microsoft word.exe

POPELER SYSTEM, S.L.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application microsoft word.exe by POPELER SYSTEM, S.L has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
POPELER SYSTEM, S.L.  (signed and verified)

MD5:
5a8be05eea60b12d83f60b8790433890

SHA-1:
72501d7ff9bcf1948a87c39051a51eb39f8d5b33

SHA-256:
7a7127bbee821819e5544823371395ffb4d575a45b5d4db241fa183439da2557

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2025 1:50:29 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba.POPELERS (M)
16.4.18.1

File size:
523.7 KB (536,288 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\microsoft word.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
7/25/2014 2:00:00 AM

Valid to:
8/29/2016 1:59:59 AM

Subject:
CN="POPELER SYSTEM, S.L.", OU=IT, O="POPELER SYSTEM, S.L.", L=Badalona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
7D4509F01375B349F2DE66BF15A48CD7

File PE Metadata
Compilation timestamp:
11/26/2014 10:17:06 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:dQ1c3DFGEvToYs+5INWpmimJpv5qCTekfVjfW6WgCFnRw:m14nvTx50/5qYekfVr1WbRw

Entry address:
0xCBEC

Entry point:
E8, A3, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 40, 5D, 42, 00, E8, FE, 15, 00, 00, E8, 74, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 36, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, FF, 64, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
109 KB (111,616 bytes)

The file microsoft word.exe has been seen being distributed by the following URL.

Remove microsoft word.exe - Powered by Reason Core Security