URL:

https://download.overwolf.com/setup/electron/mgkabooemhaamambocobpeoeelpadcjhjgbcfhlc

Full analysis: https://app.any.run/tasks/b74ef3aa-00bc-4a23-9874-95a56cbd8f8b
Verdict: Malicious activity
Analysis date: January 11, 2025, 15:43:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
Indicators:
MD5:

96AA3CE291FE5F51C05D8F87C34925ED

SHA1:

F1B31B643CF5D04925CABC96F40A656B7CB91075

SHA256:

5D522E84CBD1615DD87BF69F76C3E8A36DB9E34FE8931F7BBD629530EA6061D8

SSDEEP:

3:N8SElYSXKSRvQRXK+ICd/EWdHZOKCHGe:2SKYSXbIutWdHAme

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • setup.exe (PID: 7016)
      • setup.exe (PID: 7304)
      • Hone.exe (PID: 4740)
      • Hone.exe (PID: 2312)
      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 1572)
      • Hone.exe (PID: 1412)
      • Hone.exe (PID: 1596)
      • HoneStartup.exe (PID: 7132)
      • HoneStartup.exe (PID: 7356)
      • gamefinder472.exe (PID: 7400)
      • HoneStartup.exe (PID: 1296)
      • gamefinder472.exe (PID: 7024)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 5488)
      • Hone.exe (PID: 7880)
      • Hone.exe (PID: 6532)
      • Hone.exe (PID: 3080)
      • Hone.exe (PID: 7088)
      • gamefinder472.exe (PID: 7656)
      • HoneStartup.exe (PID: 7660)
      • gamefinder472.exe (PID: 2484)
      • Hone.exe (PID: 6168)
      • Hone.exe (PID: 6836)
      • Hone.exe (PID: 6852)
      • Hone.exe (PID: 6324)
      • Hone.exe (PID: 6484)
      • Hone.exe (PID: 6984)
      • gamefinder472.exe (PID: 6872)
      • HoneStartup.exe (PID: 6880)
      • Hone.exe (PID: 6692)
      • gamefinder472.exe (PID: 6672)
    • Changes powershell execution policy (Unrestricted)

      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 4036)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 2420)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 6808)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7284)
      • cmd.exe (PID: 7840)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6480)
      • powershell.exe (PID: 7176)
      • powershell.exe (PID: 3820)
      • powershell.exe (PID: 6716)
      • powershell.exe (PID: 7388)
      • powershell.exe (PID: 7324)
      • powershell.exe (PID: 7372)
      • powershell.exe (PID: 7892)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • setup.exe (PID: 7304)
    • Creates a software uninstall entry

      • setup.exe (PID: 7304)
    • Drops a system driver (possible attempt to evade defenses)

      • setup.exe (PID: 7304)
    • The process creates files with name similar to system file names

      • setup.exe (PID: 7304)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 7304)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 6692)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • setup.exe (PID: 7304)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6084)
      • cmd.exe (PID: 5320)
      • cmd.exe (PID: 6996)
      • cmd.exe (PID: 6828)
      • cmd.exe (PID: 5936)
      • cmd.exe (PID: 7048)
      • cmd.exe (PID: 6392)
      • cmd.exe (PID: 6556)
      • cmd.exe (PID: 6640)
    • Starts CMD.EXE for commands execution

      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
    • Application launched itself

      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
    • The process drops C-runtime libraries

      • setup.exe (PID: 7304)
    • The process bypasses the loading of PowerShell profile settings

      • Hone.exe (PID: 6676)
      • cmd.exe (PID: 4036)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 2420)
      • Hone.exe (PID: 4328)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 6808)
      • Hone.exe (PID: 6168)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7284)
      • cmd.exe (PID: 7840)
    • Starts POWERSHELL.EXE for commands execution

      • Hone.exe (PID: 6676)
      • cmd.exe (PID: 3696)
      • cmd.exe (PID: 8136)
      • cmd.exe (PID: 4036)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 6692)
      • cmd.exe (PID: 2420)
      • cmd.exe (PID: 4596)
      • Hone.exe (PID: 4328)
      • cmd.exe (PID: 6808)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 7964)
      • Hone.exe (PID: 6168)
      • cmd.exe (PID: 6372)
      • cmd.exe (PID: 6556)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7284)
      • cmd.exe (PID: 7680)
      • cmd.exe (PID: 7840)
    • The process hides Powershell's copyright startup banner

      • Hone.exe (PID: 6676)
      • cmd.exe (PID: 4036)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 2420)
      • Hone.exe (PID: 4328)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 6808)
      • Hone.exe (PID: 6168)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7284)
      • cmd.exe (PID: 7840)
    • The process executes Powershell scripts

      • cmd.exe (PID: 3696)
      • cmd.exe (PID: 8136)
      • cmd.exe (PID: 4036)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 6692)
      • cmd.exe (PID: 2420)
      • cmd.exe (PID: 4596)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 7964)
      • cmd.exe (PID: 6808)
      • cmd.exe (PID: 6372)
      • cmd.exe (PID: 6556)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7284)
      • cmd.exe (PID: 7840)
      • cmd.exe (PID: 7680)
    • Executes script without checking the security policy

      • powershell.exe (PID: 6480)
      • powershell.exe (PID: 7176)
      • powershell.exe (PID: 3820)
      • powershell.exe (PID: 6716)
      • powershell.exe (PID: 7388)
      • powershell.exe (PID: 7372)
      • powershell.exe (PID: 7324)
      • powershell.exe (PID: 7892)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 4036)
      • cmd.exe (PID: 6600)
      • cmd.exe (PID: 2420)
      • cmd.exe (PID: 6808)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7284)
      • cmd.exe (PID: 7840)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 2392)
      • Hone.exe (PID: 6168)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 6264)
      • msedge.exe (PID: 7988)
    • Checks supported languages

      • identity_helper.exe (PID: 7824)
      • identity_helper.exe (PID: 3532)
      • setup.exe (PID: 7304)
      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 4740)
      • Hone.exe (PID: 2312)
      • Hone.exe (PID: 1596)
      • Hone.exe (PID: 1572)
      • Hone.exe (PID: 1412)
      • Hone.exe (PID: 7224)
      • HoneStartup.exe (PID: 7132)
      • HoneStartup.exe (PID: 7356)
      • gamefinder472.exe (PID: 7400)
      • HoneStartup.exe (PID: 1296)
      • gamefinder472.exe (PID: 7024)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 7088)
      • Hone.exe (PID: 6532)
      • Hone.exe (PID: 7880)
      • Hone.exe (PID: 3080)
      • HoneStartup.exe (PID: 7660)
      • gamefinder472.exe (PID: 2484)
      • gamefinder472.exe (PID: 7656)
      • PLUGScheduler.exe (PID: 2392)
      • Hone.exe (PID: 6168)
      • Hone.exe (PID: 6852)
      • Hone.exe (PID: 6984)
      • Hone.exe (PID: 6324)
      • Hone.exe (PID: 6484)
      • Hone.exe (PID: 6836)
      • Hone.exe (PID: 6692)
      • HoneStartup.exe (PID: 6880)
      • gamefinder472.exe (PID: 6872)
      • gamefinder472.exe (PID: 6672)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6264)
    • Reads Environment values

      • identity_helper.exe (PID: 7824)
      • identity_helper.exe (PID: 3532)
      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
      • Hone.exe (PID: 6692)
    • Reads the computer name

      • identity_helper.exe (PID: 7824)
      • identity_helper.exe (PID: 3532)
      • setup.exe (PID: 7304)
      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 4740)
      • Hone.exe (PID: 2312)
      • HoneStartup.exe (PID: 7132)
      • HoneStartup.exe (PID: 7356)
      • HoneStartup.exe (PID: 1296)
      • gamefinder472.exe (PID: 7400)
      • Hone.exe (PID: 7224)
      • gamefinder472.exe (PID: 7024)
      • Hone.exe (PID: 6532)
      • Hone.exe (PID: 4328)
      • gamefinder472.exe (PID: 2484)
      • HoneStartup.exe (PID: 7660)
      • gamefinder472.exe (PID: 7656)
      • PLUGScheduler.exe (PID: 2392)
      • Hone.exe (PID: 6836)
      • Hone.exe (PID: 6852)
      • Hone.exe (PID: 6168)
      • Hone.exe (PID: 6692)
      • HoneStartup.exe (PID: 6880)
      • gamefinder472.exe (PID: 6672)
      • gamefinder472.exe (PID: 6872)
      • Hone.exe (PID: 7880)
    • The process uses the downloaded file

      • msedge.exe (PID: 836)
      • powershell.exe (PID: 2124)
      • powershell.exe (PID: 1540)
      • powershell.exe (PID: 3208)
      • powershell.exe (PID: 1668)
      • powershell.exe (PID: 7424)
      • powershell.exe (PID: 6708)
      • powershell.exe (PID: 6600)
      • powershell.exe (PID: 1292)
      • powershell.exe (PID: 6876)
      • powershell.exe (PID: 7056)
      • powershell.exe (PID: 7732)
    • Manual execution by a user

      • setup.exe (PID: 7016)
      • setup.exe (PID: 7304)
      • Hone.exe (PID: 5488)
      • Hone.exe (PID: 4328)
    • Creates files or folders in the user directory

      • setup.exe (PID: 7304)
      • Hone.exe (PID: 2312)
      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 6532)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
      • Hone.exe (PID: 6836)
    • Reads product name

      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
      • Hone.exe (PID: 6692)
    • Creates files in the program directory

      • setup.exe (PID: 7304)
      • Hone.exe (PID: 6676)
      • PLUGScheduler.exe (PID: 2392)
      • Hone.exe (PID: 6168)
    • Create files in a temporary directory

      • setup.exe (PID: 7304)
      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
    • Process checks computer location settings

      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 1596)
      • Hone.exe (PID: 1572)
      • Hone.exe (PID: 1412)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 7088)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 3080)
      • Hone.exe (PID: 6984)
      • Hone.exe (PID: 6168)
      • Hone.exe (PID: 6324)
      • Hone.exe (PID: 6484)
      • Hone.exe (PID: 6692)
    • Reads CPU info

      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
    • Reads the software policy settings

      • Hone.exe (PID: 4740)
      • Hone.exe (PID: 7880)
      • Hone.exe (PID: 6852)
    • The sample compiled with english language support

      • setup.exe (PID: 7304)
      • Hone.exe (PID: 7224)
      • Hone.exe (PID: 6692)
    • Checks proxy server information

      • Hone.exe (PID: 6676)
      • Hone.exe (PID: 4328)
      • Hone.exe (PID: 6168)
    • Reads the machine GUID from the registry

      • Hone.exe (PID: 6676)
      • gamefinder472.exe (PID: 7400)
      • gamefinder472.exe (PID: 7024)
      • gamefinder472.exe (PID: 7656)
      • Hone.exe (PID: 4328)
      • gamefinder472.exe (PID: 2484)
      • Hone.exe (PID: 6168)
      • gamefinder472.exe (PID: 6872)
      • gamefinder472.exe (PID: 6672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
471
Monitored processes
195
Malicious processes
8
Suspicious processes
43

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs setup.exe no specs setup.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs hone.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs hone.exe hone.exe hone.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs hone.exe no specs powershell.exe no specs hone.exe no specs cmd.exe no specs conhost.exe no specs gamefinder472.exe no specs powershell.exe no specs honestartup.exe no specs honestartup.exe no specs gamefinder472.exe no specs conhost.exe no specs hone.exe conhost.exe no specs honestartup.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs msedge.exe no specs hone.exe no specs hone.exe cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs hone.exe no specs hone.exe hone.exe cmd.exe no specs conhost.exe no specs hone.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs gamefinder472.exe no specs honestartup.exe no specs gamefinder472.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs plugscheduler.exe no specs hone.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs hone.exe hone.exe hone.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs hone.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs hone.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs hone.exe gamefinder472.exe no specs honestartup.exe no specs gamefinder472.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
768\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
836"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7160 --field-trial-handle=2360,i,2950603242273901644,17436711361033720289,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1292"C:\WINDOWS\System32\WindowsPowershell\v1.0\powershell.exe" -Command "Unblock-File -Path 'c:\ProgramData\Microsoft\d0e6c709-ab06-424f-8215-fe1e0373e2f7.ps1'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
1296C:\Users\admin\AppData\Local\Programs\Hone\resources\assets\hone-resources\HoneStartup.exe -ON "\"C:\Users\admin\AppData\Local\Programs\Hone\Hone.exe\""C:\Users\admin\AppData\Local\Programs\Hone\resources\assets\hone-resources\HoneStartup.exeHone.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\programs\hone\resources\assets\hone-resources\honestartup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
1412"C:\Users\admin\AppData\Local\Programs\Hone\Hone.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\Hone" --standard-schemes=owepm --secure-schemes=owepm --bypasscsp-schemes=owepm --fetch-schemes=owepm --streaming-schemes=owepm --app-user-model-id=Hone --app-path="C:\Users\admin\AppData\Local\Programs\Hone\resources\app.asar" --enable-sandbox --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3648,i,9708780320206843899,15357729281856019107,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3760 /prefetch:1C:\Users\admin\AppData\Local\Programs\Hone\Hone.exeHone.exe
User:
admin
Company:
AuraSide Inc
Integrity Level:
HIGH
Description:
Hone
Exit code:
0
Version:
1.1.41
Modules
Images
c:\users\admin\appdata\local\programs\hone\hone.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1540powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHone.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1572"C:\Users\admin\AppData\Local\Programs\Hone\Hone.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\Hone" --standard-schemes=owepm --secure-schemes=owepm --bypasscsp-schemes=owepm --fetch-schemes=owepm --streaming-schemes=owepm --app-user-model-id=Hone --app-path="C:\Users\admin\AppData\Local\Programs\Hone\resources\app.asar" --enable-sandbox --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3708,i,9708780320206843899,15357729281856019107,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3696 /prefetch:1C:\Users\admin\AppData\Local\Programs\Hone\Hone.exeHone.exe
User:
admin
Company:
AuraSide Inc
Integrity Level:
HIGH
Description:
Hone
Exit code:
0
Version:
1.1.41
Modules
Images
c:\users\admin\appdata\local\programs\hone\hone.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1596C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1596"C:\Users\admin\AppData\Local\Programs\Hone\Hone.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\Hone" --standard-schemes=owepm --secure-schemes=owepm --bypasscsp-schemes=owepm --fetch-schemes=owepm --streaming-schemes=owepm --app-user-model-id=Hone --app-path="C:\Users\admin\AppData\Local\Programs\Hone\resources\app.asar" --enable-sandbox --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2564,i,9708780320206843899,15357729281856019107,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2456 /prefetch:1C:\Users\admin\AppData\Local\Programs\Hone\Hone.exeHone.exe
User:
admin
Company:
AuraSide Inc
Integrity Level:
HIGH
Description:
Hone
Exit code:
0
Version:
1.1.41
Modules
Images
c:\users\admin\appdata\local\programs\hone\hone.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\users\admin\appdata\local\programs\hone\ffmpeg.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\ucrtbase.dll
1668"C:\WINDOWS\System32\WindowsPowershell\v1.0\powershell.exe" -Command "Unblock-File -Path 'c:\ProgramData\Microsoft\707ab36b-6f04-4d7d-bb9a-251f53b6a039.ps1'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
114 209
Read events
114 056
Write events
58
Delete events
95

Modification events

(PID) Process:(6264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6264) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
A3EEAB5C068A2F00
(PID) Process:(6264) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
83D7B25C068A2F00
(PID) Process:(6264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328534
Operation:writeName:WindowTabManagerFileMappingId
Value:
{BB4C2001-663B-4CCB-89A2-0719C1AE5C2A}
(PID) Process:(6264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328534
Operation:writeName:WindowTabManagerFileMappingId
Value:
{03AE3ED9-7947-40E4-8AB4-9C1CC8EE18F4}
(PID) Process:(6264) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
9E51D85C068A2F00
(PID) Process:(6264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicrosoftEdgeAutoLaunch_29EBC4579851B72EE312C449CF839B1A
Value:
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
Executable files
45
Suspicious files
487
Text files
188
Unknown types
10

Dropped files

PID
Process
Filename
Type
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF1353c1.TMP
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF1353c1.TMP
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF1353c1.TMP
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF1353c1.TMP
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF1353d0.TMP
MD5:
SHA256:
6264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
146
DNS requests
127
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7776
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6980
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7776
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6576
svchost.exe
HEAD
200
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1736892925&P2=404&P3=2&P4=Nq74qManUoPP8VpI%2b6qDVXdmP4uC42gOEYBn3cD5ruOgEcmBQD9T2eJgbCeZan99dAkLTyRLUHDukZlcBmH%2bcw%3d%3d
unknown
whitelisted
6576
svchost.exe
GET
206
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1736892925&P2=404&P3=2&P4=Nq74qManUoPP8VpI%2b6qDVXdmP4uC42gOEYBn3cD5ruOgEcmBQD9T2eJgbCeZan99dAkLTyRLUHDukZlcBmH%2bcw%3d%3d
unknown
whitelisted
6576
svchost.exe
GET
206
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1736892925&P2=404&P3=2&P4=Nq74qManUoPP8VpI%2b6qDVXdmP4uC42gOEYBn3cD5ruOgEcmBQD9T2eJgbCeZan99dAkLTyRLUHDukZlcBmH%2bcw%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1684
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
6612
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
  • 2.21.65.132
  • 2.21.65.154
whitelisted
google.com
  • 172.217.16.206
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
download.overwolf.com
  • 65.9.66.53
  • 65.9.66.30
  • 65.9.66.71
  • 65.9.66.110
whitelisted

Threats

No threats detected
No debug info