File name:

utweb_installer.exe

Full analysis: https://app.any.run/tasks/8241426f-9b9f-47db-a6b9-1cdf16a8e2f4
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 02, 2024, 04:03:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
installer
stealer
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

79906E2CFAD2738D0DAC73211C1C400D

SHA1:

242187447B286F2777842A37204AC09F5A17580E

SHA256:

D7D59CC033BDF12A0139B614F9CF9AC5EAA43BF27F5EA230444827FDE0A08DF3

SSDEEP:

49152:h7HecD4dnbibBlyUIsg88xnh+Dp/U5NHNIwKr8K2+S95dzyKCbslnTiVOAli2jW1:J+cD4dnX9Yum/U5NtIroK2ndW5b3vcl/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • utweb_installer.exe (PID: 6392)
      • utweb_installer.exe (PID: 6492)
      • utweb_installer.tmp (PID: 6516)
      • utweb_installer.exe (PID: 5504)
      • component0.exe (PID: 5996)
      • ke5zzkgs.exe (PID: 6368)
      • UnifiedStub-installer.exe (PID: 1044)
      • utweb.exe (PID: 3104)
    • Changes the autorun value in the registry

      • utweb.exe (PID: 3104)
    • Actions looks like stealing of personal data

      • UnifiedStub-installer.exe (PID: 1044)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • utweb_installer.tmp (PID: 6412)
      • utweb_installer.exe (PID: 5504)
      • utweb_installer.tmp (PID: 6516)
      • component0.exe (PID: 5996)
      • utweb.exe (PID: 3104)
    • Reads the date of Windows installation

      • utweb_installer.tmp (PID: 6412)
      • utweb_installer.tmp (PID: 6516)
      • component0.exe (PID: 5996)
    • Executable content was dropped or overwritten

      • utweb_installer.exe (PID: 6392)
      • utweb_installer.exe (PID: 6492)
      • utweb_installer.tmp (PID: 6516)
      • utweb_installer.exe (PID: 5504)
      • component0.exe (PID: 5996)
      • ke5zzkgs.exe (PID: 6368)
      • UnifiedStub-installer.exe (PID: 1044)
      • utweb.exe (PID: 3104)
    • Mutex name with non-standard characters

      • utweb_installer.tmp (PID: 6516)
    • Reads the Windows owner or organization settings

      • utweb_installer.tmp (PID: 6516)
    • The process creates files with name similar to system file names

      • utweb_installer.exe (PID: 5504)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • utweb_installer.exe (PID: 5504)
    • Process drops legitimate windows executable

      • utweb_installer.exe (PID: 5504)
      • ke5zzkgs.exe (PID: 6368)
    • Potential Corporate Privacy Violation

      • utweb.exe (PID: 3104)
    • Executes application which crashes

      • utweb_installer.tmp (PID: 6516)
    • Executes as Windows Service

      • rsSyncSvc.exe (PID: 1636)
    • Creates a software uninstall entry

      • UnifiedStub-installer.exe (PID: 1044)
    • Checks Windows Trust Settings

      • utweb.exe (PID: 3104)
    • Searches for installed software

      • UnifiedStub-installer.exe (PID: 1044)
  • INFO

    • Create files in a temporary directory

      • utweb_installer.exe (PID: 6392)
      • utweb_installer.exe (PID: 6492)
      • utweb_installer.tmp (PID: 6516)
      • utweb_installer.exe (PID: 5504)
      • component0.exe (PID: 5996)
      • ke5zzkgs.exe (PID: 6368)
    • Reads the computer name

      • utweb_installer.tmp (PID: 6412)
      • utweb_installer.tmp (PID: 6516)
      • utweb_installer.exe (PID: 5504)
      • component0.exe (PID: 5996)
      • UnifiedStub-installer.exe (PID: 1044)
      • rsSyncSvc.exe (PID: 3352)
      • rsSyncSvc.exe (PID: 1636)
      • identity_helper.exe (PID: 7504)
      • helper.exe (PID: 8888)
      • utweb.exe (PID: 3104)
    • Process checks computer location settings

      • utweb_installer.tmp (PID: 6412)
      • utweb_installer.tmp (PID: 6516)
      • component0.exe (PID: 5996)
    • Checks supported languages

      • utweb_installer.exe (PID: 6392)
      • utweb_installer.tmp (PID: 6412)
      • utweb_installer.exe (PID: 6492)
      • utweb_installer.tmp (PID: 6516)
      • utweb_installer.exe (PID: 5504)
      • component0.exe (PID: 5996)
      • ke5zzkgs.exe (PID: 6368)
      • UnifiedStub-installer.exe (PID: 1044)
      • utweb.exe (PID: 3104)
      • identity_helper.exe (PID: 7504)
      • rsSyncSvc.exe (PID: 1636)
      • helper.exe (PID: 8888)
      • rsSyncSvc.exe (PID: 3352)
    • Reads the machine GUID from the registry

      • utweb_installer.tmp (PID: 6516)
      • UnifiedStub-installer.exe (PID: 1044)
      • component0.exe (PID: 5996)
      • utweb.exe (PID: 3104)
    • Reads the software policy settings

      • utweb_installer.tmp (PID: 6516)
      • component0.exe (PID: 5996)
      • WerFault.exe (PID: 7880)
      • WerFault.exe (PID: 8392)
      • UnifiedStub-installer.exe (PID: 1044)
      • utweb.exe (PID: 3104)
    • Checks proxy server information

      • utweb_installer.tmp (PID: 6516)
      • utweb_installer.exe (PID: 5504)
      • component0.exe (PID: 5996)
      • UnifiedStub-installer.exe (PID: 1044)
      • WerFault.exe (PID: 7880)
      • WerFault.exe (PID: 8392)
      • utweb.exe (PID: 3104)
    • Creates files or folders in the user directory

      • utweb_installer.exe (PID: 5504)
      • utweb.exe (PID: 3104)
      • WerFault.exe (PID: 8392)
      • WerFault.exe (PID: 7880)
      • helper.exe (PID: 8888)
    • Creates a software uninstall entry

      • utweb_installer.exe (PID: 5504)
    • Reads Environment values

      • component0.exe (PID: 5996)
      • identity_helper.exe (PID: 7504)
      • UnifiedStub-installer.exe (PID: 1044)
    • Disables trace logs

      • component0.exe (PID: 5996)
      • UnifiedStub-installer.exe (PID: 1044)
    • Reads Microsoft Office registry keys

      • utweb.exe (PID: 3104)
      • msedge.exe (PID: 6876)
    • Creates files in the program directory

      • UnifiedStub-installer.exe (PID: 1044)
    • Application launched itself

      • msedge.exe (PID: 6876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (65.1)
.exe | Win32 EXE PECompact compressed (generic) (24.6)
.dll | Win32 Dynamic Link Library (generic) (3.9)
.exe | Win32 Executable (generic) (2.6)
.exe | Win16/32 Executable Delphi generic (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 14:54:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 77824
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 1.4.0.0
ProductVersionNumber: 1.4.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: uTоrrеnt Web®
FileVersion: 1.4
LegalCopyright: ©2022 RainBerry Inc. All Rights Reserved
OriginalFileName:
ProductName: uTоrrеnt Web®
ProductVersion: 1.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
181
Monitored processes
43
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start utweb_installer.exe utweb_installer.tmp no specs utweb_installer.exe utweb_installer.tmp utweb_installer.exe component0.exe ke5zzkgs.exe unifiedstub-installer.exe utweb.exe msedge.exe rssyncsvc.exe no specs conhost.exe no specs msedge.exe no specs rssyncsvc.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs werfault.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs werfault.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs helper.exe

Process information

PID
CMD
Path
Indicators
Parent process
936"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2216 --field-trial-handle=2372,i,11421797736899047137,16692938127377599127,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1044.\UnifiedStub-installer.exe /silentC:\Users\admin\AppData\Local\Temp\7zS0E895ABE\UnifiedStub-installer.exe
ke5zzkgs.exe
User:
admin
Company:
Reason Software Company Inc.
Integrity Level:
HIGH
Description:
UnifiedStub
Version:
6.0.6
Modules
Images
c:\users\admin\appdata\local\temp\7zs0e895abe\unifiedstub-installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1636"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:10C:\Program Files\ReasonLabs\Common\rsSyncSvc.exeservices.exe
User:
SYSTEM
Company:
Reason Software Company Inc.
Integrity Level:
SYSTEM
Description:
Reason Security Synchronize Service
Version:
1.8.5.0
Modules
Images
c:\program files\reasonlabs\common\rssyncsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\version.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3104"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" /RUNONSTARTUPC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe
utweb_installer.tmp
User:
admin
Company:
BitTorrent Limited
Integrity Level:
MEDIUM
Description:
µTorrent Web
Version:
1.4.0.5828
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\rpcrt4.dll
3352"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:10C:\Program Files\ReasonLabs\Common\rsSyncSvc.exeUnifiedStub-installer.exe
User:
admin
Company:
Reason Software Company Inc.
Integrity Level:
HIGH
Description:
Reason Security Synchronize Service
Exit code:
0
Version:
1.8.5.0
Modules
Images
c:\program files\reasonlabs\common\rssyncsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3540"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2308 --field-trial-handle=2372,i,11421797736899047137,16692938127377599127,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
4200"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2364 --field-trial-handle=2372,i,11421797736899047137,16692938127377599127,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5504"C:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\utweb_installer.exe" /SC:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\utweb_installer.exe
utweb_installer.tmp
User:
admin
Company:
BitTorrent Limited
Integrity Level:
HIGH
Description:
uTorrent Web
Exit code:
0
Version:
1.4.0.5828
Modules
Images
c:\users\admin\appdata\local\temp\is-frj2d.tmp\utweb_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5904"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x31c,0x320,0x324,0x308,0x32c,0x7fffccc45fd8,0x7fffccc45fe4,0x7fffccc45ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5980\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exersSyncSvc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
37 393
Read events
37 170
Write events
193
Delete events
30

Modification events

(PID) Process:(6516) utweb_installer.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
74190000D9582AEF90E4DA01
(PID) Process:(6516) utweb_installer.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
D5AD05E9D7DF33C36DCAF702E0ABC28B2BD34F9F3F9A9600450FCD5158C8AA5B
(PID) Process:(6516) utweb_installer.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(5504) utweb_installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe"
(PID) Process:(5504) utweb_installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe" /S
(PID) Process:(5504) utweb_installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\uTorrent Web\uninstall.ico
(PID) Process:(5504) utweb_installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayName
Value:
uTorrent Web
(PID) Process:(5504) utweb_installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:Publisher
Value:
BitTorrent Limited
(PID) Process:(5504) utweb_installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayVersion
Value:
1.4.0
(PID) Process:(5504) utweb_installer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoModify
Value:
1
Executable files
101
Suspicious files
294
Text files
92
Unknown types
3

Dropped files

PID
Process
Filename
Type
6492utweb_installer.exeC:\Users\admin\AppData\Local\Temp\is-P7OPP.tmp\utweb_installer.tmpexecutable
MD5:70BF76D041D0DF60841AA3DBF425681E
SHA256:CD63AF7DEEDAAA5DEA0B762B397594BCCD525E8F9B2AF27C6D1DDBEE4709076E
6516utweb_installer.tmpC:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\is-VJ1DE.tmpexecutable
MD5:A87F9B5D44EDD211272B5C426F1D57F6
SHA256:CD1305DE487481FA02E9DB300F9DD041D7A65CC98CA87576ABEDFA9EE305C2B9
5504utweb_installer.exeC:\Users\admin\AppData\Local\Temp\nsmC03F.tmp\FindProcDLL.dllexecutable
MD5:B4FAF654DE4284A89EAF7D073E4E1E63
SHA256:C0948B2EC36A69F82C08935FAC4B212238B6792694F009B93B4BDB478C4F26E3
6392utweb_installer.exeC:\Users\admin\AppData\Local\Temp\is-J1PPV.tmp\utweb_installer.tmpexecutable
MD5:70BF76D041D0DF60841AA3DBF425681E
SHA256:CD63AF7DEEDAAA5DEA0B762B397594BCCD525E8F9B2AF27C6D1DDBEE4709076E
6516utweb_installer.tmpC:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\license.rtftext
MD5:8A708BF775DE14E5FBB16F6077B454D5
SHA256:ECA753676C5C71D7BE141451CD6D1426A08ED5C254078BC585D9BA91395A971A
6516utweb_installer.tmpC:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\Logo.pngimage
MD5:0D29CE2F35345D19535738CB83B07E64
SHA256:210A4F1E0558DEBE2E51818A377D3C40F79F0296B166C3592AEF51DC8D02FD1E
6516utweb_installer.tmpC:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\is-PKBM0.tmpimage
MD5:CD09F361286D1AD2622BA8A57B7613BD
SHA256:B92A31D4853D1B2C4E5B9D9624F40B439856D0C6A517E100978CBDE8D3C47DC8
6516utweb_installer.tmpC:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\RAV_Cross.pngimage
MD5:CD09F361286D1AD2622BA8A57B7613BD
SHA256:B92A31D4853D1B2C4E5B9D9624F40B439856D0C6A517E100978CBDE8D3C47DC8
5504utweb_installer.exeC:\Users\admin\AppData\Local\Temp\nsmC03F.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
6516utweb_installer.tmpC:\Users\admin\AppData\Local\Temp\is-FRJ2D.tmp\is-QGU8S.tmpexecutable
MD5:CE05DDAD27D49322587F824435F844B5
SHA256:94577F576122C236AD8DB6473670DACBA8831AB1B462D2E9A2E24B0D69EC9924
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
35
TCP/UDP connections
315
DNS requests
175
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2804
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2804
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6824
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6880
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
3104
utweb.exe
POST
200
44.219.170.98:80
http://i-4101.b-10724.utweb.bench.utorrent.com/e?i=4101&e=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
unknown
whitelisted
5504
utweb_installer.exe
POST
200
52.204.119.181:80
http://i-4101.b-5828.utweb.bench.utorrent.com/e?i=4101
unknown
3104
utweb.exe
GET
200
41.63.96.130:80
http://btinstall-artifacts.bittorrent.com/helper_ui/helper_web_ui.btinstall
unknown
whitelisted
3104
utweb.exe
POST
200
44.219.170.98:80
http://i-4101.b-10724.utweb.bench.utorrent.com/e?i=4101&e=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
unknown
whitelisted
5504
utweb_installer.exe
POST
200
52.204.119.181:80
http://i-4101.b-5828.utweb.bench.utorrent.com/e?i=4101
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2532
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1984
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6516
utweb_installer.tmp
18.245.62.182:443
d2ordzmbswux6c.cloudfront.net
US
unknown
4
System
192.168.100.255:137
whitelisted
2532
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5336
SearchApp.exe
104.126.37.128:443
www.bing.com
Akamai International B.V.
DE
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.184.238
whitelisted
d2ordzmbswux6c.cloudfront.net
  • 18.245.62.182
  • 18.245.62.131
  • 18.245.62.12
  • 18.245.62.7
whitelisted
www.bing.com
  • 104.126.37.128
  • 104.126.37.136
  • 104.126.37.139
  • 104.126.37.145
  • 104.126.37.146
  • 104.126.37.138
  • 104.126.37.129
  • 104.126.37.168
  • 104.126.37.147
  • 2.23.209.140
  • 2.23.209.193
  • 2.23.209.187
  • 2.23.209.158
  • 2.23.209.150
  • 2.23.209.179
  • 2.23.209.176
  • 2.23.209.185
  • 2.23.209.149
  • 2.23.209.189
  • 2.23.209.182
  • 2.23.209.133
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.140
  • 20.190.160.14
  • 40.126.32.134
  • 40.126.32.74
  • 40.126.32.72
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
th.bing.com
  • 104.126.37.138
  • 104.126.37.168
  • 104.126.37.171
  • 104.126.37.128
  • 104.126.37.163
  • 104.126.37.177
  • 104.126.37.186
  • 104.126.37.176
  • 104.126.37.139
  • 2.23.209.149
  • 2.23.209.185
  • 2.23.209.140
  • 2.23.209.179
  • 2.23.209.189
  • 2.23.209.176
  • 2.23.209.182
  • 2.23.209.187
  • 2.23.209.133
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
whitelisted
download-lb.utorrent.com
  • 67.215.238.66
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET INFO Suspicious Domain (polyfill .io) in DNS Lookup
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Global content delivery network (unpkg .com)
Potentially Bad Traffic
ET DNS Query for .cc TLD
No debug info