softonicdownloader_for_haihaisoft-universal-player.exe

Application Installer

Softonic International

This is the Download Manager localized to Spanish that bundles the original software from the Softonic.com web site along with additional offers, mostly ad-supported browser extensions and utilities. The bundled software (which is actually not included in this file but downloaded) is most likely clean, the downloader is ad-supported. The application softonicdownloader_for_haihaisoft-universal-player.exe by Softonic International has been detected as a potentially unwanted program by 12 anti-malware scanners. The program is a setup application that uses the Softonic Downloader installer.
Publisher:
Softonic International  (signed and verified)

Product:
Application Installer

Version:
1.41.8.7

MD5:
d3d8ee95900b8a28d2cf9b24c1bfdaa9

SHA-1:
9c34247a76f588ae4277ed002ab13ca702ebb4fc

SHA-256:
c31d1a940f8b3c5a1caafa7e80d214ad41d2a3af7cd79670798ae29ed0342346

Scanner detections:
12 / 68

Status:
Potentially unwanted

Explanation:
Softonic Downloader is a download and install manager that provides users to the Softonic web site the ability to download 3rd-party software. During the installation the installer will show sponsored offers such as adware type toolbars and web browser extensions as well as other potentially unwanted applications. The downloader does not modify the original software.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/25/2024 2:59:54 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Softonic
7.1.1

AVG
Adware AdInstaller.Softonic
2016.0.2999

Dr.Web
Adware.Downware.498
9.0.1.0244

ESET NOD32
Win32/SoftonicDownloader.G potentially unwanted application
9.7.0.302.0

K7 AntiVirus
Unwanted-Program
13.183.13676

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.1491

Malwarebytes
PUP.Optional.Softonic
v2015.09.01.07

NANO AntiVirus
Trojan.Win32.Agent.dfyzyn
0.28.2.62671

Reason Heuristics
PUP.Softonic.Bundler (M)
15.7.29.13

VIPRE Antivirus
Threat.4786139
33706

Zillya! Antivirus
Downloader.Agent.Win32.225246
2.0.0.1955

File size:
362.7 KB (371,368 bytes)

Product version:
1.41.8.7

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softonic Downloader

Language:
Spanish (Spain, International Sort)

Common path:
C:\users\{user}\downloads\softonicdownloader_for_haihaisoft-universal-player.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/3/2013 3:00:00 AM

Valid to:
10/3/2015 2:59:59 AM

Subject:
CN=Softonic International, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Softonic International, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67C1FF44C765ABDA26027A6DCA52BA11

File PE Metadata
Compilation timestamp:
11/5/2014 6:18:16 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:lXVgCT318VtyI9WjkDwC8maAA4r5DOOoRu1/2BmgaDtjxZ8NndkGjysVoSMtNB2B:UCKVkEsksCNO49S9mPtkn3jnVoSMHy

Entry address:
0xFA0A0

Entry point:
60, BE, 00, B0, 4A, 00, 8D, BE, 00, 60, F5, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 3E, 89, 0F, 00, 57, 83, C3, 04, 53, 68, 9A, F0, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.9619  (probably packed)

Code size:
320 KB (327,680 bytes)

The file softonicdownloader_for_haihaisoft-universal-player.exe has been seen being distributed by the following URL.