Malware

Generic.Application.Bundler.Relevant.A.E677C895 removal tips

Malware Removal

The Generic.Application.Bundler.Relevant.A.E677C895 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Generic.Application.Bundler.Relevant.A.E677C895 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Generic.Application.Bundler.Relevant.A.E677C895?


File Info:

name: EDF163AFEE183509DE7B.mlw
path: /opt/CAPEv2/storage/binaries/82456966672e116b9fcee0be967daee49b8dbb864151f1474b159db81621276d
crc32: EE799D7B
md5: edf163afee183509de7bdbf6e4b00786
sha1: 4ac043b33cfedf50dea941655c3ea262cabb5e34
sha256: 82456966672e116b9fcee0be967daee49b8dbb864151f1474b159db81621276d
sha512: e049792ec3b6fcf306332a35ab8db6f87e825c3102896077e9b963e04e9952d4cc6e4ebd5ed83ee79a3aff874c26a0a7d31e72f7de231737005fab0414a804e2
ssdeep: 98304:5D9eVleMvURtlc2DDOKtktSI+usY+UrrBNNwamX/:HeVleMU2h0ktSrY+ErbN/mX/
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13C0633A6FDD80D30F9509FB09CAA436E77E75EB939332644636CCA071D77140AA1A783
sha3_384: cffe0881ec0af5d504a10ee08ef232ee7a84497f857656681bd20096852c0b2e40cb0df171df51c3ecc531f51bb02557
ep_bytes: 558bec83c4cc53565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup: http://www.innosetup.com
CompanyName: yaomingsoft
FileDescription: A-one Video to MPEG Converter Setup
FileVersion:
LegalCopyright:
Translation: 0x0409 0x04e4

Generic.Application.Bundler.Relevant.A.E677C895 also known as:

DrWebAdware.Relevant.149
MicroWorld-eScanGeneric.Application.Bundler.Relevant.A.E677C895
FireEyeGeneric.Application.Bundler.Relevant.A.E677C895
VIPREGeneric.Application.Bundler.Relevant.A.E677C895
K7AntiVirusTrojan ( 0056e5201 )
AlibabaRiskWare:Win32/MarketScore.b94a7e96
K7GWTrojan ( 0056e5201 )
ArcabitGeneric.Application.Bundler.Relevant.A.E677C895 [many]
SymantecPUA.Gen.2
ESET-NOD32multiple detections
CynetMalicious (score: 100)
APEXMalicious
BitDefenderGeneric.Application.Bundler.Relevant.A.E677C895
NANO-AntivirusRiskware.Win32.Relevant.dagoyf
AvastWin32:MiscX-gen [PUP]
TencentWin32.Adware.Relevant.Gajl
EmsisoftGeneric.Application.Bundler.Relevant.A.E677C895 (B)
F-SecureAdware.ADWARE/AD.RelevantKnow.liuru
SophosRKnowledge (PUA)
JiangminMonitor.RK.c
VaristW32/Risk.MHQH-3756
AviraADWARE/AD.RelevantKnow.liuru
GDataGeneric.Application.Bundler.Relevant.A.E677C895
GoogleDetected
VBA32Adware.Relevant.0961
ALYacGeneric.Application.Bundler.Relevant.A.E677C895
MAXmalware (ai score=81)
Cylanceunsafe
PandaTrj/CI.A
RisingAdware.PremierOpinion!1.BB5B (CLASSIC)
IkarusBHO.Win32.Zwangi
FortinetRiskware/OSS
AVGWin32:MiscX-gen [PUP]
DeepInstinctMALICIOUS

How to remove Generic.Application.Bundler.Relevant.A.E677C895?

Generic.Application.Bundler.Relevant.A.E677C895 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment