softonicdownloader_for_swf-to-fla-converter.exe

Application Installer

Softonic International

This is the Download Manager localized to Spanish that bundles the original software from the Softonic.com web site along with additional offers, mostly ad-supported browser extensions and utilities. While the original product is most likely clean, the Softonic Downloader is considered a PUP. The application softonicdownloader_for_swf-to-fla-converter.exe by Softonic International has been detected as a potentially unwanted program by 12 anti-malware scanners. The program is a setup application that uses the Softonic Downloader installer.
Publisher:
Softonic International  (signed and verified)

Product:
Application Installer

Version:
1.41.10.4

MD5:
a3d55effe163a44ec486ef316973a97f

SHA-1:
3fa4a58a2c5d0811067870539f20296c17dd5c5f

SHA-256:
ce4eef9928da2c1c394628df72a9248b3981bc76ae03dea1d0e4f75ebf97600a

Scanner detections:
12 / 68

Status:
Potentially unwanted

Explanation:
Softonic Downloader is a download and install manager that provides users to the Softonic web site the ability to download 3rd-party software. During the installation the installer will show sponsored offers such as adware type toolbars and web browser extensions as well as other potentially unwanted applications. This type of software is typically known as an adware co-bundler. The downloader does not modify the original software.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/27/2024 6:16:14 PM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Trojan.Siggen6.26583
9.0.1.05190

ESET NOD32
Win32/SoftonicDownloader.G potentially unwanted application
7.0.302.0

F-Prot
W32/S-1281df00
v6.4.7.1.166

G Data
Win32.Adware.Softonic
14.12.24

K7 AntiVirus
Unwanted-Program
13.188.14468

Kaspersky
not-a-virus:Downloader.Win32.Agent
15.0.0.543

Malwarebytes
PUP.Optional.Softonic
v2014.12.28.09

NANO AntiVirus
Trojan.Win32.Agent.dlbbee
0.30.0.64448

Qihoo 360 Security
Win32/Virus.Downloader.cf7
1.0.0.1015

Reason Heuristics
Bundler.PPI.Softonic.l
14.12.28.21

VIPRE Antivirus
Threat.4786139
35418

Zillya! Antivirus
Downloader.Agent.Win32.230504
2.0.0.2018

File size:
363.8 KB (372,576 bytes)

Product version:
1.41.10.4

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softonic Downloader

Language:
Spanish (Spain, International Sort)

Common path:
C:\users\{user}\downloads\softonicdownloader_for_swf-to-fla-converter.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/2/2013 6:00:00 PM

Valid to:
10/2/2015 5:59:59 PM

Subject:
CN=Softonic International, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Softonic International, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67C1FF44C765ABDA26027A6DCA52BA11

File PE Metadata
Compilation timestamp:
12/16/2014 8:00:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:VlxwD7Jxztn+EKSb0DodDx+TJgKjXVSfKGpKEdLUlQfJq6DuvJ5nemkvUboS4i4B:DxuJiBDcDmPrVCKGUXlQh3D6Jo2oS4oA

Entry address:
0xFD830

Entry point:
60, BE, 00, E0, 4A, 00, 8D, BE, 00, 30, F5, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 3E, B9, 0F, 00, 57, 83, C3, 04, 53, 68, 22, F8, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.9650  (probably packed)

Code size:
324 KB (331,776 bytes)

The file softonicdownloader_for_swf-to-fla-converter.exe has been seen being distributed by the following URL.