File name:

AlecaFrame - Installer.exe

Full analysis: https://app.any.run/tasks/e8a22212-f5c5-4ecf-9d0c-279898555db5
Verdict: Malicious activity
Analysis date: May 14, 2025, 09:36:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

A9FC1398F12DFA895CEFA09D3FF5E187

SHA1:

2CCCB826C71052396B611CC22D030C80402DBE12

SHA256:

8F8011D1008AF50811F44C0A7C9C782EDDBD28205950C991CCFFB5502D947B6C

SSDEEP:

98304:L/hnFx+J/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhBIH8m159wdAOHcq6gRAQPsa:BYISN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • AlecaFrame - Installer.exe (PID: 896)
      • AlecaFrame - Installer.exe (PID: 6436)
    • Executable content was dropped or overwritten

      • AlecaFrame - Installer.exe (PID: 6436)
      • AlecaFrame - Installer.exe (PID: 896)
    • Application launched itself

      • AlecaFrame - Installer.exe (PID: 896)
    • Drops 7-zip archiver for unpacking

      • AlecaFrame - Installer.exe (PID: 6436)
      • AlecaFrame - Installer.exe (PID: 896)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 680)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 6564)
    • Reads security settings of Internet Explorer

      • OWInstaller.exe (PID: 6564)
      • AlecaFrame - Installer.exe (PID: 6436)
      • AlecaFrame - Installer.exe (PID: 896)
    • There is functionality for taking screenshot (YARA)

      • AlecaFrame - Installer.exe (PID: 896)
      • AlecaFrame - Installer.exe (PID: 6436)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 6564)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 6564)
    • The process creates files with name similar to system file names

      • AlecaFrame - Installer.exe (PID: 896)
      • AlecaFrame - Installer.exe (PID: 6436)
  • INFO

    • Checks supported languages

      • AlecaFrame - Installer.exe (PID: 896)
      • AlecaFrame - Installer.exe (PID: 6436)
      • OWInstaller.exe (PID: 6564)
    • The sample compiled with english language support

      • AlecaFrame - Installer.exe (PID: 896)
      • AlecaFrame - Installer.exe (PID: 6436)
    • Create files in a temporary directory

      • AlecaFrame - Installer.exe (PID: 896)
      • AlecaFrame - Installer.exe (PID: 6436)
    • Reads the computer name

      • AlecaFrame - Installer.exe (PID: 6436)
      • AlecaFrame - Installer.exe (PID: 896)
      • OWInstaller.exe (PID: 6564)
    • Checks proxy server information

      • AlecaFrame - Installer.exe (PID: 6436)
      • OWInstaller.exe (PID: 6564)
      • dxdiag.exe (PID: 680)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 6564)
    • Reads Environment values

      • OWInstaller.exe (PID: 6564)
    • Reads product name

      • OWInstaller.exe (PID: 6564)
    • Process checks computer location settings

      • OWInstaller.exe (PID: 6564)
      • AlecaFrame - Installer.exe (PID: 896)
    • Disables trace logs

      • OWInstaller.exe (PID: 6564)
    • Reads the software policy settings

      • OWInstaller.exe (PID: 6564)
      • dxdiag.exe (PID: 680)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 680)
    • Creates files or folders in the user directory

      • OWInstaller.exe (PID: 6564)
      • dxdiag.exe (PID: 680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.277.0.4
ProductVersionNumber: 2.277.0.4
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Overwolf
FileVersion: 2.277.0.4
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Overwolf
ProductVersion: 2.277.0.4
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start alecaframe - installer.exe alecaframe - installer.exe sppextcomobj.exe no specs slui.exe no specs owinstaller.exe dxdiag.exe

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\WINDOWS\System32\DxDiag.exe" /xC:\Users\admin\AppData\Local\Overwolf\Temp\DxDiagOutput.xmlC:\Windows\System32\dxdiag.exe
OWInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
896"C:\Users\admin\AppData\Local\Temp\AlecaFrame - Installer.exe" C:\Users\admin\AppData\Local\Temp\AlecaFrame - Installer.exe
explorer.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
MEDIUM
Description:
Overwolf
Version:
2.277.0.4
Modules
Images
c:\users\admin\appdata\local\temp\alecaframe - installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5364C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5864"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6436"C:\Users\admin\AppData\Local\Temp\AlecaFrame - Installer.exe" /UAC:702B0 /NCRC C:\Users\admin\AppData\Local\Temp\AlecaFrame - Installer.exe
AlecaFrame - Installer.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
HIGH
Description:
Overwolf
Version:
2.277.0.4
Modules
Images
c:\users\admin\appdata\local\temp\alecaframe - installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6564"C:\Users\admin\AppData\Local\Temp\nsrC844.tmp\OWinstaller.exe" Sel=1&Channel=web_dl_btn&Extension=afmcagbpgggkpdkokjhjkllpegnadmkignlonpjm&Name=AlecaFrame&UtmCampaign=af_website&Referer=alecaframe.com&Browser=chrome /UAC:702B0 /NCRC -partnerCustomizationLevel 0 -exepath C:\Users\admin\AppData\Local\Temp\AlecaFrame - Installer.exe C:\Users\admin\AppData\Local\Temp\nsrC844.tmp\OWInstaller.exe
AlecaFrame - Installer.exe
User:
admin
Company:
Overwolf
Integrity Level:
HIGH
Description:
Overwolf Installer
Version:
2.277.0.2
Modules
Images
c:\users\admin\appdata\local\temp\nsrc844.tmp\owinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
9 075
Read events
8 914
Write events
140
Delete events
21

