setup.exe

HD Player

Air Software

Warning, this is not the legitimate setup program for HD Player. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from HD Player. The application setup.exe, “HD Player ” by Air Software has been detected as adware by 32 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
AirInstaller   (signed by Air Software)

Product:
HD Player

Description:
HD Player

Version:
2.0.44.0

MD5:
1ffadc37f96d133e50f19c2ad98f740d

SHA-1:
e9d95b3742049169aa9c85db2d6284cb8cc23c20

SHA-256:
04e1523ac35ebfca6809015c30ef37b126cd82a4880eec0b8b6ae264f9bc4bcd

Scanner detections:
32 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
12/27/2024 3:27:16 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.L
899

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
14.08.19

Avira AntiVirus
ADWARE/Adware.Gen
7.11.141.70

avast!
Win32:Adware-gen [Adw]
140813-1

AVG
InstallCore
2015.0.3377

Bitdefender
Application.Bundler.L
1.0.20.1155

Bkav FE
W32.FamVT.VBCriptK4.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Airadinstaller-21
0.98/19168

Comodo Security
Application.Win32.AirAdInstaller.A
18047

Dr.Web
Trojan.SMSSend.5375
9.0.1.05190

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

F-Prot
W32/A-10bb76c9
v6.4.7.1.166

F-Secure
Application.Bundler.L
11.2014-19-08_3

G Data
Application.Bundler
14.8.24

IKARUS anti.virus
Win32.Malware
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
15.0.0.494

Malwarebytes
PUP.Optional.AirInstaller
v2014.08.19.06

McAfee
Trojan.Artemis!B6F704289CC3
5600.7033

MicroWorld eScan
Application.Bundler.L
15.0.0.693

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwblbp
0.28.0.59608

nProtect
Trojan-Clicker/W32.AirAdInstaller.862112
14.05.22.01

Panda Antivirus
Trj/Genetic.gen
14.08.19.06

Qihoo 360 Security
Malware.QVM18.Gen
1.0.0.1015

Reason Heuristics
DownloadManager.AirSoftware.I
14.8.26.4

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.14817

Sophos
AirInstaller
4.98

SUPERAntiSpyware
Adware.AirInstaller/Variant
10411

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
Iminent
28030

Zillya! Antivirus
Adware.AirAdInstaller.Win32.101
2.0.0.1798

File size:
898.9 KB (920,480 bytes)

Product version:
2.0.44.0

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 7:00:00 PM

Valid to:
3/26/2015 7:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
8/7/2014 4:53:25 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:lb12XCHyGvKeB545hhdYn2KEAdSKM1YSMltXCQBsrxrjh:ljHyUl5EhjYnnEi21YdNKljh

Entry address:
0x296630

Entry point:
60, BE, 00, 70, 5C, 00, 8D, BE, 00, A0, E3, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8731

Packer / compiler:
UPX 2.90LZMA

Code size:
832 KB (851,968 bytes)

Remove setup.exe - Powered by Reason Core Security