File name:

Mobalytics Desktop - Installer.exe

Full analysis: https://app.any.run/tasks/b5b1669d-46d0-4717-a136-3e3bb264bf08
Verdict: Malicious activity
Analysis date: May 23, 2025, 13:51:18
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

D3A11E6C7E5757B9311B32D97F542632

SHA1:

E267BF5E6D40D9D85C422EC1B7CE5C91D3D52EFD

SHA256:

C443F73CC1C228A63C71EA15B692FD9380A9F5BC9D86D5B1FF86472886FE1C8A

SSDEEP:

98304:sEK/nkuKHJ/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhBIH8m159wdAOHcq6gRAQw:EYISY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • Mobalytics Desktop - Installer.exe (PID: 7552)
    • Drops 7-zip archiver for unpacking

      • Mobalytics Desktop - Installer.exe (PID: 7552)
      • Mobalytics Desktop - Installer.exe (PID: 7396)
    • Reads security settings of Internet Explorer

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • OWInstaller.exe (PID: 7604)
    • Executable content was dropped or overwritten

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • Mobalytics Desktop - Installer.exe (PID: 7552)
    • The process creates files with name similar to system file names

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • Mobalytics Desktop - Installer.exe (PID: 7552)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 7920)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 7604)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 7604)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 7604)
    • There is functionality for taking screenshot (YARA)

      • Mobalytics Desktop - Installer.exe (PID: 7552)
      • Mobalytics Desktop - Installer.exe (PID: 7396)
    • Application launched itself

      • Mobalytics Desktop - Installer.exe (PID: 7396)
  • INFO

    • Checks supported languages

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • OWInstaller.exe (PID: 7604)
      • Mobalytics Desktop - Installer.exe (PID: 7552)
    • The sample compiled with english language support

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • Mobalytics Desktop - Installer.exe (PID: 7552)
    • Reads the computer name

      • Mobalytics Desktop - Installer.exe (PID: 7552)
      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • OWInstaller.exe (PID: 7604)
    • Checks proxy server information

      • Mobalytics Desktop - Installer.exe (PID: 7552)
      • dxdiag.exe (PID: 7920)
      • OWInstaller.exe (PID: 7604)
    • Process checks computer location settings

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • OWInstaller.exe (PID: 7604)
    • Create files in a temporary directory

      • Mobalytics Desktop - Installer.exe (PID: 7396)
      • OWInstaller.exe (PID: 7604)
      • Mobalytics Desktop - Installer.exe (PID: 7552)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 7604)
    • Reads product name

      • OWInstaller.exe (PID: 7604)
    • Creates files or folders in the user directory

      • OWInstaller.exe (PID: 7604)
      • dxdiag.exe (PID: 7920)
    • Disables trace logs

      • OWInstaller.exe (PID: 7604)
    • Reads Environment values

      • OWInstaller.exe (PID: 7604)
    • Reads the software policy settings

      • dxdiag.exe (PID: 7920)
      • OWInstaller.exe (PID: 7604)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 7920)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.277.0.4
ProductVersionNumber: 2.277.0.4
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Mobalytics Desktop
FileVersion: 2.277.0.4
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Mobalytics Desktop
ProductVersion: 2.277.0.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start mobalytics desktop - installer.exe mobalytics desktop - installer.exe owinstaller.exe sppextcomobj.exe no specs slui.exe no specs dxdiag.exe

Process information

PID
CMD
Path
Indicators
Parent process
7396"C:\Users\admin\AppData\Local\Temp\Mobalytics Desktop - Installer.exe" C:\Users\admin\AppData\Local\Temp\Mobalytics Desktop - Installer.exe
explorer.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
MEDIUM
Description:
Mobalytics Desktop
Version:
2.277.0.4
Modules
Images
c:\users\admin\appdata\local\temp\mobalytics desktop - installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7552"C:\Users\admin\AppData\Local\Temp\Mobalytics Desktop - Installer.exe" /UAC:30246 /NCRC C:\Users\admin\AppData\Local\Temp\Mobalytics Desktop - Installer.exe
Mobalytics Desktop - Installer.exe
User:
admin
Company:
Overwolf Ltd.
Integrity Level:
HIGH
Description:
Mobalytics Desktop
Version:
2.277.0.4
Modules
Images
c:\users\admin\appdata\local\temp\mobalytics desktop - installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7604"C:\Users\admin\AppData\Local\Temp\nsdCAA6.tmp\OWinstaller.exe" Sel=1&Channel=web_dl_btn&Extension=kccgdmdllebbgifgafjfmcjdgmhoknfhjdnobcho&Name=Mobalytics%20Desktop&UtmSource=web&UtmMedium=homepage&UtmCampaign=top-lol&UtmTerm=5f4c59e6-a20b-4fe4-81b2-ce11b88e3739&Referer=mobalytics.gg&Browser=opera /UAC:30246 /NCRC -partnerCustomizationLevel 0 -customPromoPages --app-name="Mobalytics Desktop" -exepath C:\Users\admin\AppData\Local\Temp\Mobalytics Desktop - Installer.exe C:\Users\admin\AppData\Local\Temp\nsdCAA6.tmp\OWInstaller.exe
Mobalytics Desktop - Installer.exe
User:
admin
Company:
Overwolf
Integrity Level:
HIGH
Description:
Mobalytics Desktop Installer
Version:
2.277.0.2
Modules
Images
c:\users\admin\appdata\local\temp\nsdcaa6.tmp\owinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7656C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7688"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7920"C:\WINDOWS\System32\DxDiag.exe" /xC:\Users\admin\AppData\Local\Overwolf\Temp\DxDiagOutput.xmlC:\Windows\System32\dxdiag.exe
OWInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
13 694
Read events
13 533
Write events
140
Delete events
21

Modification events

(PID) Process:(7552) Mobalytics Desktop - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7552) Mobalytics Desktop - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7552) Mobalytics Desktop - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7604) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfPersist
Operation:writeName:MUIDV2
Value:
75d86188-7e25-417d-8853-1975e64aec15
(PID) Process:(7604) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverwolfPersist
Operation:writeName:MUIDV2
Value:
75d86188-7e25-417d-8853-1975e64aec15
(PID) Process:(7920) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(7604) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Overwolf
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(7604) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7604) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7604) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
33
Suspicious files
83
Text files
124
Unknown types
0

Dropped files

PID
Process
Filename
Type
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\uac.dllexecutable
MD5:861F7E800BB28F68927E65719869409C
SHA256:10A0E8CF46038AB3B2C3CF5DCE407B9A043A631CBDE9A5C8BCF0A54B2566C010
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\DotNetZip.dllexecutable
MD5:190E712F2E3B065BA3D5F63CB9B7725E
SHA256:6C512D9943A225D686B26FC832589E4C8BEF7C4DD0A8BDFD557D5D27FE5BBA0F
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\Newtonsoft.Json.dllexecutable
MD5:98CBB64F074DC600B23A2EE1A0F46448
SHA256:7B44639CBFBC8DDAC8C7A3DE8FFA97A7460BEBB0D54E9FF2E1CCDC3A742C2B13
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:198949A4C3E67B9EB916140DFF75C114
SHA256:0BDAD6DEB1B651E0A52BAB4DB2C7883C9332884AA37300B3439C69D85B054C7C
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\CommandLine.dllexecutable
MD5:210472E9E333D3329072C9EA3EF06326
SHA256:569307401B949368527B128155B4E16B349803EC7D65C1052CC23C7B7A1336D8
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\OverWolf.Client.CommonUtils.dllexecutable
MD5:B8125A2FBA353626FC71AF692ECB26A6
SHA256:CFE9A49E52B50729D936B23B843E60174378C7D392DE65CD610CA739E5369662
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\websocket-sharp.dllexecutable
MD5:1B4FCDE3554ED9CA14E8E7C3A1706FB3
SHA256:B152284FD1EF5CEBEE56802F13B46DEF7C136F0C50FB173AE29CF0648BB4CB1F
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\System.dllexecutable
MD5:51BD16A2EA23AE1E7A92CEDC6785C82E
SHA256:4DBC79D2B1C7987CC64BB5D014DB81BB5108BDD6D8BF3A5F820FAC1DED62BE33
7396Mobalytics Desktop - Installer.exeC:\Users\admin\AppData\Local\Temp\nsdBFC8.tmp\log4net.dllexecutable
MD5:F15C8A9E2876568B3910189B2D493706
SHA256:AE9C8073C3357C490F5D1C64101362918357C568F6B9380A60B09A4A4C1FF309
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
46
DNS requests
29
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7552
Mobalytics Desktop - Installer.exe
GET
200
18.244.18.106:80
http://analyticsnew.overwolf.com/analytics/Counter?Name=installer_uac_action&Value=1&&Extra=%5b%7b%22Name%22%3a%22installer_version%22%2c%22Value%22%3a%222.277.0.4%22%7d%5d
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7604
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEnA9eVH9TrLXPKuCavuqCA0%3D
unknown
whitelisted
7604
OWInstaller.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=71319386&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=968385016&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1021779935.1748008294.1748008294.1748008294.2%3B%2B__utmz%3D0.1748008294.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
7604
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkpLy9ROx7U76vGUhC06D6E%3D
unknown
whitelisted
7604
OWInstaller.exe
GET
200
172.217.18.14:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=572970373&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=195080672&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1021779935.1748008294.1748008294.1748008294.2%3B%2B__utmz%3D0.1748008294.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A2.0.50727%20SP2%2C%203.0%20SP2%2C%203.5%20SP1%2C%204%20Client%2C%204%20Full%2C%204.0%20Client%29%28%29&gaq=1&utmt=event
unknown
whitelisted
7604
OWInstaller.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
7604
OWInstaller.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4108
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7552
Mobalytics Desktop - Installer.exe
18.244.18.106:80
analyticsnew.overwolf.com
US
whitelisted
7604
OWInstaller.exe
172.217.18.14:80
www.google-analytics.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.106
  • 18.244.18.46
  • 18.244.18.56
  • 18.244.18.51
whitelisted
www.google-analytics.com
  • 172.217.18.14
whitelisted
login.live.com
  • 40.126.31.129
  • 40.126.31.2
  • 40.126.31.130
  • 20.190.159.0
  • 20.190.159.129
  • 40.126.31.131
  • 20.190.159.71
  • 20.190.159.131
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
content.overwolf.com
  • 18.245.86.110
  • 18.245.86.117
  • 18.245.86.78
  • 18.245.86.39
whitelisted
ocsp.rootca3.amazontrust.com
  • 18.245.38.41
whitelisted

Threats

PID
Process
Class
Message
7552
Mobalytics Desktop - Installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
No debug info