pipinstallerbundle_fwv5_.exe

Offercast - APN Install Manager

Ask.com

This installer is part of the Ask.com (APN) network which will install the Ask.com branded toolbar or browser extension which will take control of the web browser's search functions. The application pipinstallerbundle_fwv5_.exe by Ask.com has been detected as a potentially unwanted program by 5 anti-malware scanners. The program is a setup application that uses the Offercast APN Install Manager installer. This version of the installer will bundle the Ask.com Toolbar, a potentially unwanted web browser extension. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address 199.36.100.103.df.iacapn.com on port 80 using the HTTP protocol.
Publisher:
Ask.com  (signed and verified)

Product:
Offercast - APN Install Manager

Version:
2.8.0.2

MD5:
4341c3de9ff39c99dceda3cfb2167fd1

SHA-1:
26a46ebf7a0a114c7a515010868883908714efa9

SHA-256:
e1861385ffff49d737ee0e2faf73ad746456c6ad6a993468950cf0239cec0216

Scanner detections:
5 / 68

Status:
Potentially unwanted

Explanation:
This is the APN Offercast install manager which will offer the user to opt-out of installing the Ask.com Toolbar as part of the setup routine.

Analysis date:
5/8/2024 6:06:51 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.1417
9.0.1.033

ESET NOD32
Win32/Bundled.Toolbar.Ask (variant)
8.9156

herdProtect (fuzzy)
2014.4.5.14

Malwarebytes
PUP.Optional.Spigot.A
v2014.02.02.06

Reason Heuristics
PUP.Installer.Ask.Y
14.8.8.2

File size:
1.1 MB (1,158,064 bytes)

Product version:
2.8.0.2

Copyright:
2010 (c) Ask.com. All rights reserved.

Original file name:
AskInstaller.exe

File type:
Executable application (Win32 EXE)

Installer:
Offercast APN Install Manager

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\pipinstallerbundle_fwv5_.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/20/2011 1:00:00 AM

Valid to:
6/19/2014 12:59:59 AM

Subject:
CN=Ask.com, OU=Distribution, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ask.com, L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0965F2AC7236C7E1BDCA44ED139B273A

File PE Metadata
Compilation timestamp:
6/3/2013 7:57:11 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:UcEnMrtFER9XnHfvHzEtts01u7SVTrwTY3NQNpQFoqZYkCT:U6sRVnXzEtts01u+VTAY9QNpQmkCT

Entry address:
0x74983

Entry point:
E8, 88, EE, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 34, 85, 49, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, D4, 72, 49, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, A8, 9C, 4B, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, AC...
 
[+]

Entropy:
6.6776

Code size:
598 KB (612,352 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a23-211-100-157.deploy.static.akamaitechnologies.com  (23.211.100.157:80)

TCP (HTTP):
Connects to a104-107-21-210.deploy.static.akamaitechnologies.com  (104.107.21.210:80)

TCP (HTTP):

TCP (HTTP):
Connects to 199.36.100.103.df.iacapn.com  (199.36.100.103:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-76-195-110.deploy.static.akamaitechnologies.com  (23.76.195.110:80)

TCP (HTTP):
Connects to a23-43-161-128.deploy.static.akamaitechnologies.com  (23.43.161.128:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-205-211-95.deploy.static.akamaitechnologies.com  (23.205.211.95:80)

TCP (HTTP):

TCP (HTTP):
Connects to a184-27-110-135.deploy.static.akamaitechnologies.com  (184.27.110.135:80)

TCP (HTTP):
Connects to a184-24-118-39.deploy.static.akamaitechnologies.com  (184.24.118.39:80)

TCP (HTTP):

TCP (HTTP):

Remove pipinstallerbundle_fwv5_.exe - Powered by Reason Core Security