setup.exe

HD Player

Air Software

Warning, this is not the legitimate setup program for HD Player. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from HD Player. The application setup.exe, “HD Player ” by Air Software has been detected as adware by 31 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
AirInstaller   (signed by Air Software)

Product:
HD Player

Description:
HD Player

Version:
2.0.15.0

MD5:
bbec5217afd70247dffa1ef25717bee2

SHA-1:
b153aa2436bd08b15aa9eb5cb68d91d311fa2118

SHA-256:
5742d7293ad29061251bed4e90351477c53707125da34d1a34b50a74135f19c1

Scanner detections:
31 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/19/2024 7:00:37 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstaller.A
827

Agnitum Outpost
PUA.AirAdInstaller
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.02.22

Avira AntiVirus
Adware/AgentCV.A.6255
7.11.150.246

avast!
Win32:Adware-gen [Adw]
2014.9-141030

AVG
InstallCore
2015.0.3305

Bitdefender
Application.Bundler.AirInstaller.A
1.0.20.1515

Bkav FE
W32.FamVT.VBCriptK4.Adware
1.3.0.6185

Comodo Security
Application.Win32.AirAdInstaller.B
18308

Dr.Web
Trojan.SMSSend.4953
9.0.1.0303

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
8.7.0.302.0

F-Prot
W32/AirInstall.D.gen
v6.4.7.1.166

F-Secure
Application.Bundler.AirInstaller
11.2014-30-10_5

G Data
Win32.Adware.Airadinstaller
14.10.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.3021

Malwarebytes
PUP.Optional.AirAdInstaller
v2014.10.30.08

MicroWorld eScan
Application.Bundler.AirInstaller.A
15.0.0.909

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwbyev
0.28.0.59048

nProtect
Trojan-Clicker/W32.AirAdInstaller.824744
14.03.17.01

Panda Antivirus
Trj/Genetic.gen
14.10.30.08

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.I3
10.14.14.00

Reason Heuristics
DownloadManager.AirSoftware.F
14.10.30.20

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.141028

Sophos
AirInstaller
4.98

SUPERAntiSpyware
Adware.AirAdInstaller
10267

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
Threat.4150696
29418

Zillya! Antivirus
Adware.AirAdInstaller.Win32.205
2.0.0.1973

File size:
755.9 KB (774,048 bytes)

Product version:
2.0.15.0

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 6:00:00 PM

Valid to:
3/26/2015 6:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
6/18/2014 5:48:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:uQN20eCofhgVDNuK40ufbN64b6slOJ5B/N2j+aFUnQn53CI2tjyufeKB1:t40eCoJgD8H3T04nARN2H6nQn53lQjy6

Entry address:
0x25C418

Entry point:
60, E8, 00, 00, 00, 00, 58, 05, 5A, 0B, 00, 00, 8B, 30, 03, F0, 2B, C0, 8B, FE, 66, AD, C1, E0, 0C, 8B, C8, 50, AD, 2B, C8, 03, F1, 8B, C8, 57, 51, 49, 8A, 44, 39, 06, 88, 04, 31, 75, F6, 2B, C0, AC, 8B, C8, 80, E1, F0, 24, 0F, C1, E1, 0C, 8A, E8, AC, 0B, C8, 51, 02, CD, BD, 00, FD, FF, FF, D3, E5, 59, 58, 8B, DC, 8D, A4, 6C, 90, F1, FF, FF, 51, 2B, C9, 51, 51, 8B, CC, 51, 66, 8B, 17, C1, E2, 0C, 52, 57, 83, C1, 04, 51, 50, 83, C1, 04, 56, 51, E8, 5E, 00, 00, 00, 8B, E3, 5E, 5A, 2B, C0, 89, 04, 32, B4, 10...
 
[+]

Entropy:
7.9353

Packer / compiler:
ASPack v1.08.04

Code size:
1.7 MB (1,733,632 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security