installchecker.exe

Install Checker

Ask.com

This is a component of the Ask.com toolbar, a browser extension that will modify the default web browser's search provider, home page and various other settings. The application installchecker.exe by Ask.com has been detected as a potentially unwanted program by 3 anti-malware scanners. This version of the file will bundle the Ask.com Toolbar, a potentially unwanted web browser extension. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address 74.113.233.61.df.iaccap.com on port 80 using the HTTP protocol.
Publisher:
Ask.com  (signed and verified)

Product:
Install Checker

Version:
1.8.1.0

MD5:
188c28762cb16b2b19bbf606c3119a15

SHA-1:
022cc448dc22e5975c21eb8874acb4c067a80d14

SHA-256:
7b3bdcf28cbc2b88ab2a58b8a0c5689ea1052ddc82e7aff903e7dad7e68e1f38

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 6:35:08 AM UTC  (today)

Scan engine
Detection
Engine version

Boost by Reason
Optional.Ask.O
188838

ESET NOD32
Win32/Bundled.Toolbar.Ask (variant)
8.8865

Reason Heuristics
PUP.Ask.O
14.8.8.2

File size:
297.3 KB (304,472 bytes)

Product version:
1.8.1.0

Copyright:
© 2008 Ask.com

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\installchecker.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/16/2008 5:00:00 PM

Valid to:
6/17/2011 4:59:59 PM

Subject:
CN=Ask.com, OU=Distribution, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ask.com, L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at https://www.verisign.com/rpa (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
286F8A30E2EAC6965B936F826A05305D

File PE Metadata
Compilation timestamp:
5/6/2011 4:53:35 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:rTphy3xEHnDWoT9Bd/a4fWhL53sbKDUqxZzczQI:rO3uDbT9rhfEVsbKDX28I

Entry address:
0x175B5

Entry point:
E8, 05, 9C, 00, 00, E9, 79, FE, FF, FF, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C, 24, 04, 2B...
 
[+]

Entropy:
6.6957

Code size:
176 KB (180,224 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 74.113.233.61.df.iaccap.com  (74.113.233.61:80)

TCP (HTTP):
Connects to 199.36.102.106.df.iacapn.com  (199.36.102.106:80)

TCP (HTTP):
Connects to 199.36.100.106.df.iacapn.com  (199.36.100.106:80)

TCP (HTTP):

Remove installchecker.exe - Powered by Reason Core Security