Threat Database Adware Adware.Softomate

Adware.Softomate

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 4,822
Threat Level: 20 % (Normal)
Infected Computers: 41,418
First Seen: July 24, 2009
Last Seen: April 12, 2026
OS(es) Affected: Windows

Adware.Softomate is adware that may be used to display numerous annoying pop-up ads, banners and messages on the PC each time the computer user is browsing the Web. Adware.Softomate may be installed into Internet Explorer, Mozilla Firefox or Google Chrome Web browsers. Adware.Softomate may attempt to make the PC user click on random pop-up ads, banners and messages which means that the computer user may get unwillingly rerouted to suspicious websites and, therefore, boost traffic of the website this way. Adware.Softomate may also earn money from clicks on ads, banners and messages. Adware.Softomate may also repeatedly reroute PC users to legitimate websites that were hijacked and set the computer system at risk of being infected with various security threats. Adware.Softomate may keep track of the computer user's browsing habits and transmit this information to third-parties for targeted advertising purposes.

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
McAfee-GW-Edition Heuristic.LooksLike.Win32.Agent.J
F-Secure Adware:W32/Mostofate.gen2
McAfee+Artemis potentially unwanted program Generic PUP
K7AntiVirus Adware
AVG Generic.VOH
AhnLab-V3 Win-AppCare/Softomate.475136
AntiVir ADSPY/Softomate.AI
Comodo ApplicUnwnt.Win32.Adware.Mostofate.ai
Sophos CoolDeskAlert
BitDefender Adware.Softomate.BM
Kaspersky not-a-virus:AdWare.Win32.Mostofate.ai
ClamAV Adware.Toolbar-103
Avast Win32:Adware-gen [Adw]
F-Prot W32/Backdoor.AJFK
NOD32 a variant of Win32/Adware.Softomate.AC

SpyHunter Detects & Remove Adware.Softomate

File System Details

Adware.Softomate may create the following file(s):
# File Name MD5 Detections
1. tbcore3.dll c07957685151800524eb8a8394d8171d 3,042
2. xp.dll d3d067d1d91b7748ce36edd93a558693 15
3. Toolbar.dll 8668335c9463d7ca99d5c8d4c612ffb4 5
4. deskbar.dll 2b2f7fdd2bbd23ac0a222b577bdeccb1 4
5. NSE_TOOLBAR.dll c82c878bdefeae491c213d9f47f4e82e 3
6. SoftIEToolbar.dll 8ffe8ffc5b4afff4586b73c407d78432 2
7. JiWireIE.dll 8d69b864acce3ea4dbd73bbdb3f85da1 2
8. crvenazvezda[1].exe 3045657ac9ea9c72e052958b3ff0f82c 0
9. blic.dll, cedajovanovic.dll, crvenazvezda.dll, donstalens.dll 09274d84394233d56d67441ac8d35a3c 0
10. damebiraju.dll, ds.dll, g17plus.dll 478873b3a689503aa288ec45951198d9 0
11. cafe[1].exe e08a0a516c69f15df77cb149d68a45e1 0
12. dinamo.dll 222f4d016f868fe8e54f1b282807db0e 0
13. cafe.dll 47b642db07f0be67a4ccd05ce87b6ec5 0
14. elektrijada.dll 64bfa0f6e11058e34f3e5146f36a9230 0
15. ds[1].exe 218ba34aa5a4cc4ce2ee050c4093b355 0
16. donstalens[1].exe ac55c07f8a8b8554693a031c3c526457 0
17. damebiraju[1].exe 26e74240474451b2a652ae29be306157 0
18. cedajovanovic[1].exe ea2c8c3fae5434304f3bba2d3508476a 0
19. dinamo[1].exe 292dc78dbfb0fd00adfdecfa2bae2eb2 0
20. g17plus[1].exe 4c5041896ca25ffe178f97e20b994bfa 0
21. blic[1].exe 166cf1f52421a18901e88519793afdae 0
More files

