whomepagearmor.exe

Simply Tech Ltd

One Floor App (Simply Tech/Widdit) distributes and bundles potentially unwanted programs (PUPs) using its OneFloorApp install manager (SimplyInstaller). The application whomepagearmor.exe by Simply Tech has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Widdit Setup installer. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in.
Publisher:
Simply Tech Ltd  (signed and verified)

Version:
1.0.0.0

MD5:
3d7b8a63000896ca001e569896a0e4c1

SHA-1:
29b9408da57c4a0b0ea1c4ac15ed73686fd7bc49

SHA-256:
fdfa81b8b6f177b1060c74546a4d12e6355c4e8db10dcf8041b45a29c97422b2

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
1/9/2025 5:38:33 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.SimplyTech
15.4.21.13

File size:
88.6 KB (90,696 bytes)

Product version:
1.0.0.0

Original file name:
ProtectedSearch.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Widdit Setup

Common path:
C:\Program Files\hometab\whomepagearmor.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/4/2012 2:00:00 AM

Valid to:
4/5/2014 1:59:59 AM

Subject:
CN=Simply Tech Ltd, O=Simply Tech Ltd, STREET=10 Zarhin street, L=Raanana, S=Raanana, PostalCode=43662, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1FC78D842B3886BB8D32517578F7489C

File PE Metadata
Compilation timestamp:
2/13/2014 5:58:33 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:oa48ZioStn747aul8+jPDeodM5/l6HMxMTj6lmWJH+RY3fr8E1OhT:oaioYEGuN/BAL3RJHXQE1

Entry address:
0x1590E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
78.5 KB (80,384 bytes)

Scheduled Task
Task name:
Protected Search

Path:
\ProtectedSearch\Protected Search

Trigger:
Logon (Runs on logon)


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to crl.comodoca.com.cdn.cloudflare.net  (178.255.83.2:80)

Remove whomepagearmor.exe - Powered by Reason Core Security