File name:

utweb_installer.exe

Full analysis: https://app.any.run/tasks/9fc10e37-03f1-460a-802c-6b042192801a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 11, 2024, 12:16:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-doc
arch-html
bittorrent
loader
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

0B42472451F0741B9808C8E19FD65741

SHA1:

FFBDC75B9E2474374EC0448A217A1CC0315F875F

SHA256:

FE2815A969DB02584CAB4A95720A6A8E774CD1B30A2752355125B0804A2DD740

SSDEEP:

98304:3y7WjaQqnhXY5jhMDNL8q1xhx+OfYKGSSGC+cg6UxUx9o1cguHgTUtpz4R/EPjMS:Q+oUmG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • utweb.exe (PID: 1144)
    • BITTORRENT has been detected (SURICATA)

      • utweb.exe (PID: 1144)
    • Actions looks like stealing of personal data

      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
    • Starts application with an unusual extension

      • utweb_installer.exe (PID: 6812)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • beta (PID: 6380)
    • The process creates files with name similar to system file names

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • Process drops legitimate windows executable

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
    • Creates a software uninstall entry

      • beta (PID: 6380)
      • servicehost.exe (PID: 7688)
    • Reads security settings of Internet Explorer

      • beta (PID: 6380)
      • utweb_installer.exe (PID: 6812)
      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • uihost.exe (PID: 7424)
    • The process verifies whether the antivirus software is installed

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • installer.exe (PID: 6496)
      • cmd.exe (PID: 8756)
      • cmd.exe (PID: 8888)
      • updater.exe (PID: 8708)
    • Reads the date of Windows installation

      • utweb_installer.exe (PID: 6812)
    • Checks Windows Trust Settings

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Adds/modifies Windows certificates

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
    • Potential Corporate Privacy Violation

      • utweb.exe (PID: 1144)
    • Executes as Windows Service

      • servicehost.exe (PID: 7688)
    • Creates/Modifies COM task schedule object

      • installer.exe (PID: 5460)
    • Reads Mozilla Firefox installation path

      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
    • Hides command output

      • cmd.exe (PID: 8756)
    • Starts CMD.EXE for commands execution

      • servicehost.exe (PID: 7688)
      • updater.exe (PID: 8708)
    • Connects to unusual port

      • utweb.exe (PID: 1144)
  • INFO

    • Reads the machine GUID from the registry

      • utweb_installer.exe (PID: 6812)
      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Checks supported languages

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • helper.exe (PID: 4944)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • identity_helper.exe (PID: 7352)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • utweb.exe (PID: 8436)
      • identity_helper.exe (PID: 9028)
      • utweb.exe (PID: 2392)
      • utweb.exe (PID: 4724)
      • updater.exe (PID: 8708)
    • The sample compiled with english language support

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • msedge.exe (PID: 4056)
    • Reads the computer name

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
      • installer.exe (PID: 5460)
      • identity_helper.exe (PID: 7352)
      • servicehost.exe (PID: 7688)
      • updater.exe (PID: 8708)
      • identity_helper.exe (PID: 9028)
    • Create files in a temporary directory

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
    • Sends debugging messages

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
    • Checks proxy server information

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
    • Creates files in the program directory

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • Creates files or folders in the user directory

      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
    • Reads the software policy settings

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • The process uses the downloaded file

      • utweb_installer.exe (PID: 6812)
      • msedge.exe (PID: 2940)
    • Process checks computer location settings

      • utweb_installer.exe (PID: 6812)
      • servicehost.exe (PID: 7688)
    • Application launched itself

      • msedge.exe (PID: 1668)
      • msedge.exe (PID: 2940)
    • Manual execution by a user

      • msedge.exe (PID: 2940)
    • Reads Environment values

      • identity_helper.exe (PID: 7352)
      • identity_helper.exe (PID: 9028)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 4056)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 2940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:14 10:17:56+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 2560512
InitializedDataSize: 2708480
UninitializedDataSize: -
EntryPoint: 0x223188
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.0.13.45874
ProductVersionNumber: 3.0.13.45874
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: u Torrent Web
FileDescription: u Torrent Web
FileVersion: 3.0.13.111410
LegalCopyright: (c) u Torrent Web
ProductName: u Torrent Web
ProductVersion: 3.0.13.111410
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
213
Monitored processes
82
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
start utweb_installer.exe beta sabsi.exe #BITTORRENT utweb.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs helper.exe installer.exe installer.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs servicehost.exe uihost.exe msedge.exe no specs updater.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb.exe no specs msedge.exe no specs utweb.exe no specs utweb.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb_installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1144"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" /RUNONSTARTUPC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe
utweb_installer.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
HIGH
Description:
µTorrent Web
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\rpcrt4.dll
1580"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5652 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1668"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeutweb.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2212"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4432 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2280"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5896 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2392"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" "C:\Users\admin\Downloads\Thangalaan (2024) [1080p] [WEBRip] [x265] [10bit] [5.1] [YTS.MX].torrent" /SHELLASSOCC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exemsedge.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
MEDIUM
Description:
µTorrent Web
Exit code:
0
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\rpcrt4.dll
c:\windows\syswow64\crypt32.dll
2940"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --do-not-de-elevate --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7368 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4128"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=6800 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4336"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=7852 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
48 823
Read events
48 345
Write events
458
Delete events
20

Modification events

(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe"
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe" /S
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\uTorrent Web\uninstall.ico
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayName
Value:
uTorrent Web
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:Publisher
Value:
BitTorrent Limited
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayVersion
Value:
1.4.0
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoModify
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoRepair
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
43
Suspicious files
1 109
Text files
1 245
Unknown types
35

Dropped files

PID
Process
Filename
Type
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\UAC.dllexecutable
MD5:ADB29E6B186DAA765DC750128649B63D
SHA256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\it.langtext
MD5:8174C1F56BF731097B872A9FDF499EDF
SHA256:EC1E9FA1CD24181AEB7695BFFEF8AB782CE89962782A8E48169E1BA364D0F82F
6812utweb_installer.exeC:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI.zipcompressed
MD5:F68008B70822BD28C82D13A289DEB418
SHA256:CC6F4FAF4E8A9F4D2269D1D69A69EA326F789620FB98078CC98597F3CB998589
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\de.langtext
MD5:3ABF457A7FD0E7AB549062003EAF5E5F
SHA256:2773849568EFFA2BA7FFBF628E89C75F7887FC779C2434AEF22FBA3F88A84082
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\tr.langtext
MD5:BE11EC74C870EBE33AF130BF63A0C4B3
SHA256:C3B3BC933AA57A23F37021F1DE9DBFB61F31F18C95F55AE5B537C9D4A37F6011
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\ko.langtext
MD5:2AF29BB0F3DC916F46E1D147092707B0
SHA256:8902F99F7115494D87F4B8A4019CC82BD8D52F8F311E961C1535A61B1688C051
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\es-la.langtext
MD5:3205881F5139242227F5513E80091461
SHA256:80A398E4A040FC95F40167FF18E8866625F74FF2230C5C181E8DA985641D0C95
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\ja.langtext
MD5:DFEB12CE9BC026EE96FB3B8EF0BACA52
SHA256:B5F2D311F859E1403189EE0CC18F6B45D0EA474CE6AD17F5368D9A4EBF624748
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\pt.langtext
MD5:05D4FF65054267991CDD36FBA52E4568
SHA256:C69916FA2B4ABC31BEC44675AFD695644B23D8A33C16521873F186AE4DBDA899
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
1 968
DNS requests
348
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6788
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6380
beta
POST
200
3.81.199.252:80
http://i-4101.b-6042.utweb.bench.utorrent.com/e?i=4101
unknown
whitelisted
3224
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3224
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1144
utweb.exe
GET
200
41.63.96.130:80
http://btinstall-artifacts.bittorrent.com/helper_ui/helper_web_ui.btinstall
unknown
shared
1144
utweb.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
1144
utweb.exe
POST
200
34.227.174.173:80
http://i-4101.b-10840.utweb.bench.utorrent.com/e?i=4101&e=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
unknown
whitelisted
1144
utweb.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEA3Ry9FoZbFjnbmEXM7L0qI%3D
unknown
whitelisted
1144
utweb.exe
POST
200
34.227.174.173:80
http://i-4101.b-10840.utweb.bench.utorrent.com/e?i=4101&e=eyJldmVudE5hbWUiOiJ1dHdlYiIsImFjdGlvbiI6ImdhQmxvY2suYWJzZW50LnBhZ2Vsb2FkIiwiQlVJTERfTlVNQkVSIjoiMTA4NDAiLCJhcHBOYW1lIjoidXR3ZWIiLCJhcHBWZXJzaW9uIjoiMS40LjAuNjA0Mi4xMDg0MCIsImlzVXR3ZWIiOnRydWUsInR1dG9yaWFsVmlkZW9IYXNoTGlzdCI6WyI4MGIzOWEyZTM3YWEzNTJjZDJmY2JmYmVmN2M0YTZlOWU4Y2ZlNDM4IiwiOWEyM2JlNmM1NWQ1ZjhkMWUyODI2MGU0MDNiYWU1NDEyNDQzNTc5ZSIsIjM4ZTk3MjM0ZmQ2MGM0ZjMwMzQ0ZDlmYWU4MDg5OWE3NWZjZmJmZmUiLCI2MWIzYjg4NTZjNDgzOWVkZjUxZjVjMjM0NjU5OWI2YmVjNTI0MTQ1IiwiNTYyZTI5Yzc4MzZkYWRiY2Y1NWIzZGViZjgzMDYzMjcxNzY5Yzk0ZiJdLCJ1dWlkIjoiNTExZmI5ZDRiOWI3ZWYxMWI0ZWExOGY3Nzg2Zjk2ZWUiLCJnYUJsb2NrZXJEZXRlY3RlZCI6bnVsbCwiYmVuY2hHZW8iOiIiLCJ1dHdlYlNhbXBsZVJhdGUiOjF9
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 184.24.77.37
  • 184.24.77.35
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.bing.com
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.184
  • 104.126.37.160
  • 104.126.37.168
  • 104.126.37.163
  • 104.126.37.161
  • 104.126.37.152
  • 104.126.37.171
  • 2.23.209.144
  • 2.23.209.152
  • 2.23.209.156
  • 2.23.209.160
  • 2.23.209.157
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.177
  • 2.23.209.185
  • 2.23.209.182
  • 2.23.209.176
  • 2.23.209.178
  • 2.23.209.186
  • 2.23.209.179
  • 2.23.209.188
  • 2.23.209.173
  • 2.23.209.140
  • 2.23.209.132
  • 2.23.209.142
  • 2.23.209.131
  • 2.23.209.137
  • 2.23.209.130
  • 2.23.209.133
  • 2.23.209.136
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.72
  • 20.190.160.14
whitelisted
go.microsoft.com
  • 23.218.210.69
  • 184.28.89.167
whitelisted
d259em5jkzx24q.cloudfront.net
  • 18.66.137.230
  • 18.66.137.69
  • 18.66.137.201
  • 18.66.137.210
whitelisted
download-lb.utorrent.com
  • 67.215.238.66
whitelisted

Threats

PID
Process
Class
Message
6380
beta
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
6380
beta
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
1144
utweb.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
1144
utweb.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
1144
utweb.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Process
Message
utweb_installer.exe
LoadingPage
utweb_installer.exe
LicensePage
utweb_installer.exe
ProductPage
utweb_installer.exe
DownloadPageISV
utweb_installer.exe
FinishPageISV
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory