File name:

Porofessor.gg - Installer.exe

Full analysis: https://app.any.run/tasks/5b28aabe-3377-4781-bc5f-b2fd255e3256
Verdict: Malicious activity
Analysis date: September 14, 2024, 16:27:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

C82469B121E07ED8F7868EF91A0F7641

SHA1:

674D605ECF58635CC9CC15F5A7E12EF5A90D673F

SHA256:

23A41A0B304E4277A56F68D0176AA53A482E36263EBEB9763090B450E84BDCD5

SSDEEP:

98304:O/LL6J/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhbD2bLd129hhoA6qT6p9BwCiqx:6b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • Porofessor.gg - Installer.exe (PID: 6168)
      • Porofessor.gg - Installer.exe (PID: 5548)
    • Reads security settings of Internet Explorer

      • Porofessor.gg - Installer.exe (PID: 6168)
      • Porofessor.gg - Installer.exe (PID: 5548)
      • OWInstaller.exe (PID: 6748)
    • Executable content was dropped or overwritten

      • Porofessor.gg - Installer.exe (PID: 6168)
      • Porofessor.gg - Installer.exe (PID: 5548)
    • Application launched itself

      • Porofessor.gg - Installer.exe (PID: 6168)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 6748)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 7028)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 6748)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 6748)
    • Checks Windows Trust Settings

      • OWInstaller.exe (PID: 6748)
  • INFO

    • Create files in a temporary directory

      • Porofessor.gg - Installer.exe (PID: 6168)
      • Porofessor.gg - Installer.exe (PID: 5548)
      • OWInstaller.exe (PID: 6748)
    • Checks supported languages

      • Porofessor.gg - Installer.exe (PID: 6168)
      • Porofessor.gg - Installer.exe (PID: 5548)
      • OWInstaller.exe (PID: 6748)
    • Reads the computer name

      • Porofessor.gg - Installer.exe (PID: 6168)
      • Porofessor.gg - Installer.exe (PID: 5548)
      • OWInstaller.exe (PID: 6748)
    • Process checks computer location settings

      • Porofessor.gg - Installer.exe (PID: 6168)
      • OWInstaller.exe (PID: 6748)
    • Checks proxy server information

      • Porofessor.gg - Installer.exe (PID: 5548)
      • OWInstaller.exe (PID: 6748)
      • dxdiag.exe (PID: 7028)
    • Creates files or folders in the user directory

      • Porofessor.gg - Installer.exe (PID: 5548)
      • OWInstaller.exe (PID: 6748)
      • dxdiag.exe (PID: 7028)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 6748)
    • Reads product name

      • OWInstaller.exe (PID: 6748)
    • Reads Environment values

      • OWInstaller.exe (PID: 6748)
    • Reads the software policy settings

      • OWInstaller.exe (PID: 6748)
      • dxdiag.exe (PID: 7028)
    • Disables trace logs

      • OWInstaller.exe (PID: 6748)
    • The process uses the downloaded file

      • OWInstaller.exe (PID: 6748)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 7028)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.258.0.4
ProductVersionNumber: 2.258.0.4
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Porofessor
FileVersion: 2.258.0.4
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Porofessor
ProductVersion: 2.258.0.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start porofessor.gg - installer.exe porofessor.gg - installer.exe owinstaller.exe dxdiag.exe

Process information

PID
CMD
Path
Indicators
Parent process
5548"C:\Users\admin\AppData\Local\Temp\Porofessor.gg - Installer.exe" /UAC:60202 /NCRC C:\Users\admin\AppData\Local\Temp\Porofessor.gg - Installer.exe
Porofessor.gg - Installer.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
HIGH
Description:
Porofessor
Version:
2.258.0.4
Modules
Images
c:\users\admin\appdata\local\temp\porofessor.gg - installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6168"C:\Users\admin\AppData\Local\Temp\Porofessor.gg - Installer.exe" C:\Users\admin\AppData\Local\Temp\Porofessor.gg - Installer.exe
explorer.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
MEDIUM
Description:
Porofessor
Version:
2.258.0.4
Modules
Images
c:\users\admin\appdata\local\temp\porofessor.gg - installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6748"C:\Users\admin\AppData\Local\Temp\nskA64B.tmp\OWinstaller.exe" Sel=1&Partner=3776&Extension=pibhbkkgefgheeglaeemkkfjlhidhcedalapdggh&Name=Porofessor.gg&UtmSource=porofessor-website&UtmMedium=download-button&UtmCampaign=download-button&Referer=porofessor.gg&Browser=chrome /UAC:60202 /NCRC -partnerCustomizationLevel 0 --app-name="Porofessor" -exepath C:\Users\admin\AppData\Local\Temp\Porofessor.gg - Installer.exe C:\Users\admin\AppData\Local\Temp\nskA64B.tmp\OWInstaller.exe
Porofessor.gg - Installer.exe
User:
admin
Company:
Overwolf
Integrity Level:
HIGH
Description:
Porofessor Installer
Version:
2.258.0.8
Modules
Images
c:\users\admin\appdata\local\temp\nska64b.tmp\owinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7028"C:\WINDOWS\System32\DxDiag.exe" /tC:\Users\admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txtC:\Windows\System32\dxdiag.exe
OWInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
11 476
Read events
11 317
Write events
138
Delete events
21

Modification events

(PID) Process:(5548) Porofessor.gg - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5548) Porofessor.gg - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5548) Porofessor.gg - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6748) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Overwolf
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(7028) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(6748) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6748) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6748) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6748) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6748) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
Executable files
32
Suspicious files
76
Text files
124
Unknown types
9

