softonicdownloader_for_synaptics-touchpad-driver.exe

Application Installer

Softonic International

This is the Download Manager localized to Spanish that bundles the original software from the Softonic.com web site along with additional offers, mostly ad-supported browser extensions and utilities. The bundled software (which is actually not included in this file but downloaded) is most likely clean, the downloader is ad-supported. The application softonicdownloader_for_synaptics-touchpad-driver.exe by Softonic International has been detected as a potentially unwanted program by 13 anti-malware scanners. The program is a setup application that uses the Softonic Downloader installer.
Publisher:
Softonic International  (signed and verified)

Product:
Application Installer

Version:
1.41.10.4

MD5:
89a1cae2df195b0ec6aeb1164197e048

SHA-1:
fc4b7a841680ce3a0a04d042cf280fb2ed43c1ac

SHA-256:
c6300aa5a7a6843c9cabe36483f058ea7658fa3bc5672fe721923ae52dfdcedb

Scanner detections:
13 / 68

Status:
Potentially unwanted

Explanation:
Softonic Downloader is a download and install manager that provides users to the Softonic web site the ability to download 3rd-party software. During the installation the installer will show sponsored offers such as adware type toolbars and web browser extensions as well as other potentially unwanted applications. The downloader does not modify the original software.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/19/2024 6:08:42 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Softonic
7.1.1

avast!
Malware-gen
141214-1

AVG
BundleApp_r
2015.0.3256

Dr.Web
Trojan.Siggen6.26583
9.0.1.05190

ESET NOD32
Win32/SoftonicDownloader.G potentially unwanted application
7.0.302.0

G Data
Win32.Adware.Softonic
14.12.24

K7 AntiVirus
Unwanted-Program
13.185.13840

Kaspersky
not-a-virus:Downloader.Win32.Agent
15.0.0.543

Malwarebytes
PUP.Optional.Softonic
v2014.12.19.11

NANO AntiVirus
Trojan.Win32.Agent.dhiitm
0.28.6.62995

Reason Heuristics
Bundler.PPI.Softonic.q
14.12.19.11

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Threat.4786139
34232

File size:
363.9 KB (372,584 bytes)

Product version:
1.41.10.4

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softonic Downloader

Language:
Spanish

Common path:
C:\users\{user}\downloads\softonicdownloader_for_synaptics-touchpad-driver.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/3/2013 2:00:00 AM

Valid to:
10/3/2015 1:59:59 AM

Subject:
CN=Softonic International, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Softonic International, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67C1FF44C765ABDA26027A6DCA52BA11

File PE Metadata
Compilation timestamp:
12/16/2014 4:00:30 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:UlxwD7Jxztn+EKSb0DodDx+TJgKjXVSfKGpKEdLUlQfJq6DuvJ5nemkvUboS4i37:exuJiBDcDmPrVCKGUXlQh3D6Jo2oS4rA

Entry address:
0xFD830

Entry point:
60, BE, 00, E0, 4A, 00, 8D, BE, 00, 30, F5, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 3E, B9, 0F, 00, 57, 83, C3, 04, 53, 68, 22, F8, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Code size:
324 KB (331,776 bytes)

The file softonicdownloader_for_synaptics-touchpad-driver.exe has been seen being distributed by the following URL.