File name:

utweb_installer.exe

Full analysis: https://app.any.run/tasks/9fc10e37-03f1-460a-802c-6b042192801a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 11, 2024, 12:16:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-doc
arch-html
bittorrent
loader
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

0B42472451F0741B9808C8E19FD65741

SHA1:

FFBDC75B9E2474374EC0448A217A1CC0315F875F

SHA256:

FE2815A969DB02584CAB4A95720A6A8E774CD1B30A2752355125B0804A2DD740

SSDEEP:

98304:3y7WjaQqnhXY5jhMDNL8q1xhx+OfYKGSSGC+cg6UxUx9o1cguHgTUtpz4R/EPjMS:Q+oUmG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • utweb.exe (PID: 1144)
    • BITTORRENT has been detected (SURICATA)

      • utweb.exe (PID: 1144)
    • Actions looks like stealing of personal data

      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • utweb_installer.exe (PID: 6812)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • beta (PID: 6380)
    • Executable content was dropped or overwritten

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
    • The process creates files with name similar to system file names

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • Process drops legitimate windows executable

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
    • Creates a software uninstall entry

      • beta (PID: 6380)
      • servicehost.exe (PID: 7688)
    • Reads security settings of Internet Explorer

      • beta (PID: 6380)
      • utweb_installer.exe (PID: 6812)
      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • uihost.exe (PID: 7424)
    • Reads the date of Windows installation

      • utweb_installer.exe (PID: 6812)
    • The process verifies whether the antivirus software is installed

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • installer.exe (PID: 6496)
      • cmd.exe (PID: 8756)
      • cmd.exe (PID: 8888)
      • updater.exe (PID: 8708)
    • Checks Windows Trust Settings

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • servicehost.exe (PID: 7688)
      • installer.exe (PID: 5460)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Potential Corporate Privacy Violation

      • utweb.exe (PID: 1144)
    • Adds/modifies Windows certificates

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
    • Creates/Modifies COM task schedule object

      • installer.exe (PID: 5460)
    • Executes as Windows Service

      • servicehost.exe (PID: 7688)
    • Reads Mozilla Firefox installation path

      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
    • Starts CMD.EXE for commands execution

      • updater.exe (PID: 8708)
      • servicehost.exe (PID: 7688)
    • Hides command output

      • cmd.exe (PID: 8756)
    • Connects to unusual port

      • utweb.exe (PID: 1144)
  • INFO

    • Reads the computer name

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
      • installer.exe (PID: 5460)
      • identity_helper.exe (PID: 7352)
      • servicehost.exe (PID: 7688)
      • updater.exe (PID: 8708)
      • identity_helper.exe (PID: 9028)
    • The sample compiled with english language support

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • msedge.exe (PID: 4056)
    • Checks supported languages

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • identity_helper.exe (PID: 7352)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
      • identity_helper.exe (PID: 9028)
      • utweb.exe (PID: 2392)
      • utweb.exe (PID: 8436)
      • utweb.exe (PID: 4724)
    • Sends debugging messages

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
    • Reads the machine GUID from the registry

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Checks proxy server information

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
    • Reads the software policy settings

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Create files in a temporary directory

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
    • Creates files or folders in the user directory

      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
    • The process uses the downloaded file

      • utweb_installer.exe (PID: 6812)
      • msedge.exe (PID: 2940)
    • Creates files in the program directory

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • Process checks computer location settings

      • utweb_installer.exe (PID: 6812)
      • servicehost.exe (PID: 7688)
    • Application launched itself

      • msedge.exe (PID: 1668)
      • msedge.exe (PID: 2940)
    • Manual execution by a user

      • msedge.exe (PID: 2940)
    • Reads Environment values

      • identity_helper.exe (PID: 7352)
      • identity_helper.exe (PID: 9028)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 2940)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 4056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:14 10:17:56+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 2560512
InitializedDataSize: 2708480
UninitializedDataSize: -
EntryPoint: 0x223188
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.0.13.45874
ProductVersionNumber: 3.0.13.45874
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: u Torrent Web
FileDescription: u Torrent Web
FileVersion: 3.0.13.111410
LegalCopyright: (c) u Torrent Web
ProductName: u Torrent Web
ProductVersion: 3.0.13.111410
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
213
Monitored processes
82
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
start utweb_installer.exe beta sabsi.exe #BITTORRENT utweb.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs helper.exe installer.exe installer.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs servicehost.exe uihost.exe msedge.exe no specs updater.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb.exe no specs msedge.exe no specs utweb.exe no specs utweb.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb_installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1144"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" /RUNONSTARTUPC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe
utweb_installer.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
HIGH
Description:
µTorrent Web
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\rpcrt4.dll
1580"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5652 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1668"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeutweb.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2212"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4432 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2280"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5896 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2392"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" "C:\Users\admin\Downloads\Thangalaan (2024) [1080p] [WEBRip] [x265] [10bit] [5.1] [YTS.MX].torrent" /SHELLASSOCC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exemsedge.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
MEDIUM
Description:
µTorrent Web
Exit code:
0
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\rpcrt4.dll
c:\windows\syswow64\crypt32.dll
2940"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --do-not-de-elevate --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7368 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4128"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=6800 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4336"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=7852 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
48 823
Read events
48 345
Write events
458
Delete events
20

Modification events

(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe"
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe" /S
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\uTorrent Web\uninstall.ico
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayName
Value:
uTorrent Web
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:Publisher
Value:
BitTorrent Limited
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayVersion
Value:
1.4.0
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoModify
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoRepair
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
43
Suspicious files
1 109
Text files
1 245
Unknown types
35

Dropped files

PID
Process
Filename
Type
6812utweb_installer.exeC:\Users\admin\AppData\Local\Temp\ISV5595.tmp\betaexecutable
MD5:F90AC5C11AA97726788246A120FD2550
SHA256:CAD49B1006DA8A23994531B755BEB3833542ED73CDE2C0A4882887EF8A1588E5
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\pt-br.langtext
MD5:744641954533C29EAEC0E5527135C016
SHA256:A75D0E4D554599BF690FA9F922FFABB75268AF1F8E59B66C4C5FDAE2439CB262
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\tr.langtext
MD5:BE11EC74C870EBE33AF130BF63A0C4B3
SHA256:C3B3BC933AA57A23F37021F1DE9DBFB61F31F18C95F55AE5B537C9D4A37F6011
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\nl.langtext
MD5:9B98CF7C75589E5B1939B6E32054DC34
SHA256:3A54E4B49EDC588E5E8AA1BB7BF6BAE19B98935C0D10CB0024071BC10D5271F5
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\zh-cn.langtext
MD5:6B4F572DE7874993B6B3ACA76D341F35
SHA256:C239CF4FBAE53D40A9CB202F4E561C1E83F8B68212CC654BC1E9C585423A3ABA
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\pt.langtext
MD5:05D4FF65054267991CDD36FBA52E4568
SHA256:C69916FA2B4ABC31BEC44675AFD695644B23D8A33C16521873F186AE4DBDA899
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\ru.langtext
MD5:B5171E547C00802760E2497ACF036590
SHA256:35B50DCA884BF00627C242DC5F696DEACA46302CD695D2B86DADAB2D9FF7B905
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\zh-tw.langtext
MD5:00DD6BE1DFB987C4722FDB3AAEDDA230
SHA256:C0FD072B126A9589BF6DFDD3F66B6D63DE64A7F19DD527AC331AA071E2480058
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\UAC.dllexecutable
MD5:ADB29E6B186DAA765DC750128649B63D
SHA256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
1 968
DNS requests
348
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
524
svchost.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
524
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6788
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6380
beta
POST
200
3.81.199.252:80
http://i-4101.b-6042.utweb.bench.utorrent.com/e?i=4101
unknown
whitelisted
3224
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6380
beta
POST
200
3.81.199.252:80
http://i-4101.b-6042.utweb.bench.utorrent.com/e?i=4101
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 184.24.77.37
  • 184.24.77.35
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.bing.com
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.184
  • 104.126.37.160
  • 104.126.37.168
  • 104.126.37.163
  • 104.126.37.161
  • 104.126.37.152
  • 104.126.37.171
  • 2.23.209.144
  • 2.23.209.152
  • 2.23.209.156
  • 2.23.209.160
  • 2.23.209.157
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.177
  • 2.23.209.185
  • 2.23.209.182
  • 2.23.209.176
  • 2.23.209.178
  • 2.23.209.186
  • 2.23.209.179
  • 2.23.209.188
  • 2.23.209.173
  • 2.23.209.140
  • 2.23.209.132
  • 2.23.209.142
  • 2.23.209.131
  • 2.23.209.137
  • 2.23.209.130
  • 2.23.209.133
  • 2.23.209.136
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.72
  • 20.190.160.14
whitelisted
go.microsoft.com
  • 23.218.210.69
  • 184.28.89.167
whitelisted
d259em5jkzx24q.cloudfront.net
  • 18.66.137.230
  • 18.66.137.69
  • 18.66.137.201
  • 18.66.137.210
whitelisted
download-lb.utorrent.com
  • 67.215.238.66
whitelisted

Threats

PID
Process
Class
Message
6380
beta
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
6380
beta
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
1144
utweb.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
1144
utweb.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
1144
utweb.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Process
Message
utweb_installer.exe
LoadingPage
utweb_installer.exe
LicensePage
utweb_installer.exe
ProductPage
utweb_installer.exe
DownloadPageISV
utweb_installer.exe
FinishPageISV
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory