setup.exe

HD Player

Download Manager

This is part of the Air Installer, a download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application setup.exe, “HD Player ” by Download Manager has been detected as adware by 34 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
Download Manager Cert   (signed by Download Manager)

Product:
HD Player

Description:
HD Player

Version:
2.0.4.99

MD5:
25b24f24d3ad6789b9f96bcdf64c260e

SHA-1:
f522b4443b9d4be697e2ca95c79c7bfe8f4dc270

SHA-256:
462ba9cf1b993f852210a35266fe2b0b4d59462a50a71bcdb4dbbd53b3918aca

Scanner detections:
34 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2024 2:19:21 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AirInstall.A
833

Agnitum Outpost
PUA.AirAdInstaller
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
14.10.24

Avira AntiVirus
ADWARE/Adware.Gen
7.11.148.40

avast!
PUP-gen [PUP]
2014.9-141024

AVG
Adware InstallCore.QH
2014.0.4040

Bitdefender
Application.Bundler.AirInstall.A
1.0.20.1485

Bkav FE
HW32.CDB
1.3.0.4959

Clam AntiVirus
Win.Trojan.Airadinstaller-2
0.98/19303

Comodo Security
Application.Win32.AirAdInstaller.B
18235

Dr.Web
Trojan.SMSSend.4790
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.148461
8.14.10.24.04

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.1819587
10/24/2014

F-Prot
W32/AirInstall.D.gen
v6.4.7.1.166

F-Secure
Application.Bundler.AirInstall
11.2014-24-10_6

G Data
Application.Bundler.AirInstall
14.10.24

IKARUS anti.virus
AdWare.AirAdInstaller
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12013

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.3052

Malwarebytes
PUP.Optional.AirAdInstaller
v2014.10.24.04

MicroWorld eScan
Application.Bundler.AirInstall.A
15.0.0.891

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwjiid
0.28.0.59608

nProtect
Trojan-Clicker/W32.AirAdInstaller.770472
14.08.22.01

Panda Antivirus
Trj/Genetic.gen
14.10.24.04

Qihoo 360 Security
Malware.QVM18.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
10.14.14.00

Reason Heuristics
PUP.Installer.DownloadManager.F
14.10.24.15

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.141022

Sophos
AirInstaller
4.98

SUPERAntiSpyware
Adware.AirAdInstaller
10280

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
Threat.4784938
29418

Zillya! Antivirus
Adware.AirAdInstaller.Win32.169
2.0.0.1835

File size:
841.9 KB (862,120 bytes)

Product version:
2.0.4.99

Copyright:
(c) Download Manager Cert

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/7/2013 8:00:00 PM

Valid to:
6/8/2014 7:59:59 PM

Subject:
CN=Download Manager, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Manager, L=Vancouver, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
428E8B7C1AC548D083F4D3A0C5FDAF4C

File PE Metadata
Compilation timestamp:
2/26/2014 12:32:55 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:8dSm0SPFmhs4+doHz2hM3OBT922ymyqlA9ZfZI7m2/g5xkdGOcJyK:8djdd/qH5G5nS9Zfi7m2F8ONK

Entry address:
0x268310

Entry point:
60, BE, 00, 50, 5A, 00, 8D, BE, 00, C0, E5, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8867

Packer / compiler:
UPX 2.90LZMA

Code size:
784 KB (802,816 bytes)

Remove setup.exe - Powered by Reason Core Security