File name:

itubego.exe

Full analysis: https://app.any.run/tasks/e39d8d82-820f-4773-9329-1ada1e637318
Verdict: Malicious activity
Analysis date: May 28, 2025, 23:49:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

E3AC7FCA8B3A801AF158CE08B3EB2161

SHA1:

E3459E6BA40C431B164F9FE42DCDD0059CE9628C

SHA256:

F5E9CCEEEC50CBDE2E648EE6BEA98F0496901A00750C3E1366195EAED3A32699

SSDEEP:

98304:f/G/ZBf6s7c9PFad+pw7zsECD7goRpl9tfYa+pk2OE0Ab663Ox79MXdFu55nlzzU:xGke5wT0Q6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes Windows Defender settings

      • itubego.exe (PID: 3268)
    • Adds path to the Windows Defender exclusion list

      • itubego.exe (PID: 3268)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • itubego.exe (PID: 3268)
    • Script adds exclusion path to Windows Defender

      • itubego.exe (PID: 3268)
  • INFO

    • The sample compiled with chinese language support

      • itubego.exe (PID: 3268)
    • Checks supported languages

      • itubego.exe (PID: 3268)
    • Creates files in the program directory

      • itubego.exe (PID: 3268)
    • Reads the computer name

      • itubego.exe (PID: 3268)
    • Create files in a temporary directory

      • itubego.exe (PID: 3268)
    • Reads the machine GUID from the registry

      • itubego.exe (PID: 3268)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7152)
      • powershell.exe (PID: 5428)
      • powershell.exe (PID: 5216)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5216)
      • powershell.exe (PID: 5428)
      • powershell.exe (PID: 7152)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 7844)
      • BackgroundTransferHost.exe (PID: 8056)
      • BackgroundTransferHost.exe (PID: 6656)
      • BackgroundTransferHost.exe (PID: 4172)
    • Checks proxy server information

      • itubego.exe (PID: 3268)
      • BackgroundTransferHost.exe (PID: 8056)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 8056)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 8056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:05:16 02:04:22+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 2240000
InitializedDataSize: 1054720
UninitializedDataSize: -
EntryPoint: 0x1ded53
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 25.3.25.1
ProductVersionNumber: 5.2.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileDescription: iTubeGo
FileVersion: 25.3.25.1
LegalCopyright: Copyright (c) 2025 iTubeGo Studio. All rights reserved.
ProductName: iTubeGo
ProductVersion: 5.2.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
15
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start itubego.exe powershell.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs slui.exe shellexperiencehost.exe no specs itubego.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1276"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
2088\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2416\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3268"C:\Users\admin\Desktop\itubego.exe" C:\Users\admin\Desktop\itubego.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
iTubeGo
Version:
25.3.25.1
Modules
Images
c:\users\admin\desktop\itubego.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4172"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
5216powershell.exe -Command Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Roaming\WvEdgeBrowser'C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeitubego.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5248"C:\Users\admin\Desktop\itubego.exe" C:\Users\admin\Desktop\itubego.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
iTubeGo
Exit code:
3221226540
Version:
25.3.25.1
Modules
Images
c:\users\admin\desktop\itubego.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5428powershell.exe -Command Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Local\Temp\\tmp123_downloader'C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeitubego.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6656"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
6920\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
24 961
Read events
24 944
Write events
17
Delete events
0

Modification events

(PID) Process:(7844) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7844) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7844) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(8056) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(8056) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(8056) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4172) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4172) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4172) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6656) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
0
Suspicious files
5
Text files
55
Unknown types
0

Dropped files

PID
Process
Filename
Type
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\de.initext
MD5:2E0F07585F0ECB04D295248849E8B8DD
SHA256:0A2C63C116A18DC24B6967C3C6E508163A836996A684E2D09E8E10C8D9EBE926
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\id.initext
MD5:136ECC2F15A2F6DDEFCAC120A63947B4
SHA256:661287A1191E72E2A7267B9F1A8FFA6B5BB50F280D2AC63E9F363F5795AF9EE5
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\app.icoimage
MD5:B3B3AB6DE17BB09A57EDAA05E7E55301
SHA256:A06671799875CA56B7BD186FAC0655AD51FBFB2860ADF3F2E92CC228A399F2A4
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\hi.initext
MD5:5DCCA38D140728158C75AB05BE09AAAE
SHA256:421257032BC752FFC3A8E720E0F73C1422C422EC2905F0F6C6EE021FD58C8C93
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\vi.initext
MD5:5475E2E46B40296CFB3233CF59E24CC8
SHA256:2B1FF21945D6D36604ED09F8C74B1DA47BD7D5FAEA550F6193E55A4B452D3DFF
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\config.initext
MD5:E676AE41D9657FDFEE475F7D5C669CC8
SHA256:D89C5C63BA586A8B0DAE4DA8A1264D64DE9696A9DF67EF329D93BA592C97333C
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\fr.initext
MD5:C411B773802DBB3CA3EDF2CC0B5E04FD
SHA256:EDC686FDB599E190EFF6E0DA49195AB8E42FD7A83B5865F0F78B61B4495C9E70
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\ko.initext
MD5:28E843EBF0E252632F8230491ADA90D8
SHA256:C0A807891343CF2B6EC68C8CA4E6B78938BA16A2562E6CDBC79872D935A527F9
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\jp.initext
MD5:4C68C5F6388C82F65988D065A1BBFF2C
SHA256:088F32EE0471477C517A44D297EED7EE81EA613A1043AAE357AC6077D150B17C
3268itubego.exeC:\Users\admin\AppData\Local\Temp\tmp123_downloader\Cache\10bcba\language\es.initext
MD5:66D8BBC0FBA6281109ED4568C9B1AEE7
SHA256:93CDA998D6CED85788D0274C17787D261A428D71555594367DA9AAE97EFCF0ED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
42
TCP/UDP connections
61
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5796
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
172.67.72.188:443
https://download.itubego.com/updateinfo/itubego_update_win.json
unknown
binary
988 b
GET
204
142.250.186.142:443
https://www.google-analytics.com/g/collect?v=2&sct=1&seg=1&tid=G-V9BVQVS970&cid=989857505410153.524510151999745&sid=1748476173&en=Product_iTubeGo&ep.action=DownloaderVersion_iTubeGo&ep.label=5.2.0.0_iTubeGo
unknown
GET
204
142.250.186.142:443
https://www.google-analytics.com/g/collect?v=2&sct=1&seg=1&tid=G-V9BVQVS970&cid=989857505410153.524510151999745&sid=1748476173&en=Progress_iTubeGo&ep.action=ClickInstall_iTubeGo
unknown
GET
104.26.12.246:443
https://download.itubego.com/itubego/win/itubego_v10.3.1_x64.exe
unknown
GET
204
142.250.186.142:443
https://www.google-analytics.com/g/collect?v=2&sct=1&seg=1&tid=G-V9BVQVS970&cid=989857505410153.524510151999745&sid=1748476173&en=Product_iTubeGo&ep.action=DownloaderCategory_iTubeGo&ep.label=iTubeGo_iTubeGo
unknown
GET
204
142.250.186.142:443
https://www.google-analytics.com/g/collect?v=2&sct=1&seg=1&tid=G-V9BVQVS970&cid=989857505410153.524510151999745&sid=1748476173&en=Progress_iTubeGo&ep.action=DownloaderStart_iTubeGo
unknown
POST
200
20.190.159.2:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
GET
204
142.250.186.142:443
https://www.google-analytics.com/g/collect?v=2&sct=1&seg=1&tid=G-V9BVQVS970&cid=989857505410153.524510151999745&sid=1748476173&en=System_iTubeGo&ep.action=SysOS_iTubeGo&ep.label=Windows1064(english_1033)_iTubeGo
unknown
POST
200
40.126.31.129:443
https://login.live.com/RST2.srf
unknown
xml
11.3 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5796
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
864
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5796
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
864
RUXIMICS.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5796
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
864
RUXIMICS.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5796
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.219.150.101
whitelisted
www.google-analytics.com
  • 216.58.206.78
  • 142.250.184.206
whitelisted
download.itubego.com
  • 172.67.72.188
  • 104.26.12.246
  • 104.26.13.246
unknown
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.250
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.2
  • 20.190.160.17
  • 20.190.160.5
  • 20.190.160.20
  • 40.126.32.68
  • 20.190.160.67
  • 20.190.160.131
  • 20.190.160.65
  • 20.190.160.3
  • 20.190.160.64
  • 40.126.32.76
  • 20.190.160.128
  • 40.126.32.133
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
www.bing.com
  • 2.16.241.201
  • 2.16.241.218
whitelisted

Threats

No threats detected
No debug info