softonicdownloader_pour_connectify-hotspot.exe

Application Installer

Softonic International

This is the Download Manager localized to Spanish that bundles the original software from the Softonic.com web site along with additional offers, mostly ad-supported browser extensions and utilities. While the original product is most likely clean, the Softonic Downloader is considered a PUP. The application softonicdownloader_pour_connectify-hotspot.exe by Softonic International has been detected as a potentially unwanted program by 14 anti-malware scanners. The program is a setup application that uses the Softonic Downloader installer.
Publisher:
Softonic International  (signed and verified)

Product:
Application Installer

Version:
1.41.8.1

MD5:
278c092ccea7bc73a462e0451b8fdee9

SHA-1:
521fc79d63f433493b7ead5015700ac3150684da

SHA-256:
33e13f016649ac1dc68f1e32b0b16751641d0e65a0e47761e4b5df6ff52d339a

Scanner detections:
14 / 68

Status:
Potentially unwanted

Explanation:
Softonic Downloader is a download and install manager that provides users to the Softonic web site the ability to download 3rd-party software. During the installation the installer will show sponsored offers such as adware type toolbars and web browser extensions as well as other potentially unwanted applications. This type of software is typically known as an adware co-bundler. The downloader does not modify the original software.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 6:21:00 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Softonic
7.1.1

Comodo Security
Application.Win32.SoftonicDownloader.A
20878

Dr.Web
Adware.Downware.498
9.0.1.05190

ESET NOD32
Win32/SoftonicDownloader.G potentially unwanted application
7.0.302.0

F-Prot
W32/S-20d4b341
v6.4.7.1.166

G Data
Win32.Adware.Softonic
15.1.25

K7 AntiVirus
Unwanted-Program
13.193.14789

Kaspersky
not-a-virus:Downloader.Win32.Agent
15.0.0.543

Malwarebytes
PUP.Optional.Softonic
v2015.01.28.02

NANO AntiVirus
Trojan.Win32.Agent.divudw
0.30.0.65070

Reason Heuristics
Bundler.PPI.Softonic
15.1.28.14

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Threat.4786139
36694

Zillya! Antivirus
Downloader.Agent.Win32.229479
2.0.0.2048

File size:
362.4 KB (371,064 bytes)

Product version:
1.41.8.1

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softonic Downloader

Language:
Spanish

Common path:
C:\Windows\System32\config\systemprofile\downloads\softonicdownloader_pour_connectify-hotspot.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/3/2013 2:00:00 AM

Valid to:
10/3/2015 1:59:59 AM

Subject:
CN=Softonic International, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Softonic International, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67C1FF44C765ABDA26027A6DCA52BA11

File PE Metadata
Compilation timestamp:
11/5/2014 3:57:49 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:npTXJ+9fqk0WeLCvPBIS4bd8N5GnzTZXdlZLWcI0aR46FllDsbBkDaYRLX8ToSss:d7Sz/GnL00aR46FllDoBqf76oSsG8m

Entry address:
0xFA080

Entry point:
60, BE, 00, B0, 4A, 00, 8D, BE, 00, 60, F5, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 3E, 89, 0F, 00, 57, 83, C3, 04, 53, 68, 72, F0, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Code size:
320 KB (327,680 bytes)

The file softonicdownloader_pour_connectify-hotspot.exe has been seen being distributed by the following URL.