A0005445.exe file report

MD5 d1f1cbd93dc3e33770caa9e12c1e3344
Latest seen 2021-01-14 08:00:34 (5 years ago)
First seen 2017-05-28 16:04:05 (8 years ago)
Size 357 KB
Publisher APN LLC.
Product Toolbar Core
Signed by APN LLC

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2017-05-28 16:04:05 (8 years ago); latest analysis 2021-01-14 08:00:34 (5 years ago).

Publisher context

Company metadata: APN LLC.. Product metadata: Toolbar Core.

Digital signature

Signed by APN LLC. The signature is not reported as trusted and valid, which can indicate tampering, repackaging, or copied publisher data.

Aliases

This hash has appeared under multiple file names, which can happen with repackaging, bundling, or deliberate renaming.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

A0005445.exe is a Windows file recorded in the ThreatInfo database. It is associated with Toolbar Core. The reported company name is APN LLC.. The current detection status is Undefined, based on the latest analysis from 2021-01-14 08:00:34 (5 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Toolbar Core
Company Name: APN LLC.
MD5: d1f1cbd93dc3e33770caa9e12c1e3344
Size: 357 KB
First Published: 2017-05-28 16:04:05 (8 years ago)
Latest Published: 2021-01-14 08:00:34 (5 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2021-01-14 08:00:34 (5 years ago)
Signed By: APN LLC
Status: Invalid (digital signature could be stolen or file could be patched)

The signature on A0005445.exe is not reported as trusted and valid. Invalid or suspicious signature data can indicate tampering, repackaging, or an unrelated file using copied publisher information.

%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-atu4[6].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-atu4[7].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-orj[1].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-kmpv7[2].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-kmpv7[3].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-kmpv7[4].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-kmpv7[5].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-avira-v7[2].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-avira-v7[3].7z\program files\askpartnernetwork\toolbar
%system%\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\asktoolbarinstaller-ff3-v7[8].7z\program files\askpartnernetwork\toolbar

ThreatInfo has observed A0005445.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

Toolbar.exe
toolbar.exe
Toolbar.exe.vir
A0005458.exe
A0005445.exe

This hash has been seen with multiple file names. Alternate names can appear when software is updated, copied between folders, packed by an installer, or deliberately renamed to avoid recognition. Compare the exact MD5 above before assuming two names refer to the same file.

14.4%
9.2%
8.3%
7.0%
6.6%
4.8%
4.4%
3.9%
3.5%
3.5%
3.1%
2.6%
2.6%
2.6%
1.7%
1.7%
1.7%
1.7%
1.7%
1.3%
1.3%
1.3%
1.3%
1.3%
0.9%
0.9%
0.9%
0.9%
0.9%
0.4%
0.4%
0.4%
0.4%
0.4%
0.4%
0.4%
0.4%
0.4%

The strongest geographic signal for this file is United States with 14.4% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 7 78.2%
Windows 10 13.2%
Windows 8 5.1%
Windows 8.1 2.1%
Windows XP 0.9%
Windows Vista 0.4%

The most common operating system signal for A0005445.exe is Windows 7 with 78.2% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

A0005445.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x0001bf8e

PE Sections:

Name Size of data MD5
.text 175104 1e97c330ec4e04697dab4cb6e663c442
.rdata 47616 165c93e0692cb9ab46ddfadc2d30661e
.data 10240 50daf7d2f3bb95857612d642957eb864
.rsrc 110592 01a3dadff70e0ae16af4b8867a9912e9
.reloc 14848 a629bd0275fc61fc953c9087baafa488

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: