bubblehit_mp_pgr.exe

Bubble Hit by GamePacks

SweetIM Technologies Ltd

This is part of the Montera web browser toolbar and extension that will modify the browser's default search provider, DNS, and home page functions. The application bubblehit_mp_pgr.exe, “Bubble Hit Installer by GamePacks” by SweetIM Technologies has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup and installation application and has been known to bundle potentially unwanted software.
Publisher:
SweetIM Technologies Ltd.  (signed by SweetIM Technologies Ltd)

Product:
Bubble Hit by GamePacks

Description:
Bubble Hit Installer by GamePacks

Version:
4, 1, 0, 1

MD5:
15037f4c5ee51c07bfa4ef8c3fd86a58

SHA-1:
e027daac6ebf8353d34e931796645747c88d7b17

SHA-256:
2ad27612d9fb927af619b86e97fe80f1df7d2acd367ae566bc802b115d8dbf77

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/18/2024 12:03:04 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Perion (M)
17.3.13.1

File size:
758.2 KB (776,424 bytes)

Product version:
4, 1, 0, 1

Copyright:
Copyright © 2011 SweetIM Technologies Ltd.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\bubblehit_mp_pgr.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/9/2011 10:00:00 PM

Valid to:
2/4/2014 9:59:59 PM

Subject:
CN=SweetIM Technologies Ltd, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=SweetIM Technologies Ltd, L=Ra'anana, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5E3BF2B52DA9EA7F1B539A7F018F4EC6

File PE Metadata
Compilation timestamp:
8/15/2013 10:54:04 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x216CC0

Entry point:
60, BE, 00, 90, 56, 00, 8D, BE, 00, 80, E9, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 4F, 47, 21, 00, 57, 83, C3, 04, 53, 68, B5, DC, 0A, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Code size:
700 KB (716,800 bytes)

Remove bubblehit_mp_pgr.exe - Powered by Reason Core Security