Threat Database Adware Adware.Outbrowse.CB

Adware.Outbrowse.CB

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 20,027
Threat Level: 20 % (Normal)
Infected Computers: 463
First Seen: January 7, 2013
Last Seen: February 11, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Outbrowse.CB
Signature status: No Signature

Known Samples

MD5: 0b62a4c5cd7d3ded58b9c226e587ef44
SHA1: 83cb538c3f7072a4f2960001f950a687e29330ff
SHA256: 31F566968B8E09D6CDCB7FEBFF03C5C875439008E9C3F25ACC40E9DA7449DD99
File Size: 711.33 KB, 711326 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Description Installer
Product Version 4.1

File Traits

  • dll
  • HighEntropy
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsbbd3f.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsbbd3f.tmp\frghw.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsbbd3f.tmp\frghw.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\oo2.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\oo2.zzz Generic Write,Read Attributes
c:\users\user\appdata\local\temp\oo2.zzz Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352*1\??\C:\P RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Network Info Queried
  • GetAdaptersInfo
Network Winhttp
  • WinHttpConnect
  • WinHttpOpen
  • WinHttpOpenRequest
  • WinHttpReadData
  • WinHttpReceiveResponse
  • WinHttpSendRequest

Shell Command Execution

C:\Users\Lwauqrhc\AppData\Local\Temp/oo2.exe /PID=5065 /SUBPID=0 /DISTID=21818 /VM=2 /NETWORDK=1 /CID=0 /PRODUCT_ID=21004 /RETURNING_USER_DAYS=2 /SERVER_URL=http://installer.ppdownload.com
wmic /output:C:\Users\Lwauqrhc\AppData\Local\Temp\81770839219.txt bios get serialnumber
wmic /output:C:\Users\Lwauqrhc\AppData\Local\Temp\81770839219.txt bios get version
wmic /output:C:\Users\Lwauqrhc\AppData\Local\Temp\81770839219.txt bios get version
wmic /output:C:\Users\Lwauqrhc\AppData\Local\Temp\81770839219.txt bios get version
Show More
wmic /output:C:\Users\Lwauqrhc\AppData\Local\Temp\81770839219.txt bios get version

Trending

Most Viewed

Loading...