dropbox.exe

installation process

SETUPPROCESS

This is the Solimba installer program that will bundle additional offers mostly including adware and various unwanted PC utilities. The application dropbox.exe, “Installer Manager” by SETUPPROCESS has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the Solimba DownloadMR installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The installer is marketed through download protals and search ads as Dropbox but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Setup Process (r)  (signed by SETUPPROCESS)

Product:
installation process

Description:
Installer Manager

Version:
1.0.1.37

MD5:
e07bbb1864de2960a9250e11e492d335

SHA-1:
46876cb70cd83faa21c477f61944d570f3f884b9

SHA-256:
1108158dee3319675fc514ca16cf2b5767956c5c97d329532dff8ff7b6c12e57

Scanner detections:
29 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/25/2024 5:37:02 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Application.Bundler.Firseria.1
6506914

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.FirseriaInstaller
2015.02.02

Avira AntiVirus
APPL/Firseria.Gen
7.11.206.100

avast!
Win32:PUP-gen [PUP]
150101-1

AVG
Adware BundleApp.M
2014.0.4257

Bitdefender
Gen:Application.Bundler.Firseria.1
1.0.20.160

Comodo Security
Application.Win32.Bechiro.BDC
20924

Dr.Web
Trojan.DownLoader11.3531
9.0.1.05190

Emsisoft Anti-Malware
Gen:Application.Bundler.Firseria
9.0.0.4799

ESET NOD32
Win32/FirseriaInstaller.C potentially unwanted application
7.0.302.0

F-Prot
W32/A-8323559f
v6.4.7.1.166

F-Secure
Riskware.Gen:Application.Bundler.Firseria
5.13.68

G Data
Gen:Application.Bundler.Firseria
15.2.25

IKARUS anti.virus
not-a-virus:Downloader.Win32.Morstar
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.193.14824

Kaspersky
not-a-virus:AdWare.Win32.Fiseria
15.0.0.543

Malwarebytes
PUP.Optional.BundleInstaller.A
v2015.02.01.12

MicroWorld eScan
Gen:Application.Bundler.Firseria.1
16.0.0.96

NANO AntiVirus
Trojan.Win32.Downloader.czjgwa
0.30.0.65070

Norman
Gen:Application.Bundler.Firseria.1
03.12.2014 13:20:04

nProtect
Trojan-Clicker/W32.Fiseria.205168
15.01.30.01

Quick Heal
TrojanDownloader.Morstar.O3
2.15.14.00

Reason Heuristics
PUP.Installer.Solimba
15.2.1.12

Rising Antivirus
PE:PUF.FirseriaInstaller@CV!1.5C42
23.00.65.15130

Sophos
PUA 'Solimba Installer'
5.10

Vba32 AntiVirus
Downware.Morstar
3.12.26.3

VIPRE Antivirus
Threat.4150696
36666

Zillya! Antivirus
Downloader.Morstar.Win32.16
2.0.0.2050

File size:
200.4 KB (205,168 bytes)

Product version:
3.0.27

Copyright:
copyright © 2013

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads.exe

Digital Signature
Signed by:

Authority:
DigiCert Inc

Valid from:
11/27/2013 2:00:00 AM

Valid to:
12/1/2014 2:00:00 PM

Subject:
CN=SETUPPROCESS, O=SETUPPROCESS, L=Badalona, S=Barcelona, C=ES

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0A8ABFC7C80D0C2F0A3A89CF6139A91D

File PE Metadata
Compilation timestamp:
1/16/2014 4:40:52 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:msBHN/vimy20jbxVDSYGWgAZxuDIn6kCr0w2je/KsFapo8DW3tUIxMHOh:7H1IFJVJGWjZgDIn6kCr0HpsFOoPjh

Entry address:
0x67117

Entry point:
60, E8, 00, 00, 00, 00, 58, 05, 5A, 0B, 00, 00, 8B, 30, 03, F0, 2B, C0, 8B, FE, 66, AD, C1, E0, 0C, 8B, C8, 50, AD, 2B, C8, 03, F1, 8B, C8, 57, 51, 49, 8A, 44, 39, 06, 88, 04, 31, 75, F6, 2B, C0, AC, 8B, C8, 80, E1, F0, 24, 0F, C1, E1, 0C, 8A, E8, AC, 0B, C8, 51, 02, CD, BD, 00, FD, FF, FF, D3, E5, 59, 58, 8B, DC, 8D, A4, 6C, 90, F1, FF, FF, 51, 2B, C9, 51, 51, 8B, CC, 51, 66, 8B, 17, C1, E2, 0C, 52, 57, 83, C1, 04, 51, 50, 83, C1, 04, 56, 51, E8, 5E, 00, 00, 00, 8B, E3, 5E, 5A, 2B, C0, 89, 04, 32, B4, 10...
 
[+]

Entropy:
7.8903

Packer / compiler:
ASPack v1.08.04

Code size:
101 KB (103,424 bytes)

The file dropbox.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to cdn.solimba.com  (95.211.6.35:80)

TCP (HTTP):
Connects to api.downloadmr.com  (95.211.39.161:80)

 
http://api.downloadmr.com/installer/51310683/launch

Remove dropbox.exe - Powered by Reason Core Security