URL:

https://www.utorrent.com/intl/ru/downloads/complete/track/stable/os/win

Full analysis: https://app.any.run/tasks/8b99d638-9296-48c1-9dcb-f4bd2a3d1bdd
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: July 24, 2019, 12:04:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
adware
pua
lavasoft
Indicators:
MD5:

3A5F0DA3A841A846997D4F3A75FD84AC

SHA1:

678F0D3E7BC8AC43D5FC14E811F0057C70628E70

SHA256:

B96C70B2E0E7DB2F3F3F459DBAA982C88D679BC7C33AA0CE0AD0F14B7CB5C1AF

SSDEEP:

3:N8DSL6RLKDKXQCJ4KdI89CGONRXKKND:2OL6RLoAK89FONRXRND

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • chrome.exe (PID: 2948)
      • GenericSetup.exe (PID: 3228)
    • Application was dropped or rewritten from another process

      • uTorrent.exe (PID: 3108)
      • installer.exe (PID: 2852)
      • GenericSetup.exe (PID: 3228)
      • Carrier.exe (PID: 3256)
      • t2zige1n.dsx.exe (PID: 3640)
      • uTorrent.exe (PID: 612)
      • WebCompanionInstaller.exe (PID: 3032)
      • utorrentie.exe (PID: 956)
      • utorrentie.exe (PID: 2892)
    • Loads dropped or rewritten executable

      • GenericSetup.exe (PID: 3228)
      • WebCompanionInstaller.exe (PID: 3032)
      • WebCompanion.exe (PID: 2816)
    • Changes settings of System certificates

      • GenericSetup.exe (PID: 3228)
    • LAVASOFT was detected

      • installer.exe (PID: 2852)
    • Loads the Task Scheduler COM API

      • GenericSetup.exe (PID: 3228)
    • Changes the autorun value in the registry

      • Carrier.exe (PID: 3256)
      • uTorrent.exe (PID: 612)
    • Changes internet zones settings

      • WebCompanionInstaller.exe (PID: 3032)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 3388)
      • chrome.exe (PID: 2948)
      • uTorrent.exe (PID: 3108)
      • GenericSetup.exe (PID: 3228)
      • Carrier.exe (PID: 3256)
      • t2zige1n.dsx.exe (PID: 3640)
      • uTorrent.exe (PID: 612)
      • WebCompanionInstaller.exe (PID: 3032)
      • orzcaeoi.ncu.tmp (PID: 3124)
      • orzcaeoi.ncu.exe (PID: 3472)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3388)
    • Reads Environment values

      • GenericSetup.exe (PID: 3228)
    • Reads the Windows organization settings

      • GenericSetup.exe (PID: 3228)
      • orzcaeoi.ncu.tmp (PID: 3124)
    • Reads Windows owner or organization settings

      • GenericSetup.exe (PID: 3228)
      • orzcaeoi.ncu.tmp (PID: 3124)
    • Starts CMD.EXE for commands execution

      • GenericSetup.exe (PID: 3228)
      • WebCompanionInstaller.exe (PID: 3032)
    • Adds / modifies Windows certificates

      • GenericSetup.exe (PID: 3228)
    • Creates files in the user directory

      • Carrier.exe (PID: 3256)
      • uTorrent.exe (PID: 612)
      • WebCompanionInstaller.exe (PID: 3032)
    • Modifies the open verb of a shell class

      • Carrier.exe (PID: 3256)
    • Creates a software uninstall entry

      • Carrier.exe (PID: 3256)
      • WebCompanionInstaller.exe (PID: 3032)
    • Executed via Task Scheduler

      • uTorrent.exe (PID: 612)
    • Reads internet explorer settings

      • utorrentie.exe (PID: 2892)
      • utorrentie.exe (PID: 956)
    • Changes IE settings (feature browser emulation)

      • uTorrent.exe (PID: 612)
    • Uses NETSH.EXE for network configuration

      • cmd.exe (PID: 2376)
    • Reads the machine GUID from the registry

      • orzcaeoi.ncu.tmp (PID: 3124)
    • Creates files in the program directory

      • WebCompanionInstaller.exe (PID: 3032)
      • WebCompanion.exe (PID: 2816)
    • Starts SC.EXE for service management

      • WebCompanionInstaller.exe (PID: 3032)
    • Searches for installed software

      • GenericSetup.exe (PID: 3228)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 3388)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 3388)
    • Reads settings of System Certificates

      • GenericSetup.exe (PID: 3228)
    • Dropped object may contain Bitcoin addresses

      • WebCompanionInstaller.exe (PID: 3032)
    • Creates files in the program directory

      • orzcaeoi.ncu.tmp (PID: 3124)
    • Application was dropped or rewritten from another process

      • orzcaeoi.ncu.tmp (PID: 3124)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
96
Monitored processes
49
Malicious processes
11
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs utorrent.exe #LAVASOFT installer.exe genericsetup.exe cmd.exe no specs carrier.exe cmd.exe no specs t2zige1n.dsx.exe webcompanioninstaller.exe utorrent.exe utorrentie.exe utorrentie.exe sc.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs orzcaeoi.ncu.exe orzcaeoi.ncu.tmp cmd.exe no specs netsh.exe no specs webcompanion.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
412"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=980,6523840816197302920,14792501918190809888,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=563361378213338626 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2388 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
612C:\Users\admin\AppData\Roaming\uTorrent\uTorrent.exe C:\Users\admin\AppData\Roaming\uTorrent\uTorrent.exe
taskeng.exe
User:
admin
Company:
BitTorrent Inc.
Integrity Level:
MEDIUM
Description:
µTorrent
Exit code:
0
Version:
3.5.5.45311
Modules
Images
c:\users\admin\appdata\roaming\utorrent\utorrent.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
956"C:\Users\admin\AppData\Roaming\uTorrent\updates\3.5.5_45311\utorrentie.exe" uTorrent_612_02E3FC58_215389888 µTorrent4823DF041B09 uTorrentC:\Users\admin\AppData\Roaming\uTorrent\updates\3.5.5_45311\utorrentie.exe
uTorrent.exe
User:
admin
Company:
BitTorrent Inc.
Integrity Level:
LOW
Description:
WebHelper
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\roaming\utorrent\updates\3.5.5_45311\utorrentie.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
1236"C:\Windows\system32\cmd.exe" /C ""C:\Users\admin\AppData\Local\Temp\orzcaeoi.ncu.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /NOCLOSEAPPLICATIONS /TID=lavasoft /PROFILE=lavasoft /CHANNEL=lavasoft /SID=UT2"C:\Windows\system32\cmd.exeGenericSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1500"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=980,6523840816197302920,14792501918190809888,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15380965399630940468 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1776"C:\Windows\system32\cmd.exe" /C ""C:\Users\admin\AppData\Local\Temp\t2zige1n.dsx.exe" --silent --homepage=1 --search=1 --partner=BT171001"C:\Windows\system32\cmd.exeGenericSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6f43a9d0,0x6f43a9e0,0x6f43a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2272"sc.exe" failure WCAssistantService reset= 30 actions= restart/60000C:\Windows\system32\sc.exeWebCompanionInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\apphelp.dll
2320"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=980,6523840816197302920,14792501918190809888,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=4437760525920769314 --mojo-platform-channel-handle=4544 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2320"sc.exe" Create "WCAssistantService" binPath= "C:\Program Files\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe" DisplayName= "WC Assistant" start= autoC:\Windows\system32\sc.exeWebCompanionInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\secur32.dll
c:\windows\system32\wininet.dll
c:\windows\system32\webio.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\wtsapi32.dll
Total events
5 005
Read events
4 610
Write events
387
Delete events
8

Modification events

(PID) Process:(3416) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:3388-13208443455309125
Value:
259
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3388) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:1512-13197841398593750
Value:
0
(PID) Process:(3388) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
71
Suspicious files
77
Text files
379
Unknown types
13

Dropped files

PID
Process
Filename
Type
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\8d19af96-4f5f-47f7-83d2-312ddf322853.tmp
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF10ea91.TMPtext
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF10ea62.TMPtext
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:
SHA256:
3388chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
86
TCP/UDP connections
228
DNS requests
72
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
612
uTorrent.exe
GET
173.254.195.58:80
http://update.bittorrent.com/time.php
US
whitelisted
3256
Carrier.exe
GET
82.221.103.246:80
http://update.utorrent.li/installstats.php?cl=uTorrent&v=111915263&h=eCzwS93wqo7U-P2H&w=1DB10106&bu=0&pr=0&cmp=292&ocmp=292&showinstall&pid=3256&cau=0&au=0&view=win32
IS
whitelisted
612
uTorrent.exe
GET
178.79.208.1:80
http://cdn.ap.bittorrent.com/control/tags/ut.json
IT
shared
612
uTorrent.exe
GET
178.79.208.1:80
http://cdn.ap.bittorrent.com/control/feature/tags/ut.json
IT
shared
3228
GenericSetup.exe
GET
200
104.17.177.102:80
http://webcompanion.com/nano_download.php?partner=BT171001
US
executable
349 Kb
malicious
2948
chrome.exe
GET
302
172.217.18.14:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
513 b
whitelisted
2892
utorrentie.exe
GET
200
87.248.202.99:80
http://cdn.bitmedianetwork.com/assets/js/3p/ie8.js
IT
text
7.34 Kb
suspicious
2948
chrome.exe
GET
200
8.241.121.126:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.3 Kb
whitelisted
612
uTorrent.exe
POST
107.20.217.71:80
http://i-21.b-45311.ut.bench.utorrent.com/e?i=21
US
suspicious
2948
chrome.exe
GET
200
67.215.238.66:80
http://download-hr.utorrent.com/track/stable/endpoint/utorrent/os/windows
US
executable
3.02 Mb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2948
chrome.exe
172.217.16.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2948
chrome.exe
172.217.21.237:443
accounts.google.com
Google Inc.
US
whitelisted
2948
chrome.exe
87.248.202.64:443
www.utorrent.com
Limelight Networks, Inc.
IT
suspicious
2948
chrome.exe
172.217.21.202:443
ajax.googleapis.com
Google Inc.
US
whitelisted
2948
chrome.exe
172.217.23.138:443
ajax.googleapis.com
Google Inc.
US
whitelisted
2948
chrome.exe
172.217.23.131:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2948
chrome.exe
13.32.158.53:443
cdn-assets.bittorrent.com
Amazon.com, Inc.
US
whitelisted
2948
chrome.exe
67.215.238.66:80
download-hr.utorrent.com
QuadraNet, Inc
US
suspicious
2948
chrome.exe
8.241.121.126:80
www.download.windowsupdate.com
Level 3 Communications, Inc.
US
suspicious
2948
chrome.exe
108.177.15.156:443
stats.g.doubleclick.net
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.utorrent.com
  • 87.248.202.64
whitelisted
clientservices.googleapis.com
  • 172.217.16.195
whitelisted
accounts.google.com
  • 172.217.21.237
shared
ajax.googleapis.com
  • 172.217.21.202
  • 216.58.205.234
  • 172.217.22.10
  • 172.217.18.10
  • 172.217.23.138
  • 216.58.206.10
  • 216.58.207.42
  • 172.217.16.170
  • 172.217.16.138
  • 172.217.22.42
  • 216.58.210.10
  • 172.217.18.106
whitelisted
fonts.googleapis.com
  • 172.217.23.138
whitelisted
fonts.gstatic.com
  • 172.217.23.131
whitelisted
www.google-analytics.com
  • 172.217.18.14
whitelisted
cdn-assets.bittorrent.com
  • 13.32.158.53
  • 13.32.158.94
  • 13.32.158.64
  • 13.32.158.245
whitelisted
x.ss2.us
  • 13.32.222.171
  • 13.32.222.49
  • 13.32.222.54
  • 13.32.222.145
whitelisted
download-hr.utorrent.com
  • 67.215.238.66
suspicious

Threats

PID
Process
Class
Message
2948
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2948
chrome.exe
Misc activity
ET INFO EXE - Served Attached HTTP
2852
installer.exe
A Network Trojan was detected
ET MALWARE Lavasoft PUA/Adware Client Install
3228
GenericSetup.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3228
GenericSetup.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3228
GenericSetup.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3256
Carrier.exe
Potential Corporate Privacy Violation
ET P2P Bittorrent P2P Client User-Agent (uTorrent)
3256
Carrier.exe
Potential Corporate Privacy Violation
ET P2P Bittorrent P2P Client User-Agent (uTorrent)
612
uTorrent.exe
Potential Corporate Privacy Violation
ET P2P BTWebClient UA uTorrent in use
612
uTorrent.exe
Potential Corporate Privacy Violation
ET P2P BTWebClient UA uTorrent in use
Process
Message
WebCompanionInstaller.exe
Detecting windows culture
WebCompanionInstaller.exe
7/24/2019 1:06:52 PM :-> Starting installer 4.7.1993.3887 with: .\WebCompanionInstaller.exe --partner=BT171001 --version=4.7.1993.3887 --prod --silent --homepage=1 --search=1 --partner=BT171001, Run as admin: True
WebCompanionInstaller.exe
Preparing for installing Web Companion
WebCompanionInstaller.exe
7/24/2019 1:06:53 PM :-> Generating Machine and Install Id ...
WebCompanionInstaller.exe
7/24/2019 1:06:53 PM :-> Machine Id and Install Id has been generated
WebCompanionInstaller.exe
7/24/2019 1:06:54 PM :-> Checking prerequisites ...
WebCompanionInstaller.exe
7/24/2019 1:06:54 PM :-> Antivirus not detected
WebCompanionInstaller.exe
7/24/2019 1:06:54 PM :-> vm_check False
WebCompanionInstaller.exe
7/24/2019 1:06:54 PM :-> reg_check :False
WebCompanionInstaller.exe
7/24/2019 1:06:54 PM :-> Installed .Net framework is V40