chrome_update.exe

Software Updater

Air Software

This is part of the Air Installer, a download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application chrome_update.exe, “Software Updater ” by Air Software has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
AirInstaller   (signed by Air Software)

Product:
Software Updater

Description:
Software Updater

Version:
2.0.4.69

MD5:
4614626a789ea08c35a391ebe46dcb34

SHA-1:
e2ae325a005a196d735ead100cefb6dfc7251242

SHA-256:
a1f0f1b552e0aa4f094e34011e9f26894be4ec4d1c786f4c5fbcb1432f6a12fb

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 1:48:50 AM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
Troj.W32.Jorik.Steckt
2.1.4+

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.02.22

Avira AntiVirus
Adware/AgentCV.A.6255
7.11.150.246

avast!
Win32:Installer-L [PUP]
2014.9-160121

AVG
Adware InstallCore
2017.0.2857

Clam AntiVirus
Win.Adware.Airadinstaller-59
0.98/19312

Comodo Security
Application.Win32.AirAdInstaller.A
17728

Dr.Web
Trojan.SMSSend.4747
9.0.1.021

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
10.7.0.302.0

F-Prot
W32/AirInstall.D.gen
v6.4.7.1.166

G Data
Win32.Adware.Airadinstaller
16.1.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.782

Malwarebytes
PUP.Optional.AirInstaller
v2016.01.21.01

McAfee
Artemis!0AD84E90907F
5600.6513

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwbyev
0.28.0.59048

nProtect
Trojan-Clicker/W32.AirAdInstaller.824744
14.03.17.01

Panda Antivirus
Trj/Genetic.gen
16.01.21.01

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.I5
1.16.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
16.1.21.13

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.16119

Sophos
AirInstaller
4.98

SUPERAntiSpyware
Adware.AirAdInstaller
9372

Trend Micro House Call
TROJ_GEN.F47V0119
7.2.21

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
Iminent
26124

Zillya! Antivirus
Adware.AirAdInstaller.Win32.103
2.0.0.1902

File size:
817.9 KB (837,544 bytes)

Product version:
2.0.4.69

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\chrome_update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 4:00:00 PM

Valid to:
3/26/2015 4:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
12/17/2013 11:10:42 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:bddjBQcqQV8/0+2PeW+zrAHSVl3fLQWdWtorDRJRuyT81g+R:JdjBlVx+2PzsflvDOop3Zk

Entry address:
0x25F7B0

Entry point:
60, BE, 00, D0, 59, 00, 8D, BE, 00, 40, E6, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8789

Packer / compiler:
UPX 2.90LZMA

Code size:
780 KB (798,720 bytes)

The file chrome_update.exe has been seen being distributed by the following URL.

Remove chrome_update.exe - Powered by Reason Core Security