Modification events

(PID) Process:(6564) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfPersist
Operation:writeName:MUIDV2
Value:
7e8a89d6-603e-493d-b186-de681671ab5c
(PID) Process:(6564) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverwolfPersist
Operation:writeName:MUIDV2
Value:
7e8a89d6-603e-493d-b186-de681671ab5c
(PID) Process:(6436) AlecaFrame - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6436) AlecaFrame - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6436) AlecaFrame - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6564) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Overwolf
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(680) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(6564) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6564) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6564) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
33
Suspicious files
83
Text files
116
Unknown types
0

Dropped files

PID
Process
Filename
Type
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\OWInstaller.exeexecutable
MD5:1AFBCBDC92DF0BB75E2F65CEF42337FD
SHA256:AF9283EE8EDDCDFD2EE3101848261659139F4675E99E406EE319A73BE3EF05F6
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\websocket-sharp.dllexecutable
MD5:1B4FCDE3554ED9CA14E8E7C3A1706FB3
SHA256:B152284FD1EF5CEBEE56802F13B46DEF7C136F0C50FB173AE29CF0648BB4CB1F
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\nsProcess.dllexecutable
MD5:10E47E822B85D2A12FA4727001612182
SHA256:D530589A90918334B8E08D7355630892DD62F41333D948A860735D5BECFCB391
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\utils.dllexecutable
MD5:C6B46A5FCDCCBF3AEFF930B1E5B383D4
SHA256:251AB3E2690562DCFCD510642607F206E6DCF626D06D94B74E1FA8297B1050A0
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\SharpRaven.dllexecutable
MD5:271251960BF1D6A491803E15BD562E45
SHA256:776C6B0642F7A3F3F3AD3CC6BB5F1D528E90C6029B671D8F82B0320B185B92A7
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\DotNetZip.dllexecutable
MD5:190E712F2E3B065BA3D5F63CB9B7725E
SHA256:6C512D9943A225D686B26FC832589E4C8BEF7C4DD0A8BDFD557D5D27FE5BBA0F
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\Newtonsoft.Json.dllexecutable
MD5:98CBB64F074DC600B23A2EE1A0F46448
SHA256:7B44639CBFBC8DDAC8C7A3DE8FFA97A7460BEBB0D54E9FF2E1CCDC3A742C2B13
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\log4net.dllexecutable
MD5:F15C8A9E2876568B3910189B2D493706
SHA256:AE9C8073C3357C490F5D1C64101362918357C568F6B9380A60B09A4A4C1FF309
896AlecaFrame - Installer.exeC:\Users\admin\AppData\Local\Temp\nskC259.tmp\app\index.htmlhtml
MD5:C7B752ACF6D1E10F3ACA2C67B1CCF4D3
SHA256:69B9F99F6611F953D94984AC35BDAF9E9817F689E1E3614976BEBE3465C613FC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
35
DNS requests
25
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.158:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6436
AlecaFrame - Installer.exe
GET
200
18.244.18.56:80
http://analyticsnew.overwolf.com/analytics/Counter?Name=installer_uac_action&Value=1&&Extra=%5b%7b%22Name%22%3a%22installer_version%22%2c%22Value%22%3a%222.277.0.4%22%7d%5d
unknown
whitelisted
6564
OWInstaller.exe
GET
200
142.250.184.206:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=171654201&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=20561777&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1521008233.1747215382.1747215382.1747215382.2%3B%2B__utmz%3D0.1747215382.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6564
OWInstaller.exe
GET
200
142.250.184.206:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=474818474&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=697888976&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1521008233.1747215382.1747215382.1747215382.2%3B%2B__utmz%3D0.1747215382.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6564
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEnA9eVH9TrLXPKuCavuqCA0%3D
unknown
whitelisted
6564
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkpLy9ROx7U76vGUhC06D6E%3D
unknown
whitelisted
6564
OWInstaller.exe
GET
200
142.250.185.195:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6564
OWInstaller.exe
GET
200
142.250.185.195:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
6564
OWInstaller.exe
GET
200
142.250.185.195:80
http://o.pki.goog/we2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEFYLKxOzl6hEEuPKhM%2BnvHQ%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.158:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6436
AlecaFrame - Installer.exe
18.244.18.56:80
analyticsnew.overwolf.com
US
whitelisted
6564
OWInstaller.exe
142.250.184.206:80
www.google-analytics.com
GOOGLE
US
whitelisted
6564
OWInstaller.exe
18.244.18.56:443
analyticsnew.overwolf.com
US
whitelisted
6564
OWInstaller.exe
18.245.86.78:443
content.overwolf.com
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.48.23.158
  • 23.48.23.164
  • 23.48.23.190
  • 23.48.23.162
  • 23.48.23.177
  • 23.48.23.180
  • 23.48.23.143
  • 23.48.23.194
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.56
  • 18.244.18.51
  • 18.244.18.46
  • 18.244.18.106
whitelisted
www.google-analytics.com
  • 142.250.184.206
whitelisted
content.overwolf.com
  • 18.245.86.78
  • 18.245.86.39
  • 18.245.86.110
  • 18.245.86.117
whitelisted
storeapi.overwolf.com
  • 18.172.112.117
  • 18.172.112.84
  • 18.172.112.62
  • 18.172.112.72
shared
ocsp.rootca3.amazontrust.com
  • 18.245.38.41
whitelisted

Threats

PID
Process
Class
Message
6436
AlecaFrame - Installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
No debug info