File name:

CurseForge Windows - Installer.exe

Full analysis: https://app.any.run/tasks/cb638732-3a70-451c-98ca-84588b4e3ece
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 25, 2025, 17:48:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
arch-scr
arch-html
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

42CAC93A9E9D89B4AFE70D1285F45FAE

SHA1:

737B021BB584A712A0D00A220D0F6BDA6F2D9948

SHA256:

E3F886C52EE3826986A622440155B3DAF195F3A3DFD307C6D6465B0CDFD7E935

SSDEEP:

98304:v/4orv0J/A9nGcRa1xXcVsy3RxeLLCIJgap176MVhR6fewOWbBfhBCOfskkfswcZ:tvC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • CurseForge.exe (PID: 3928)
    • Actions looks like stealing of personal data

      • CurseForge.exe (PID: 3928)
    • Changes powershell execution policy (Unrestricted)

      • CurseForge.exe (PID: 6752)
    • Changes the autorun value in the registry

      • CurseForge.exe (PID: 6752)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
    • Drops 7-zip archiver for unpacking

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
    • The process creates files with name similar to system file names

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
    • Executable content was dropped or overwritten

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 4328)
      • Curse.Agent.Host.exe (PID: 5740)
    • Reads Microsoft Outlook installation path

      • OWInstaller.exe (PID: 6224)
    • Reads security settings of Internet Explorer

      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
    • Reads Internet Explorer settings

      • OWInstaller.exe (PID: 6224)
    • Checks Windows Trust Settings

      • OWInstaller.exe (PID: 6224)
    • There is functionality for taking screenshot (YARA)

      • CurseForge Windows - Installer.exe (PID: 1556)
    • Reads the date of Windows installation

      • OWInstaller.exe (PID: 6224)
    • Starts CMD.EXE for commands execution

      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 4328)
    • Get information on the list of running processes

      • ow-electron-setup.exe (PID: 4320)
      • cmd.exe (PID: 4468)
    • Process drops legitimate windows executable

      • ow-electron-setup.exe (PID: 4320)
    • Creates a software uninstall entry

      • ow-electron-setup.exe (PID: 4320)
    • Application launched itself

      • CurseForge.exe (PID: 6752)
    • The process bypasses the loading of PowerShell profile settings

      • CurseForge.exe (PID: 6752)
    • The process hides Powershell's copyright startup banner

      • CurseForge.exe (PID: 6752)
    • Starts POWERSHELL.EXE for commands execution

      • CurseForge.exe (PID: 6752)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6488)
  • INFO

    • Checks supported languages

      • CurseForge Windows - Installer.exe (PID: 1556)
      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 6800)
      • CurseForge.exe (PID: 904)
      • CurseForge.exe (PID: 3928)
      • CurseForge.exe (PID: 4504)
      • CurseForge.exe (PID: 1684)
      • CurseForge.exe (PID: 4328)
      • CurseForge.exe (PID: 5200)
      • Curse.Agent.Host.exe (PID: 5740)
    • Creates files or folders in the user directory

      • CurseForge Windows - Installer.exe (PID: 1556)
      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 3928)
      • CurseForge.exe (PID: 904)
      • CurseForge.exe (PID: 4328)
      • CurseForge.exe (PID: 5200)
      • Curse.Agent.Host.exe (PID: 5740)
    • Create files in a temporary directory

      • CurseForge Windows - Installer.exe (PID: 1556)
      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 6752)
    • The sample compiled with english language support

      • CurseForge Windows - Installer.exe (PID: 1556)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 4328)
      • Curse.Agent.Host.exe (PID: 5740)
    • Reads the machine GUID from the registry

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 6800)
      • CurseForge.exe (PID: 5200)
    • Reads the computer name

      • OWInstaller.exe (PID: 6224)
      • ow-electron-setup.exe (PID: 4320)
      • CurseForge.exe (PID: 904)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 6800)
      • CurseForge.exe (PID: 3928)
      • Curse.Agent.Host.exe (PID: 5740)
      • CurseForge.exe (PID: 4328)
      • CurseForge.exe (PID: 5200)
    • Reads Environment values

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 4328)
      • CurseForge.exe (PID: 6800)
    • Disables trace logs

      • OWInstaller.exe (PID: 6224)
    • Checks proxy server information

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • Curse.Agent.Host.exe (PID: 5740)
    • Reads the software policy settings

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 3928)
      • Curse.Agent.Host.exe (PID: 5740)
    • Process checks computer location settings

      • OWInstaller.exe (PID: 6224)
      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 4504)
      • CurseForge.exe (PID: 4328)
      • CurseForge.exe (PID: 1684)
      • Curse.Agent.Host.exe (PID: 5740)
    • Reads product name

      • CurseForge.exe (PID: 6752)
      • CurseForge.exe (PID: 4328)
    • Reads CPU info

      • CurseForge.exe (PID: 6752)
    • Manual execution by a user

      • CurseForge.exe (PID: 6752)
    • Creates files in the program directory

      • Curse.Agent.Host.exe (PID: 5740)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.261.0.4
ProductVersionNumber: 2.261.0.4
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Overwolf Ltd.
FileDescription: Curseforge
FileVersion: 2.261.0.4
LegalCopyright: Copyright (C) 2021 Overwolf Ltd. All Rights Reserved.
LegalTrademarks: -
ProductName: Curseforge
ProductVersion: 2.261.0.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
240
Monitored processes
111
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start curseforge windows - installer.exe owinstaller.exe ow-electron-setup.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs curseforge.exe curseforge.exe no specs curseforge.exe curseforge.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs curseforge.exe no specs curseforge.exe curseforge.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs curse.agent.host.exe cmd.exe no specs conhost.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs curseforge.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
624C:\WINDOWS\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuidC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
648\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
904"C:\Users\admin\AppData\Local\Programs\CurseForge Windows\CurseForge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\admin\AppData\Roaming\CurseForge" --standard-schemes=owepm --secure-schemes=owepm --bypasscsp-schemes=owepm --fetch-schemes=owepm --streaming-schemes=owepm --field-trial-handle=2016,i,688889257772146667,10386152964863539045,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:3C:\Users\admin\AppData\Local\Programs\CurseForge Windows\CurseForge.exe
CurseForge.exe
User:
admin
Company:
Overwolf
Integrity Level:
MEDIUM
Description:
CurseForge
Version:
1.270.1-22556.22556
Modules
Images
c:\users\admin\appdata\local\programs\curseforge windows\curseforge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1080C:\WINDOWS\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuidC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1140C:\WINDOWS\system32\cmd.exe /d /s /c "C:\WINDOWS\system32\reg.exe QUERY "HKCU\Software\OverwolfElectron""C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1144\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1220C:\WINDOWS\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1224\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1348C:\WINDOWS\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1460C:\WINDOWS\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"C:\Windows\System32\cmd.exeCurseForge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
20 021
Read events
19 961
Write events
39
Delete events
21

Modification events

(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_CURRENT_USER\SOFTWARE\OverwolfElectron
Operation:writeName:MUID
Value:
bb926e54-e3ca-40fd-ae90-2764341e7792
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6224) OWInstaller.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OWinstaller_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
56
Suspicious files
298
Text files
97
Unknown types
8

Dropped files

PID
Process
Filename
Type
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\UserInfo.dllexecutable
MD5:1DD4CA0F4A94155F8D46EC95A20ADA4A
SHA256:A27DC3069793535CB64123C27DCA8748983D133C8FA5AADDEE8CDBC83F16986D
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\System.dllexecutable
MD5:51BD16A2EA23AE1E7A92CEDC6785C82E
SHA256:4DBC79D2B1C7987CC64BB5D014DB81BB5108BDD6D8BF3A5F820FAC1DED62BE33
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\uac.dllexecutable
MD5:861F7E800BB28F68927E65719869409C
SHA256:10A0E8CF46038AB3B2C3CF5DCE407B9A043A631CBDE9A5C8BCF0A54B2566C010
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\nsProcess.dllexecutable
MD5:10E47E822B85D2A12FA4727001612182
SHA256:D530589A90918334B8E08D7355630892DD62F41333D948A860735D5BECFCB391
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\Newtonsoft.Json.dllexecutable
MD5:98CBB64F074DC600B23A2EE1A0F46448
SHA256:7B44639CBFBC8DDAC8C7A3DE8FFA97A7460BEBB0D54E9FF2E1CCDC3A742C2B13
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\websocket-sharp.dllexecutable
MD5:EB91B0AA3661D2CDF276B6A059F4F941
SHA256:0BF44E05C44B3A220AF71E4D6E520603E2ED226AE1ECE84A7D1B9D058106B1DB
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\SharpRaven.dllexecutable
MD5:96E7C0177C15BC7A157C51612F3369BF
SHA256:50532B392723AEFF6F3E20C5196A8C4BB5865D1FF7D537FC9C27AF6AA24D6E2E
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\CommandLine.dllexecutable
MD5:42B8558275C6838BF25616B05F5B1CC2
SHA256:D98011873F275393DB4810CA9FFE5A066C66CD157FA1C2D46A312824E86FA6F6
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\OverWolf.Client.CommonUtils.dllexecutable
MD5:CC208A83FDF244BF8BD73C163DAC39F0
SHA256:6BB4B0EC3D131F212D0F0DED7788FEEFA1DCE1C312AE1AACEAA0DB3E73ACAC79
1556CurseForge Windows - Installer.exeC:\Users\admin\AppData\Local\Temp\nsp55B6.tmp\OWInstaller.exe.configxml
MD5:82D22E4E19E27E306317513B9BFA70FF
SHA256:272E4C5364193E73633CAA3793E07509A349B79314EA01808B24FDB12C51B827
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
93
DNS requests
71
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.48.23.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6224
OWInstaller.exe
GET
200
216.58.212.174:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=592795239&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=575044920&utmr=/&utmp=/&utmac=UA-80584726-1&utmcc=__utma%3D0.1780289390.1737827322.1737827322.1737827322.2%3B%2B__utmz%3D0.1737827322.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A%29%28%29&gaq=1&utmt=event
unknown
whitelisted
6224
OWInstaller.exe
GET
200
216.58.212.174:80
http://www.google-analytics.com/__utm.gif?utmwv=4.7.2&utmn=732339225&utmhn=&utmcs=UTF-8&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=&utmhid=653651382&utmr=/&utmp=/&utmac=UA-18298709-8&utmcc=__utma%3D0.1780289390.1737827322.1737827322.1737827322.2%3B%2B__utmz%3D0.1737827322.1.1.utmcsr%3D%28direct%29%7Cutmccn%3D%7Cutmcmd%3D%3B&utme=5%28Funnel2%2AInstaller%20Launched%2A%29%28%29&gaq=1&utmt=event
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6224
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca3.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRkNawYMzz%2BjKSfYbTyFR0AXuhs6QQUq7bb1waeN6wwhgeRcMecxBmxeMACEwdzEnA9eVH9TrLXPKuCavuqCA0%3D
unknown
unknown
6224
OWInstaller.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkpLy9ROx7U76vGUhC06D6E%3D
unknown
whitelisted
6224
OWInstaller.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
6224
OWInstaller.exe
GET
200
142.250.185.163:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQD6lJ7pMKIJtAkRObjh8Eki
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1356
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
92.123.104.59:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
23.48.23.138:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6224
OWInstaller.exe
216.58.212.174:80
www.google-analytics.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
www.bing.com
  • 92.123.104.59
  • 92.123.104.62
  • 92.123.104.8
  • 92.123.104.7
  • 92.123.104.54
  • 92.123.104.6
  • 92.123.104.61
  • 92.123.104.26
  • 92.123.104.31
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.138
  • 23.48.23.137
  • 23.48.23.139
  • 23.48.23.134
  • 23.48.23.148
  • 23.48.23.195
  • 23.48.23.143
  • 23.48.23.149
  • 23.48.23.190
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.google-analytics.com
  • 216.58.212.174
whitelisted
analyticsnew.overwolf.com
  • 18.244.18.51
  • 18.244.18.56
  • 18.244.18.106
  • 18.244.18.46
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
login.live.com
  • 20.190.160.17
  • 20.190.160.22
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.140
whitelisted

Threats

PID
Process
Class
Message
904
CurseForge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
904
CurseForge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info