Registry Details

Adware.Softomate may create the following registry entry or registry entries:
CLSID
{2A42D13C-D427-4787-821B-CF6973855778}
{3D8478AA-7B88-48A9-8BCB-B85D594411EC}
{4509D3CC-B642-4745-B030-645B79522C6D}
{452AE416-9A97-44CA-93DA-D0F15C36254F}
{45CDA4F7-594C-49A0-AAD1-8224517FE979}
{4897BBA6-48D9-468C-8EFA-846275D7701B}
{4CE516A7-F7AC-4628-B411-8F886DC5733E}
{4D8ED2B3-DC62-43EC-ABA3-5B74F046B1BE}
{57CADC46-58FF-4105-B733-5A9F3FC9783C}
{628F3201-34D0-49C0-BB9A-82A26AEFB291}
{81E852CC-1FD5-4004-8761-79A48B975E29}
{95B6A271-FEB4-4160-B0FF-44394C21C8DC}
{B24D9234-CFC5-46D2-95C5-0DE695A7895E}
{B2CA345D-ADB8-4F5D-AC64-4AB34322F659}
{B9F43021-60D4-42A6-A065-9BA37F38AC47}
{BF921DD3-732A-4A11-933B-A5EA49F2FD2C}
{CA3EB689-8F09-4026-AA10-B9534C691CE0}
{CDB982ED-F9D6-4E3B-B94B-96F705D35AD1}
{E67D5BC7-7129-493E-9281-F47BDAFACE4F}
{EC4085F2-8DB3-45A6-AD0B-CA289F3C5D7E}
SOFTWARE\Microsoft\Internet Explorer\Toolbar\{338B4DFE-2E2C-4338-9E41-E176D497299E}
SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{628F3201-34D0-49C0-BB9A-82A26AEFB291}
SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{338B4DFE-2E2C-4338-9E41-E176D497299E}

Directories

Adware.Softomate may create the following directory or directories:

%ProgramFiles%\elektrijada

Analysis Report

General information

Family Name: Adware.Softomate
Signature status: No Signature

Known Samples

MD5: 62202bd57aba983fbc49c151bbea9af1
SHA1: f25c2e2d9601b1aa524caf8621799e5e7251756c
SHA256: 8C728704B582F9A8581744BB74F0796A6917BAC202C7F76634E48AD06A1E1528
File Size: 176.19 KB, 176190 bytes
MD5: 8d29d95f9af432396026f1047f2cea19
SHA1: ab3417fcd518c745a87a1cd83e2ce28f263cad1b
SHA256: AA192C0862CBFD24BAD94FE13D6B330FC82E2AA28E406DB38C3CF79436CCBA8E
File Size: 301.57 KB, 301568 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
File Description IE Toolbar Helper Module
File Version
  • 4, 1, 0, 95
  • 3, 0, 1, 51
Internal Name
  • tbhelper
  • tbhelperU
Legal Copyright
  • Copyright © 2001-2006. All rights reserved.
  • Copyright © 2001-2009. All rights reserved.
Original Filename
  • tbhelper.dll
  • tbhelperU.dll
Product Name IE Toolbar
Product Version
  • 4, 1, 0, 95
  • 3.0.1.0

File Traits

  • dll
  • x86

Block Information

Total Blocks: 1,600
Potentially Malicious Blocks: 0
Whitelisted Blocks: 1,597
Unknown Blocks: 3

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 2 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 1 0 1 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 1 1 0 1 0 0 0 0 0 2 3 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 2 0 2 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 1 1 0 0 0 0 0 0 0 0 1 1 1 0 0 1 0 0 2 2 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 2 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 1 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 0 2 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\f25c2e2d9601b1aa524caf8621799e5e7251756c_0000176190.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ab3417fcd518c745a87a1cd83e2ce28f263cad1b_0000301568.,LiQMAxHB

Related Posts

Trending

Most Viewed

Loading...