everestwrapper.exe

Everest Installer

Ask.com

This installer is part of the Ask.com (APN) network which will install the Ask.com branded toolbar or browser extension which will take control of the web browser's search functions. The application everestwrapper.exe by Ask.com has been detected as a potentially unwanted program by 2 anti-malware scanners. The program is a setup application that uses the APN Stub installer. This version of the installer will bundle the Ask.com Toolbar, a potentially unwanted web browser extension. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from apnmedia.ask.com.
Publisher:
APN LLC.  (signed by Ask.com)

Product:
Everest Installer

Version:
2.2.0.64

MD5:
671e1237d97cd9fdcc8c43f537bba3c2

SHA-1:
4ceb614ffc4984ac5012f38ad293dda96001da7c

SHA-256:
afdbf27182c2e25ed30b76be9a33aa5f2f11eb50e0b4ddfe9da29d38d1f124d6

Scanner detections:
2 / 68

Status:
Potentially unwanted

Explanation:
Bundles that Ask.com toolbar as a third-party offer, a web browser extension that may modify a user's search and home pages.

Analysis date:
4/26/2024 9:01:39 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Bundled.Toolbar.Ask (variant)
7.9190

Reason Heuristics
PUP.Installer.Ask.O
14.8.8.2

File size:
621.9 KB (636,848 bytes)

Product version:
2.2.0.64

Copyright:
Copyright (C) 2013

Original file name:
Everest.exe

File type:
Executable application (Win32 EXE)

Installer:
APN Stub

Language:
English (United States)

Common path:
C:\Documents and Settings\{user}\Local settings\temporary internet files\content.ie5\{random}\everestwrapper.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/20/2011 2:00:00 AM

Valid to:
6/19/2014 1:59:59 AM

Subject:
CN=Ask.com, OU=Distribution, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ask.com, L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0965F2AC7236C7E1BDCA44ED139B273A

File PE Metadata
Compilation timestamp:
12/6/2013 2:09:25 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:28/bzlezn5hEpLMX/GiR5VQhYgvEfUDLPB2AA/AVzKc2:28/bzlQhMC/GiRlUDl2AA/AV2c2

Entry address:
0x83B5

Entry point:
E8, F3, 46, 00, 00, E9, 89, FE, FF, FF, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, 48, E1, 41, 00, 00, 74, 05, E9, 5C, 47, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02, 74, 06, F3, AB, 85, D2, 74, 0A, 88, 07, 83, C7, 01, 83, EA, 01, 75, F6, 8B, 44, 24, 08, 5F, C3...
 
[+]

Entropy:
6.3981

Code size:
82.5 KB (84,480 bytes)

The file everestwrapper.exe has been seen being distributed by the following URL.

Remove everestwrapper.exe - Powered by Reason Core Security