timestamp: 2012-01-29 21:32:28

Version Info:

FileDescription:
FileVersion: 3, 3, 8, 1
CompiledScript: AutoIt v3 Script: 3, 3, 8, 1
Translation: 0x0809 0x04b0

Application.ProcessHacker.1 also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Script.LodaRat.m!c
tehtrisGeneric.Malware
MicroWorld-eScanAIT:Trojan.Nymeria.3483
ALYacApplication.ProcessHacker.1
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0026d7c31 )
BitDefenderAIT:Trojan.Nymeria.3483
K7GWTrojan ( 0026d7c31 )
CrowdStrikewin/malicious_confidence_100% (W)
ArcabitAIT:Trojan.Nymeria.DD9B
BitDefenderThetaAI:Packer.599AA70016
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Autoit.EJ
APEXMalicious
Paloaltogeneric.ml
ClamAVTxt.Malware.LodaRAT-9769386-0
KasperskyHEUR:Backdoor.Script.LodaRat.b
AlibabaMalware:Win32/Dorpal.ali1000029
TencentWin32.Trojan.Autoit.Szvk
Ad-AwareAIT:Trojan.Nymeria.3483
SophosProcess Hacker (PUA)
DrWebTool.ProcessHacker.3
TrendMicroPUA.Win32.ProcHack.A
McAfee-GW-EditionBehavesLike.Win32.Agent.wc
Trapminemalicious.moderate.ml.score
FireEyeGeneric.mg.5f90ee94dcda8f48
EmsisoftAIT:Trojan.Nymeria.3483 (B)
IkarusTrojan.Autoit
AviraHEUR/AGEN.1229437
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataApplication.ProcessHacker.1 (2x)
CynetMalicious (score: 100)
Acronissuspicious
McAfeeArtemis!5F90EE94DCDA
MAXmalware (ai score=82)
VBA32Trojan-Downloader.Autoit.gen
TrendMicro-HouseCallPUA.Win32.ProcHack.A
RisingTrojan.Agent/Autoit!1.BC29 (CLASSIC)
YandexRiskware.ProcessHacker!Z+ABec4nlz0
MaxSecureTrojan.Autoit.AZA
FortinetAutoIt/Agent.DB!tr
AVGAutoIt:Dropper-DU [Trj]
Cybereasonmalicious.4dcda8
AvastAutoIt:Dropper-DU [Trj]

How to remove Application.ProcessHacker.1?

Application.ProcessHacker.1 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment