File name:

Buff Achievement Tracker - Installer.exe

Full analysis: https://app.any.run/tasks/029297e6-8b78-47d4-8863-2638d5168e7d
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 28, 2025, 01:05:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-scr
arch-html
arch-doc
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

13DAD77F1DE4AE9BB3515269B684E66E

SHA1:

A9C4FDE18621C13D005839ABAF473751B979550C

SHA256:

4A7EBC5267BBBB742F237BFCB00FA25DB0A57188F8A10E88973920C534BA9585

SSDEEP:

98304:bz/w18yYJ/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhBIHtugzPFMNxs3JPAWQPBN:eYaRO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • OWInstaller.exe (PID: 6724)
      • VC_redist.x64.exe (PID: 4020)
    • Actions looks like stealing of personal data

      • OverwolfLauncher.exe (PID: 8532)
    • Steals credentials from Web Browsers

      • OverwolfLauncher.exe (PID: 8532)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
    • The process creates files with name similar to system file names

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
    • Executable content was dropped or overwritten

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • vcredist.exe (PID: 1356)
      • vcredist.exe (PID: 6400)
      • OWInstaller.exe (PID: 6724)
      • VC_redist.x64.exe (PID: 4020)
      • VC_redist.x64.exe (PID: 10152)
      • VC_redist.x64.exe (PID: 10200)
      • Overwolf.exe (PID: 8728)
    • Drops 7-zip archiver for unpacking

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
    • Reads security settings of Internet Explorer

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • vcredist.exe (PID: 1356)
      • OverwolfLauncher.exe (PID: 2124)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 10152)
      • WinRAR.exe (PID: 10160)
    • Application launched itself

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • OverwolfLauncher.exe (PID: 2124)
      • VC_redist.x64.exe (PID: 10128)
      • VC_redist.x64.exe (PID: 10152)
      • WinRAR.exe (PID: 10160)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 6724)
      • Overwolf.exe (PID: 8728)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 6724)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 6724)
    • There is functionality for taking screenshot (YARA)

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 6984)
    • Checks Windows Trust Settings

      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • msiexec.exe (PID: 8400)
      • Overwolf.exe (PID: 8728)
    • Creates a software uninstall entry

      • OverwolfSetup.exe (PID: 4468)
      • VC_redist.x64.exe (PID: 4020)
      • Overwolf.exe (PID: 8728)
    • Adds/modifies Windows certificates

      • OverwolfUpdater.exe (PID: 6676)
    • Process drops legitimate windows executable

      • OverwolfSetup.exe (PID: 4468)
      • vcredist.exe (PID: 6400)
      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10200)
    • The process drops C-runtime libraries

      • OverwolfSetup.exe (PID: 4468)
      • msiexec.exe (PID: 8400)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7828)
      • sc.exe (PID: 4036)
      • sc.exe (PID: 2100)
      • sc.exe (PID: 6240)
      • sc.exe (PID: 5628)
      • sc.exe (PID: 1752)
      • sc.exe (PID: 6284)
      • sc.exe (PID: 3144)
      • sc.exe (PID: 7216)
      • sc.exe (PID: 7212)
      • sc.exe (PID: 3532)
      • sc.exe (PID: 7552)
    • Executes application which crashes

      • checkRedist.exe (PID: 7716)
    • Starts SC.EXE for service management

      • OverwolfUpdater.exe (PID: 6676)
    • Starts a Microsoft application from unusual location

      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
    • Searches for installed software

      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
      • dllhost.exe (PID: 4300)
      • VC_redist.x64.exe (PID: 10200)
      • VC_redist.x64.exe (PID: 10152)
      • Overwolf.exe (PID: 8728)
    • Starts itself from another location

      • vcredist.exe (PID: 1356)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6804)
    • The process executes via Task Scheduler

      • OverwolfLauncher.exe (PID: 2124)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 8400)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 8400)
  • INFO

    • Checks supported languages

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OWInstaller.exe (PID: 6724)
      • SearchApp.exe (PID: 5064)
      • identity_helper.exe (PID: 7632)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • OverwolfUpdater.exe (PID: 6676)
      • OverwolfTSHelper.exe (PID: 828)
      • checkRedist.exe (PID: 7716)
      • vcredist.exe (PID: 1356)
      • vcredist.exe (PID: 6400)
      • OverwolfLauncher.exe (PID: 2124)
      • VC_redist.x64.exe (PID: 4020)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10128)
      • VC_redist.x64.exe (PID: 10152)
      • OverwolfTSHelper.exe (PID: 7856)
      • OverwolfBrowser.exe (PID: 9252)
      • OverwolfBrowser.exe (PID: 9348)
      • VC_redist.x64.exe (PID: 10200)
      • OverwolfBrowser.exe (PID: 9332)
      • OverwolfBrowser.exe (PID: 9904)
    • The sample compiled with english language support

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • vcredist.exe (PID: 6400)
      • vcredist.exe (PID: 1356)
      • msedge.exe (PID: 6072)
      • VC_redist.x64.exe (PID: 4020)
      • VC_redist.x64.exe (PID: 10152)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10200)
      • Overwolf.exe (PID: 8728)
    • Create files in a temporary directory

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
      • VC_redist.x64.exe (PID: 10152)
    • Reads the computer name

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • OWInstaller.exe (PID: 6724)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • identity_helper.exe (PID: 7632)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • OverwolfUpdater.exe (PID: 6676)
      • OverwolfTSHelper.exe (PID: 828)
      • vcredist.exe (PID: 1356)
      • vcredist.exe (PID: 6400)
      • OverwolfLauncher.exe (PID: 2124)
      • VC_redist.x64.exe (PID: 4020)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10152)
      • VC_redist.x64.exe (PID: 10200)
      • OverwolfTSHelper.exe (PID: 7856)
      • OverwolfBrowser.exe (PID: 9252)
      • OverwolfBrowser.exe (PID: 9348)
      • OverwolfBrowser.exe (PID: 9904)
      • OverwolfBrowser.exe (PID: 9332)
    • Process checks computer location settings

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • OWInstaller.exe (PID: 6724)
      • SearchApp.exe (PID: 5064)
      • vcredist.exe (PID: 1356)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 10152)
      • OverwolfBrowser.exe (PID: 9904)
    • Creates files or folders in the user directory

      • OWInstaller.exe (PID: 6724)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • dxdiag.exe (PID: 6984)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • WerFault.exe (PID: 6808)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • msiexec.exe (PID: 8400)
      • OverwolfBrowser.exe (PID: 9252)
      • OverwolfBrowser.exe (PID: 9332)
      • dxdiag.exe (PID: 1344)
    • Reads product name

      • OWInstaller.exe (PID: 6724)
      • Overwolf.exe (PID: 8728)
    • Checks proxy server information

      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • dxdiag.exe (PID: 6984)
      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • WerFault.exe (PID: 6808)
      • Overwolf.exe (PID: 8728)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 6984)
      • dxdiag.exe (PID: 1344)
    • Reads the software policy settings

      • dxdiag.exe (PID: 6984)
      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • WerFault.exe (PID: 6808)
      • OverwolfLauncher.exe (PID: 8532)
      • OverwolfLauncher.exe (PID: 2124)
      • SearchApp.exe (PID: 5064)
      • msiexec.exe (PID: 8400)
      • dxdiag.exe (PID: 1344)
      • Overwolf.exe (PID: 8728)
    • Manual execution by a user

      • msedge.exe (PID: 4024)
      • powershell.exe (PID: 6664)
      • WinRAR.exe (PID: 10160)
    • Reads Environment values

      • OWInstaller.exe (PID: 6724)
      • identity_helper.exe (PID: 7632)
      • Overwolf.exe (PID: 8728)
      • OverwolfBrowser.exe (PID: 9252)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • SearchApp.exe (PID: 5064)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 4020)
      • msiexec.exe (PID: 8400)
      • OverwolfBrowser.exe (PID: 9252)
      • OverwolfBrowser.exe (PID: 9332)
      • OverwolfBrowser.exe (PID: 9348)
      • OverwolfBrowser.exe (PID: 9904)
    • Disables trace logs

      • OWInstaller.exe (PID: 6724)
      • Overwolf.exe (PID: 8728)
    • Creates files in the program directory

      • OWInstaller.exe (PID: 6724)
      • OverwolfUpdater.exe (PID: 1304)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 4020)
      • WinRAR.exe (PID: 6796)
    • Application launched itself

      • msedge.exe (PID: 4024)
      • chrome.exe (PID: 7436)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6072)
      • msiexec.exe (PID: 8400)
    • Manages system restore points

      • SrTasks.exe (PID: 9112)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 8400)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 6664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.266.0.11
ProductVersionNumber: 2.266.0.11
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Buff
FileVersion: 2.266.0.11
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Buff
ProductVersion: 2.266.0.11
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
301
Monitored processes
147
Malicious processes
15
Suspicious processes
0

