whatsapp.exe

XXXVI-II evito

Popeler System, s.l.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application whatsapp.exe, “parum atavus ullus erepo” by Popeler System, s.l has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
proprius habeo  (signed by Popeler System, s.l.)

Product:
XXXVI-II evito

Description:
parum atavus ullus erepo

Version:
53.69.18.45

MD5:
5d8ea1d1e8273417d12e21edf0c8a6f9

SHA-1:
ef897d881a98bd7eaaf6af0b6e8e1751ad33f9cb

SHA-256:
2f54892492e53f8d4475bfd37bb30cb1a7e32bc97c68d64bb93f97cefd7ff765

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 12:19:18 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba (M)
17.2.24.17

File size:
538.8 KB (551,680 bytes)

Product version:
83.17.46.49

Copyright:
Copyright procella audacia privatus olim

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\new folder usha\whatsapp.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/25/2014 5:30:00 AM

Valid to:
9/23/2017 5:29:59 AM

Subject:
CN="Popeler System, s.l.", O="Popeler System, s.l.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
31167DADB03384BDCA4981DE407B4CB5

File PE Metadata
Compilation timestamp:
10/9/2014 7:42:34 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0xDE9C

Entry point:
E8, A5, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 28, 6E, 42, 00, E8, FE, 15, 00, 00, E8, 76, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 38, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 01, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7095

Packer / compiler:
PEQuake V0.06

Code size:
113.5 KB (116,224 bytes)

Remove whatsapp.exe - Powered by Reason Core Security