virtual access point.exe

POPELER SYSTEM, S.L.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application virtual access point.exe by POPELER SYSTEM, S.L has been detected as adware by 31 anti-malware scanners. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
POPELER SYSTEM, S.L.  (signed and verified)

MD5:
6b1b76bc372c90f2ecbabd0675c324b0

SHA-1:
306e23092b9b5a344a2b589109babe4f5cfec3e0

SHA-256:
798330eba8740aff43b875936dd3213549c807ff82a9469a812cd6662365fff0

Scanner detections:
31 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/3/2024 9:52:50 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Mplug.37
5558769

Agnitum Outpost
PUA.Solimba
7.1.1

AhnLab V3 Security
PUP/Win32.Solimba
2015.05.27

Avira AntiVirus
PUA/Firseria.aona
8.3.1.6

avast!
Win32:Solimba-S [PUP]
150525-2

AVG
Popeler
2016.0.3097

Bitdefender
Gen:Variant.Adware.Mplug.37
1.0.20.730

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Agent-862213
0.98/20505

Comodo Security
Application.Win32.Solimba.XL
22250

Dr.Web
Adware.Downware.10657, Adware.Downware.10857
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Mplug.37
15.05.26

ESET NOD32
MSIL/Solimba.AM potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Morstar
5/26/2015

F-Prot
W32/S-552eed4f
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Mplug
5.14.151

G Data
Gen:Variant.Adware.Mplug.37
15.5.25

IKARUS anti.virus
not-a-virus:Downloader.Morstar
t3scan.1.8.9.0

K7 AntiVirus
Adware
13.204.16037

Kaspersky
not-a-virus:Downloader.Win32.Morstar
15.0.0.543

Malwarebytes
PUP.Optional.Popeler
v2015.05.26.07

MicroWorld eScan
Gen:Variant.Adware.Mplug.37
16.0.0.438

NANO AntiVirus
Trojan.Win32.Morstar.dppbve
0.30.24.1636

Panda Antivirus
Adware/Firseria
15.05.26.07

Reason Heuristics
PUP.Solimba.POPELERSYSTEM
15.5.26.19

Rising Antivirus
PE:Trojan.Win32.Jaik.a!1075357329
23.00.65.15524

Sophos
PUA 'Solimba Installer'
5.14

SUPERAntiSpyware
Trojan.Agent/Gen-RogueAV
9851

Vba32 AntiVirus
Downware.Morstar
3.12.26.4

VIPRE Antivirus
Threat.4371328
40552

Zillya! Antivirus
Backdoor.PePatch.Win32.69757
2.0.0.2190

File size:
512.6 KB (524,856 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\programs\virtual access point.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
7/25/2014 2:00:00 AM

Valid to:
8/29/2016 1:59:59 AM

Subject:
CN="POPELER SYSTEM, S.L.", OU=IT, O="POPELER SYSTEM, S.L.", L=Badalona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
7D4509F01375B349F2DE66BF15A48CD7

File PE Metadata
Compilation timestamp:
3/28/2015 8:34:49 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:0+h9St2Ma70zIIc91Dwws4zruXic2O/3E4V:0+h9OY70z+warul3E4V

Entry address:
0xC1DC

Entry point:
E8, 5B, 4D, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, A8, 1A, 42, 00, E8, 3E, 15, 00, 00, E8, 2C, 4F, 00, 00, 0F, B7, F0, 6A, 02, E8, EE, 4C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 89, 42, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
98 KB (100,352 bytes)

Remove virtual access point.exe - Powered by Reason Core Security