flash player 12.exe

Adobe Flash Player

Air Software

Warning, this is not the legitimate setup program for Adobe Flash Player. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Adobe Flash Player. The application flash player 12.exe by Air Software has been detected as adware by 32 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller Inc.  (signed by Air Software)

Product:
Adobe Flash Player

Version:
2.0.4.11

MD5:
2b8793fb45d372231062f68a4f186fda

SHA-1:
5470ca3ae52842a97934de11fb3b6477e247151b

SHA-256:
7616ff63ba5d02dd69070b4883c45fcd36fb40a8418cb7217cd97bc7a409ab4a

Scanner detections:
32 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 6:51:01 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.AirInstaller.4
375

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirInstaller
2015.04.12

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.140.88

avast!
Win32:Installer-L [PUP]
2014.9-160126

AVG
Adware Generic_r
2017.0.2853

Bitdefender
Application.Bundler.AirInstaller.E
1.0.20.130

Bkav FE
W32.HfsAdware
1.3.0.6267

Clam AntiVirus
Win.Adware.Airadinstaller-4
0.98/19086

Comodo Security
Application.Win32.AirAdInstaller.A
18025

Dr.Web
Trojan.SMSSend.4204
9.0.1.026

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.AirInstaller
8.16.01.26.09

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
10.7.0.302.0

F-Prot
W32/AirInstall.A8.gen
v6.4.7.1.166

F-Secure
Suspected infection: Application.Bundler.AirInstaller.E
11.2016-26-01_3

G Data
Win32.Adware.Airadinstaller
16.1.24

IKARUS anti.virus
not-a-virus:AdWare.Win32
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.176.11613

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.758

Malwarebytes
PUP.Optional.AirInstaller
v2016.01.26.09

MicroWorld eScan
Application.Bundler.AirInstaller.E
17.0.0.78

NANO AntiVirus
Riskware.Win32.AirAdInstaller.daxzhz
0.28.0.60253

nProtect
Trojan/W32.Agent.1125288.B
14.03.31.01

Panda Antivirus
Adware/AirInstaller
16.01.26.09

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
1.16.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
16.1.26.9

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.16124

Sophos
AirInstaller
4.98

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
AirInstaller
27892

Zillya! Antivirus
Adware.AirAdInstaller.Win32.32
2.0.0.1833

File size:
1.1 MB (1,117,096 bytes)

Product version:
2.0.4.11

Copyright:
(c) AirInstaller. All rights reserved.

Original file name:
AirInstaller.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flash player 12.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 7:00:00 PM

Valid to:
3/26/2015 7:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
7/15/2013 12:25:53 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:J3n+dxJkJjwBGxw8ckyTiyMY1BE5v+fY7UJQ:AVyMBGxrc9MA4CY7l

Entry address:
0x250260

Entry point:
60, BE, 00, 40, 54, 00, 8D, BE, 00, D0, EB, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Entropy:
7.7629

Packer / compiler:
UPX 2.90LZMA

Code size:
1.1 MB (1,101,824 bytes)

The file flash player 12.exe has been seen being distributed by the following URL.

Remove flash player 12.exe - Powered by Reason Core Security