softonicdownloader_for_free-pdf-to-word-doc-converter.exe

Application Installer

Softonic International

This is the Download Manager localized to Spanish that bundles the original software from the Softonic.com web site along with additional offers, mostly ad-supported browser extensions and utilities. While the original product is most likely clean, the Softonic Downloader is considered a PUP. The application softonicdownloader_for_free-pdf-to-word-doc-converter.exe by Softonic International has been detected as a potentially unwanted program by 13 anti-malware scanners. The program is a setup application that uses the Softonic Downloader installer.
Publisher:
Softonic International  (signed and verified)

Product:
Application Installer

Version:
1.41.5.2

MD5:
ca917c46431b7f980b7e393cac6a3a74

SHA-1:
7493f0d5efb8ad1e0a6124e6a190250b5a3b7a91

SHA-256:
34fdacbaffcc09beed4a803b3b874d4566198961d1edde23ecfe8029741609cc

Scanner detections:
13 / 68

Status:
Potentially unwanted

Explanation:
Softonic Downloader is a download and install manager that provides users to the Softonic web site the ability to download 3rd-party software. During the installation the installer will show sponsored offers such as adware type toolbars and web browser extensions as well as other potentially unwanted applications. This type of software is typically known as an adware co-bundler. The downloader does not modify the original software.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/24/2024 3:17:40 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Softonic
7.1.1

AVG
Adware BundleApp_r
2015.0.3285

Baidu Antivirus
Hacktool.Win32.Downloader
4.0.3.141119

Dr.Web
Adware.Downware.8558
9.0.1.0323

ESET NOD32
Win32/SoftonicDownloader.G potentially unwanted application
8.7.0.302.0

G Data
Win32.Adware.Softonic
14.11.24

K7 AntiVirus
Unwanted-Program
13.183.13432

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.2922

Malwarebytes
PUP.Optional.Softonic
v2014.11.19.03

Reason Heuristics
Bundler.PPI.Softonic.v
14.9.17.2

VIPRE Antivirus
Threat.4150696
32938

Zillya! Antivirus
Downloader.Agent.Win32.221506
2.0.0.1929

File size:
358.9 KB (367,472 bytes)

Product version:
1.41.5.2

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softonic Downloader

Language:
Spanish (Spain, International Sort)

Common path:
C:\users\{user}\downloads\softonicdownloader_for_free-pdf-to-word-doc-converter.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/3/2013 2:00:00 AM

Valid to:
10/3/2015 1:59:59 AM

Subject:
CN=Softonic International, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Softonic International, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67C1FF44C765ABDA26027A6DCA52BA11

File PE Metadata
Compilation timestamp:
9/10/2014 4:45:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:F2BM3UpmHpZ1R0BL+t7PfxXx64WvL6DgOV8rTTsm3eAPDCSroHc1AAauI2HY9rkb:rkpifR098ph64eGgOkomOwo8CvNnoS9Q

Entry address:
0xF72B0

Entry point:
60, BE, 00, 90, 4A, 00, 8D, BE, 00, 80, F5, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 27, 59, 0F, 00, 57, 83, C3, 04, 53, 68, AD, E2, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.9611  (probably packed)

Code size:
316 KB (323,584 bytes)

The file softonicdownloader_for_free-pdf-to-word-doc-converter.exe has been seen being distributed by the following URL.