Behavior graph

Click at the process to see the details
start buff achievement tracker - installer.exe buff achievement tracker - installer.exe owinstaller.exe dxdiag.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs overwolfsetup.exe msedge.exe no specs msedge.exe no specs overwolfupdater.exe overwolfupdater.exe overwolftshelper.exe no specs checkredist.exe conhost.exe no specs werfault.exe sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs vcredist.exe vcredist.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs msedge.exe chrome.exe chrome.exe no specs overwolflauncher.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs overwolflauncher.exe msedge.exe no specs overwolf.exe chrome.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe msedge.exe no specs dxdiag.exe no specs chrome.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe overwolftshelper.exe no specs overwolfbrowser.exe no specs overwolfbrowser.exe no specs overwolfbrowser.exe overwolfbrowser.exe no specs msedge.exe no specs winrar.exe no specs chrome.exe no specs winrar.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
828"C:\Program Files (x86)\Common Files\Overwolf\Teamspeak\OverwolfTSHelper.exe" /RegServerC:\Program Files (x86)\Common Files\Overwolf\Teamspeak\OverwolfTSHelper.exeOverwolfSetup.exe
User:
admin
Company:
Overwolf LTD
Integrity Level:
HIGH
Description:
Overwolf.TeamSpeakHelper
Exit code:
0
Version:
1.0.0.2
Modules
Images
c:\program files (x86)\common files\overwolf\teamspeak\overwolftshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1304"C:\Program Files (x86)\Common Files\Overwolf\OverwolfUpdater.exe" /UpdateFWRules "C:\Program Files (x86)\Overwolf\\0.266.131.43\OverwolfBrowser.exe"C:\Program Files (x86)\Common Files\Overwolf\OverwolfUpdater.exe
OverwolfSetup.exe
User:
admin
Company:
Overwolf LTD
Integrity Level:
HIGH
Description:
OverwolfUpdater
Exit code:
0
Version:
0.266.131.43
Modules
Images
c:\program files (x86)\common files\overwolf\overwolfupdater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1344"C:\WINDOWS\System32\DxDiag.exe" /tC:\Users\admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txtC:\Windows\System32\dxdiag.exeOverwolf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1356"C:\WINDOWS\Temp\{219F57C0-8917-40F6-85CE-4F6B1A765B72}\.cr\vcredist.exe" -burn.clean.room="C:\ProgramData\Overwolf\Setup\vcredist.exe" -burn.filehandle.attached=608 -burn.filehandle.self=572 /q /norestart /repairC:\Windows\Temp\{219F57C0-8917-40F6-85CE-4F6B1A765B72}\.cr\vcredist.exe
vcredist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.42.34433
Exit code:
3010
Version:
14.42.34433.0
Modules
Images
c:\windows\temp\{219f57c0-8917-40f6-85ce-4f6b1a765b72}\.cr\vcredist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1476"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=3844 --field-trial-handle=2288,i,460378638548327176,6141051407923611659,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1752"sc" sdshow OverwolfUpdaterC:\Windows\System32\sc.exeOverwolfUpdater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2100"sc" sdshow OverwolfUpdaterC:\Windows\System32\sc.exeOverwolfUpdater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2124"C:\Program Files (x86)\Overwolf\OverwolfLauncher.exe"C:\Program Files (x86)\Overwolf\OverwolfLauncher.exe
svchost.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
MEDIUM
Description:
Overwolf Launcher
Exit code:
0
Version:
1.131.268.11
Modules
Images
c:\program files (x86)\overwolf\overwolflauncher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2136"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4760 --field-trial-handle=1872,i,12823298096813123470,102389570847191047,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
Total events
97 179
Read events
95 351
Write events
1 383
Delete events
445

Modification events

(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds\DSB
Operation:writeName:DynamicText
Value:
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds\DSB
Operation:writeName:DynamicTextTruncated
Value:
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState\DynamicSearchBox
Operation:writeName:TelemetryID
Value:
00000848BCAA2071DB01
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState\DynamicSearchBox
Operation:writeName:TelemetryID
Value:
000095ABBEAA2071DB01
(PID) Process:(6724) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfPersist
Operation:writeName:MUIDV2
Value:
3869c144-d65e-4fa0-bbf8-5f773189df50
(PID) Process:(6724) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverwolfPersist
Operation:writeName:MUIDV2
Value:
3869c144-d65e-4fa0-bbf8-5f773189df50
(PID) Process:(6660) Buff Achievement Tracker - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6660) Buff Achievement Tracker - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6660) Buff Achievement Tracker - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6984) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
Executable files
490
Suspicious files
2 257
Text files
1 890
Unknown types
3

