Malware

Should I remove “Application.Bundler.ICLoader.4.Gen (B)”?

Malware Removal

The Application.Bundler.ICLoader.4.Gen (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Bundler.ICLoader.4.Gen (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Anomalous binary characteristics

How to determine Application.Bundler.ICLoader.4.Gen (B)?


File Info:

crc32: 5C2910E8
md5: cf9c3e39674810d2b9dd3c6189bfea61
name: CF9C3E39674810D2B9DD3C6189BFEA61.mlw
sha1: d9990f4d3ec6cfaa76a0e7bf958752ea1ee3c160
sha256: 24861a74f77e1d83c028b3ef87d32f979ffbabd03907d180f8ce9e79f2bccf3c
sha512: 575cfe9cef7db3f77147a2225b196a2f5d87c56b4a241dfe4932f803f9b024ee643bf00f53c451162cc3961cbdb6e74c5df4177a0af1e73d23aaed6c0cc1baa4
ssdeep: 49152:V0OIAYOjQ82czXnCXMq8NM5eLg46HJ9bZUxZGoEdb:W3AYNIzXCONM0gzHP3oEdb
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (c) 1983,2001 Borland Software Corporation
InternalName: DCC32
FileVersion: 7.0.4.453
Copyright: Copyright (c) 1983,2001 Borland Software Corporation
CompanyName: Borland Software Corporation
ProductName: Borland Delphi/C++Builder (Enterprise Edition)
ProductVersion: 7.0.4.453
FileDescription: Delphi Pascal Compiler
Translation: 0x0409 0x04e4

Application.Bundler.ICLoader.4.Gen (B) also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 00538b811 )
Elasticmalicious (high confidence)
DrWebTrojan.InstallCube.3673
CynetMalicious (score: 100)
CAT-QuickHealPUA.IcloaderRI.S19006307
ALYacApplication.Bundler.ICLoader.4.Gen
CylanceUnsafe
ZillyaTrojan.Generic.Win32.201170
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaVirTool:Win32/CeeInject.9f6e2029
K7GWTrojan ( 00538b811 )
Cybereasonmalicious.967481
CyrenW32/Trojan.BXC.gen!Eldorado
SymantecPUA.ICLoader
ESET-NOD32a variant of Win32/Kryptik.GJDT
APEXMalicious
AvastWin32:ICLoader-X [Adw]
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderApplication.Bundler.ICLoader.4.Gen
NANO-AntivirusTrojan.Win32.Ekstak.ffqxrm
MicroWorld-eScanApplication.Bundler.ICLoader.4.Gen
TencentTrojan.Win32.Kryptik.gjiy
Ad-AwareApplication.Bundler.ICLoader.4.Gen
SophosMal/Generic-S
ComodoApplication.Win32.ICLoader.GHH@7rkufo
F-SecurePotentialRisk.PUA/ICLoader.Gen7
BitDefenderThetaGen:NN.ZexaF.34266.3r0@ayKIQngi
TrendMicroPUA.Win32.ICLoader.SMA
McAfee-GW-EditionBehavesLike.Win32.Generic.th
FireEyeGeneric.mg.cf9c3e39674810d2
EmsisoftApplication.Bundler.ICLoader.4.Gen (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Ekstak.ndg
AviraPUA/ICLoader.Gen7
Antiy-AVLGrayWare[Dropper]/Win32.Kryptik.GJx
MicrosoftVirTool:Win32/CeeInject.AJX!bit
ArcabitApplication.Bundler.ICLoader.4.Gen
SUPERAntiSpywarePUP.InstallCore/Variant
GDataWin32.Application.ICLoader.F
AhnLab-V3PUP/Win32.Agent.R232392
Acronissuspicious
McAfeePacked-FJO!CF9C3E396748
MAXmalware (ai score=71)
MalwarebytesPUP.Optional.ICLoader
PandaTrj/Genetic.gen
TrendMicro-HouseCallPUA.Win32.ICLoader.SMA
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
YandexTrojan.GenAsa!OZVPnw8G0Zw
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/CoinMiner.GYQC!tr
AVGWin32:ICLoader-X [Adw]
Paloaltogeneric.ml

How to remove Application.Bundler.ICLoader.4.Gen (B)?

Application.Bundler.ICLoader.4.Gen (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment