apnstub.exe

AskStub Application

Ask.com

This installer is part of the Ask.com (APN) network which will install the Ask.com branded toolbar or browser extension which will take control of the web browser's search functions. The application apnstub.exe by Ask.com has been detected as a potentially unwanted program by 5 anti-malware scanners. The program is a setup application that uses the APN Stub installer. This version of the installer will bundle the Ask.com Toolbar, a potentially unwanted web browser extension. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address 199.36.102.106.df.iacapn.com on port 80 using the HTTP protocol.
Publisher:
Ask.com  (signed and verified)

Product:
AskStub Application

Version:
9.9.9.9

MD5:
93a912072351dfef975f12efad18bd9f

SHA-1:
ffa8b6510d624a55f3eb7ffd6d5221a44944681c

SHA-256:
e1981c51b3102b7d58d2006efb82ad403133f32ae94721e719e364d618e47cb5

Scanner detections:
5 / 68

Status:
Potentially unwanted

Explanation:
Bundles that Ask.com toolbar as a third-party offer, a web browser extension that may modify a user's search and home pages.

Analysis date:
11/27/2024 6:52:06 AM UTC  (today)

Scan engine
Detection
Engine version

Boost by Reason
Optional.Ask.H
188838

Dr.Web
Trojan.DownLoader7.16675
9.0.1.0357

ESET NOD32
Win32/Bundled.Toolbar.Ask (variant)
7.9158

Reason Heuristics
PUP.Ask.H
14.8.8.2

XVirus List
Win.Detected
2.3.31

File size:
141.7 KB (145,096 bytes)

Product version:
9.9.9.9

Copyright:
Copyright (C) Ask 2012

Original file name:
AskStub.exe

File type:
Executable application (Win32 EXE)

Installer:
APN Stub

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\apnstub.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/20/2011 2:00:00 AM

Valid to:
6/19/2014 1:59:59 AM

Subject:
CN=Ask.com, OU=Distribution, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ask.com, L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0965F2AC7236C7E1BDCA44ED139B273A

File PE Metadata
Compilation timestamp:
8/23/2012 5:37:06 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:hchfXbup04LnombmlgV5sUjbe15St5qqqqqqqqqqqqHkF0b4:APbue4LPnV5fa67qqqqqqqqqqqqO

Entry address:
0x4448

Entry point:
E8, A9, 39, 00, 00, E9, 79, FE, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 08, B4, 41, 00, 89, 0D, 04, B4, 41, 00, 89, 15, 00, B4, 41, 00, 89, 1D, FC, B3, 41, 00, 89, 35, F8, B3, 41, 00, 89, 3D, F4, B3, 41, 00, 66, 8C, 15, 20, B4, 41, 00, 66, 8C, 0D, 14, B4, 41, 00, 66, 8C, 1D, F0, B3, 41, 00, 66, 8C, 05, EC, B3, 41, 00, 66, 8C, 25, E8, B3, 41, 00, 66, 8C, 2D, E4, B3, 41, 00, 9C, 8F, 05, 18, B4, 41, 00, 8B, 45, 00, A3, 0C, B4, 41, 00, 8B, 45, 04, A3, 10, B4, 41, 00, 8D, 45, 08, A3, 1C, B4, 41...
 
[+]

Entropy:
6.5113

Code size:
74 KB (75,776 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 74.113.233.61.df.iaccap.com  (74.113.233.61:80)

TCP (HTTP):
Connects to 199.36.102.106.df.iacapn.com  (199.36.102.106:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to host-213.158.175.81.tedata.net  (213.158.175.81:80)

TCP (HTTP):
Connects to a88-221-100-112.deploy.akamaitechnologies.com  (88.221.100.112:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

Remove apnstub.exe - Powered by Reason Core Security