bubblehit_mp_pgr.exe

Bubble Hit by GamePacks

SweetIM Technologies Ltd

This is part of the Montera web browser toolbar and extension that will modify the browser's default search provider, DNS, and home page functions. The application bubblehit_mp_pgr.exe, “Bubble Hit Installer by GamePacks” by SweetIM Technologies has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software.
Publisher:
SweetIM Technologies Ltd.  (signed by SweetIM Technologies Ltd)

Product:
Bubble Hit by GamePacks

Description:
Bubble Hit Installer by GamePacks

Version:
4, 1, 0, 1

MD5:
3083e7008bf3d8da8c6e3b0827b64e0f

SHA-1:
13e72ea23c59bbd414cb13e0ab27e23f98b6a1e1

SHA-256:
3736dbfcfb88de1e75f9bdddf1e4f2591456ad31e0ec4f8eb54a2a98196e358c

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/26/2024 10:09:05 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Perion (M)
17.3.13.16

File size:
758.2 KB (776,424 bytes)

Product version:
4, 1, 0, 1

Copyright:
Copyright © 2011 SweetIM Technologies Ltd.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\bubblehit_mp_pgr.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/10/2011 1:00:00 AM

Valid to:
2/5/2014 12:59:59 AM

Subject:
CN=SweetIM Technologies Ltd, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=SweetIM Technologies Ltd, L=Ra'anana, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5E3BF2B52DA9EA7F1B539A7F018F4EC6

File PE Metadata
Compilation timestamp:
8/15/2013 3:54:04 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x216CC0

Entry point:
60, BE, 00, 90, 56, 00, 8D, BE, 00, 80, E9, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 4F, 47, 21, 00, 57, 83, C3, 04, 53, 68, B5, DC, 0A, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Code size:
700 KB (716,800 bytes)

Remove bubblehit_mp_pgr.exe - Powered by Reason Core Security