Malware

Application.Bundler.InstallMonster.OR removal guide

Malware Removal

The Application.Bundler.InstallMonster.OR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Bundler.InstallMonster.OR virus can do?

  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid

How to determine Application.Bundler.InstallMonster.OR?


File Info:

name: 40D560693EB3AF03D3EC.mlw
path: /opt/CAPEv2/storage/binaries/0c7092b5f3342615a97f31768223f38c805c542782e9291d626832488a7ab996
crc32: 047BEDF3
md5: 40d560693eb3af03d3ec14bf2c081526
sha1: 3c7c4a319fc395d9c7f907d18189e993431dbbac
sha256: 0c7092b5f3342615a97f31768223f38c805c542782e9291d626832488a7ab996
sha512: 2c1e051238c1a720aecc319c470a764b9bfee4423bdcfa3c795ce2d0183cbccd42337a553b2542167b21545ce25f7156635d7dd279f00078d44586dc2217fee6
ssdeep: 49152:gRgtcUuyQIt96+PpOfJSLnkX/uMy2WHiYX/rGGrs31:gR6y2pOfJSLS/3z2iYX/Ri1
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T124A533C30C0215BBF28ADC39EB1E9EF58A33B93A278935156F53E137C5766D11990A0E
sha3_384: c08ec279e5992d62f40f50cf9a1a5acbbe453ae05c030c0fda80d7edc17e7bffe58662871011188b3ab00652a7bddaa7
ep_bytes: 60be00d090008dbe0040afff5783cdff
timestamp: 1992-06-19 22:22:17

Version Info:

CompanyName: CompanyName
FileDescription: FileDescription
FileVersion: 1.0.1.0
InternalName: InternalName
LegalCopyright: LegalCopyright
LegalTrademarks: LegalTrademarks
OriginalFilename: OriginalFilename
ProductName: ProductName
ProductVersion: 1.1.1.2
Comments: Comments
Translation: 0x0409 0x04e4

Application.Bundler.InstallMonster.OR also known as:

BkavW32.AIDetectMalware
Elasticmalicious (moderate confidence)
MicroWorld-eScanApplication.Bundler.InstallMonster.OR
FireEyeApplication.Bundler.InstallMonster.OR
CAT-QuickHealAdware.InstallMonster.B8
SkyhighBehavesLike.Win32.Trojan.vc
McAfeeArtemis!40D560693EB3
Cylanceunsafe
ZillyaTool.Bundler.Win32.4665
SangforTrojan.Win32.Save.a
K7AntiVirusAdware ( 0053082d1 )
AlibabaVirus:Win32/InstallMonster.060601f1
K7GWAdware ( 0053082d1 )
ArcabitApplication.Bundler.InstallMonster.OR
APEXMalicious
ClamAVWin.Malware.Agent-6598770-0
BitDefenderApplication.Bundler.InstallMonster.OR
AvastWin32:InstallMonstr-LG [PUP]
SophosInstall Monster (PUA)
DrWebTrojan.InstallMonster.2800
VIPREApplication.Bundler.InstallMonster.OR
EmsisoftApplication.Bundler.InstallMonster.OR (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Agent.cgkj
WebrootW32.Adware.Gen
GoogleDetected
VaristW32/InstallMonster.JK.gen!Eldorado
Antiy-AVLTrojan/Win32.TSGeneric
XcitiumApplication.Win32.InstallMonster.UE@7dl5uh
GDataApplication.Bundler.InstallMonster.OR
CynetMalicious (score: 100)
AhnLab-V3PUP/Win32.InstallMonster.R212119
ALYacApplication.Bundler.InstallMonster.OR
MAXmalware (ai score=78)
MalwarebytesGeneric.Malware.AI.DDS
RisingTrojan.FakeAV!8.175 (TFE:5:2M20rWNc1FJ)
YandexTrojan.GenAsa!ZPWZurBLYOg
Ikarusnot-a-virus:AdWare.InstallMonster
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Agen.AOBC!tr
AVGWin32:InstallMonstr-LG [PUP]
DeepInstinctMALICIOUS

How to remove Application.Bundler.InstallMonster.OR?

Application.Bundler.InstallMonster.OR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment