File name:

Thunderstore Mod Manager - Installer.exe

Full analysis: https://app.any.run/tasks/aa319dcd-b9a9-419d-9c54-2af29f269326
Verdict: Malicious activity
Analysis date: April 19, 2025, 01:34:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-scr
arch-html
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

7452CBBF4F957165AF3AA8D0F9F00DAF

SHA1:

B4ED46FCB7F88D5F0F4CED2DD749A6AC197D0111

SHA256:

1DCD4D64431F9228B32E9CBD04A6A6A6D36C6AE49061C5566FC17210FAD7720F

SSDEEP:

98304:R//rhEGJ/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhBIHtugzPFMNxs3JPAWQPIap:ZIYaROW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • OWInstaller.exe (PID: 4428)
      • VC_redist.x64.exe (PID: 7892)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OverwolfSetup.exe (PID: 7328)
    • The process creates files with name similar to system file names

      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • OverwolfSetup.exe (PID: 7328)
    • Drops 7-zip archiver for unpacking

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7492)
    • Executable content was dropped or overwritten

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7492)
      • vcredist.exe (PID: 3032)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 7892)
      • OWInstaller.exe (PID: 4428)
      • VC_redist.x64.exe (PID: 1168)
      • VC_redist.x64.exe (PID: 7012)
      • Overwolf.exe (PID: 7460)
    • Application launched itself

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • VC_redist.x64.exe (PID: 7780)
      • VC_redist.x64.exe (PID: 1168)
      • OverwolfLauncher.exe (PID: 6512)
      • OverwolfUpdater.exe (PID: 3900)
    • Reads security settings of Internet Explorer

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OWInstaller.exe (PID: 4428)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7500)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 1168)
      • OverwolfLauncher.exe (PID: 6512)
      • Overwolf.exe (PID: 7460)
      • OverwolfLauncher.exe (PID: 7852)
      • OverwolfUpdater.exe (PID: 3900)
      • OverwolfBrowser.exe (PID: 2420)
      • OverwolfBrowser.exe (PID: 7596)
      • OverwolfHelper64.exe (PID: 6512)
      • OverwolfHelper.exe (PID: 5416)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 4428)
      • Overwolf.exe (PID: 7460)
      • OverwolfUpdater.exe (PID: 3900)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 1228)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 4428)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 4428)
    • There is functionality for taking screenshot (YARA)

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
    • The process drops C-runtime libraries

      • OverwolfSetup.exe (PID: 7328)
      • msiexec.exe (PID: 5344)
      • Overwolf.exe (PID: 7460)
    • Creates a software uninstall entry

      • OverwolfSetup.exe (PID: 7328)
      • VC_redist.x64.exe (PID: 7892)
      • Overwolf.exe (PID: 7460)
    • Adds/modifies Windows certificates

      • OverwolfUpdater.exe (PID: 7500)
    • Executes application which crashes

      • checkRedist.exe (PID: 6036)
    • Process drops legitimate windows executable

      • OverwolfSetup.exe (PID: 7328)
      • vcredist.exe (PID: 3032)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 7892)
      • msiexec.exe (PID: 5344)
      • VC_redist.x64.exe (PID: 7012)
      • Overwolf.exe (PID: 7460)
    • Windows service management via SC.EXE

      • sc.exe (PID: 5728)
      • sc.exe (PID: 7048)
      • sc.exe (PID: 5084)
      • sc.exe (PID: 7844)
      • sc.exe (PID: 7808)
      • sc.exe (PID: 7832)
      • sc.exe (PID: 3300)
      • sc.exe (PID: 7416)
      • sc.exe (PID: 8060)
      • sc.exe (PID: 8004)
      • sc.exe (PID: 7928)
      • sc.exe (PID: 5972)
    • Starts SC.EXE for service management

      • OverwolfUpdater.exe (PID: 7500)
    • Starts a Microsoft application from unusual location

      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 7892)
    • Searches for installed software

      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 7892)
      • dllhost.exe (PID: 5364)
      • VC_redist.x64.exe (PID: 1168)
      • VC_redist.x64.exe (PID: 7012)
      • Overwolf.exe (PID: 7460)
      • OverwolfUpdater.exe (PID: 6800)
    • Executes as Windows Service

      • VSSVC.exe (PID: 8112)
      • OverwolfUpdater.exe (PID: 3900)
    • Starts itself from another location

      • vcredist.exe (PID: 1676)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 5344)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 5344)
      • Overwolf.exe (PID: 7460)
    • The process executes via Task Scheduler

      • OverwolfLauncher.exe (PID: 6512)
  • INFO

    • The sample compiled with english language support

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7492)
      • vcredist.exe (PID: 3032)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 7892)
      • msiexec.exe (PID: 5344)
      • VC_redist.x64.exe (PID: 1168)
      • VC_redist.x64.exe (PID: 7012)
      • Overwolf.exe (PID: 7460)
    • Reads the computer name

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OWInstaller.exe (PID: 4428)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7492)
      • OverwolfUpdater.exe (PID: 7500)
      • OverwolfTSHelper.exe (PID: 4560)
      • vcredist.exe (PID: 3032)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 7892)
      • VC_redist.x64.exe (PID: 1168)
      • msiexec.exe (PID: 5344)
      • VC_redist.x64.exe (PID: 7012)
      • OverwolfLauncher.exe (PID: 6512)
      • OverwolfTSHelper.exe (PID: 7932)
      • Overwolf.exe (PID: 7460)
      • OverwolfLauncher.exe (PID: 7852)
      • OverwolfBrowser.exe (PID: 7416)
      • OverwolfBrowser.exe (PID: 208)
      • OverwolfBrowser.exe (PID: 3124)
      • OverwolfBrowser.exe (PID: 6080)
      • OverwolfBrowser.exe (PID: 8128)
      • OverwolfBrowser.exe (PID: 6264)
      • OverwolfUpdater.exe (PID: 3900)
      • OverwolfBrowser.exe (PID: 2420)
      • OverwolfUpdater.exe (PID: 6800)
      • OverwolfBrowser.exe (PID: 7596)
      • OverwolfHelper64.exe (PID: 6512)
    • Process checks computer location settings

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • OWInstaller.exe (PID: 4428)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 1168)
      • Overwolf.exe (PID: 7460)
      • OverwolfBrowser.exe (PID: 6080)
      • OverwolfBrowser.exe (PID: 7596)
      • OverwolfBrowser.exe (PID: 2420)
    • Checks supported languages

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OWInstaller.exe (PID: 4428)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7492)
      • OverwolfTSHelper.exe (PID: 4560)
      • OverwolfUpdater.exe (PID: 7500)
      • checkRedist.exe (PID: 6036)
      • vcredist.exe (PID: 3032)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 7892)
      • msiexec.exe (PID: 5344)
      • VC_redist.x64.exe (PID: 7780)
      • VC_redist.x64.exe (PID: 1168)
      • VC_redist.x64.exe (PID: 7012)
      • OverwolfLauncher.exe (PID: 6512)
      • OverwolfLauncher.exe (PID: 7852)
      • Overwolf.exe (PID: 7460)
      • OverwolfTSHelper.exe (PID: 7932)
      • OverwolfBrowser.exe (PID: 7416)
      • OverwolfBrowser.exe (PID: 3124)
      • OverwolfBrowser.exe (PID: 208)
      • OverwolfBrowser.exe (PID: 6080)
      • OverwolfUpdater.exe (PID: 3900)
      • OverwolfBrowser.exe (PID: 6264)
      • OverwolfBrowser.exe (PID: 8128)
      • OverwolfBrowser.exe (PID: 7596)
      • OverwolfUpdater.exe (PID: 6800)
      • OverwolfBrowser.exe (PID: 2420)
      • OverwolfHelper.exe (PID: 5416)
      • OverwolfHelper64.exe (PID: 6512)
    • Create files in a temporary directory

      • Thunderstore Mod Manager - Installer.exe (PID: 5668)
      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OWInstaller.exe (PID: 4428)
      • OverwolfSetup.exe (PID: 7328)
      • vcredist.exe (PID: 1676)
      • VC_redist.x64.exe (PID: 1168)
      • VC_redist.x64.exe (PID: 7892)
      • Overwolf.exe (PID: 7460)
    • Checks proxy server information

      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OWInstaller.exe (PID: 4428)
      • dxdiag.exe (PID: 1228)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7500)
      • slui.exe (PID: 8136)
      • Overwolf.exe (PID: 7460)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 4428)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7500)
      • VC_redist.x64.exe (PID: 7892)
      • msiexec.exe (PID: 5344)
      • Overwolf.exe (PID: 7460)
      • OverwolfBrowser.exe (PID: 3124)
      • OverwolfBrowser.exe (PID: 7416)
      • OverwolfBrowser.exe (PID: 208)
      • OverwolfBrowser.exe (PID: 6080)
      • OverwolfBrowser.exe (PID: 8128)
      • OverwolfBrowser.exe (PID: 6264)
      • OverwolfUpdater.exe (PID: 3900)
      • OverwolfBrowser.exe (PID: 7596)
      • OverwolfBrowser.exe (PID: 2420)
      • OverwolfUpdater.exe (PID: 6800)
      • OverwolfHelper.exe (PID: 5416)
      • OverwolfHelper64.exe (PID: 6512)
    • Reads Environment values

      • OWInstaller.exe (PID: 4428)
      • Overwolf.exe (PID: 7460)
      • OverwolfBrowser.exe (PID: 7416)
      • OverwolfUpdater.exe (PID: 6800)
    • Reads the software policy settings

      • dxdiag.exe (PID: 1228)
      • OWInstaller.exe (PID: 4428)
      • slui.exe (PID: 1052)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7500)
      • slui.exe (PID: 8136)
      • msiexec.exe (PID: 5344)
      • dxdiag.exe (PID: 4528)
      • OverwolfLauncher.exe (PID: 7852)
      • Overwolf.exe (PID: 7460)
      • OverwolfUpdater.exe (PID: 3900)
      • OverwolfUpdater.exe (PID: 6800)
      • OverwolfHelper64.exe (PID: 6512)
    • Disables trace logs

      • OWInstaller.exe (PID: 4428)
      • Overwolf.exe (PID: 7460)
      • OverwolfUpdater.exe (PID: 6800)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 1228)
      • dxdiag.exe (PID: 4528)
    • Creates files or folders in the user directory

      • Thunderstore Mod Manager - Installer.exe (PID: 4424)
      • OWInstaller.exe (PID: 4428)
      • OverwolfSetup.exe (PID: 7328)
      • dxdiag.exe (PID: 1228)
      • OverwolfUpdater.exe (PID: 7500)
      • WerFault.exe (PID: 7548)
      • msiexec.exe (PID: 5344)
      • Overwolf.exe (PID: 7460)
      • OverwolfBrowser.exe (PID: 7416)
      • dxdiag.exe (PID: 4528)
      • OverwolfBrowser.exe (PID: 208)
      • OverwolfBrowser.exe (PID: 8128)
    • Reads product name

      • OWInstaller.exe (PID: 4428)
      • Overwolf.exe (PID: 7460)
    • Creates files in the program directory

      • OWInstaller.exe (PID: 4428)
      • OverwolfSetup.exe (PID: 7328)
      • OverwolfUpdater.exe (PID: 7492)
      • OverwolfUpdater.exe (PID: 7500)
      • VC_redist.x64.exe (PID: 7892)
      • Overwolf.exe (PID: 7460)
      • OverwolfUpdater.exe (PID: 6800)
    • Manages system restore points

      • SrTasks.exe (PID: 632)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 5344)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 5344)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.266.0.11
ProductVersionNumber: 2.266.0.11
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Overwolf
FileVersion: 2.266.0.11
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Overwolf
ProductVersion: 2.266.0.11
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
213
Monitored processes
68
Malicious processes
14
Suspicious processes
1

Behavior graph

Click at the process to see the details
start thunderstore mod manager - installer.exe thunderstore mod manager - installer.exe owinstaller.exe sppextcomobj.exe no specs dxdiag.exe slui.exe slui.exe overwolfsetup.exe overwolfupdater.exe overwolfupdater.exe overwolftshelper.exe no specs checkredist.exe conhost.exe no specs werfault.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs vcredist.exe vcredist.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe overwolflauncher.exe no specs overwolflauncher.exe overwolf.exe dxdiag.exe no specs overwolftshelper.exe no specs overwolfbrowser.exe no specs overwolfbrowser.exe no specs overwolfbrowser.exe overwolfbrowser.exe no specs overwolfbrowser.exe no specs overwolfbrowser.exe no specs overwolfupdater.exe overwolfbrowser.exe no specs overwolfbrowser.exe no specs overwolfupdater.exe overwolfhelper.exe no specs overwolfhelper.exe overwolfhelper64.exe no specs overwolfhelper64.exe

Process information

PID
CMD
Path
Indicators
Parent process
208"C:\Program Files (x86)\Overwolf\0.273.1.4\OverwolfBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations=is-enterprise-managed=no --user-agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36" --start-stack-profiler --user-data-dir="C:\Users\admin\AppData\Local\Overwolf\CefBrowserCache" --locales-dir-path="C:\Program Files (x86)\Overwolf\0.273.1.4\Locales" --log-severity=disable --ignore-certificate-errors --remote-allow-origins=* --ow-domain=www.overwolf.com --ow-process-id=7460 --field-trial-handle=4788,i,4595272687348114405,13199992218817277725,262144 --enable-features=AudioVideoTracks --disable-features=HeavyAdIntervention,HeavyAdPrivacyMitigations,PictureInPicture,ProcessSharingWithDefaultSiteInstances,SpareRendererForSitePerProcess,UseModernMediaControls,WinUseBrowserSpellChecker --variations-seed-version --enable-logging=handle --log-file=4792 --mojo-platform-channel-handle=4776 /prefetch:3C:\Program Files (x86)\Overwolf\0.273.1.4\OverwolfBrowser.exe
Overwolf.exe
User:
admin
Company:
Overwolf LTD
Integrity Level:
MEDIUM
Description:
OverwolfBrowser
Version:
0.273.1.4
Modules
Images
c:\program files (x86)\overwolf\0.273.1.4\overwolfbrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
632C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exedllhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
644\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
684\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1052"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1168"C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -burn.filehandle.attached=536 -burn.filehandle.self=556 -uninstall -quiet -burn.related.upgrade -burn.ancestors={b49c10dd-4d54-45f8-ad13-fa25704456a4} -burn.filehandle.self=1112 -burn.embedded BurnPipe.{42386E0E-11EE-46B6-83B8-0DD425DE0455} {E975B840-E671-48BE-A88E-375BBDD102CB} 7892C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
VC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1180C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
1228"C:\WINDOWS\System32\DxDiag.exe" /tC:\Users\admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txtC:\Windows\System32\dxdiag.exe
OWInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1512\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1676"C:\WINDOWS\Temp\{A7740AF3-8D8D-446C-A273-2CF4218870A9}\.cr\vcredist.exe" -burn.clean.room="C:\ProgramData\Overwolf\Setup\vcredist.exe" -burn.filehandle.attached=716 -burn.filehandle.self=588 /q /norestart /repairC:\Windows\Temp\{A7740AF3-8D8D-446C-A273-2CF4218870A9}\.cr\vcredist.exe
vcredist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.42.34438
Exit code:
3010
Version:
14.42.34438.0
Modules
Images
c:\windows\temp\{a7740af3-8d8d-446c-a273-2cf4218870a9}\.cr\vcredist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
63 783
Read events
62 377
Write events
981
Delete events
425

Modification events

(PID) Process:(4424) Thunderstore Mod Manager - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4424) Thunderstore Mod Manager - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4424) Thunderstore Mod Manager - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4428) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfPersist
Operation:writeName:MUIDV2
Value:
1ba3cdd2-2e5a-42f3-a983-f8de4edd5156
(PID) Process:(4428) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverwolfPersist
Operation:writeName:MUIDV2
Value:
1ba3cdd2-2e5a-42f3-a983-f8de4edd5156
(PID) Process:(1228) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(1228) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In SystemInfo
Value:
1
(PID) Process:(4428) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Overwolf
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(4428) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4428) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
516
Suspicious files
1 406
Text files
2 012
Unknown types
0

Dropped files

PID
Process
Filename
Type
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\DotNetZip.dllexecutable
MD5:190E712F2E3B065BA3D5F63CB9B7725E
SHA256:6C512D9943A225D686B26FC832589E4C8BEF7C4DD0A8BDFD557D5D27FE5BBA0F
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\System.dllexecutable
MD5:51BD16A2EA23AE1E7A92CEDC6785C82E
SHA256:4DBC79D2B1C7987CC64BB5D014DB81BB5108BDD6D8BF3A5F820FAC1DED62BE33
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\nsProcess.dllexecutable
MD5:10E47E822B85D2A12FA4727001612182
SHA256:D530589A90918334B8E08D7355630892DD62F41333D948A860735D5BECFCB391
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\log4net.dllexecutable
MD5:F15C8A9E2876568B3910189B2D493706
SHA256:AE9C8073C3357C490F5D1C64101362918357C568F6B9380A60B09A4A4C1FF309
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:198949A4C3E67B9EB916140DFF75C114
SHA256:0BDAD6DEB1B651E0A52BAB4DB2C7883C9332884AA37300B3439C69D85B054C7C
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\SharpRaven.dllexecutable
MD5:271251960BF1D6A491803E15BD562E45
SHA256:776C6B0642F7A3F3F3AD3CC6BB5F1D528E90C6029B671D8F82B0320B185B92A7
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\OWInstaller.exeexecutable
MD5:D58D2772011C07E51FDDCB8D592F61FE
SHA256:9A737F35E38ABCB7E264DB5DEE7BE9E558492060B59BFB305D967F3960DD4D9F
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\uac.dllexecutable
MD5:861F7E800BB28F68927E65719869409C
SHA256:10A0E8CF46038AB3B2C3CF5DCE407B9A043A631CBDE9A5C8BCF0A54B2566C010
5668Thunderstore Mod Manager - Installer.exeC:\Users\admin\AppData\Local\Temp\nsuB4AD.tmp\utils.dllexecutable
MD5:C6B46A5FCDCCBF3AEFF930B1E5B383D4
SHA256:251AB3E2690562DCFCD510642607F206E6DCF626D06D94B74E1FA8297B1050A0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
83
DNS requests
59
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4424
Thunderstore Mod Manager - Installer.exe
GET
200
18.244.18.56:80
http://analyticsnew.overwolf.com/analytics/Counter?Name=installer_uac_action&Value=1&&Extra=%5b%7b%22Name%22%3a%22installer_version%22%2c%22Value%22%3a%222.266.0.11%22%7d%5d
unknown
whitelisted
4428
OWInstaller.exe
GET
200
172.217.16.142:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=209822599&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=424600810&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1564805847.1745026453.1745026453.1745026453.2%3B%2B__utmz%3D0.1745026453.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
4428
OWInstaller.exe
GET
200
172.217.16.142:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=816151147&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=779255207&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1564805847.1745026453.1745026453.1745026453.2%3B%2B__utmz%3D0.1745026453.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
4428
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkpLy9ROx7U76vGUhC06D6E%3D
unknown
whitelisted
4428
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEnA9eVH9TrLXPKuCavuqCA0%3D
unknown
whitelisted
4428
OWInstaller.exe
GET
200
142.250.185.195:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
4428
OWInstaller.exe
GET
200
142.250.185.195:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
1228
dxdiag.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4424
Thunderstore Mod Manager - Installer.exe
18.244.18.56:80
analyticsnew.overwolf.com
US
whitelisted
4428
OWInstaller.exe
172.217.16.142:80
www.google-analytics.com
GOOGLE
US
whitelisted
4428
OWInstaller.exe
18.244.18.56:443
analyticsnew.overwolf.com
US
whitelisted
4428
OWInstaller.exe
18.245.86.117:443
content.overwolf.com
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.56
  • 18.244.18.106
  • 18.244.18.46
  • 18.244.18.51
whitelisted
www.google-analytics.com
  • 172.217.16.142
whitelisted
content.overwolf.com
  • 18.245.86.117
  • 18.245.86.78
  • 18.245.86.39
  • 18.245.86.110
whitelisted
storeapi.overwolf.com
  • 18.172.112.84
  • 18.172.112.72
  • 18.172.112.62
  • 18.172.112.117
shared
ocsp.rootca3.amazontrust.com
  • 18.245.38.41
whitelisted
www.overwolf.com
  • 108.138.26.25
  • 108.138.26.98
  • 108.138.26.27
  • 108.138.26.77
whitelisted

Threats

PID
Process
Class
Message
4424
Thunderstore Mod Manager - Installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
208
OverwolfBrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
208
OverwolfBrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Process
Message
msiexec.exe
Failed to release Service