microsoft word.exe

Contumar Empresarial

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application microsoft word.exe by Contumar Empresarial has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
Contumar Empresarial  (signed and verified)

MD5:
457e5e8da0f62177c7d9b33f9c5b9eee

SHA-1:
5d8ecfd21ec6081c27440cbd86d076e1cb415cd8

SHA-256:
1581383932a78b55e19bd2482408c5455bab1edc76f42c445c09c24b2b041ff8

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/26/2024 3:35:17 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba.Contumar (M)
16.6.23.2

File size:
562.7 KB (576,224 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\microsoft word.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
9/24/2014 2:00:00 AM

Valid to:
9/24/2016 1:59:59 AM

Subject:
CN=Contumar Empresarial, O=Contumar Empresarial, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
2948ACD2126C11B674661E79E57D288D

File PE Metadata
Compilation timestamp:
12/5/2014 3:08:51 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:v7f9BQ3idTIW1WLL9kBIUJLLYpQiRqMqrDEBcq1st:v7f9BFdT/1M+MVE8st

Entry address:
0xD44C

Entry point:
E8, AF, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, C0, 5F, 42, 00, E8, FE, 15, 00, 00, E8, 80, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 42, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 0B, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
111 KB (113,664 bytes)

The file microsoft word.exe has been seen being distributed by the following URL.

Remove microsoft word.exe - Powered by Reason Core Security