askpip_ff_.exe

Offercast - APN Install Manager

Ask.com

This installer is part of the Ask.com (APN) network which will install the Ask.com branded toolbar or browser extension which will take control of the web browser's search functions. The application askpip_ff_.exe by Ask.com has been detected as a potentially unwanted program by 5 anti-malware scanners. The program is a setup application that uses the Offercast APN Install Manager installer. This version of the installer will bundle the Ask.com Toolbar, a potentially unwanted web browser extension. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address 199.36.100.103.df.iacapn.com on port 80 using the HTTP protocol.
Publisher:
Ask.com  (signed and verified)

Product:
Offercast - APN Install Manager

Version:
2.8.0.2

MD5:
f54d4c0990e7c398d39908d13e380ee9

SHA-1:
1af31313b60b6f0c79069de9e71767cda27113a8

SHA-256:
f36d1e638bbf4d5e98e5372e1e9aca2188e823693e6e4278c6f259390bc480d8

Scanner detections:
5 / 68

Status:
Potentially unwanted

Explanation:
This is the APN Offercast install manager which will offer the user to opt-out of installing the Ask.com Toolbar as part of the setup routine.

Analysis date:
4/26/2024 9:46:40 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.1417
9.0.1.0355

ESET NOD32
Win32/Bundled.Toolbar.Ask (variant)
7.8809

herdProtect (fuzzy)
2013.12.24.23

Malwarebytes
PUP.Optional.Spigot.A
v2013.12.21.12

Reason Heuristics
PUP.Installer.Ask.K
14.8.8.2

File size:
1004.1 KB (1,028,232 bytes)

Product version:
2.8.0.2

Copyright:
2010 (c) Ask.com. All rights reserved.

Original file name:
AskInstaller.exe

File type:
Executable application (Win32 EXE)

Installer:
Offercast APN Install Manager

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\askpip_ff_.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/20/2011 2:00:00 AM

Valid to:
6/19/2014 1:59:59 AM

Subject:
CN=Ask.com, OU=Distribution, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ask.com, L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0965F2AC7236C7E1BDCA44ED139B273A

File PE Metadata
Compilation timestamp:
5/21/2013 10:06:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:+cEjMrtxxJ9XnHfvHzEtts01u7SVTU3lYZvNWOoCZYkCh:+e1JVnXzEtts01u+VTiYhNWjkCh

Entry address:
0x74983

Entry point:
E8, 88, EE, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 34, 85, 49, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, D4, 72, 49, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, A8, 9C, 4B, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, AC...
 
[+]

Code size:
598 KB (612,352 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 199.36.100.103.df.iacapn.com  (199.36.100.103:80)

TCP (HTTP):
Connects to a104-107-155-236.deploy.static.akamaitechnologies.com  (104.107.155.236:80)

TCP (HTTP):
Connects to a23-56-145-116.deploy.static.akamaitechnologies.com  (23.56.145.116:80)

TCP (HTTP):

TCP (HTTP):
Connects to a184-27-249-38.deploy.static.akamaitechnologies.com  (184.27.249.38:80)

TCP (HTTP):
Connects to a173-222-197-5.deploy.static.akamaitechnologies.com  (173.222.197.5:80)

TCP (HTTP):
Connects to a104-113-216-160.deploy.static.akamaitechnologies.com  (104.113.216.160:80)

TCP (HTTP):
Connects to a92-122-88-158.deploy.akamaitechnologies.com  (92.122.88.158:80)

TCP (HTTP):
Connects to a92-122-180-142.deploy.akamaitechnologies.com  (92.122.180.142:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-53-212-214.deploy.static.akamaitechnologies.com  (23.53.212.214:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a184-26-184-137.deploy.static.akamaitechnologies.com  (184.26.184.137:80)

TCP (HTTP):
Connects to a104-93-237-224.deploy.static.akamaitechnologies.com  (104.93.237.224:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-106-87-84.deploy.static.akamaitechnologies.com  (104.106.87.84:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-80-59-128.deploy.static.akamaitechnologies.com  (104.80.59.128:80)

Remove askpip_ff_.exe - Powered by Reason Core Security