flash_update.exe

Flash Player Pro

Air Software

Warning, this is not the legitimate setup program for Flash Player Pro. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Flash Player Pro. The application flash_update.exe, “Flash Player Pro ” by Air Software has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller   (signed by Air Software)

Product:
Flash Player Pro

Description:
Flash Player Pro

Version:
2.0.4.14

MD5:
50d3fee0b8ad739c07e7cf7e87eebc0c

SHA-1:
b31083a20801429fd17e6194372166e0748ed6cd

SHA-256:
664ae5af3f78fa88d18f4e863bcf80093a857034c80d2a565edda89bf403a427

Scanner detections:
33 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/16/2024 1:36:21 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstaller.E
563

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.06.14

Avira AntiVirus
Adware/Airinstall.J
7.11.142.186

avast!
Win32:Installer-L [PUP]
2014.9-150721

AVG
Adware Generic_r
2016.0.3041

Bitdefender
Application.Bundler.AirInstaller.E
1.0.20.1010

Bkav FE
W32.HfsAdware
1.3.0.6267

Clam AntiVirus
Win.Adware.Airadinstaller-65
0.98/19246

Comodo Security
Application.Win32.Agent.AJ
18086

Dr.Web
Trojan.SMSSend.4653
9.0.1.0202

Emsisoft Anti-Malware
Application.Bundler.AirInstaller
8.15.07.21.01

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
9.7.0.302.0

F-Prot
W32/AirInstall.A8.gen
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.AirInstaller
11.2015-21-07_3

G Data
Win32.Adware.Airadinstaller
15.7.24

IKARUS anti.virus
AdWare.Airinstall
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11737

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.1702

Malwarebytes
PUP.Optional.AirInstaller
v2015.07.21.01

MicroWorld eScan
Application.Bundler.AirInstaller.E
16.0.0.606

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwdort
0.28.0.59492

nProtect
Trojan-Clicker/W32.AirAdInstaller.836520
14.06.13.01

Panda Antivirus
Adware/AirInstaller
15.07.21.01

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
7.15.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
15.7.21.13

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.15719

Sophos
AirInstaller
4.98

Total Defense
Win32/AirInstaller.BRLAOX
37.1.62.1

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
AirInstaller
28194

Zillya! Antivirus
Adware.AirAdInstaller.Win32.78
2.0.0.1790

File size:
804.9 KB (824,232 bytes)

Product version:
2.0.4.14

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flash_update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 7:00:00 PM

Valid to:
3/26/2015 7:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
8/13/2013 4:06:18 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:oT/ETLJlvsqzerrcKtQyTGPILv5dLt6kyO5WfuHD+RS:483errlt8Mt6kt5c8d

Entry address:
0x2514E0

Entry point:
60, BE, 00, 20, 59, 00, 8D, BE, 00, F0, E6, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8795

Packer / compiler:
UPX 2.90LZMA

Code size:
768 KB (786,432 bytes)

The file flash_update.exe has been seen being distributed by the following URL.

Remove flash_update.exe - Powered by Reason Core Security