flash_update.exe

Flash Player Pro

Air Software

Warning, this is not the legitimate setup program for Flash Player Pro. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Flash Player Pro. The application flash_update.exe, “Flash Player Pro ” by Air Software has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller   (signed by Air Software)

Product:
Flash Player Pro

Description:
Flash Player Pro

Version:
2.0.4.60

MD5:
961134896fb0e425d65c288c11ee3134

SHA-1:
5652fbb0eefd74ecd79f368ac0d615aadd8ddd87

SHA-256:
db9c5dadbe0aedef32af9dbc517e5bb3345c9a9ae88d6ec1c46f932d7c64cf79

Scanner detections:
33 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/26/2024 5:47:52 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstaller.E
6516682

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.06.14

Avira AntiVirus
Adware/Airinstall.J
7.11.142.186

avast!
Win32:Installer-L [PUP]
2014.9-150324

AVG
Adware Generic_r
2016.0.3160

Bitdefender
Application.Bundler.AirInstaller.E
1.0.20.415

Bkav FE
W32.HfsAdware
1.3.0.6267

Clam AntiVirus
Win.Adware.Airadinstaller-65
0.98/19246

Comodo Security
Application.Win32.Agent.AJ
18086

Dr.Web
Trojan.SMSSend.4653
9.0.1.083

Emsisoft Anti-Malware
Application.Bundler.AirInstaller
9.0.0.4799

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

F-Prot
W32/AirInstall.A8.gen
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.AirInstaller
5.13.68

G Data
Win32.Adware.Airadinstaller
15.3.24

herdProtect (fuzzy)
2015.6.29.13

IKARUS anti.virus
AdWare.Airinstall
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11737

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
15.0.0.543

Malwarebytes
PUP.Optional.AirInstaller
v2015.03.24.03

MicroWorld eScan
Application.Bundler.AirInstaller.E
16.0.0.249

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwdort
0.28.0.59492

nProtect
Trojan-Clicker/W32.AirAdInstaller.836520
14.06.13.01

Panda Antivirus
Adware/AirInstaller
15.03.24.03

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
3.15.14.00

Reason Heuristics
DownloadManager.Bundler.Air Software
15.3.24.15

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.15322

Sophos
AirInstaller
4.98

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
AirInstaller
28194

Zillya! Antivirus
Adware.AirAdInstaller.Win32.78
2.0.0.1790

File size:
816.4 KB (836,008 bytes)

Product version:
2.0.4.60

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flash_update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 6:00:00 PM

Valid to:
3/26/2015 6:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
10/28/2013 11:14:04 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:3pfkL+1vdXMy2D7oROSIuYQ6iwKNHxtr3:3pcCj8yKKOqYL+R5

Entry address:
0x25D2A0

Entry point:
60, BE, 00, B0, 59, 00, 8D, BE, 00, 60, E6, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8796

Packer / compiler:
UPX 2.90LZMA

Code size:
780 KB (798,720 bytes)

The file flash_update.exe has been seen being distributed by the following URL.

Remove flash_update.exe - Powered by Reason Core Security