Malware

Application.Bundler.CGT (B) removal instruction

Malware Removal

The Application.Bundler.CGT (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Bundler.CGT (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Network activity detected but not expressed in API logs
  • Anomalous binary characteristics

Related domains:

wpad.local-net
crl.verisign.com

How to determine Application.Bundler.CGT (B)?


File Info:

name: 731DB1C76684C22F2F10.mlw
path: /opt/CAPEv2/storage/binaries/e4281ed0f2c764e90245597ba2c8f6ff4c43608dfbf3b8e306c96c4c6927794f
crc32: 3488F273
md5: 731db1c76684c22f2f10fb84a69f414d
sha1: dcc7710440ad44c381b4eb4b0efcee87aa6f44f5
sha256: e4281ed0f2c764e90245597ba2c8f6ff4c43608dfbf3b8e306c96c4c6927794f
sha512: 2f437cf75d7282d9739bb68deaaefff718b40f1afadf230fa74cae2aa65989e74532cb9343eed57c804ee910b9b4d8180242894b5e6a164935a0b15e84462c61
ssdeep: 12288:agIpRLi70zE8PyBCv+IEVuuBq2idUkOb2X9KHagXvaV32VLiYRaUqtjvyPMXmIdx:agIOM+Cv+IE8MqRdUeeapN9pmIdrF
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1910523A7E98184B7E8A21FF14CD192A0DC37BC6629385451389C3DC9BF7F261A61670F
sha3_384: 7da6b347a74877df1bc3654ced40fa61defa95d79de2b5e86efa5d27a4ab30570181a4bb20a3a17285c6107417366fe2
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription:
FileVersion:
LegalCopyright:
ProductName:
ProductVersion:
Translation: 0x0000 0x04b0

Application.Bundler.CGT (B) also known as:

DrWebTrojan.Packed.28622
MicroWorld-eScanApplication.Bundler.CGT
CAT-QuickHealAdware.InstallCore.A8
CylanceUnsafe
ZillyaTrojan.Zbot.Win32.188287
SangforPUP.Win32.Bundler.CGT
K7AntiVirusAdware ( 005104571 )
K7GWAdware ( 005104571 )
CrowdStrikewin/malicious_confidence_100% (D)
SymantecPUA.InstallCore!g10
ESET-NOD32Win32/InstallCore.Gen.A potentially unwanted
ClamAVWin.Trojan.Agent-6950263-1
BitDefenderApplication.Bundler.CGT
NANO-AntivirusRiskware.Win32.InstallCore.dfgllk
SUPERAntiSpywarePUP.InstallCore/Variant
RisingAdware.InstallCore!1.AB2C (CLASSIC)
Ad-AwareApplication.Bundler.CGT
EmsisoftApplication.Bundler.CGT (B)
ComodoApplication.Win32.InstallCore.BWAN@58je91
FireEyeGeneric.mg.731db1c76684c22f
SophosInstall Core Click run software (PUA)
GDataWin32.Application.InstallCore.CO
AviraPUA/InstallCore.Gen9
Antiy-AVLTrojan/Generic.ASBOL.7A39
ArcabitApplication.Bundler.CGT
ViRobotAdware.Installcore.820840.Y
MicrosoftPUADlManager:Win32/InstallCore
CynetMalicious (score: 100)
VBA32Trojan.InstallCore
ALYacApplication.Bundler.CGT
MalwarebytesPUP.Optional.InstallCore
APEXMalicious
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_88%
Cybereasonmalicious.76684c
MaxSecureTrojan.Malware.500359.susgen

How to remove Application.Bundler.CGT (B)?

Application.Bundler.CGT (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment