File name:

setup.exe

Full analysis: https://app.any.run/tasks/d403feac-4a19-420f-bcf0-e4c89d3905b9
Verdict: Malicious activity
Analysis date: November 24, 2023, 11:41:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

EA58C12B25C48FEA01EEE390ED06C84A

SHA1:

DF28A8077121C74EFE33A0617F8CC030C654F3C6

SHA256:

FA757528FDF828A3C372A2C12A4BACA687CED0D1F7E4C5F7A69183ADDC575A46

SSDEEP:

98304:QJyEM7ncqFIG7xn8Oy2uyCNxIHCrrHk+4kq65I+G6fs8IN1DGfma5E7vVpKYFNMV:VYv3eg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • setup.exe (PID: 2720)
      • setup.tmp (PID: 3352)
      • unins000.exe (PID: 924)
      • _iu14D2N.tmp (PID: 3068)
      • utweb_installer.exe (PID: 1036)
      • utweb_installer.tmp (PID: 3700)
      • utweb_installer.exe (PID: 3948)
      • utweb_installer.exe (PID: 3364)
      • utweb.exe (PID: 2472)
      • utweb_installer.exe (PID: 2080)
      • utweb_installer.exe (PID: 2156)
      • utweb_installer.tmp (PID: 3096)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • setup.tmp (PID: 3352)
      • _iu14D2N.tmp (PID: 3068)
      • utweb_installer.exe (PID: 3364)
    • Reads the Windows owner or organization settings

      • setup.tmp (PID: 3352)
      • _iu14D2N.tmp (PID: 3068)
      • utweb_installer.tmp (PID: 3700)
      • utweb_installer.tmp (PID: 3096)
    • Starts application with an unusual extension

      • unins000.exe (PID: 924)
    • Starts itself from another location

      • unins000.exe (PID: 924)
    • Reads settings of System Certificates

      • utweb_installer.tmp (PID: 3700)
      • utweb.exe (PID: 2472)
      • helper.exe (PID: 272)
      • utweb_installer.tmp (PID: 3096)
    • Reads the Internet Settings

      • utweb_installer.exe (PID: 3364)
      • saBSI.exe (PID: 2436)
      • utweb_installer.tmp (PID: 3700)
      • utweb.exe (PID: 2472)
      • utweb_installer.tmp (PID: 3096)
      • setup.tmp (PID: 3352)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • utweb_installer.exe (PID: 3364)
    • The process creates files with name similar to system file names

      • utweb_installer.exe (PID: 3364)
    • Reads security settings of Internet Explorer

      • saBSI.exe (PID: 2436)
      • utweb.exe (PID: 2472)
    • Checks Windows Trust Settings

      • saBSI.exe (PID: 2436)
      • utweb.exe (PID: 2472)
    • Connects to unusual port

      • utweb.exe (PID: 2472)
  • INFO

    • Create files in a temporary directory

      • setup.exe (PID: 2720)
      • unins000.exe (PID: 924)
      • setup.tmp (PID: 3352)
      • _iu14D2N.tmp (PID: 3068)
      • utweb_installer.exe (PID: 1036)
      • utweb_installer.exe (PID: 3948)
      • utweb_installer.tmp (PID: 3700)
      • utweb_installer.exe (PID: 3364)
      • utweb_installer.exe (PID: 2080)
      • utweb_installer.exe (PID: 2156)
      • utweb_installer.tmp (PID: 3096)
    • Checks supported languages

      • setup.exe (PID: 2720)
      • setup.tmp (PID: 3352)
      • unins000.exe (PID: 924)
      • _iu14D2N.tmp (PID: 3068)
      • wmpnscfg.exe (PID: 2448)
      • wmpnscfg.exe (PID: 3572)
      • utweb_installer.exe (PID: 1036)
      • utweb_installer.exe (PID: 3948)
      • utweb_installer.tmp (PID: 752)
      • utweb_installer.tmp (PID: 3700)
      • saBSI.exe (PID: 2436)
      • utweb_installer.exe (PID: 3364)
      • utweb.exe (PID: 2472)
      • helper.exe (PID: 272)
      • utweb.exe (PID: 2092)
      • utweb.exe (PID: 3916)
      • utweb.exe (PID: 2924)
      • utweb.exe (PID: 2780)
      • utweb.exe (PID: 3628)
      • utweb.exe (PID: 3184)
      • utweb.exe (PID: 2080)
      • utweb.exe (PID: 3448)
      • utweb.exe (PID: 2092)
      • utweb.exe (PID: 1376)
      • utweb.exe (PID: 1868)
      • utweb.exe (PID: 3628)
      • utweb.exe (PID: 732)
      • utweb.exe (PID: 1824)
      • utweb_installer.exe (PID: 2080)
      • utweb.exe (PID: 3992)
      • utweb_installer.tmp (PID: 3500)
      • utweb_installer.exe (PID: 2156)
      • utweb_installer.tmp (PID: 3096)
      • utweb.exe (PID: 1856)
      • utweb.exe (PID: 3336)
      • utweb.exe (PID: 2436)
      • utweb.exe (PID: 3964)
      • utweb.exe (PID: 2096)
      • utweb.exe (PID: 1948)
      • utweb.exe (PID: 2992)
      • utweb.exe (PID: 3280)
      • utweb.exe (PID: 2448)
      • utweb.exe (PID: 3228)
      • utweb.exe (PID: 3860)
    • Reads the computer name

      • setup.tmp (PID: 3352)
      • wmpnscfg.exe (PID: 2448)
      • wmpnscfg.exe (PID: 3572)
      • utweb_installer.tmp (PID: 752)
      • utweb_installer.tmp (PID: 3700)
      • utweb_installer.exe (PID: 3364)
      • saBSI.exe (PID: 2436)
      • utweb.exe (PID: 2472)
      • helper.exe (PID: 272)
      • utweb_installer.tmp (PID: 3500)
      • utweb_installer.tmp (PID: 3096)
    • Creates files in the program directory

      • setup.tmp (PID: 3352)
      • saBSI.exe (PID: 2436)
    • Manual execution by a user

      • msedge.exe (PID: 2412)
      • wmpnscfg.exe (PID: 3572)
      • wmpnscfg.exe (PID: 2448)
      • utweb.exe (PID: 3184)
      • utweb.exe (PID: 2092)
      • utweb.exe (PID: 2080)
    • Application launched itself

      • msedge.exe (PID: 2412)
      • msedge.exe (PID: 2156)
      • msedge.exe (PID: 528)
    • Drops the executable file immediately after the start

      • msedge.exe (PID: 2412)
      • msedge.exe (PID: 2304)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 2448)
      • wmpnscfg.exe (PID: 3572)
      • utweb_installer.tmp (PID: 3700)
      • utweb_installer.exe (PID: 3364)
      • saBSI.exe (PID: 2436)
      • utweb.exe (PID: 2472)
      • utweb_installer.tmp (PID: 3096)
    • The process uses the downloaded file

      • msedge.exe (PID: 3696)
      • msedge.exe (PID: 2412)
      • msedge.exe (PID: 2156)
      • msedge.exe (PID: 3416)
    • Creates files or folders in the user directory

      • utweb_installer.exe (PID: 3364)
      • utweb.exe (PID: 2472)
      • helper.exe (PID: 272)
    • Checks proxy server information

      • utweb_installer.exe (PID: 3364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (81.5)
.exe | Win32 Executable Delphi generic (10.5)
.exe | Win32 Executable (generic) (3.3)
.exe | Win16/32 Executable Delphi generic (1.5)
.exe | Generic Win/DOS Executable (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:10:02 07:04:04+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 86016
InitializedDataSize: 158208
UninitializedDataSize: -
EntryPoint: 0x16478
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.5
ProductVersionNumber: 1.0.0.5
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: torrent-igruha.org
FileDescription: Half-Life 2 Complete Edition Setup
FileVersion: 1.0.0.5
LegalCopyright: © Mail
ProductName: Half-Life 2 Complete Edition
ProductVersion: 1.0.0.5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
102
Malicious processes
13
Suspicious processes
4

Behavior graph

Click at the process to see the details
start setup.exe setup.tmp no specs unins000.exe no specs _iu14d2n.tmp no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb_installer.exe no specs utweb_installer.tmp no specs utweb_installer.exe utweb_installer.tmp msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb_installer.exe sabsi.exe utweb.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs helper.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb_installer.exe no specs utweb_installer.tmp no specs utweb_installer.exe utweb_installer.tmp utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs utweb.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb.exe no specs utweb.exe no specs setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd8,0x6a4af598,0x6a4af5a8,0x6a4af5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
148"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5036 --field-trial-handle=1320,i,8027975798276810197,5424669894995782367,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
240"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1648 --field-trial-handle=1320,i,8027975798276810197,5424669894995782367,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
272helper/helper.exe 49440 -- ut_web/1.4.0.5714 hval/745a97b0be8aee11a82612a9866c77deC:\Users\admin\AppData\Roaming\uTorrent Web\helper\helper.exe
utweb.exe
User:
admin
Company:
BitTorrent Inc.
Integrity Level:
MEDIUM
Description:
µTorrent Helper
Exit code:
0
Version:
2.1.6.2679
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\helper\helper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
284"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4164 --field-trial-handle=1320,i,8027975798276810197,5424669894995782367,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
528"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://ti-url.com/half-life-2-complete-editionC:\Program Files\Microsoft\Edge\Application\msedge.exesetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
732"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" "C:\Users\admin\Downloads\Half-Life-2-Complete-Edition-by-Igruha.torrent" /SHELLASSOCC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exemsedge.exe
User:
admin
Company:
Rainberry Inc.
Integrity Level:
MEDIUM
Description:
µTorrent Web
Exit code:
0
Version:
1.4.0.5714
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\version.dll
752"C:\Users\admin\AppData\Local\Temp\is-FI5UU.tmp\utweb_installer.tmp" /SL5="$B0184,902222,823296,C:\Users\admin\Downloads\utweb_installer.exe" C:\Users\admin\AppData\Local\Temp\is-FI5UU.tmp\utweb_installer.tmputweb_installer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-fi5uu.tmp\utweb_installer.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
924"C:\Program Files\Half-Life 2 Complete Edition\unins000.exe" /VERYSILENTC:\Program Files\Half-Life 2 Complete Edition\unins000.exesetup.tmp
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\program files\half-life 2 complete edition\unins000.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1008"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 --field-trial-handle=1320,i,8027975798276810197,5424669894995782367,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
30 562
Read events
30 348
Write events
186
Delete events
28

Modification events

(PID) Process:(3068) _iu14D2N.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Half-Life 2 Complete Edition_is1
Operation:delete keyName:(default)
Value:
(PID) Process:(3068) _iu14D2N.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Operation:delete valueName:C:\Program Files\Half-Life 2 Complete Edition\Half-Life 2 Episode Two.exe
Value:
RUNASADMIN
(PID) Process:(3068) _iu14D2N.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Operation:delete valueName:C:\Program Files\Half-Life 2 Complete Edition\Half-Life 2 Episode One.exe
Value:
RUNASADMIN
(PID) Process:(3068) _iu14D2N.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Operation:delete valueName:C:\Program Files\Half-Life 2 Complete Edition\Half-Life 2 Lost Coast.exe
Value:
RUNASADMIN
(PID) Process:(3068) _iu14D2N.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Operation:delete valueName:C:\Program Files\Half-Life 2 Complete Edition\Half-Life Source.exe
Value:
RUNASADMIN
(PID) Process:(3068) _iu14D2N.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Operation:delete valueName:C:\Program Files\Half-Life 2 Complete Edition\hl2.exe
Value:
RUNASADMIN
(PID) Process:(3068) _iu14D2N.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Operation:delete keyName:(default)
Value:
(PID) Process:(2412) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2412) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2412) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
Executable files
100
Suspicious files
1 570
Text files
207
Unknown types
0

Dropped files

PID
Process
Filename
Type
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\cls.ini
MD5:
SHA256:
2720setup.exeC:\Users\admin\AppData\Local\Temp\is-9URC8.tmp\setup.tmpexecutable
MD5:A3DA0CC6F148DD70E8E8443E5C1BCF00
SHA256:3991D7614A9EBFBE4FDF8A94F6B73AC0EEF0BA5FFA3F5071CFDEE4728BD07271
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\WinTB.dllexecutable
MD5:A2EEE508E6A51C6335650532E05AC550
SHA256:75FB2984E1B06F4278FB7B3C77E9FEC84E02A3B4BF82D35120F8CBE7BDBC76BF
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\CallbackCtrl.dllexecutable
MD5:F07E819BA2E46A897CFABF816D7557B2
SHA256:68F42A7823ED7EE88A5C59020AC52D4BBCADF1036611E96E470D986C8FAA172D
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\English.initext
MD5:B031BEE9106D82782B43BDF5D4AD79B0
SHA256:E1B6F4DC9BA12E110B33D370E8F06F176228059C42754BE5DA7B92AB939FF38E
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\ISDone.dllexecutable
MD5:4FEAFA8B5E8CDB349125C8AF0AC43974
SHA256:BB8A0245DCC5C10A1C7181BAD509B65959855009A8105863EF14F2BB5B38AC71
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\botva2.dllexecutable
MD5:67965A5957A61867D661F05AE1F4773E
SHA256:450B9B0BA25BF068AFBC2B23D252585A19E282939BF38326384EA9112DFD0105
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\b2p.dllexecutable
MD5:AB35386487B343E3E82DBD2671FF9DAB
SHA256:C3729545522FCFF70DB61046C0EFD962DF047D40E3B5CCD2272866540FC872B2
3352setup.tmpC:\Users\admin\AppData\Local\Temp\is-2SJDB.tmp\unarc.dllexecutable
MD5:C8600EE0BAD1CB2A899B792CB6C1869B
SHA256:B670F7E828AEFF88BBE6351BF3B0775AF39ADC1BFAC3B84AF4061A4C78ED174A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
2 709
DNS requests
298
Threats
41

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
272
helper.exe
POST
200
52.0.78.86:80
http://i-5600.b-2679.helper.bench.utorrent.com/e.php?i=5600
unknown
binary
21 b
unknown
2472
utweb.exe
POST
200
35.171.94.184:80
http://i-4103.b-5714.utw.bench.utorrent.com/e?i=4103
unknown
binary
21 b
unknown
3364
utweb_installer.exe
POST
200
50.19.196.255:80
http://i-4101.b-5714.utweb.bench.utorrent.com/e?i=4101
unknown
binary
21 b
unknown
2472
utweb.exe
GET
178.79.242.16:80
http://btinstall-artifacts.bittorrent.com/helper_ui/helper_web_ui.btinstall
unknown
unknown
3364
utweb_installer.exe
POST
200
50.19.196.255:80
http://i-4101.b-5714.utweb.bench.utorrent.com/e?i=4101
unknown
binary
21 b
unknown
2472
utweb.exe
POST
200
52.203.137.177:80
http://i-4101.b-10541.utweb_ui.bench.utorrent.com/e?i=4101&e=eyJhY3Rpb24iOiJ2MS4xMDU0MS5kZS5wYWdldmlldy5wbGFjZWhvbGRlci5wbGFjZWhvbGRlci5wbGFjZWhvbGRlciIsImFwcE5hbWUiOiJ1dHdlYiIsImFwcFZlcnNpb24iOiIxLjQuMC41NzE0LjEwNTQxIiwiaXNVdHdlYiI6dHJ1ZSwidHV0b3JpYWxWaWRlb0hhc2hMaXN0IjpbIjgwYjM5YTJlMzdhYTM1MmNkMmZjYmZiZWY3YzRhNmU5ZThjZmU0MzgiLCI5YTIzYmU2YzU1ZDVmOGQxZTI4MjYwZTQwM2JhZTU0MTI0NDM1NzllIiwiMzhlOTcyMzRmZDYwYzRmMzAzNDRkOWZhZTgwODk5YTc1ZmNmYmZmZSIsIjYxYjNiODg1NmM0ODM5ZWRmNTFmNWMyMzQ2NTk5YjZiZWM1MjQxNDUiLCI1NjJlMjljNzgzNmRhZGJjZjU1YjNkZWJmODMwNjMyNzE3NjljOTRmIl0sInV1aWQiOiI3NDVhOTdiMGJlOGFlZTExYTgyNjEyYTk4NjZjNzdkZSIsImJlbmNoR2VvIjoiZGUiLCJ1dHdlYlNhbXBsZVJhdGUiOjEsImdhQmxvY2tlckRldGVjdGVkIjpudWxsLCJuYW1lIjoidDAiLCJ0cmFja2luZ0lkIjoiVUEtODg2OTgxMDItMTAiLCJjb29raWVOYW1lIjoiX2dhIiwiY29va2llRG9tYWluIjoicmFpbmJlcnJ5dHYuY29tIiwiY29va2llUGF0aCI6Ii8iLCJjb29raWVFeHBpcmVzIjo2MzA3MjAwMCwibGVnYWN5SGlzdG9yeUltcG9ydCI6dHJ1ZSwiYWxsb3dMaW5rZXIiOmZhbHNlLCJhbGxvd0FuY2hvciI6dHJ1ZSwic2FtcGxlUmF0ZSI6MTAwLCJzaXRlU3BlZWRTYW1wbGVSYXRlIjoxLCJhbHdheXNTZW5kUmVmZXJyZXIiOmZhbHNlLCJzdG9yYWdlIjoiY29va2llIiwiX2dlIjp0cnVlLCJhcGlWZXJzaW9uIjoxLCJjbGllbnRWZXJzaW9uIjoiajU2IiwiX2djbiI6Il9naWQiLCJjbGllbnRJZCI6IjE0ODU5NzYxNjIuMTcwMDgyNjIxNiIsIl9naWQiOiIxOTkyMzA5Mzk3LjE3MDA4MjYyMTYiLCJsb2NhdGlvbiI6Imh0dHBzOi8vdXR3ZWIucmFpbmJlcnJ5dHYuY29tL2d1aS9pbmRleC5odG1sP3Y9MS40LjAuNTcxNCIsInNjcmVlblJlc29sdXRpb24iOiIxMjgweDcyMCIsInNjcmVlbkNvbG9ycyI6IjI0LWJpdCIsInZpZXdwb3J0U2l6ZSI6IjEyODB4NjIxIiwiZW5jb2RpbmciOiJVVEYtOCIsImphdmFFbmFibGVkIjpmYWxzZSwibGFuZ3VhZ2UiOiJlbi11cyIsImFkU2Vuc2VJZCI6MTM0MjE3OTA2OCwiZGltZW5zaW9uMSI6IjE0ODU5NzYxNjIuMTcwMDgyNjIxNiIsImRpbWVuc2lvbjYiOjEsInRpdGxlIjoizrxUb3JyZW50IFdlYiIsInNjcmVlbk5hbWUiOiJkYXNoYm9hcmQiLCJwYWdlIjoiL2Rhc2hib2FyZCIsImRpbWVuc2lvbjIiOjE3MDA4MjYyMTU4OTUsImRpbWVuc2lvbjMiOjAsImRpbWVuc2lvbjciOiI3NDVhOTdiMGJlOGFlZTExYTgyNjEyYTk4NjZjNzdkZSIsImhpdFR5cGUiOiJwYWdldmlldyIsIl90aSI6MTcwMDgyNjIxNTk3MywiX3RvIjoxOSwiX2hjIjoxLCJfajEiOiI3ODE5MjI4ODciLCJfajIiOiIxMDcwOTEyNTUiLCJfciI6MSwidHJhbnNwb3J0VXJsIjoiaHR0cHM6Ly93d3cuZ29vZ2xlLWFuYWx5dGljcy5jb20vci9jb2xsZWN0IiwiX3MiOjEsImV2ZW50TmFtZSI6InV0d2ViX3VpIiwiQlVJTERfTlVNQkVSIjoiMTA1NDEifQ==