Dropped files

PID
Process
Filename
Type
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\OWInstaller.exeexecutable
MD5:ED5782D57235038DBCAB36F301A48C2E
SHA256:79A6B6C704E5007F1A8D1DF3BF951FC3C05D957C8871B275B5448E307FFE2AD2
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:25802E743767FDC032480CE80725EF21
SHA256:495A72C7EA5F479B3BC4A9A2782E73A1CD3FC398C6598C0F3C0BB2E57C30B482
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\Newtonsoft.Json.dllexecutable
MD5:98CBB64F074DC600B23A2EE1A0F46448
SHA256:7B44639CBFBC8DDAC8C7A3DE8FFA97A7460BEBB0D54E9FF2E1CCDC3A742C2B13
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\nsis7z.dllexecutable
MD5:FAB8222B20DF8EC4794CE130C952BD59
SHA256:EFC55552199572948459E0F577FB19001FBDA7E2504CCBC9EC359E4DB2829123
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\DotNetZip.dllexecutable
MD5:190E712F2E3B065BA3D5F63CB9B7725E
SHA256:6C512D9943A225D686B26FC832589E4C8BEF7C4DD0A8BDFD557D5D27FE5BBA0F
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\OverWolf.Client.CommonUtils.dllexecutable
MD5:F927B95203A3D1D253938EAD1F8143C6
SHA256:AC480A104D0EC21BB96EC6E5EA3418A3118EA80A07426DCD2E1E01FF41147F40
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\websocket-sharp.dllexecutable
MD5:7D7B21A6C7BAD831559FE4E5E58CF44B
SHA256:B93AFFD08EDB54FE4E88BE626A95ECA78897FB874DC0AAB214782B5D27CFF7F5
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\CommandLine.dllexecutable
MD5:29D9046304542E1CE30EBA022C49DFCC
SHA256:DD954BC5C2F8EAD7580EE492A242EA3F09DC07B601BFADD1AB5AC804FC54DA01
6168Porofessor.gg - Installer.exeC:\Users\admin\AppData\Local\Temp\nsh9DC0.tmp\SharpRaven.dllexecutable
MD5:551A0903C6598FB93777FB10FCD11E3E
SHA256:CD53520A046058FD26CF0051BFF47051948D3B7932234A90A60E3E59E57D6361
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
55
DNS requests
31
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6748
OWInstaller.exe
GET
200
216.58.206.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=4344522&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=74537082&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1928497617.1726331249.1726331249.1726331249.2%3B%2B__utmz%3D0.1726331249.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
5548
Porofessor.gg - Installer.exe
GET
200
18.65.39.36:80
http://analyticsnew.overwolf.com/analytics/Counter?Name=installer_uac_action&Value=1&&Extra=%5b%7b%22Name%22%3a%22installer_version%22%2c%22Value%22%3a%222.258.0.4%22%7d%5d
unknown
whitelisted
6748
OWInstaller.exe
GET
200
216.58.206.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=112324055&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=655887135&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1928497617.1726331249.1726331249.1726331249.2%3B%2B__utmz%3D0.1726331249.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6748
OWInstaller.exe
GET
200
18.65.41.80:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEm3iwvr9LEetiLFWbgGCBG0%3D
unknown
unknown
6748
OWInstaller.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
6748
OWInstaller.exe
GET
200
18.65.41.80:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
unknown
6748
OWInstaller.exe
GET
200
142.250.186.67:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEGs31zQSL0RFCna%2BsoPon%2Bg%3D
unknown
whitelisted
6748
OWInstaller.exe
GET
200
142.250.185.163:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
6748
OWInstaller.exe
GET
200
142.250.186.67:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDBBI61buTJSxBPkvvajAV6
unknown
whitelisted
6856
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6856
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6164
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5548
Porofessor.gg - Installer.exe
18.65.39.36:80
analyticsnew.overwolf.com
AMAZON-02
US
whitelisted
6748
OWInstaller.exe
216.58.206.78:80
www.google-analytics.com
GOOGLE
US
whitelisted
6748
OWInstaller.exe
18.65.39.36:443
analyticsnew.overwolf.com
AMAZON-02
US
whitelisted
6748
OWInstaller.exe
18.239.83.31:443
content.overwolf.com
US
whitelisted
6748
OWInstaller.exe
18.239.94.53:443
storeapi.overwolf.com
US
shared
6748
OWInstaller.exe
18.65.41.80:80
ocsp.rootca3.amazontrust.com
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.78
whitelisted
analyticsnew.overwolf.com
  • 18.65.39.36
  • 18.65.39.19
  • 18.65.39.88
  • 18.65.39.87
whitelisted
www.google-analytics.com
  • 216.58.206.78
whitelisted
content.overwolf.com
  • 18.239.83.31
  • 18.239.83.78
  • 18.239.83.121
  • 18.239.83.76
whitelisted
storeapi.overwolf.com
  • 18.239.94.53
  • 18.239.94.57
  • 18.239.94.73
  • 18.239.94.84
shared
ocsp.rootca3.amazontrust.com
  • 18.65.41.80
unknown
www.overwolf.com
  • 18.239.83.66
  • 18.239.83.111
  • 18.239.83.98
  • 18.239.83.8
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.65.41.80
shared
fonts.googleapis.com
  • 142.250.186.138
whitelisted

Threats

PID
Process
Class
Message
5548
Porofessor.gg - Installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2 ETPRO signatures available at the full report
No debug info