File name:

utweb_installer.exe

Full analysis: https://app.any.run/tasks/9fc10e37-03f1-460a-802c-6b042192801a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 11, 2024, 12:16:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-doc
arch-html
bittorrent
loader
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

0B42472451F0741B9808C8E19FD65741

SHA1:

FFBDC75B9E2474374EC0448A217A1CC0315F875F

SHA256:

FE2815A969DB02584CAB4A95720A6A8E774CD1B30A2752355125B0804A2DD740

SSDEEP:

98304:3y7WjaQqnhXY5jhMDNL8q1xhx+OfYKGSSGC+cg6UxUx9o1cguHgTUtpz4R/EPjMS:Q+oUmG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • utweb.exe (PID: 1144)
    • BITTORRENT has been detected (SURICATA)

      • utweb.exe (PID: 1144)
    • Actions looks like stealing of personal data

      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • utweb_installer.exe (PID: 6812)
    • Executable content was dropped or overwritten

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • beta (PID: 6380)
    • The process creates files with name similar to system file names

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • Reads security settings of Internet Explorer

      • beta (PID: 6380)
      • utweb_installer.exe (PID: 6812)
      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • uihost.exe (PID: 7424)
    • Process drops legitimate windows executable

      • beta (PID: 6380)
      • installer.exe (PID: 5460)
    • Creates a software uninstall entry

      • beta (PID: 6380)
      • servicehost.exe (PID: 7688)
    • The process verifies whether the antivirus software is installed

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
      • installer.exe (PID: 6496)
      • updater.exe (PID: 8708)
      • cmd.exe (PID: 8888)
      • cmd.exe (PID: 8756)
    • Reads the date of Windows installation

      • utweb_installer.exe (PID: 6812)
    • Adds/modifies Windows certificates

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
    • Checks Windows Trust Settings

      • utweb.exe (PID: 1144)
      • saBSI.exe (PID: 6188)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • installer.exe (PID: 5460)
      • updater.exe (PID: 8708)
    • Potential Corporate Privacy Violation

      • utweb.exe (PID: 1144)
    • Creates/Modifies COM task schedule object

      • installer.exe (PID: 5460)
    • Executes as Windows Service

      • servicehost.exe (PID: 7688)
    • Reads Mozilla Firefox installation path

      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
    • Starts CMD.EXE for commands execution

      • updater.exe (PID: 8708)
      • servicehost.exe (PID: 7688)
    • Hides command output

      • cmd.exe (PID: 8756)
    • Connects to unusual port

      • utweb.exe (PID: 1144)
  • INFO

    • Reads the computer name

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • helper.exe (PID: 4944)
      • identity_helper.exe (PID: 7352)
      • updater.exe (PID: 8708)
      • servicehost.exe (PID: 7688)
      • identity_helper.exe (PID: 9028)
    • Reads the machine GUID from the registry

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • servicehost.exe (PID: 7688)
      • installer.exe (PID: 5460)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • Checks proxy server information

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
    • Sends debugging messages

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 5460)
    • Checks supported languages

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • saBSI.exe (PID: 6188)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • helper.exe (PID: 4944)
      • servicehost.exe (PID: 7688)
      • identity_helper.exe (PID: 7352)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
      • utweb.exe (PID: 2392)
      • utweb.exe (PID: 8436)
      • identity_helper.exe (PID: 9028)
      • utweb.exe (PID: 4724)
    • The sample compiled with english language support

      • utweb_installer.exe (PID: 6812)
      • beta (PID: 6380)
      • installer.exe (PID: 6496)
      • utweb.exe (PID: 1144)
      • installer.exe (PID: 5460)
      • msedge.exe (PID: 4056)
    • Create files in a temporary directory

      • utweb_installer.exe (PID: 6812)
      • saBSI.exe (PID: 6188)
      • beta (PID: 6380)
    • Creates files or folders in the user directory

      • beta (PID: 6380)
      • utweb.exe (PID: 1144)
      • helper.exe (PID: 4944)
    • Creates files in the program directory

      • saBSI.exe (PID: 6188)
      • installer.exe (PID: 6496)
      • installer.exe (PID: 5460)
      • servicehost.exe (PID: 7688)
    • Reads the software policy settings

      • saBSI.exe (PID: 6188)
      • utweb_installer.exe (PID: 6812)
      • installer.exe (PID: 5460)
      • utweb.exe (PID: 1144)
      • servicehost.exe (PID: 7688)
      • uihost.exe (PID: 7424)
      • updater.exe (PID: 8708)
    • The process uses the downloaded file

      • utweb_installer.exe (PID: 6812)
      • msedge.exe (PID: 2940)
    • Application launched itself

      • msedge.exe (PID: 1668)
      • msedge.exe (PID: 2940)
    • Manual execution by a user

      • msedge.exe (PID: 2940)
    • Process checks computer location settings

      • utweb_installer.exe (PID: 6812)
      • servicehost.exe (PID: 7688)
    • Reads Environment values

      • identity_helper.exe (PID: 7352)
      • identity_helper.exe (PID: 9028)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 2940)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 4056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:14 10:17:56+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 2560512
InitializedDataSize: 2708480
UninitializedDataSize: -
EntryPoint: 0x223188
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.0.13.45874
ProductVersionNumber: 3.0.13.45874
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: u Torrent Web
FileDescription: u Torrent Web
FileVersion: 3.0.13.111410
LegalCopyright: (c) u Torrent Web
ProductName: u Torrent Web
ProductVersion: 3.0.13.111410
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
213
Monitored processes
82
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
start utweb_installer.exe beta sabsi.exe #BITTORRENT utweb.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs helper.exe installer.exe installer.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs servicehost.exe uihost.exe msedge.exe no specs updater.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb.exe no specs msedge.exe no specs utweb.exe no specs utweb.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs utweb_installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1144"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" /RUNONSTARTUPC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe
utweb_installer.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
HIGH
Description:
µTorrent Web
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\rpcrt4.dll
1580"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5652 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1668"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeutweb.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2212"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4432 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2280"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5896 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2392"C:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exe" "C:\Users\admin\Downloads\Thangalaan (2024) [1080p] [WEBRip] [x265] [10bit] [5.1] [YTS.MX].torrent" /SHELLASSOCC:\Users\admin\AppData\Roaming\uTorrent Web\utweb.exemsedge.exe
User:
admin
Company:
BitTorrent Limited
Integrity Level:
MEDIUM
Description:
µTorrent Web
Exit code:
0
Version:
1.4.0.6042
Modules
Images
c:\users\admin\appdata\roaming\utorrent web\utweb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\rpcrt4.dll
c:\windows\syswow64\crypt32.dll
2940"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --do-not-de-elevate --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.6042&firstrun=1&localauth=localapi805a8cb1ee43363d:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7368 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4128"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=6800 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4336"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=7852 --field-trial-handle=2436,i,8972483241377768233,12431165532050580171,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
48 823
Read events
48 345
Write events
458
Delete events
20

Modification events

(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe"
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\uTorrent Web\Uninstall.exe" /S
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\uTorrent Web\uninstall.ico
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayName
Value:
uTorrent Web
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:Publisher
Value:
BitTorrent Limited
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:DisplayVersion
Value:
1.4.0
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoModify
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\utweb
Operation:writeName:NoRepair
Value:
1
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6380) betaKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
43
Suspicious files
1 109
Text files
1 245
Unknown types
35

