flash_update.exe

Flash Player Pro

Air Software

Warning, this is not the legitimate setup program for Flash Player Pro. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Flash Player Pro. The application flash_update.exe, “Flash Player Pro ” by Air Software has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller   (signed by Air Software)

Product:
Flash Player Pro

Description:
Flash Player Pro

Version:
2.0.4.35

MD5:
cb15147024eaa059012eef2879516f49

SHA-1:
6f7d7e2d3be29e9f77cf97793715302832f29720

SHA-256:
0b5d39e63fd86d1ca7b326f358cc1037a6e7c19407e8b1b6475cc35433cfb3b8

Scanner detections:
33 / 68

Status:
Adware

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/26/2024 1:26:12 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstaller.E
5676587

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.06.14

Avira AntiVirus
Adware/Airinstall.J
7.11.125.192

avast!
Adware-gen [Adw]
2014.9-150413

AVG
Adware Generic_r.IX
2014.0.4311

Bitdefender
Application.Bundler.AirInstaller.E
1.0.20.515

Bkav FE
W32.HfsAdware
1.3.0.6267

Clam AntiVirus
Win.Adware.Airadinstaller-65
0.98/19246

Comodo Security
Application.Win32.Agent.AJ
17640

Dr.Web
Trojan.SMSSend.4528
9.0.1.0103

Emsisoft Anti-Malware
Application.Bundler.AirInstaller
9.0.0.4799

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

F-Prot
W32/AirInstall.A.gen
v6.4.6.5.141

F-Secure
Riskware.Application.Bundler.AirInstaller
5.13.68

G Data
Win32.Adware.Airadinstaller
15.4.24

herdProtect (fuzzy)
2015.7.15.13

IKARUS anti.virus
AdWare.Airinstall
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.175.10881

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
15.0.0.543

Malwarebytes
PUP.Optional.AirInstaller
v2015.04.13.06

MicroWorld eScan
Application.Bundler.AirInstaller.E
16.0.0.309

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwdort
0.28.0.59492

nProtect
Trojan-Clicker/W32.AirAdInstaller.824744
14.01.19.01

Panda Antivirus
Adware/AirInstaller
15.04.13.06

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
4.15.14.00

Reason Heuristics
DownloadManager.Bundler.Air Software
15.4.13.14

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.15411

Sophos
AirInstaller
4.96

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
AirInstaller
25584

Zillya! Antivirus
Adware.AirAdInstaller.Win32.78
2.0.0.1790

File size:
807.9 KB (827,304 bytes)

Product version:
2.0.4.35

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flash_update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 4:00:00 PM

Valid to:
3/26/2015 4:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
9/25/2013 3:56:45 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:ic8Ua5Xe9YKd3taCgDih+qF0VGPfhvbB4ST+A5YApOvcx/5BURVHZnZGp2rVq+I:ij/2YecJW+NEd6Sd5Y4Ovch6jZc2ro+I

Entry address:
0x254FE0

Entry point:
60, BE, 00, 50, 59, 00, 8D, BE, 00, C0, E6, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8777

Packer / compiler:
UPX 2.90LZMA

Code size:
772 KB (790,528 bytes)

The file flash_update.exe has been seen being distributed by the following URL.

Remove flash_update.exe - Powered by Reason Core Security