unknown
binary
21 b
unknown
2472
utweb.exe
POST
200
52.203.137.177:80
http://i-4101.b-10541.utweb.bench.utorrent.com/e?i=4101&e=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
unknown
binary
21 b
unknown
2472
utweb.exe
POST
200
52.44.225.32:80
http://i-4101.b-10541.utweb_ui.bench.utorrent.com/e?i=4101&e=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
unknown
binary
21 b
unknown
2472
utweb.exe
POST
200
52.44.225.32:80
http://i-4101.b-10541.utweb_ui.bench.utorrent.com/e?i=4101&e=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
unknown
binary
21 b
unknown
2472
utweb.exe
POST
200
52.44.225.32:80
http://i-4101.b-10541.utweb_ui.bench.utorrent.com/e?i=4101&e=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
unknown
binary
21 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
2412
msedge.exe
239.255.255.250:1900
whitelisted
2304
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2304
msedge.exe
172.67.71.140:443
itorrents-igruha.org
unknown
2304
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2304
msedge.exe
104.26.12.145:443
ti-url.com
CLOUDFLARENET
US
unknown
2304
msedge.exe
20.105.95.163:443
nav-edge.smartscreen.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
config.edge.skype.com
  • 13.107.42.16
whitelisted
ti-url.com
  • 104.26.12.145
  • 104.26.13.145
  • 172.67.71.29
unknown
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
nav-edge.smartscreen.microsoft.com
  • 20.105.95.163
  • 20.103.180.120
whitelisted
itorrents-igruha.org
  • 172.67.71.140
  • 104.26.5.172
  • 104.26.4.172
unknown
data-edge.smartscreen.microsoft.com
  • 20.31.251.109
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
cdn.jsdelivr.net
  • 104.16.89.20
  • 104.16.85.20
  • 104.16.87.20
  • 104.16.88.20
  • 104.16.86.20
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
mc.yandex.ru
  • 77.88.21.119
  • 87.250.250.119
  • 87.250.251.119
  • 93.158.134.119
whitelisted

Threats

PID
Process
Class
Message
3364
utweb_installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
3364
utweb_installer.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2472
utweb.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
2472
utweb.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
2472
utweb.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2304
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code.jquery .com)
2304
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Global content delivery network (unpkg .com)
2472
utweb.exe
Potential Corporate Privacy Violation
ET P2P Vuze BT UDP Connection (5)
2472
utweb.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent transfer
2472
utweb.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent transfer
Process
Message
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-NEBDF.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003