osnicxjgtypap.exe

Object Browser

ObjectB

The application osnicxjgtypap.exe, “Object Browser Installer” has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Nullsoft Install System installer, however the file is not signed with an authenticode signature from a trusted source. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address tlb.hwcdn.net on port 80 using the HTTP protocol.
Publisher:
ObjectB

Product:
Object Browser

Description:
Object Browser Installer

Version:
1.36.01.22

MD5:
23a10f95f6a1c8416f42871cff04f98d

SHA-1:
7776e23f609217e59be4da7b5168b401d801425f

SHA-256:
ede4a8a435e6f5afd19c6030f0f3d6ec16bcfc844bdae5ccc0b5d88ff3995013

Scanner detections:
1 / 68

Status:
Adware

Explanation:
This is part of the Crossrider Internet browser extension framework which may modify the user's web browser settings including changing the home and search pages.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application.

Analysis date:
11/27/2024 1:21:19 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Downloader.Installer
15.6.12.7

File size:
9.8 MB (10,245,240 bytes)

Copyright:
Copyright ObjectB

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\osnicxjgtypap.exe

File PE Metadata
Compilation timestamp:
12/4/2012 4:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:5LjOmu33zADTM+149OtQbYi300hSS/SM34ob2jxF0JUH3Rhb:5LjG3wAeuUcZhL/S2IS0b

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Entropy:
7.9988  (probably packed)

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.13.204:80)

TCP (HTTP):
Connects to ec2-23-23-252-88.compute-1.amazonaws.com  (23.23.252.88:80)

Remove osnicxjgtypap.exe - Powered by Reason Core Security