File name:

utweb_installer.exe

Full analysis: https://app.any.run/tasks/9fc10e37-03f1-460a-802c-6b042192801a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 11, 2024, 12:16:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-doc
arch-html
bittorrent
loader
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

0B42472451F0741B9808C8E19FD65741

SHA1:

FFBDC75B9E2474374EC0448A217A1CC0315F875F

SHA256:

FE2815A969DB02584CAB4A95720A6A8E774CD1B30A2752355125B0804A2DD740

SSDEEP:

98304:3y7WjaQqnhXY5jhMDNL8q1xhx+OfYKGSSGC+cg6UxUx9o1cguHgTUtpz4R/EPjMS:Q+oUmG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • utweb.exe (PID: 1144)
    • BITTORRENT has been detected (SURICATA)

      • utweb.exe (PID: 1144)
    • Actions looks like stealing of personal data

      • uihost.exe (PID: 7424)
      • servicehost.exe (PID: 7688)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • beta (PID: 6380)
    • Starts application with an unusual extension

      • utweb_installer.exe (PID: 6812)
    • The process creates files with name similar to system file names

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • Process drops legitimate windows executable

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
    • Creates a software uninstall entry

      • beta (PID: 6380)
      • servicehost.exe (PID: 7688)
    • Reads security settings of Internet Explorer

      • beta (PID: 6380)
      • utweb_installer.exe (PID: 6812)
      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • uihost.exe (PID: 7424)
    • The process verifies whether the antivirus software is installed

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • installer.exe (PID: 6496)
      • cmd.exe (PID: 8756)
      • cmd.exe (PID: 8888)
      • updater.exe (PID: 8708)
    • Reads the date of Windows installation

      • utweb_installer.exe (PID: 6812)
    • Potential Corporate Privacy Violation

      • utweb.exe (PID: 1144)
    • Adds/modifies Windows certificates

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
    • Checks Windows Trust Settings

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Creates/Modifies COM task schedule object

      • installer.exe (PID: 5460)
    • Executes as Windows Service

      • servicehost.exe (PID: 7688)
    • Reads Mozilla Firefox installation path

      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
    • Starts CMD.EXE for commands execution

      • updater.exe (PID: 8708)
      • servicehost.exe (PID: 7688)
    • Hides command output

      • cmd.exe (PID: 8756)
    • Connects to unusual port

      • utweb.exe (PID: 1144)
  • INFO

    • Reads the computer name

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • helper.exe (PID: 4944)
      • identity_helper.exe (PID: 7352)
      • servicehost.exe (PID: 7688)
      • updater.exe (PID: 8708)
      • identity_helper.exe (PID: 9028)
    • Checks supported languages

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
      • installer.exe (PID: 5460)
      • installer.exe (PID: 6496)
      • identity_helper.exe (PID: 7352)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
      • utweb.exe (PID: 2392)
      • utweb.exe (PID: 4724)
      • utweb.exe (PID: 8436)
      • identity_helper.exe (PID: 9028)
    • Sends debugging messages

      • utweb_installer.exe (PID: 6812)
      • installer.exe (PID: 5460)
      • saBSI.exe (PID: 6188)
    • Checks proxy server information

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
    • Reads the machine GUID from the registry

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • The sample compiled with english language support

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • msedge.exe (PID: 4056)
    • Create files in a temporary directory

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
    • Reads the software policy settings

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Creates files or folders in the user directory

      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
    • Process checks computer location settings

      • utweb_installer.exe (PID: 6812)
      • servicehost.exe (PID: 7688)
    • Creates files in the program directory

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • The process uses the downloaded file

      • utweb_installer.exe (PID: 6812)
      • msedge.exe (PID: 2940)
    • Application launched itself

      • msedge.exe (PID: 1668)
      • msedge.exe (PID: 2940)
    • Manual execution by a user

      • msedge.exe (PID: 2940)
    • Reads Environment values

      • identity_helper.exe (PID: 7352)
      • identity_helper.exe (PID: 9028)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 2940)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 4056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:14 10:17:56+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 2560512
InitializedDataSize: 2708480
UninitializedDataSize: -
EntryPoint: 0x223188
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.0.13.45874
ProductVersionNumber: 3.0.13.45874
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: u Torrent Web
FileDescription: u Torrent Web
FileVersion: 3.0.13.111410
LegalCopyright: (c) u Torrent Web
ProductName: u Torrent Web
ProductVersion: 3.0.13.111410
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
213
Monitored processes
82
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
start utweb_installer.exe beta sabsi.exe #BITTORRENT utweb.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs helper.exe installer.exe installer.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs servicehost.exe uihost.exe msedge.exe no specs updater.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb.exe no specs msedge.exe no specs utweb.exe no specs utweb.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb_installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1144"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" /RUNONSTARTUPC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe
utweb_installer.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
HIGH
Description:
µTorrent Web
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\rpcrt4.dll
1580"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5652 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1668"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeutweb.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2212"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4432 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2280"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5896 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2392"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" "C:\Users\admin\Downloads\Thangalaan (2024) [1080p] [WEBRip] [x265] [10bit] [5.1] [YTS.MX].torrent" /SHELLASSOCC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exemsedge.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
MEDIUM
Description:
µTorrent Web
Exit code:
0
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\rpcrt4.dll
c:\windows\syswow64\crypt32.dll
2940"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --do-not-de-elevate --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7368 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4128"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=6800 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4336"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=7852 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
48 823
Read events
48 345
Write events
458
Delete events
20

Modification events

(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe"
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe" /S
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\uTorrent Web\uninstall.ico
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayName
Value:
uTorrent Web
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:Publisher
Value:
BitTorrent Limited
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayVersion
Value:
1.4.0
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoModify
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoRepair
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
43
Suspicious files
1 109
Text files
1 245
Unknown types
35

Dropped files

PID
Process
Filename
Type
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\webui\version.txttext
MD5:646301F56A97AABEE83F521011A15A97
SHA256:5EA8BEFF4EB03A1AEAE8E4645FBE1536171BA059EDF48D05ABBD90D6B4FE33FE
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\UAC.dllexecutable
MD5:ADB29E6B186DAA765DC750128649B63D
SHA256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\es-la.langtext
MD5:3205881F5139242227F5513E80091461
SHA256:80A398E4A040FC95F40167FF18E8866625F74FF2230C5C181E8DA985641D0C95
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\pt.langtext
MD5:05D4FF65054267991CDD36FBA52E4568
SHA256:C69916FA2B4ABC31BEC44675AFD695644B23D8A33C16521873F186AE4DBDA899
6812utweb_installer.exeC:\Users\admin\AppData\Local\Temp\ISV5595.tmp\betaexecutable
MD5:F90AC5C11AA97726788246A120FD2550
SHA256:CAD49B1006DA8A23994531B755BEB3833542ED73CDE2C0A4882887EF8A1588E5
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\fr.langtext
MD5:11A3F9F9D7F238D2B1E8D7699DBAFF02
SHA256:53656932C41719FCD2B809CC3FB84F40EC39DB344E527450D8A830E271E49A28
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\FindProcDLL.dllexecutable
MD5:B4FAF654DE4284A89EAF7D073E4E1E63
SHA256:C0948B2EC36A69F82C08935FAC4B212238B6792694F009B93B4BDB478C4F26E3
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\it.langtext
MD5:8174C1F56BF731097B872A9FDF499EDF
SHA256:EC1E9FA1CD24181AEB7695BFFEF8AB782CE89962782A8E48169E1BA364D0F82F
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\ja.langtext
MD5:DFEB12CE9BC026EE96FB3B8EF0BACA52
SHA256:B5F2D311F859E1403189EE0CC18F6B45D0EA474CE6AD17F5368D9A4EBF624748
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
1 968
DNS requests
348
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
524
svchost.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
524
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6788
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6380
beta
POST
200
3.81.199.252:80
http://i-4101.b-6042.utweb.bench.utorrent.com/e?i=4101
unknown
whitelisted
6380
beta
POST
200
3.81.199.252:80
http://i-4101.b-6042.utweb.bench.utorrent.com/e?i=4101
unknown
whitelisted
3224
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 184.24.77.37
  • 184.24.77.35
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.bing.com
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.184
  • 104.126.37.160
  • 104.126.37.168
  • 104.126.37.163
  • 104.126.37.161
  • 104.126.37.152
  • 104.126.37.171
  • 2.23.209.144
  • 2.23.209.152
  • 2.23.209.156
  • 2.23.209.160
  • 2.23.209.157
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.177
  • 2.23.209.185
  • 2.23.209.182
  • 2.23.209.176
  • 2.23.209.178
  • 2.23.209.186
  • 2.23.209.179
  • 2.23.209.188
  • 2.23.209.173
  • 2.23.209.140
  • 2.23.209.132
  • 2.23.209.142
  • 2.23.209.131
  • 2.23.209.137
  • 2.23.209.130
  • 2.23.209.133
  • 2.23.209.136
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.72
  • 20.190.160.14
whitelisted
go.microsoft.com
  • 23.218.210.69
  • 184.28.89.167
whitelisted
d259em5jkzx24q.cloudfront.net
  • 18.66.137.230
  • 18.66.137.69
  • 18.66.137.201
  • 18.66.137.210
whitelisted
download-lb.utorrent.com
  • 67.215.238.66
whitelisted

Threats

PID
Process
Class
Message
6380
beta
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
6380
beta
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
1144
utweb.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
1144
utweb.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
1144
utweb.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
6096
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Process
Message
utweb_installer.exe
LoadingPage
utweb_installer.exe
LicensePage
utweb_installer.exe
ProductPage
utweb_installer.exe
DownloadPageISV
utweb_installer.exe
FinishPageISV
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory