flash_update.exe

Flash Player Pro

Air Software

Warning, this is not the legitimate setup program for Flash Player Pro. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Flash Player Pro. The application flash_update.exe, “Flash Player Pro ” by Air Software has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller   (signed by Air Software)

Product:
Flash Player Pro

Description:
Flash Player Pro

Version:
2.0.4.38

MD5:
e637672793a01dc4ad6b437b43d4cc16

SHA-1:
3a7037935c803852c706c2df1246cb94623996e1

SHA-256:
4789b7b0a3e06da5a52a14c6523269c6093ace6eff1d531cffd0fcd0c51a69aa

Scanner detections:
33 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 3:33:01 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstaller.E
455

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.06.14

Avira AntiVirus
Adware/Airinstall.J
7.11.142.186

avast!
Win32:Installer-L [PUP]
2014.9-151107

AVG
Adware Generic_r
2016.0.2933

Bitdefender
Application.Bundler.AirInstaller.E
1.0.20.1555

Bkav FE
W32.HfsAdware
1.3.0.6267

Clam AntiVirus
Win.Adware.Airadinstaller-65
0.98/19246

Comodo Security
Application.Win32.Agent.AJ
18086

Dr.Web
Trojan.SMSSend.4653
9.0.1.0311

Emsisoft Anti-Malware
Application.Bundler.AirInstaller
8.15.11.07.08

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
9.7.0.302.0

F-Prot
W32/AirInstall.A8.gen
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.AirInstaller
11.2015-07-11_7

G Data
Win32.Adware.Airadinstaller
15.11.24

IKARUS anti.virus
AdWare.Airinstall
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11737

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.1158

Malwarebytes
PUP.Optional.AirInstaller
v2015.11.07.08

MicroWorld eScan
Application.Bundler.AirInstaller.E
16.0.0.933

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwdort
0.28.0.59492

nProtect
Trojan-Clicker/W32.AirAdInstaller.836520
14.06.13.01

Panda Antivirus
Adware/AirInstaller
15.11.07.08

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
11.15.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
15.11.7.8

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.151105

Sophos
AirInstaller
4.98

Total Defense
Win32/AirInstaller.BRLAOX
37.1.62.1

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
AirInstaller
28194

Zillya! Antivirus
Adware.AirAdInstaller.Win32.78
2.0.0.1790

File size:
808.9 KB (828,328 bytes)

Product version:
2.0.4.38

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flash_update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 7:00:00 PM

Valid to:
3/26/2015 7:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
10/1/2013 12:43:08 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:CATDiJW7LeLUkoZ0h27zg7RcNzggCRjAiSQehtL+SgfbMUFGRGIrVssefd4g:NCIrwhW87R6zgBLS65fbMXGIBFwd4g

Entry address:
0x2553F0

Entry point:
60, BE, 00, 50, 59, 00, 8D, BE, 00, C0, E6, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8782

Packer / compiler:
UPX 2.90LZMA

Code size:
772 KB (790,528 bytes)

The file flash_update.exe has been seen being distributed by the following URL.

Remove flash_update.exe - Powered by Reason Core Security