Malware

Generic.Application.Bundler.Relevant.A.72C6903D (file analysis)

Malware Removal

The Generic.Application.Bundler.Relevant.A.72C6903D is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Generic.Application.Bundler.Relevant.A.72C6903D virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Generic.Application.Bundler.Relevant.A.72C6903D?


File Info:

name: 8DE33EC2A913A56F7D69.mlw
path: /opt/CAPEv2/storage/binaries/bf2337465ec622bdf6a9dbb225affa347faf795937cdeddea0692ae4f2d6c309
crc32: 7462D278
md5: 8de33ec2a913a56f7d6935b274b5cb6a
sha1: 7b0825cd8fb7103c512caccee86b04ee16425d73
sha256: bf2337465ec622bdf6a9dbb225affa347faf795937cdeddea0692ae4f2d6c309
sha512: fcb498f61330054816f816a89777404076608778f1390453b6ac3a18c6281523fd57be2267819f3c71d15d60a69fd38b151ff2e012840252d84f241bd77aaaa2
ssdeep: 98304:5cOlcaIQJr8NFgI0+FQKbbFlnvwjasf2Cq5XCLNsKCFwpInmX25:ia5JYzgI0+H/SxyCLNMwomXa
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1614633F2257D8831D2903AF99584323211EF6D9AAC3E19882649B7D7DF7A085FF15383
sha3_384: aa52f27c66bd60499a9a13997a3f07bc25fc8d7484bb8839165cf164ef30d30492098e4cfdab6538b66bbc0e2ea6b9f5
ep_bytes: 558bec83c4cc53565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup: http://www.innosetup.com
CompanyName: yaomingsoft
FileDescription: A-one DVD to 3GP Ripper Setup
FileVersion:
LegalCopyright:
Translation: 0x0409 0x04e4

Generic.Application.Bundler.Relevant.A.72C6903D also known as:

LionicRiskware.Win32.Relevant.1!c
Elasticmalicious (moderate confidence)
DrWebAdware.Relevant.75
MicroWorld-eScanGeneric.Application.Bundler.Relevant.A.72C6903D
FireEyeGeneric.Application.Bundler.Relevant.A.72C6903D
Cylanceunsafe
K7AntiVirusTrojan ( 0056e5201 )
AlibabaRiskWare:Win32/MarketScore.a5d835e5
K7GWTrojan ( 0056e5201 )
SymantecPUA.Gen.2
ESET-NOD32multiple detections
APEXMalicious
CynetMalicious (score: 100)
Kasperskynot-a-virus:Monitor.Win32.RK.cb
BitDefenderGeneric.Application.Bundler.Relevant.A.72C6903D
NANO-AntivirusRiskware.Win32.Relevant.dgxpml
AvastNSIS:Relevant-G [PUP]
EmsisoftGeneric.Application.Bundler.Relevant.A.72C6903D (B)
F-SecureAdware.ADWARE/Adware.Gen
VIPREGeneric.Application.Bundler.Relevant.A.72C6903D
SophosRKnowledge (PUA)
GDataWin32.Application.RelevantKnowledge.G
JiangminMonitor.RK.r
WebrootW32.Adware.Gen
GoogleDetected
AviraADWARE/Adware.Gen
XcitiumMalware@#1710ah212m1j7
ArcabitGeneric.Application.Bundler.Relevant.A.72C6903D [many]
ViRobotAdware.Relevant.5598749
ZoneAlarmnot-a-virus:Monitor.Win32.RK.cb
VaristW32/Relevant.O.gen!Eldorado
VBA32BScope.Downloader.Bundl
ALYacGeneric.Application.Bundler.Relevant.A.72C6903D
MalwarebytesGeneric.Malware/Suspicious
TrendMicro-HouseCallTROJ_GEN.R002H0CI923
RisingAdware.PremierOpinion!1.BB5B (CLASSIC)
YandexTrojan.GenAsa!WZUjskT2aHI
IkarusBHO.Win32.Zwangi
MaxSecureTrojan.Malware.2592340.susgen
FortinetAdware/Relevant
AVGNSIS:Relevant-G [PUP]
DeepInstinctMALICIOUS

How to remove Generic.Application.Bundler.Relevant.A.72C6903D?

Generic.Application.Bundler.Relevant.A.72C6903D removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment