File name:

CurseForge Windows - Installer.exe

Full analysis: https://app.any.run/tasks/cb638732-3a70-451c-98ca-84588b4e3ece
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 25, 2025, 17:48:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
arch-scr
arch-html
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

42CAC93A9E9D89B4AFE70D1285F45FAE

SHA1:

737B021BB584A712A0D00A220D0F6BDA6F2D9948

SHA256:

E3F886C52EE3826986A622440155B3DAF195F3A3DFD307C6D6465B0CDFD7E935

SSDEEP:

98304:v/4orv0J/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhR6fewOWbBfhBCOfskkfswcZ:tvC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • CurseForge.exe (PID: 3928)
    • Changes powershell execution policy (Unrestricted)

      • CurseForge.exe (PID: 6752)
    • Steals credentials from Web Browsers

      • CurseForge.exe (PID: 3928)
    • Changes the autorun value in the registry

      • CurseForge.exe (PID: 6752)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
    • Executable content was dropped or overwritten

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 4328)
      • Curse.Agent.Host.exe (PID: 5740)
    • Drops 7-zip archiver for unpacking

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 6224)
    • Checks Windows Trust Settings

      • OWInstaller.exe (PID: 6224)
    • Reads security settings of Internet Explorer

      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
    • There is functionality for taking screenshot (YARA)

      • CurseForge Windows - Installer.exe (PID: 1556)
    • Get information on the list of running processes

      • ow-electron-setup.exe (PID: 4320)
      • cmd.exe (PID: 4468)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 6224)
    • Starts CMD.EXE for commands execution

      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 4328)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 6224)
    • Process drops legitimate windows executable

      • ow-electron-setup.exe (PID: 4320)
    • Creates a software uninstall entry

      • ow-electron-setup.exe (PID: 4320)
    • Application launched itself

      • CurseForge.exe (PID: 6752)
    • The process bypasses the loading of PowerShell profile settings

      • CurseForge.exe (PID: 6752)
    • The process hides Powershell's copyright startup banner

      • CurseForge.exe (PID: 6752)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6488)
    • Starts POWERSHELL.EXE for commands execution

      • CurseForge.exe (PID: 6752)
  • INFO

    • The sample compiled with english language support

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 4328)
      • Curse.Agent.Host.exe (PID: 5740)
    • Create files in a temporary directory

      • CurseForge Windows - Installer.exe (PID: 1556)
      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
    • Creates files or folders in the user directory

      • CurseForge Windows - Installer.exe (PID: 1556)
      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 3928)
      • CurseForge.exe (PID: 904)
      • CurseForge.exe (PID: 4328)
      • Curse.Agent.Host.exe (PID: 5740)
      • CurseForge.exe (PID: 5200)
    • Checks proxy server information

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • Curse.Agent.Host.exe (PID: 5740)
    • Checks supported languages

      • OWInstaller.exe (PID: 6224)
      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 6800)
      • CurseForge.exe (PID: 3928)
      • CurseForge.exe (PID: 4504)
      • CurseForge.exe (PID: 904)
      • CurseForge.exe (PID: 4328)
      • Curse.Agent.Host.exe (PID: 5740)
      • CurseForge.exe (PID: 5200)
      • CurseForge.exe (PID: 1684)
    • Reads the computer name

      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 904)
      • CurseForge.exe (PID: 3928)
      • CurseForge.exe (PID: 6800)
      • Curse.Agent.Host.exe (PID: 5740)
      • CurseForge.exe (PID: 5200)
      • CurseForge.exe (PID: 4328)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 6800)
      • CurseForge.exe (PID: 5200)
    • Reads Environment values

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 6800)
      • CurseForge.exe (PID: 4328)
    • Process checks computer location settings

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 4328)
      • CurseForge.exe (PID: 1684)
      • Curse.Agent.Host.exe (PID: 5740)
      • CurseForge.exe (PID: 4504)
    • Reads the software policy settings

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 3928)
      • Curse.Agent.Host.exe (PID: 5740)
    • Disables trace logs

      • OWInstaller.exe (PID: 6224)
    • Manual execution by a user

      • CurseForge.exe (PID: 6752)
    • Reads product name

      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 4328)
    • Reads CPU info

      • CurseForge.exe (PID: 6752)
    • Creates files in the program directory

      • Curse.Agent.Host.exe (PID: 5740)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.261.0.4
ProductVersionNumber: 2.261.0.4
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Curseforge
FileVersion: 2.261.0.4
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Curseforge
ProductVersion: 2.261.0.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
240
Monitored processes
111
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start curseforge windows - installer.exe owinstaller.exe ow-electron-setup.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs curseforge.exe curseforge.exe no specs curseforge.exe curseforge.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs curseforge.exe no specs curseforge.exe curseforge.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs curse.agent.host.exe cmd.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs curseforge.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
624C:\WINDOWS\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuidC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
648\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
904"C:\Users\admin\AppData\Local\Programs\CurseForge Windows\CurseForge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\admin\AppData\Roaming\CurseForge" --standard-schemes=owepm --secure-schemes=owepm --bypasscsp-schemes=owepm --fetch-schemes=owepm --streaming-schemes=owepm --field-trial-handle=2016,i,688889257772146667,10386152964863539045,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:3C:\Users\admin\AppData\Local\Programs\CurseForge Windows\CurseForge.exe
CurseForge.exe
User:
admin
Company:
Overwolf
Integrity Level:
MEDIUM
Description:
CurseForge
Version:
1.270.1-22556.22556
Modules
Images
c:\users\admin\appdata\local\programs\curseforge windows\curseforge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1080C:\WINDOWS\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuidC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1140C:\WINDOWS\system32\cmd.exe /d /s /c "C:\WINDOWS\system32\reg.exe QUERY "HKCU\Software\OverwolfElectron""C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1144\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1220C:\WINDOWS\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1224\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1348C:\WINDOWS\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1460C:\WINDOWS\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
20 021
Read events
19 961
Write events
39
Delete events
21

Modification events

(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfElectron
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
56
Suspicious files
298
Text files
97
Unknown types
8

Dropped files

PID
Process
Filename
Type
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\System.dllexecutable
MD5:51BD16A2EA23AE1E7A92CEDC6785C82E
SHA256:4DBC79D2B1C7987CC64BB5D014DB81BB5108BDD6D8BF3A5F820FAC1DED62BE33
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\OWInstaller.exeexecutable
MD5:333ABD660B3D127AC744338F7203BF3B
SHA256:13CB242673383FE12389047720F0C76B82EDFFEE35B73AC914B2B68FD912B38B
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\DotNetZip.dllexecutable
MD5:190E712F2E3B065BA3D5F63CB9B7725E
SHA256:6C512D9943A225D686B26FC832589E4C8BEF7C4DD0A8BDFD557D5D27FE5BBA0F
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\log4net.dllexecutable
MD5:F15C8A9E2876568B3910189B2D493706
SHA256:AE9C8073C3357C490F5D1C64101362918357C568F6B9380A60B09A4A4C1FF309
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\websocket-sharp.dllexecutable
MD5:EB91B0AA3661D2CDF276B6A059F4F941
SHA256:0BF44E05C44B3A220AF71E4D6E520603E2ED226AE1ECE84A7D1B9D058106B1DB
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\utils.dllexecutable
MD5:C6B46A5FCDCCBF3AEFF930B1E5B383D4
SHA256:251AB3E2690562DCFCD510642607F206E6DCF626D06D94B74E1FA8297B1050A0
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\nsis7z.dllexecutable
MD5:4FD5E385C3A948DF7FDE5597D3C7D6C0
SHA256:4325551DE38C07FA6C9CADDBC4E53A5E36DC7B7BA91A4A39491A921AF5C9AAA4
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\partner-custom-asset.pngimage
MD5:EF8B9C7179C1A42D62569EECCAB950A0
SHA256:815F88AE517F42B1C7F0E9BCB907A972539E944E4287A5B967734108BEFBC1A1
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:F573F393781B7A9B1F8CB3F1DBA432BE
SHA256:91FB9A8648E271864A374C39D3D7B79E1ADAC1D0F784AA997770F5936D067BAC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
93
DNS requests
71
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6224
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkpLy9ROx7U76vGUhC06D6E%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6224
OWInstaller.exe
GET
200
142.250.185.163:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDcCedmY1U0dAlur0ujHZYQ
unknown
whitelisted
5892
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5460
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5892
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6224
OWInstaller.exe
GET
200
216.58.212.174:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=412494462&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=296599449&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1780289390.1737827322.1737827322.1737827322.2%3B%2B__utmz%3D0.1737827322.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstalled%20Successfully%2A%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6224
OWInstaller.exe
GET
200
216.58.212.174:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=802863942&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=488553740&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1780289390.1737827322.1737827322.1737827322.2%3B%2B__utmz%3D0.1737827322.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Installer%2AInstaller%20Exit%2AInstalled%20Successfully%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6224
OWInstaller.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
6224
OWInstaller.exe
GET
200
142.250.184.227:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1356
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
92.123.104.59:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
23.48.23.138:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6224
OWInstaller.exe
216.58.212.174:80
www.google-analytics.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
www.bing.com
  • 92.123.104.59
  • 92.123.104.62
  • 92.123.104.8
  • 92.123.104.7
  • 92.123.104.54
  • 92.123.104.6
  • 92.123.104.61
  • 92.123.104.26
  • 92.123.104.31
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.138
  • 23.48.23.137
  • 23.48.23.139
  • 23.48.23.134
  • 23.48.23.148
  • 23.48.23.195
  • 23.48.23.143
  • 23.48.23.149
  • 23.48.23.190
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.google-analytics.com
  • 216.58.212.174
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.51
  • 18.244.18.56
  • 18.244.18.106
  • 18.244.18.46
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
login.live.com
  • 20.190.160.17
  • 20.190.160.22
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.140
whitelisted

Threats

PID
Process
Class
Message
904
CurseForge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
904
CurseForge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info