setup.exe

HD Player

Air Software

Warning, this is not the legitimate setup program for HD Player. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from HD Player. The application setup.exe, “HD Player ” by Air Software has been detected as adware by 24 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer.
Publisher:
AirInstaller   (signed by Air Software)

Product:
HD Player

Description:
HD Player

Version:
2.0.5.0

MD5:
3000c3394eb08c46c87ba8e7202aae70

SHA-1:
76f1466f91b5ad6554040689b0bd3dababb8592a

SHA-256:
41aecc74034b3ad2d36c03b92b108903e99778146f44ec48854958a1fa3ac633

Scanner detections:
24 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 1:59:57 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.02.22

Avira AntiVirus
ADWARE/Adware.Gen
7.11.137.118

avast!
Malware-gen
140529-0

AVG
Adware Generic_r.JF
2014.0.3955

Comodo Security
Application.Win32.AirAdInstaller.A
17825

Dr.Web
Trojan.SMSSend.4819
9.0.1.05190

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

F-Prot
W32/AirInstall.A8.gen
v6.4.7.1.166

G Data
Win32.Adware.Airadinstaller
14.5.24

IKARUS anti.virus
Win32.AdWare
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.3786

Malwarebytes
PUP.Optional.AirInstaller
v2014.05.30.08

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwbyev
0.28.0.59048

nProtect
Trojan-Clicker/W32.AirAdInstaller.824744
14.03.17.01

Panda Antivirus
Trj/Genetic.gen
14.05.30.08

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Reason Heuristics
DownloadManager.AirSoftware.F
14.8.7.18

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.14528

Sophos
AirInstaller
4.97

SUPERAntiSpyware
Adware.AirInstaller/Variant
10573

Vba32 AntiVirus
AdWare.AirAdInstaller.ajov
3.12.24.3

VIPRE Antivirus
Iminent
26712

File size:
842.4 KB (862,624 bytes)

Product version:
2.0.5.0

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 10:00:00 PM

Valid to:
3/26/2015 8:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
3/6/2014 4:15:18 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:07OkPVpSfAMEbmW3t9oPt2QWfIwV4j8eBhtuKG+YWpafR70fvg92iYttMhmNdvVR:02AP9a2DIHg+tNG/WpaJ7uvBibqdv/n7

Entry address:
0x269510

Entry point:
60, BE, 00, 60, 5A, 00, 8D, BE, 00, B0, E5, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA]

Code size:
784 KB (802,816 bytes)

The file setup.exe has been seen being distributed by the following 2 URLs.

Remove setup.exe - Powered by Reason Core Security