Toolbar.exe

Toolbar Core

APN LLC

This installer is part of the Ask.com (APN) network which will install the Ask.com branded toolbar or browser extension which will take control of the web browser's search functions. The application Toolbar.exe by APN has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the APN Stub installer. While running, it connects to the Internet address fixed-189-203-151-59.totalplay.com.mx on port 443.
Publisher:
APN LLC.  (signed by APN LLC)

Product:
Toolbar Core

Version:
21.23.0.8342

MD5:
9d9d172dcaba7db9d5a1df9d726e5276

SHA-1:
289c285355ef7ae803e63e60e55df21151042cfb

SHA-256:
9ee314bdc039f1454b1c8ef9b5352726cc159d55012b954f4b7f2af6fc191b88

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/7/2024 8:39:20 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Ask (M)
16.11.16.19

File size:
282.1 KB (288,832 bytes)

Product version:
21.23.0.8342

Copyright:
© 2016 APN, LLC. All Rights Reserved.

Original file name:
Toolbar.exe

File type:
Executable application (Win32 EXE)

Installer:
APN Stub

Language:
English (United States)

Common path:
C:\Program Files\askpartnernetwork\toolbar\atu3-tmg\source\Program Files\askpartnernetwork\toolbar\toolbar.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
11/8/2016 7:00:00 PM

Valid to:
5/27/2018 6:59:59 PM

Subject:
CN=APN LLC, O=APN LLC, L=Oakland, S=California, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
68C47F5E2060C71C80910906B06BBB93

File PE Metadata
Compilation timestamp:
11/15/2016 2:44:14 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:XURNcjNRqeKRwquRv54U5m8ZGTBl9bLrd:2NcqeKRwxEUU8ZGTDll

Entry address:
0x20B2E

Entry point:
E8, 6F, 82, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 30, 0F, 44, 00, 89, 0D, 2C, 0F, 44, 00, 89, 15, 28, 0F, 44, 00, 89, 1D, 24, 0F, 44, 00, 89, 35, 20, 0F, 44, 00, 89, 3D, 1C, 0F, 44, 00, 66, 8C, 15, 48, 0F, 44, 00, 66, 8C, 0D, 3C, 0F, 44, 00, 66, 8C, 1D, 18, 0F, 44, 00, 66, 8C, 05, 14, 0F, 44, 00, 66, 8C, 25, 10, 0F, 44, 00, 66, 8C, 2D, 0C, 0F, 44, 00, 9C, 8F, 05, 40, 0F, 44, 00, 8B, 45, 00, A3, 34, 0F, 44, 00, 8B, 45, 04, A3, 38, 0F, 44, 00, 8D, 45, 08, A3, 44, 0F, 44...
 
[+]

Code size:
191 KB (195,584 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a23-198-216-222.deploy.static.akamaitechnologies.com  (23.198.216.222:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP SSL):
Connects to 200-152-251.25.static.stech.net.br  (200.152.251.25:443)

TCP (HTTP):
Connects to a104-104-218-78.deploy.static.akamaitechnologies.com  (104.104.218.78:80)

TCP (HTTP):
Connects to client-200.60.190.33.speedy.net.pe  (200.60.190.33:80)

TCP (HTTP):
Connects to a23-14-225-250.deploy.static.akamaitechnologies.com  (23.14.225.250:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-68-194-223.deploy.static.akamaitechnologies.com  (104.68.194.223:80)

TCP (HTTP SSL):
Connects to googlecom187.static.host.gvt.net.br  (187.58.66.187:443)

TCP (HTTP):
Connects to ext-189-247-145-30.uninet.net.mx  (189.247.145.30:80)

TCP (HTTP SSL):
Connects to ext-189-247-145-103.uninet.net.mx  (189.247.145.103:443)

TCP (HTTP):
Connects to a23-206-56-208.deploy.static.akamaitechnologies.com  (23.206.56.208:80)

TCP (HTTP):
Connects to a184-50-153-111.deploy.static.akamaitechnologies.com  (184.50.153.111:80)

TCP (HTTP):

TCP (HTTP):
Connects to 74.113.237.189.lv.iaccap.com  (74.113.237.189:80)

TCP (HTTP):
Connects to server-54-230-51-91.jfk5.r.cloudfront.net  (54.230.51.91:80)

TCP (HTTP):
Connects to server-52-84-33-238.ewr50.r.cloudfront.net  (52.84.33.238:80)

TCP (HTTP SSL):
Connects to fixed-189-203-151-59.totalplay.com.mx  (189.203.151.59:443)

TCP (HTTP SSL):
Connects to ext-189-247-140-109.uninet.net.mx  (189.247.140.109:443)

Remove Toolbar.exe - Powered by Reason Core Security