File name:

Hone - Installer.exe

Full analysis: https://app.any.run/tasks/b17a18e9-046b-4c19-aae6-53770190e35a
Verdict: Malicious activity
Analysis date: October 11, 2024, 21:18:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

01011FFA7010AA0EBE066B12E246DD8D

SHA1:

D84213457340D775FAA40DAD74FC5941380BC28F

SHA256:

E0E18234E3B35290E6ACFDE525A55376A45B59683A70EF5129F626455EAA446F

SSDEEP:

98304:a/HapPJ/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhjE5fWHkVv8d1BfOwiVs/vZah:qai

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Unrestricted)

      • Hone.exe (PID: 3432)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 4208)
      • cmd.exe (PID: 7852)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 8144)
      • powershell.exe (PID: 7240)
      • powershell.exe (PID: 7764)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Hone - Installer.exe (PID: 6024)
      • Hone - Installer.exe (PID: 5932)
      • ow-electron-setup.exe (PID: 4308)
    • Executable content was dropped or overwritten

      • Hone - Installer.exe (PID: 6024)
      • Hone - Installer.exe (PID: 5932)
      • ow-electron-setup.exe (PID: 4308)
      • Hone.exe (PID: 7452)
    • Drops 7-zip archiver for unpacking

      • Hone - Installer.exe (PID: 6024)
      • Hone - Installer.exe (PID: 5932)
      • ow-electron-setup.exe (PID: 4308)
    • The process creates files with name similar to system file names

      • Hone - Installer.exe (PID: 6024)
    • Reads security settings of Internet Explorer

      • Hone - Installer.exe (PID: 6024)
    • Application launched itself

      • Hone - Installer.exe (PID: 6024)
      • Hone.exe (PID: 3432)
    • Starts CMD.EXE for commands execution

      • ow-electron-setup.exe (PID: 4308)
      • Hone.exe (PID: 3432)
    • Get information on the list of running processes

      • ow-electron-setup.exe (PID: 4308)
      • cmd.exe (PID: 1372)
    • Process drops legitimate windows executable

      • ow-electron-setup.exe (PID: 4308)
    • Drops a system driver (possible attempt to evade defenses)

      • ow-electron-setup.exe (PID: 4308)
    • The process drops C-runtime libraries

      • ow-electron-setup.exe (PID: 4308)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7120)
      • cmd.exe (PID: 1236)
      • cmd.exe (PID: 5068)
      • cmd.exe (PID: 6896)
    • Starts POWERSHELL.EXE for commands execution

      • Hone.exe (PID: 3432)
      • cmd.exe (PID: 7196)
      • cmd.exe (PID: 7524)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 4208)
      • cmd.exe (PID: 5920)
      • cmd.exe (PID: 7852)
    • The process bypasses the loading of PowerShell profile settings

      • Hone.exe (PID: 3432)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 4208)
      • cmd.exe (PID: 7852)
    • The process hides Powershell's copyright startup banner

      • Hone.exe (PID: 3432)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 4208)
      • cmd.exe (PID: 7852)
    • The process executes Powershell scripts

      • cmd.exe (PID: 7196)
      • cmd.exe (PID: 7524)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 4208)
      • cmd.exe (PID: 5920)
      • cmd.exe (PID: 7852)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 4208)
      • cmd.exe (PID: 7852)
  • INFO

    • Checks supported languages

      • Hone - Installer.exe (PID: 6024)
    • Create files in a temporary directory

      • Hone - Installer.exe (PID: 6024)
    • Reads the computer name

      • Hone - Installer.exe (PID: 6024)
    • Process checks computer location settings

      • Hone - Installer.exe (PID: 6024)
    • Manual execution by a user

      • Hone.exe (PID: 7036)
      • Hone.exe (PID: 3432)
      • msedge.exe (PID: 7332)
    • Application launched itself

      • msedge.exe (PID: 8040)
      • msedge.exe (PID: 7332)
      • msedge.exe (PID: 7588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.261.0.3
ProductVersionNumber: 2.261.0.3
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Hone
FileVersion: 2.261.0.3
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Hone
ProductVersion: 2.261.0.3
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
240
Monitored processes
104
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start hone - installer.exe hone - installer.exe owinstaller.exe ow-electron-setup.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs sppextcomobj.exe no specs slui.exe no specs hone.exe no specs hone.exe cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs hone.exe hone.exe hone.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs hone.exe no specs powershell.exe no specs hone.exe no specs hone.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs gamefinder472.exe no specs honestartup.exe no specs honestartup.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs gamefinder472.exe no specs conhost.exe no specs honestartup.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs powershell.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe powershell.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs powershell.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
204"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5180 --field-trial-handle=2296,i,7020212362868817,3901175683731996294,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
784reg add "hklm\Software\Classes\hone" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1172"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2648 --field-trial-handle=2296,i,7020212362868817,3901175683731996294,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1176\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1200\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1236C:\WINDOWS\system32\cmd.exe /d /s /c "reg add "hklm\Software\Classes\hone" /v "URL Protocol" /t REG_SZ /d "" /f"C:\Windows\System32\cmd.exeHone.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1236"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2292 --field-trial-handle=2296,i,7020212362868817,3901175683731996294,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1372"C:\WINDOWS\system32\cmd.exe" /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Hone.exe" /FO csv | "C:\WINDOWS\system32\find.exe" "Hone.exe"C:\Windows\SysWOW64\cmd.exeow-electron-setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2056C:\WINDOWS\system32\cmd.exe /d /s /c "reg query "hklm\Software\Classes\hone" 2> nul"C:\Windows\System32\cmd.exeHone.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
48 782
Read events
48 692
Write events
70
Delete events
20

Modification events

(PID) Process:(5932) Hone - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5932) Hone - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5932) Hone - Installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6660) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Overwolf
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(6660) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfElectron
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(6660) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6660) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6660) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6660) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6660) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
Executable files
126
Suspicious files
290
Text files
240
Unknown types
25

Dropped files

PID
Process
Filename
Type
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\System.dllexecutable
MD5:51BD16A2EA23AE1E7A92CEDC6785C82E
SHA256:4DBC79D2B1C7987CC64BB5D014DB81BB5108BDD6D8BF3A5F820FAC1DED62BE33
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\OWInstaller.exeexecutable
MD5:CDBEE041D73F8DDCC1EC6940862E8228
SHA256:4E73171185764262385DDACBEA5EE1565C4AFF01B201D70A7FC434D1B0715550
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\log4net.dllexecutable
MD5:F15C8A9E2876568B3910189B2D493706
SHA256:AE9C8073C3357C490F5D1C64101362918357C568F6B9380A60B09A4A4C1FF309
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\Newtonsoft.Json.dllexecutable
MD5:98CBB64F074DC600B23A2EE1A0F46448
SHA256:7B44639CBFBC8DDAC8C7A3DE8FFA97A7460BEBB0D54E9FF2E1CCDC3A742C2B13
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\uac.dllexecutable
MD5:861F7E800BB28F68927E65719869409C
SHA256:10A0E8CF46038AB3B2C3CF5DCE407B9A043A631CBDE9A5C8BCF0A54B2566C010
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:4AFA0E645D87DB538A8998A9AA7E4571
SHA256:81ED9A92B6122DAD85A1550273D663D3E8B56094FB14E07C04BFFED81BBDF453
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\nsProcess.dllexecutable
MD5:10E47E822B85D2A12FA4727001612182
SHA256:D530589A90918334B8E08D7355630892DD62F41333D948A860735D5BECFCB391
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\SharpRaven.dllexecutable
MD5:DB581A69376A9113521957D6F6AE9B98
SHA256:ACB50BEB408EA0E83460625AED1B0F16366395A52833A658BF68E0C919FEB191
6024Hone - Installer.exeC:\Users\admin\AppData\Local\Temp\nslBD5E.tmp\websocket-sharp.dllexecutable
MD5:28838B57A9F9E05C63C0EF96E3635D2A
SHA256:92C58929510D037E77D8DD10F7ECB0CB3E588525A6B3AE1A6FBC449A896D16B9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
136
DNS requests
98
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5932
Hone - Installer.exe
GET
200
18.244.18.46:80
http://analyticsnew.overwolf.com/analytics/Counter?Name=installer_uac_action&Value=1&&Extra=%5b%7b%22Name%22%3a%22installer_version%22%2c%22Value%22%3a%222.261.0.3%22%7d%5d
unknown
whitelisted
6660
OWInstaller.exe
GET
200
216.58.206.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=895875288&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=406267333&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.2091849097.1728681536.1728681536.1728681536.2%3B%2B__utmz%3D0.1728681536.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6660
OWInstaller.exe
GET
200
216.58.206.78:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=502203835&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=760921731&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.2091849097.1728681536.1728681536.1728681536.2%3B%2B__utmz%3D0.1728681536.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A%29%28%29&gaq=1&utmt=event
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3676
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6660
OWInstaller.exe
GET
200
18.66.142.79:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEm3iwvr9LEetiLFWbgGCBG0%3D
unknown
unknown
6660
OWInstaller.exe
GET
200
18.66.142.79:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
unknown
6660
OWInstaller.exe
GET
200
142.250.184.227:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
6660
OWInstaller.exe
GET
200
142.250.186.99:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
6660
OWInstaller.exe
GET
200
142.250.186.99:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQCMIoSniFj39BAtXGMIdqpm
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7060
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6944
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5932
Hone - Installer.exe
18.244.18.46:80
analyticsnew.overwolf.com
US
whitelisted
4360
SearchApp.exe
104.126.37.186:443
www.bing.com
Akamai International B.V.
DE
whitelisted
6660
OWInstaller.exe
216.58.206.78:80
google.com
GOOGLE
US
whitelisted
6660
OWInstaller.exe
18.244.18.46:443
analyticsnew.overwolf.com
US
whitelisted
4360
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.46
  • 18.244.18.106
  • 18.244.18.51
  • 18.244.18.56
whitelisted
www.bing.com
  • 104.126.37.186
  • 104.126.37.129
  • 104.126.37.123
  • 104.126.37.176
  • 104.126.37.136
  • 104.126.37.137
  • 104.126.37.128
  • 104.126.37.178
  • 104.126.37.131
  • 104.126.37.179
  • 104.126.37.161
  • 104.126.37.146
  • 104.126.37.139
  • 104.126.37.130
  • 104.126.37.144
  • 104.126.37.147
  • 104.126.37.177
whitelisted
www.google-analytics.com
  • 216.58.206.78
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.67
  • 20.190.159.4
  • 20.190.159.68
  • 20.190.159.2
  • 20.190.159.71
  • 20.190.159.75
  • 40.126.31.71
whitelisted
content.overwolf.com
  • 18.245.86.39
  • 18.245.86.117
  • 18.245.86.110
  • 18.245.86.78
whitelisted
ocsp.rootca3.amazontrust.com
  • 18.66.142.79
unknown
th.bing.com
  • 104.126.37.171
  • 104.126.37.154
  • 104.126.37.153
  • 104.126.37.145
  • 104.126.37.163
  • 104.126.37.139
  • 104.126.37.137
  • 104.126.37.144
  • 104.126.37.170
whitelisted
storeapi.overwolf.com
  • 18.172.112.117
  • 18.172.112.62
  • 18.172.112.84
  • 18.172.112.72
shared

Threats

PID
Process
Class
Message
5932
Hone - Installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2 ETPRO signatures available at the full report
No debug info