bundle_networkmanager.exe

Borussia Dortmund Demo

Develop Proekt, TOV

The application bundle_networkmanager.exe, “Borussia Dortmund gmbh” by Develop Proekt, TOV has been detected as a potentially unwanted program by 2 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.hrwrap.tech.
Publisher:
Borussia Dortmund  (signed by Develop Proekt, TOV)

Product:
Borussia Dortmund Demo

Description:
Borussia Dortmund gmbh

Version:
2.10.26.43

MD5:
42c513ed2177d580379e7f9a581dfbec

SHA-1:
fc178f85d6998db7eeaa724b0f447e1a2c28fdc5

SHA-256:
91db4502b5c6f649e0e888c37860e3e57585699b72addf1c615edff9fc676dce

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
7/10/2025 12:04:14 AM UTC  (today)

Scan engine
Detection
Engine version

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
15.0.0.562

Reason Heuristics
PUP.Amonetize.DevelopP (M)
16.5.7.19

File size:
417 KB (427,016 bytes)

Product version:
2.10.26.43

Original file name:
bor.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\bundle_networkmanager.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/17/2016 7:00:00 PM

Valid to:
4/18/2017 6:59:59 PM

Subject:
CN="Develop Proekt, TOV", OU=IT, O="Develop Proekt, TOV", STREET="vul. PREDSLAVYNSKA, 34-B", L=Kiev, S=Kiev, PostalCode=01010, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00BEE04287A1E0464634495BC96248B8F7

File PE Metadata
Compilation timestamp:
5/7/2016 7:08:02 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:W9yVS4TB8HTrjrpDY5ZOSL+Cd5LUVBU4RJ9X2vcXGgRF+0ZnDM:6yVS4TmHTrpgDd5LU84N2kWqZnDM

Entry address:
0x6A86

Entry point:
E8, 4B, 22, 00, 00, E9, 75, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 73, 03, 00, 00, 0F, BA, 25, 54, E6, 3A, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 60, D0, 3A, 00, 01, 0F, 82, F0, 04, 00, 00, 0F, BA, 25, 54, E6, 3A, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00...
 
[+]

Entropy:
6.4126

Code size:
69.5 KB (71,168 bytes)

The file bundle_networkmanager.exe has been seen being distributed by the following URL.

Remove bundle_networkmanager.exe - Powered by Reason Core Security