Crack Risk

Riskware.Patcher (A) information

Malware Removal

The Riskware.Patcher (A) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Riskware.Patcher (A) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Anomalous file deletion behavior detected (10+)
  • Guard pages use detected – possible anti-debugging.
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • A named pipe was used for inter-process communication
  • Starts servers listening on 127.0.0.1:0
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Riskware.Patcher (A)?


File Info:

name: 0932235BE540D4C13046.mlw
path: /opt/CAPEv2/storage/binaries/a2e266431e2090caf9b4dd8ad648ab5a90b3ce243ab1b7b0aa489a3dcdcf2bf9
crc32: B46B5A35
md5: 0932235be540d4c1304637035c791bc8
sha1: c8b43236d214e12aa0b833324b86c868af792b45
sha256: a2e266431e2090caf9b4dd8ad648ab5a90b3ce243ab1b7b0aa489a3dcdcf2bf9
sha512: f0940b2c97124d855cbb9f09aa7ce104d3c95ba22285d86a9e8414ac5e7ce72b09083d2b3b01036e2bcc51bed9db761270938697ccdb3585ba1e05dc5bf4799f
ssdeep: 49152:OAI+lwawUlRJ+48kzL2MRkBZmDKt/2l06tswmAeLW1rh951LHoCMeE2f:OAI+qawyLpzL2MRcZmDKV2vtswGSJhxj
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D7D5F0BB5AB70838F7511D3814660AFD74BBAFC03C1BF59A6DA07518C637BC2246E246
sha3_384: 0442a1f99041badce1239057e70068548bf78c2bfc6290f6ab03102f75649b03fd3ef1fb18680f4a848694d41d53f691
ep_bytes: 558bec83c4f0b888534200e824f2fdff
timestamp: 1992-06-19 22:22:17

Version Info:

Comments:
CompanyName: CrackingPatching
FileDescription: IDM 6.40 build 1 6.40.1 Installation
FileVersion: 6.40.1
LegalCopyright: CrackingPatching
Translation: 0x0409 0x04e4

Riskware.Patcher (A) also known as:

BkavW32.AIDetect.malware2
LionicRiskware.Win32.Generic.1!c
CynetMalicious (score: 100)
CAT-QuickHealHacktool.Caypnamer
McAfeeArtemis!0932235BE540
CylanceUnsafe
K7AntiVirusRiskware ( 0051f4271 )
K7GWRiskware ( 0051f4271 )
ESET-NOD32a variant of Win32/RiskWare.HackTool.Agent.K
APEXMalicious
AvastFileRepMalware
TencentWin32.Trojan.Generic.Eog
SophosGeneric ML PUA (PUA)
McAfee-GW-EditionBehavesLike.Win32.BadFile.vc
FireEyeGeneric.mg.0932235be540d4c1
EmsisoftRiskware.Patcher (A)
SentinelOneStatic AI – Malicious PE
WebrootW32.Hack.Tool
ArcabitTrojan.Generic.D13C2C
MicrosoftTrojan:Win32/Wacatac.A!ml
MalwarebytesRiskWare.Crack.Generic
IkarusPUA.RiskWare.Hacktool
MaxSecureTrojan-Ransom.Win32.Crypmod.zfq
FortinetRiskware/HackTool_Agent
AVGFileRepMalware
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_60% (D)

How to remove Riskware.Patcher (A)?

Riskware.Patcher (A) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment