update.exe

Flash Player Pro

Air Software

Warning, this is not the legitimate setup program for Flash Player Pro. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Flash Player Pro. The application update.exe by Air Software has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller Inc.  (signed by Air Software)

Product:
Flash Player Pro

Version:
2.0.3.53

MD5:
476e3b370e2a87a501c27ca9a9535063

SHA-1:
ff1735982166d28c216b380e41d0c398c53d54b2

SHA-256:
2ee3a37d3b81a428fe812ef05d67ade65d8ee63c4143c145a873b92c87ba012b

Scanner detections:
33 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/2/2024 1:30:48 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.AirInstaller.4
403

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
15.12.29

Avira AntiVirus
ADWARE/Adware.Gen
7.11.183.178

avast!
Win32:Adware-CAH [PUP]
2014.9-151229

AVG
Adware Generic5
2016.0.2881

Bitdefender
Gen:Variant.Application.Bundler.AirInstaller.4
1.0.20.1815

Bkav FE
W32.HfsAdware
1.3.0.6267

Comodo Security
Application.Win32.AirAdInstaller.A
18095

Dr.Web
Adware.Downware.1011
9.0.1.0363

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.AirInstaller
8.15.12.29.03

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/AirAdInstaller
12/29/2015

F-Prot
W32/AirInstall.A.gen
v6.4.6.5.141

F-Secure
Gen:Variant.Adware.Kazy.260778
11.2015-29-12_3

G Data
Win32.Adware.Airadinstaller
15.12.24

IKARUS anti.virus
Trojan-Downloader
t3scan.1.8.3.0

K7 AntiVirus
Adware
13.185.13943

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Generic
14.0.0.899

Malwarebytes
PUP.Optional.AirInstaller
v2015.12.29.03

McAfee
Trojan.Artemis!10FAC89DB8EE
5600.6537

MicroWorld eScan
Gen:Variant.Application.Bundler.AirInstaller.4
16.0.0.1089

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cxhjot
0.28.6.62995

Norman
Gen:Variant.Application.Bundler.AirInstaller.4
11.20151229

Panda Antivirus
Adware/AirInstaller
15.12.29.03

Qihoo 360 Security
Win32/Virus.Adware.a5b
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.I5
12.15.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
15.12.29.3

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.151227

Sophos
PUA 'AirInstaller'
5.10

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
Threat.4782985
34232

Zillya! Antivirus
Adware.AirAdInstaller.Win32.23
2.0.0.1799

File size:
1 MB (1,095,248 bytes)

Product version:
2.0.3.53

Copyright:
(c) AirInstaller. All rights reserved.

Original file name:
AirInstaller.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 6:00:00 PM

Valid to:
3/26/2015 6:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
3/4/2013 5:35:04 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:TfLHuzBsBX4BF3LEV8dz/WqBEJBFeYns+HAeyfLGfgyMWsY:Tfj0wk9L80z/LEJBFeJ+HZEGTb

Entry address:
0x2423E0

Entry point:
60, BE, 00, C0, 53, 00, 8D, BE, 00, 50, EC, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Entropy:
7.7654

Packer / compiler:
UPX 2.90LZMA

Code size:
1 MB (1,077,248 bytes)

The file update.exe has been seen being distributed by the following URL.

Remove update.exe - Powered by Reason Core Security