Dropped files

PID
Process
Filename
Type
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\log4net.dllexecutable
MD5:F15C8A9E2876568B3910189B2D493706
SHA256:AE9C8073C3357C490F5D1C64101362918357C568F6B9380A60B09A4A4C1FF309
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\OWInstaller.exeexecutable
MD5:E8820109B7F8C29A5BDD9907AABC9951
SHA256:741E9AC82F313DAEA3888D63D04737F6288EC1601EB000BA527ECDBF6273141C
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\uac.dllexecutable
MD5:861F7E800BB28F68927E65719869409C
SHA256:10A0E8CF46038AB3B2C3CF5DCE407B9A043A631CBDE9A5C8BCF0A54B2566C010
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\System.dllexecutable
MD5:51BD16A2EA23AE1E7A92CEDC6785C82E
SHA256:4DBC79D2B1C7987CC64BB5D014DB81BB5108BDD6D8BF3A5F820FAC1DED62BE33
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\Newtonsoft.Json.dllexecutable
MD5:98CBB64F074DC600B23A2EE1A0F46448
SHA256:7B44639CBFBC8DDAC8C7A3DE8FFA97A7460BEBB0D54E9FF2E1CCDC3A742C2B13
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\nsProcess.dllexecutable
MD5:10E47E822B85D2A12FA4727001612182
SHA256:D530589A90918334B8E08D7355630892DD62F41333D948A860735D5BECFCB391
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\DotNetZip.dllexecutable
MD5:190E712F2E3B065BA3D5F63CB9B7725E
SHA256:6C512D9943A225D686B26FC832589E4C8BEF7C4DD0A8BDFD557D5D27FE5BBA0F
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\app\index.htmlhtml
MD5:C7B752ACF6D1E10F3ACA2C67B1CCF4D3
SHA256:69B9F99F6611F953D94984AC35BDAF9E9817F689E1E3614976BEBE3465C613FC
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\app\game_detection_database.jsonbinary
MD5:336D26D3E0AB31E8DC102EA86C48FA26
SHA256:F30B571B8BB396AA0BCA9AA9B80638416EC638DE5C4788BC281AC67D3D54CCAF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
135
TCP/UDP connections
336
DNS requests
353
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1684
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1684
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6660
Buff Achievement Tracker - Installer.exe
GET
200
18.244.18.56:80
http://analyticsnew.overwolf.com/analytics/Counter?Name=installer_uac_action&Value=1&&Extra=%5b%7b%22Name%22%3a%22installer_version%22%2c%22Value%22%3a%222.266.0.11%22%7d%5d
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6724
OWInstaller.exe
GET
200
142.250.186.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=8281792&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=909504152&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1648986380.1738026310.1738026310.1738026310.2%3B%2B__utmz%3D0.1738026310.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6724
OWInstaller.exe
GET
200
142.250.186.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=314748039&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=40222663&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1648986380.1738026310.1738026310.1738026310.2%3B%2B__utmz%3D0.1738026310.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6724
OWInstaller.exe
GET
200
18.66.145.213:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEnA9eVH9TrLXPKuCavuqCA0%3D
unknown
unknown
6724
OWInstaller.exe
GET
200
18.66.145.213:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
whitelisted
6724
OWInstaller.exe
GET
200
18.66.145.213:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkpLy9ROx7U76vGUhC06D6E%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
104.126.37.163:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1684
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1684
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1684
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6660
Buff Achievement Tracker - Installer.exe
18.244.18.56:80
analyticsnew.overwolf.com
US
whitelisted
1076
svchost.exe
184.30.18.9:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 104.126.37.163
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.123
  • 104.126.37.139
  • 2.21.65.132
  • 2.21.65.154
whitelisted
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.56
  • 18.244.18.46
  • 18.244.18.106
  • 18.244.18.51
  • 13.32.110.84
  • 13.32.110.114
  • 13.32.110.4
  • 13.32.110.105
whitelisted
go.microsoft.com
  • 184.30.18.9
  • 184.28.89.167
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.134
  • 20.190.160.17
  • 40.126.32.140
  • 20.190.160.14
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.68
  • 20.190.160.20
whitelisted
www.google-analytics.com
  • 142.250.186.78
whitelisted
content.overwolf.com
  • 18.245.86.110
  • 18.245.86.78
  • 18.245.86.39
  • 18.245.86.117
whitelisted

Threats

PID
Process
Class
Message
6660
Buff Achievement Tracker - Installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Observed Commonly Abused File Sharing Site Domain (file .io) in TLS SNI
6260
msedge.exe
Misc activity
ET INFO Observed Commonly Abused File Sharing Site Domain (file .io) in TLS SNI
6260
msedge.exe
Misc activity
ET INFO Observed Commonly Abused File Sharing Site Domain (file .io) in TLS SNI
Process
Message
OverwolfLauncher.exe
OWLauncher::Process executed C:\Program Files (x86)\Overwolf\Overwolf.exe
OverwolfLauncher.exe
OWLauncher::Waiting for event...
msiexec.exe
Failed to release Service
Overwolf.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Overwolf directory exists )
OverwolfLauncher.exe
OWLauncher::Exit Listener.
OverwolfLauncher.exe
OWLauncher::Process timeout
OverwolfLauncher.exe
OWLauncher::Listener End.
OverwolfLauncher.exe
OWLauncher::End.