File name:

Buff Achievement Tracker - Installer.exe

Full analysis: https://app.any.run/tasks/029297e6-8b78-47d4-8863-2638d5168e7d
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 28, 2025, 01:05:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-scr
arch-html
arch-doc
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

13DAD77F1DE4AE9BB3515269B684E66E

SHA1:

A9C4FDE18621C13D005839ABAF473751B979550C

SHA256:

4A7EBC5267BBBB742F237BFCB00FA25DB0A57188F8A10E88973920C534BA9585

SSDEEP:

98304:bz/w18yYJ/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhBIHtugzPFMNxs3JPAWQPBN:eYaRO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • OWInstaller.exe (PID: 6724)
      • VC_redist.x64.exe (PID: 4020)
    • Actions looks like stealing of personal data

      • OverwolfLauncher.exe (PID: 8532)
    • Steals credentials from Web Browsers

      • OverwolfLauncher.exe (PID: 8532)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
    • Executable content was dropped or overwritten

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • vcredist.exe (PID: 6400)
      • vcredist.exe (PID: 1356)
      • OWInstaller.exe (PID: 6724)
      • VC_redist.x64.exe (PID: 4020)
      • VC_redist.x64.exe (PID: 10152)
      • VC_redist.x64.exe (PID: 10200)
      • Overwolf.exe (PID: 8728)
    • The process creates files with name similar to system file names

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
    • Drops 7-zip archiver for unpacking

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
    • Reads security settings of Internet Explorer

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • vcredist.exe (PID: 1356)
      • OverwolfLauncher.exe (PID: 2124)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 10152)
      • WinRAR.exe (PID: 10160)
    • Application launched itself

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • OverwolfLauncher.exe (PID: 2124)
      • VC_redist.x64.exe (PID: 10128)
      • VC_redist.x64.exe (PID: 10152)
      • WinRAR.exe (PID: 10160)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 6724)
      • Overwolf.exe (PID: 8728)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 6984)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 6724)
    • Checks Windows Trust Settings

      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • msiexec.exe (PID: 8400)
      • Overwolf.exe (PID: 8728)
    • There is functionality for taking screenshot (YARA)

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 6724)
    • Creates a software uninstall entry

      • OverwolfSetup.exe (PID: 4468)
      • VC_redist.x64.exe (PID: 4020)
      • Overwolf.exe (PID: 8728)
    • Adds/modifies Windows certificates

      • OverwolfUpdater.exe (PID: 6676)
    • Process drops legitimate windows executable

      • OverwolfSetup.exe (PID: 4468)
      • vcredist.exe (PID: 1356)
      • vcredist.exe (PID: 6400)
      • VC_redist.x64.exe (PID: 4020)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10200)
    • The process drops C-runtime libraries

      • OverwolfSetup.exe (PID: 4468)
      • msiexec.exe (PID: 8400)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7828)
      • sc.exe (PID: 6240)
      • sc.exe (PID: 2100)
      • sc.exe (PID: 5628)
      • sc.exe (PID: 1752)
      • sc.exe (PID: 7216)
      • sc.exe (PID: 3144)
      • sc.exe (PID: 7212)
      • sc.exe (PID: 4036)
      • sc.exe (PID: 6284)
      • sc.exe (PID: 7552)
      • sc.exe (PID: 3532)
    • Executes application which crashes

      • checkRedist.exe (PID: 7716)
    • Starts SC.EXE for service management

      • OverwolfUpdater.exe (PID: 6676)
    • Searches for installed software

      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
      • dllhost.exe (PID: 4300)
      • VC_redist.x64.exe (PID: 10152)
      • VC_redist.x64.exe (PID: 10200)
      • Overwolf.exe (PID: 8728)
    • Starts a Microsoft application from unusual location

      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
    • Starts itself from another location

      • vcredist.exe (PID: 1356)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6804)
    • The process executes via Task Scheduler

      • OverwolfLauncher.exe (PID: 2124)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 8400)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 8400)
  • INFO

    • The sample compiled with english language support

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • vcredist.exe (PID: 6400)
      • vcredist.exe (PID: 1356)
      • msedge.exe (PID: 6072)
      • VC_redist.x64.exe (PID: 4020)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10152)
      • VC_redist.x64.exe (PID: 10200)
      • Overwolf.exe (PID: 8728)
    • Reads the computer name

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • OWInstaller.exe (PID: 6724)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • identity_helper.exe (PID: 7632)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • OverwolfUpdater.exe (PID: 6676)
      • OverwolfTSHelper.exe (PID: 828)
      • vcredist.exe (PID: 6400)
      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
      • OverwolfLauncher.exe (PID: 2124)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10152)
      • OverwolfTSHelper.exe (PID: 7856)
      • OverwolfBrowser.exe (PID: 9252)
      • VC_redist.x64.exe (PID: 10200)
      • OverwolfBrowser.exe (PID: 9348)
      • OverwolfBrowser.exe (PID: 9332)
      • OverwolfBrowser.exe (PID: 9904)
    • Create files in a temporary directory

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OverwolfSetup.exe (PID: 4468)
      • OWInstaller.exe (PID: 6724)
      • vcredist.exe (PID: 1356)
      • VC_redist.x64.exe (PID: 4020)
      • VC_redist.x64.exe (PID: 10152)
    • Checks supported languages

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OWInstaller.exe (PID: 6724)
      • SearchApp.exe (PID: 5064)
      • OverwolfSetup.exe (PID: 4468)
      • identity_helper.exe (PID: 7632)
      • OverwolfUpdater.exe (PID: 1304)
      • OverwolfUpdater.exe (PID: 6676)
      • OverwolfTSHelper.exe (PID: 828)
      • checkRedist.exe (PID: 7716)
      • vcredist.exe (PID: 1356)
      • vcredist.exe (PID: 6400)
      • VC_redist.x64.exe (PID: 4020)
      • OverwolfLauncher.exe (PID: 2124)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • msiexec.exe (PID: 8400)
      • VC_redist.x64.exe (PID: 10128)
      • VC_redist.x64.exe (PID: 10152)
      • VC_redist.x64.exe (PID: 10200)
      • OverwolfBrowser.exe (PID: 9252)
      • OverwolfTSHelper.exe (PID: 7856)
      • OverwolfBrowser.exe (PID: 9348)
      • OverwolfBrowser.exe (PID: 9904)
      • OverwolfBrowser.exe (PID: 9332)
    • Process checks computer location settings

      • Buff Achievement Tracker - Installer.exe (PID: 6324)
      • OWInstaller.exe (PID: 6724)
      • vcredist.exe (PID: 1356)
      • SearchApp.exe (PID: 5064)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 10152)
      • OverwolfBrowser.exe (PID: 9904)
    • Creates files or folders in the user directory

      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • OWInstaller.exe (PID: 6724)
      • dxdiag.exe (PID: 6984)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • WerFault.exe (PID: 6808)
      • OverwolfLauncher.exe (PID: 8532)
      • Overwolf.exe (PID: 8728)
      • msiexec.exe (PID: 8400)
      • OverwolfBrowser.exe (PID: 9252)
      • OverwolfBrowser.exe (PID: 9332)
      • dxdiag.exe (PID: 1344)
    • Reads product name

      • OWInstaller.exe (PID: 6724)
      • Overwolf.exe (PID: 8728)
    • Reads Environment values

      • OWInstaller.exe (PID: 6724)
      • identity_helper.exe (PID: 7632)
      • Overwolf.exe (PID: 8728)
      • OverwolfBrowser.exe (PID: 9252)
    • Checks proxy server information

      • Buff Achievement Tracker - Installer.exe (PID: 6660)
      • dxdiag.exe (PID: 6984)
      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • WerFault.exe (PID: 6808)
      • Overwolf.exe (PID: 8728)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 6984)
      • dxdiag.exe (PID: 1344)
    • Reads the software policy settings

      • dxdiag.exe (PID: 6984)
      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • WerFault.exe (PID: 6808)
      • OverwolfLauncher.exe (PID: 2124)
      • SearchApp.exe (PID: 5064)
      • OverwolfLauncher.exe (PID: 8532)
      • msiexec.exe (PID: 8400)
      • dxdiag.exe (PID: 1344)
      • Overwolf.exe (PID: 8728)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 6676)
      • SearchApp.exe (PID: 5064)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 4020)
      • msiexec.exe (PID: 8400)
      • OverwolfBrowser.exe (PID: 9252)
      • OverwolfBrowser.exe (PID: 9348)
      • OverwolfBrowser.exe (PID: 9904)
      • OverwolfBrowser.exe (PID: 9332)
    • Disables trace logs

      • OWInstaller.exe (PID: 6724)
      • Overwolf.exe (PID: 8728)
    • Creates files in the program directory

      • OWInstaller.exe (PID: 6724)
      • OverwolfSetup.exe (PID: 4468)
      • OverwolfUpdater.exe (PID: 1304)
      • OverwolfUpdater.exe (PID: 6676)
      • Overwolf.exe (PID: 8728)
      • VC_redist.x64.exe (PID: 4020)
      • WinRAR.exe (PID: 6796)
    • Manual execution by a user

      • msedge.exe (PID: 4024)
      • powershell.exe (PID: 6664)
      • WinRAR.exe (PID: 10160)
    • Application launched itself

      • msedge.exe (PID: 4024)
      • chrome.exe (PID: 7436)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6072)
      • msiexec.exe (PID: 8400)
    • Manages system restore points

      • SrTasks.exe (PID: 9112)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 8400)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 6664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.266.0.11
ProductVersionNumber: 2.266.0.11
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Buff
FileVersion: 2.266.0.11
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Buff
ProductVersion: 2.266.0.11
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
301
Monitored processes
147
Malicious processes
15
Suspicious processes
0

Behavior graph

Click at the process to see the details
start buff achievement tracker - installer.exe buff achievement tracker - installer.exe owinstaller.exe dxdiag.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs overwolfsetup.exe msedge.exe no specs msedge.exe no specs overwolfupdater.exe overwolfupdater.exe overwolftshelper.exe no specs checkredist.exe conhost.exe no specs werfault.exe sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs vcredist.exe vcredist.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs msedge.exe chrome.exe chrome.exe no specs overwolflauncher.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs overwolflauncher.exe msedge.exe no specs overwolf.exe chrome.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe msedge.exe no specs dxdiag.exe no specs chrome.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe overwolftshelper.exe no specs overwolfbrowser.exe no specs overwolfbrowser.exe no specs overwolfbrowser.exe overwolfbrowser.exe no specs msedge.exe no specs winrar.exe no specs chrome.exe no specs winrar.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
828"C:\Program Files (x86)\Common Files\Overwolf\Teamspeak\OverwolfTSHelper.exe" /RegServerC:\Program Files (x86)\Common Files\Overwolf\Teamspeak\OverwolfTSHelper.exeOverwolfSetup.exe
User:
admin
Company:
Overwolf LTD
Integrity Level:
HIGH
Description:
Overwolf.TeamSpeakHelper
Exit code:
0
Version:
1.0.0.2
Modules
Images
c:\program files (x86)\common files\overwolf\teamspeak\overwolftshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1304"C:\Program Files (x86)\Common Files\Overwolf\OverwolfUpdater.exe" /UpdateFWRules "C:\Program Files (x86)\Overwolf\\0.266.131.43\OverwolfBrowser.exe"C:\Program Files (x86)\Common Files\Overwolf\OverwolfUpdater.exe
OverwolfSetup.exe
User:
admin
Company:
Overwolf LTD
Integrity Level:
HIGH
Description:
OverwolfUpdater
Exit code:
0
Version:
0.266.131.43
Modules
Images
c:\program files (x86)\common files\overwolf\overwolfupdater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1344"C:\WINDOWS\System32\DxDiag.exe" /tC:\Users\admin\AppData\Local\Overwolf\Temp\DxDiagOutput.txtC:\Windows\System32\dxdiag.exeOverwolf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1356"C:\WINDOWS\Temp\{219F57C0-8917-40F6-85CE-4F6B1A765B72}\.cr\vcredist.exe" -burn.clean.room="C:\ProgramData\Overwolf\Setup\vcredist.exe" -burn.filehandle.attached=608 -burn.filehandle.self=572 /q /norestart /repairC:\Windows\Temp\{219F57C0-8917-40F6-85CE-4F6B1A765B72}\.cr\vcredist.exe
vcredist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.42.34433
Exit code:
3010
Version:
14.42.34433.0
Modules
Images
c:\windows\temp\{219f57c0-8917-40f6-85ce-4f6b1a765b72}\.cr\vcredist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1476"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=3844 --field-trial-handle=2288,i,460378638548327176,6141051407923611659,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1752"sc" sdshow OverwolfUpdaterC:\Windows\System32\sc.exeOverwolfUpdater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2100"sc" sdshow OverwolfUpdaterC:\Windows\System32\sc.exeOverwolfUpdater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2124"C:\Program Files (x86)\Overwolf\OverwolfLauncher.exe"C:\Program Files (x86)\Overwolf\OverwolfLauncher.exe
svchost.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
MEDIUM
Description:
Overwolf Launcher
Exit code:
0
Version:
1.131.268.11
Modules
Images
c:\program files (x86)\overwolf\overwolflauncher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2136"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4760 --field-trial-handle=1872,i,12823298096813123470,102389570847191047,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
Total events
97 179
Read events
95 351
Write events
1 383
Delete events
445

Modification events

(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds\DSB
Operation:writeName:DynamicText
Value:
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds\DSB
Operation:writeName:DynamicTextTruncated
Value:
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState\DynamicSearchBox
Operation:writeName:TelemetryID
Value:
00000848BCAA2071DB01
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState\DynamicSearchBox
Operation:writeName:TelemetryID
Value:
000095ABBEAA2071DB01
(PID) Process:(6724) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfPersist
Operation:writeName:MUIDV2
Value:
3869c144-d65e-4fa0-bbf8-5f773189df50
(PID) Process:(6724) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverwolfPersist
Operation:writeName:MUIDV2
Value:
3869c144-d65e-4fa0-bbf8-5f773189df50
(PID) Process:(6660) Buff Achievement Tracker - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6660) Buff Achievement Tracker - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6660) Buff Achievement Tracker - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6984) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
Executable files
490
Suspicious files
2 257
Text files
1 890
Unknown types
3

Dropped files

PID
Process
Filename
Type
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\System.dllexecutable
MD5:51BD16A2EA23AE1E7A92CEDC6785C82E
SHA256:4DBC79D2B1C7987CC64BB5D014DB81BB5108BDD6D8BF3A5F820FAC1DED62BE33
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\nsis7z.dllexecutable
MD5:4E717703CA805824B8B577D86160D6B9
SHA256:15E8DB02827BAB847E842754CF52C82E91FD0574A338769BCE728D6EB05445A2
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\CommandLine.dllexecutable
MD5:210472E9E333D3329072C9EA3EF06326
SHA256:569307401B949368527B128155B4E16B349803EC7D65C1052CC23C7B7A1336D8
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\utils.dllexecutable
MD5:C6B46A5FCDCCBF3AEFF930B1E5B383D4
SHA256:251AB3E2690562DCFCD510642607F206E6DCF626D06D94B74E1FA8297B1050A0
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:198949A4C3E67B9EB916140DFF75C114
SHA256:0BDAD6DEB1B651E0A52BAB4DB2C7883C9332884AA37300B3439C69D85B054C7C
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\websocket-sharp.dllexecutable
MD5:1B4FCDE3554ED9CA14E8E7C3A1706FB3
SHA256:B152284FD1EF5CEBEE56802F13B46DEF7C136F0C50FB173AE29CF0648BB4CB1F
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\app\cmp.htmlhtml
MD5:D7B8B31B190E552677589CFD4CBB5D8E
SHA256:6C21E8C07CE28327DCA05F873D73FE85D5473F9B22A751A4D3D28931F5D0C74F
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\app\index.htmlhtml
MD5:C7B752ACF6D1E10F3ACA2C67B1CCF4D3
SHA256:69B9F99F6611F953D94984AC35BDAF9E9817F689E1E3614976BEBE3465C613FC
6324Buff Achievement Tracker - Installer.exeC:\Users\admin\AppData\Local\Temp\nso54CB.tmp\OWInstaller.exe.configxml
MD5:82D22E4E19E27E306317513B9BFA70FF
SHA256:272E4C5364193E73633CAA3793E07509A349B79314EA01808B24FDB12C51B827
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
135
TCP/UDP connections
336
DNS requests
353
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1684
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1684
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6660
Buff Achievement Tracker - Installer.exe
GET
200
18.244.18.56:80
http://analyticsnew.overwolf.com/analytics/Counter?Name=installer_uac_action&Value=1&&Extra=%5b%7b%22Name%22%3a%22installer_version%22%2c%22Value%22%3a%222.266.0.11%22%7d%5d
unknown
whitelisted
6724
OWInstaller.exe
GET
200
142.250.186.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=314748039&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=40222663&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1648986380.1738026310.1738026310.1738026310.2%3B%2B__utmz%3D0.1738026310.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6724
OWInstaller.exe
GET
200
142.250.186.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=8281792&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=909504152&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1648986380.1738026310.1738026310.1738026310.2%3B%2B__utmz%3D0.1738026310.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6724
OWInstaller.exe
GET
200
18.66.145.213:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
whitelisted
6724
OWInstaller.exe
GET
200
18.66.145.213:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEnA9eVH9TrLXPKuCavuqCA0%3D
unknown
unknown
6724
OWInstaller.exe
GET
200
142.250.184.227:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
104.126.37.163:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1684
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1684
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1684
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6660
Buff Achievement Tracker - Installer.exe
18.244.18.56:80
analyticsnew.overwolf.com
US
whitelisted
1076
svchost.exe
184.30.18.9:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 104.126.37.163
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.123
  • 104.126.37.139
  • 2.21.65.132
  • 2.21.65.154
whitelisted
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.56
  • 18.244.18.46
  • 18.244.18.106
  • 18.244.18.51
  • 13.32.110.84
  • 13.32.110.114
  • 13.32.110.4
  • 13.32.110.105
whitelisted
go.microsoft.com
  • 184.30.18.9
  • 184.28.89.167
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.134
  • 20.190.160.17
  • 40.126.32.140
  • 20.190.160.14
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.68
  • 20.190.160.20
whitelisted
www.google-analytics.com
  • 142.250.186.78
whitelisted
content.overwolf.com
  • 18.245.86.110
  • 18.245.86.78
  • 18.245.86.39
  • 18.245.86.117
whitelisted

Threats

PID
Process
Class
Message
6660
Buff Achievement Tracker - Installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed in DNS Lookup (file .io)
6260
msedge.exe
Misc activity
ET INFO Observed Commonly Abused File Sharing Site Domain (file .io) in TLS SNI
6260
msedge.exe
Misc activity
ET INFO Observed Commonly Abused File Sharing Site Domain (file .io) in TLS SNI
6260
msedge.exe
Misc activity
ET INFO Observed Commonly Abused File Sharing Site Domain (file .io) in TLS SNI
Process
Message
OverwolfLauncher.exe
OWLauncher::Process executed C:\Program Files (x86)\Overwolf\Overwolf.exe
OverwolfLauncher.exe
OWLauncher::Waiting for event...
msiexec.exe
Failed to release Service
Overwolf.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Overwolf directory exists )
OverwolfLauncher.exe
OWLauncher::Exit Listener.
OverwolfLauncher.exe
OWLauncher::Process timeout
OverwolfLauncher.exe
OWLauncher::Listener End.
OverwolfLauncher.exe
OWLauncher::End.