flashupdate.exe

Flash Player Pro

Air Software

Warning, this is not the legitimate setup program for Flash Player Pro. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Flash Player Pro. The application flashupdate.exe, “Flash Player Pro ” by Air Software has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller   (signed by Air Software)

Product:
Flash Player Pro

Description:
Flash Player Pro

Version:
2.0.4.56

MD5:
ce24071b0e02715fce68a1dea27ef97c

SHA-1:
42676d03785d067a0e5274870865c0ec20c21e2f

SHA-256:
457dd67709a42499fc4bf0fc3bdc47c168df64558ce1bf09b261a4ed3583bd62

Scanner detections:
33 / 68

Status:
Adware

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
5/7/2024 10:25:54 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstaller.E
364

Agnitum Outpost
PUA.AirAdInstaller
7.1.1

AhnLab V3 Security
Adware/Win32.AirAdInstaller
16.02.06

Avira AntiVirus
Adware/Airinstall.J
7.11.131.194

avast!
Win32:Installer-L [PUP]
2014.9-160206

AVG
Adware Generic_r
2017.0.2842

Bitdefender
Application.Bundler.AirInstaller.E
1.0.20.185

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Airadinstaller-183
0.98/19944

Comodo Security
Application.Win32.Agent.AJ
17787

Dr.Web
Adware.Downware.1470
9.0.1.037

Emsisoft Anti-Malware
Application.Bundler.AirInstaller
8.16.02.06.10

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
10.7.0.302.0

F-Prot
W32/AirInstall.D.gen
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.AirInstaller
11.2016-06-02_7

G Data
Win32.Adware.Airadinstaller
16.2.24

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.176.11226

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.703

Malwarebytes
PUP.Optional.AirInstaller
v2016.02.06.10

McAfee
Trojan.Artemis!80C794C99729
5600.6498

MicroWorld eScan
Application.Bundler.AirInstaller.E
17.0.0.111

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwanhi
0.28.0.59492

nProtect
Trojan-Clicker/W32.AirAdInstaller.836008
14.09.17.01

Panda Antivirus
Trj/Genetic.gen
16.02.06.10

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
2.16.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
16.2.6.10

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.16204

Sophos
AirInstaller
4.97

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.24.3

VIPRE Antivirus
AirInstaller
26480

Zillya! Antivirus
Adware.AirAdInstaller.Win32.107
2.0.0.1782

File size:
815.9 KB (835,496 bytes)

Product version:
2.0.4.56

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flashupdate.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 5:00:00 PM

Valid to:
3/26/2015 5:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
10/18/2013 12:44:14 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:9Dfc9gxWUtwlxQ99Bm/hP6rN2meg55Pl3:9D6TUt79ChChjeg5

Entry address:
0x25D020

Entry point:
60, BE, 00, B0, 59, 00, 8D, BE, 00, 60, E6, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8792

Packer / compiler:
UPX 2.90LZMA

Code size:
780 KB (798,720 bytes)

The file flashupdate.exe has been seen being distributed by the following URL.

Remove flashupdate.exe - Powered by Reason Core Security