setup.exe

HD Player

Air Software

Warning, this is not the legitimate setup program for HD Player. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from HD Player. The application setup.exe, “HD Player ” by Air Software has been detected as adware by 31 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
AirInstaller   (signed by Air Software)

Product:
HD Player

Description:
HD Player

Version:
2.0.4.99

MD5:
4372ddf0e50570216a589d20d7dae37a

SHA-1:
8dbfd48acb1adf3c98e86616838ff0ef3648f8d4

SHA-256:
2a253474f76c0fed52cc18256d6d1dc2be3b808cdae0b5a5517a157be88ad467

Scanner detections:
31 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 3:21:01 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstaller.B
833

Agnitum Outpost
PUA.AirAdInstaller
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.02.22

Avira AntiVirus
Adware/AgentCV.A.6255
7.11.150.246

avast!
Win32:Adware-gen [Adw]
2014.9-141024

AVG
Adware InstallCore.QH
2014.0.4040

Bitdefender
Application.Bundler.AirInstaller.B
1.0.20.1485

Comodo Security
Application.Win32.AirAdInstaller.B
18308

Dr.Web
Trojan.SMSSend.4790
9.0.1.05190

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.1819587
10/24/2014

F-Prot
W32/AirInstall.D.gen
v6.4.7.1.166

F-Secure
Application.Bundler.AirInstaller
11.2014-24-10_6

G Data
Win32.Adware.Airadinstaller
14.10.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
15.0.0.494

Malwarebytes
PUP.Optional.AirAdInstaller
v2014.10.24.04

MicroWorld eScan
Application.Bundler.AirInstaller.B
15.0.0.891

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwbyev
0.28.0.59048

nProtect
Trojan-Clicker/W32.AirAdInstaller.824744
14.03.17.01

Panda Antivirus
Trj/Genetic.gen
14.10.24.04

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.I5
10.14.14.00

Reason Heuristics
DownloadManager.AirSoftware.F
14.10.24.15

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.141022

Sophos
AirInstaller
4.98

SUPERAntiSpyware
Adware.AirAdInstaller
10280

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
Threat.4150696
29418

Zillya! Antivirus
Adware.AirAdInstaller.Win32.101
2.0.0.1966

File size:
841.9 KB (862,112 bytes)

Product version:
2.0.4.99

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 7:00:00 PM

Valid to:
3/26/2015 7:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
2/26/2014 12:32:55 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:UdSm0SPFmhs4+doHz2hM3OBT922ymyqlA9ZfZI7m2/g5xkdGOcJEY:Udjdd/qH5G5nS9Zfi7m2F8OHY

Entry address:
0x268310

Entry point:
60, BE, 00, 50, 5A, 00, 8D, BE, 00, C0, E5, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8867

Packer / compiler:
UPX 2.90LZMA

Code size:
784 KB (802,816 bytes)

Remove setup.exe - Powered by Reason Core Security