build_batoncoupon_newch.exe

7-Zip

Bundle Co. Ltd.

The application build_batoncoupon_newch.exe, “7z Setup SFX small” by Bundle Co has been detected as a potentially unwanted program by 6 anti-malware scanners. The program is a setup application that uses the 7z Setup installer. It is also typically executed from the user's temporary directory.
Publisher:
Igor Pavlov  (signed by Bundle Co. Ltd.)

Product:
7-Zip

Description:
7z Setup SFX small

Version:
9.20

MD5:
97d00e0c167f53e0b5819b1d4c59792a

SHA-1:
7679a6a2ae609c19771aa956e126269ccb28d047

SHA-256:
c0555c9add51d43501aea16bdd7f6330292d36157463ab27c7806878e73401aa

Scanner detections:
6 / 68

Status:
Potentially unwanted

Analysis date:
4/18/2024 10:45:21 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.MediaMagnet
2014.11.17

Clam AntiVirus
Win.Trojan.Agent-792627
0.98/21411

Kaspersky
not-a-virus:AdWare.Win32.Agent
15.0.0.494

Qihoo 360 Security
HEUR/QVM41.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.BundleCo.X
14.11.21.23

Vba32 AntiVirus
AdWare.JS.Agent
3.12.26.3

File size:
154.2 KB (157,872 bytes)

Product version:
9.20

Copyright:
Copyright (c) 1999-2010 Igor Pavlov

Original file name:
7zS2.sfx.exe

File type:
Executable application (Win32 EXE)

Installer:
7z Setup

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\build_batoncoupon_newch.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/18/2014 4:00:00 AM

Valid to:
8/19/2015 3:59:59 AM

Subject:
CN=Bundle Co. Ltd., O=Bundle Co. Ltd., STREET=Chernyahovskogo str. 15/A office 3-H, L=Saint-Petersburg, S=RU, PostalCode=194356, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E6346AD1059875576C9310B07844FFD5

File PE Metadata
Compilation timestamp:
11/18/2010 10:41:55 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:J2SjsXe8kZ2h13UO/UKNRdrH9KtG9DSL4Jz6ZNDgpyAItP2UGMOkATtFVE:sKsXNa2vjLNrL92qzOAojGMODbVE

Entry address:
0x643F

Entry point:
55, 8B, EC, 6A, FF, 68, E8, 70, 40, 00, 68, C0, 65, 40, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, 6C, 70, 40, 00, 59, 83, 0D, 00, A2, 40, 00, FF, 83, 0D, 04, A2, 40, 00, FF, FF, 15, 70, 70, 40, 00, 8B, 0D, F0, 81, 40, 00, 89, 08, FF, 15, 74, 70, 40, 00, 8B, 0D, EC, 81, 40, 00, 89, 08, A1, 78, 70, 40, 00, 8B, 00, A3, 08, A2, 40, 00, E8, 11, 01, 00, 00, 39, 1D, D0, 81, 40, 00, 75, 0C, 68, BC, 65, 40, 00, FF, 15, 7C, 70...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
21.5 KB (22,016 bytes)

Remove build_batoncoupon_newch.exe - Powered by Reason Core Security