upgrade.exe

Flash Player Pro

Air Software

Warning, this is not the legitimate setup program for Flash Player Pro. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from Flash Player Pro. The application upgrade.exe by Air Software has been detected as adware by 32 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
AirInstaller Inc.  (signed by Air Software)

Product:
Flash Player Pro

Version:
2.0.3.66

MD5:
6b8be188163cc4c97625bd9592719d07

SHA-1:
a889b79cbf3a7675c46ba2bfaf906d7b7d3783bd

SHA-256:
b4dbd1382b1b6c40ccf477ec456d56f199cfa565ab42216e5511958ad04936a9

Scanner detections:
32 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/19/2024 8:46:37 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.AirInstaller.4
399

Agnitum Outpost
PUA.AirAdInstaller
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
16.01.01

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.143.18

avast!
Win32:Adware-CAH [PUP]
2014.9-160101

AVG
Adware InstallCore
2017.0.2877

Bitdefender
Gen:Variant.Application.Bundler.AirInstaller.4
1.0.20.5

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.AirAdInstaller.A
18095

Dr.Web
Adware.Downware.10718
9.0.1.01

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.AirInstaller
8.16.01.01.08

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
10.7.0.302.0

F-Prot
W32/AirInstall.A.gen
v6.4.6.5.141

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2016-01-01_6

G Data
Win32.Adware.Airadinstaller
16.1.24

IKARUS anti.virus
Win32.Malware
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11737

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Generic
14.0.0.881

Malwarebytes
PUP.Optional.Bundle
v2016.01.01.08

MicroWorld eScan
Gen:Variant.Application.Bundler.AirInstaller.4
17.0.0.3

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cxhlas
0.28.0.60253

Norman
Gen:Variant.Application.Bundler.AirInstaller.4
11.20160101

nProtect
Trojan-Clicker/W32.AirAdInstaller.1115272.B
14.07.01.02

Panda Antivirus
Adware/AirInstaller
16.01.01.08

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
1.16.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
16.1.1.20

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.151230

Sophos
PUA 'AirInstaller'
5.15

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
AirInstaller
28208

Zillya! Antivirus
Adware.AirAdInstaller.Win32.9
2.0.0.1789

File size:
1.1 MB (1,103,496 bytes)

Product version:
2.0.3.66

Copyright:
(c) AirInstaller. All rights reserved.

Original file name:
AirInstaller.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\upgrade.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/25/2013 8:00:00 AM

Valid to:
3/27/2015 7:59:59 AM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
4/3/2013 12:59:21 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:WDjh9HqtR6+WkHumwHldAuKzedLJbz+FZ0BMJhVmfUPsxNjKX5/VG/8:WDV9K76LO0uKFoPJhofUINmdV1

Entry address:
0x2456E0

Entry point:
60, BE, 00, D0, 53, 00, 8D, BE, 00, 40, EC, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Entropy:
7.7661

Packer / compiler:
UPX 2.90LZMA

Code size:
1 MB (1,085,440 bytes)

The file upgrade.exe has been seen being distributed by the following URL.

Remove upgrade.exe - Powered by Reason Core Security