video_update.exe

HD Player

Air Software

Warning, this is not the legitimate setup program for HD Player. The setup is bootstrapped by the Air Installer 'download manager' (a pay-per-install monetization download manager) that bundles unwanted software (adware, toolbars, extensions) during setup while deciving the user into thinking they are downloading the stadard installation setup from HD Player. The application video_update.exe, “HD Player ” by Air Software has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
AirInstaller   (signed by Air Software)

Product:
HD Player

Description:
HD Player

Version:
2.0.4.99

MD5:
3cd8a3993700492d223e3dcf3f93ab72

SHA-1:
d16955e75a6d3ebb981a23ba429ad0856e583ce2

SHA-256:
590f9e8d6448f694fc1a03dd96070e3d401bed299f7e756a033e2a001d9a0bf6

Scanner detections:
33 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/24/2024 9:46:16 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.AirInstaller.4
468

Agnitum Outpost
PUA.AirAdInstaller
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2014.02.22

Avira AntiVirus
ADWARE/Adware.Gen
7.11.145.10

avast!
PUP-gen [PUP]
2014.9-151025

AVG
Adware Generic_r
2016.0.2946

Bitdefender
Gen:Variant.Adware.Graftor.147957
1.0.20.1490

Bkav FE
W32.FamVT.VBCriptK4.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Airadinstaller-20
0.98/20462

Comodo Security
Application.Win32.AirAdInstaller.B
18157

Dr.Web
Trojan.SMSSend.4684
9.0.1.0298

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.AirInstaller
8.15.10.25.08

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
9.7.0.302.0

F-Prot
W32/AirInstall.D.gen
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2015-25-10_1

G Data
Win32.Adware.Airadinstaller
15.10.24

IKARUS anti.virus
Win32.AdWare
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.1223

Malwarebytes
PUP.Optional.AirInstaller
v2015.10.25.08

MicroWorld eScan
Gen:Variant.Adware.Graftor.147957
16.0.0.894

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwbyev
0.28.0.59048

nProtect
Trojan-Clicker/W32.AirAdInstaller.824744
14.03.17.01

Panda Antivirus
Trj/Genetic.gen
15.10.25.08

Qihoo 360 Security
Malware.QVM01.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
10.15.14.00

Reason Heuristics
PUP.Air Software.AirSoftware.Bundler (M)
15.10.25.8

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.151023

Sophos
AirInstaller
4.98

SUPERAntiSpyware
Adware.AirInstaller/Variant
9548

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.0

VIPRE Antivirus
AirInstaller
28550

Zillya! Antivirus
Adware.AirAdInstaller.Win32.100
2.0.0.1822

File size:
841.9 KB (862,112 bytes)

Product version:
2.0.4.99

Copyright:
(c) AirInstaller

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\video_update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2013 6:00:00 PM

Valid to:
3/26/2015 6:59:59 PM

Subject:
CN=Air Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Air Software, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AC786E09219DF82DA830E461D4FC39F

File PE Metadata
Compilation timestamp:
2/26/2014 11:32:55 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:UdSm0SPFmhs4+doHz2hM3OBT922ymyqlA9ZfZI7m2/g5xkdGOcJ2C:Udjdd/qH5G5nS9Zfi7m2F8OpC

Entry address:
0x268310

Entry point:
60, BE, 00, 50, 5A, 00, 8D, BE, 00, C0, E5, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8867

Packer / compiler:
UPX 2.90LZMA

Code size:
784 KB (802,816 bytes)

The file video_update.exe has been seen being distributed by the following URL.

Remove video_update.exe - Powered by Reason Core Security