Dropped files

PID
Process
Filename
Type
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\FindProcDLL.dllexecutable
MD5:B4FAF654DE4284A89EAF7D073E4E1E63
SHA256:C0948B2EC36A69F82C08935FAC4B212238B6792694F009B93B4BDB478C4F26E3
6380betaC:\Users\admin\AppData\Local\Temp\nsqA58B.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\it.langtext
MD5:8174C1F56BF731097B872A9FDF499EDF
SHA256:EC1E9FA1CD24181AEB7695BFFEF8AB782CE89962782A8E48169E1BA364D0F82F
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\nl.langtext
MD5:9B98CF7C75589E5B1939B6E32054DC34
SHA256:3A54E4B49EDC588E5E8AA1BB7BF6BAE19B98935C0D10CB0024071BC10D5271F5
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\ru.langtext
MD5:B5171E547C00802760E2497ACF036590
SHA256:35B50DCA884BF00627C242DC5F696DEACA46302CD695D2B86DADAB2D9FF7B905
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\pt.langtext
MD5:05D4FF65054267991CDD36FBA52E4568
SHA256:C69916FA2B4ABC31BEC44675AFD695644B23D8A33C16521873F186AE4DBDA899
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\zh-tw.langtext
MD5:00DD6BE1DFB987C4722FDB3AAEDDA230
SHA256:C0FD072B126A9589BF6DFDD3F66B6D63DE64A7F19DD527AC331AA071E2480058
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\fr.langtext
MD5:11A3F9F9D7F238D2B1E8D7699DBAFF02
SHA256:53656932C41719FCD2B809CC3FB84F40EC39DB344E527450D8A830E271E49A28
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\pl.langtext
MD5:C286292F897E4120E2F498A420516C8F
SHA256:AEC6B6070D50D4B2823132715755A34E0D9F5FC1F11E92BA6811C407F8911B87
6380betaC:\Users\admin\AppData\Roaming\uTorrent Web\localization\zh-cn.langtext
MD5:6B4F572DE7874993B6B3ACA76D341F35
SHA256:C239CF4FBAE53D40A9CB202F4E561C1E83F8B68212CC654BC1E9C585423A3ABA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
1 968
DNS requests
348
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1144
utweb.exe
POST
200
34.227.174.173:80
http://i-4101.b-10840.utweb.bench.utorrent.com/e?i=4101&e=eyJldmVudE5hbWUiOiJ1dHdlYiIsImFjdGlvbiI6ImFkQmxvY2suYWJzZW50LnBhZ2Vsb2FkIiwiQlVJTERfTlVNQkVSIjoiMTA4NDAiLCJhcHBOYW1lIjoidXR3ZWIiLCJhcHBWZXJzaW9uIjoiMS40LjAuNjA0Mi4xMDg0MCIsImlzVXR3ZWIiOnRydWUsInR1dG9yaWFsVmlkZW9IYXNoTGlzdCI6WyI4MGIzOWEyZTM3YWEzNTJjZDJmY2JmYmVmN2M0YTZlOWU4Y2ZlNDM4IiwiOWEyM2JlNmM1NWQ1ZjhkMWUyODI2MGU0MDNiYWU1NDEyNDQzNTc5ZSIsIjM4ZTk3MjM0ZmQ2MGM0ZjMwMzQ0ZDlmYWU4MDg5OWE3NWZjZmJmZmUiLCI2MWIzYjg4NTZjNDgzOWVkZjUxZjVjMjM0NjU5OWI2YmVjNTI0MTQ1IiwiNTYyZTI5Yzc4MzZkYWRiY2Y1NWIzZGViZjgzMDYzMjcxNzY5Yzk0ZiJdLCJ1dWlkIjoiNTExZmI5ZDRiOWI3ZWYxMWI0ZWExOGY3Nzg2Zjk2ZWUiLCJnYUJsb2NrZXJEZXRlY3RlZCI6ZmFsc2UsImJlbmNoR2VvIjoiIiwidXR3ZWJTYW1wbGVSYXRlIjoxfQ==
unknown
whitelisted
1144
utweb.exe
POST
200
3.209.210.156:80
http://i-4101.b-10840.utweb_ui.bench.utorrent.com/e?i=4101&e=eyJhY3Rpb24iOiJ2MS4xMDg0MC5kZS5wYWdldmlldy5wbGFjZWhvbGRlci5wbGFjZWhvbGRlci5wbGFjZWhvbGRlciIsImFwcE5hbWUiOiJ1dHdlYiIsImFwcFZlcnNpb24iOiIxLjQuMC42MDQyLjEwODQwIiwiaXNVdHdlYiI6dHJ1ZSwidHV0b3JpYWxWaWRlb0hhc2hMaXN0IjpbIjgwYjM5YTJlMzdhYTM1MmNkMmZjYmZiZWY3YzRhNmU5ZThjZmU0MzgiLCI5YTIzYmU2YzU1ZDVmOGQxZTI4MjYwZTQwM2JhZTU0MTI0NDM1NzllIiwiMzhlOTcyMzRmZDYwYzRmMzAzNDRkOWZhZTgwODk5YTc1ZmNmYmZmZSIsIjYxYjNiODg1NmM0ODM5ZWRmNTFmNWMyMzQ2NTk5YjZiZWM1MjQxNDUiLCI1NjJlMjljNzgzNmRhZGJjZjU1YjNkZWJmODMwNjMyNzE3NjljOTRmIl0sInV1aWQiOiI1MTFmYjlkNGI5YjdlZjExYjRlYTE4Zjc3ODZmOTZlZSIsImJlbmNoR2VvIjoiZGUiLCJ1dHdlYlNhbXBsZVJhdGUiOjEsImdhQmxvY2tlckRldGVjdGVkIjpudWxsLCJuYW1lIjoidDAiLCJ0cmFja2luZ0lkIjoiVUEtODg2OTgxMDItMTAiLCJjb29raWVOYW1lIjoiX2dhIiwiY29va2llRG9tYWluIjoicmFpbmJlcnJ5dHYuY29tIiwiY29va2llUGF0aCI6Ii8iLCJjb29raWVFeHBpcmVzIjo2MzA3MjAwMCwibGVnYWN5SGlzdG9yeUltcG9ydCI6dHJ1ZSwiYWxsb3dMaW5rZXIiOmZhbHNlLCJhbGxvd0FuY2hvciI6dHJ1ZSwic2FtcGxlUmF0ZSI6MTAwLCJzaXRlU3BlZWRTYW1wbGVSYXRlIjoxLCJhbHdheXNTZW5kUmVmZXJyZXIiOmZhbHNlLCJzdG9yYWdlIjoiY29va2llIiwiX2dlIjp0cnVlLCJhcGlWZXJzaW9uIjoxLCJjbGllbnRWZXJzaW9uIjoiajU2IiwiX2djbiI6Il9naWQiLCJjbGllbnRJZCI6Ijk0MDY1NTIxLjE3MzM5MTk0MjkiLCJfZ2lkIjoiNjM2OTQ0OTg4LjE3MzM5MTk0MjkiLCJsb2NhdGlvbiI6Imh0dHBzOi8vdXR3ZWIucmFpbmJlcnJ5dHYuY29tL2d1aS9pbmRleC5odG1sP3Y9MS40LjAuNjA0MiIsInNjcmVlblJlc29sdXRpb24iOiIxMjgweDcyMCIsInNjcmVlbkNvbG9ycyI6IjI0LWJpdCIsInZpZXdwb3J0U2l6ZSI6IjEyNzJ4NjA2IiwiZW5jb2RpbmciOiJVVEYtOCIsImphdmFFbmFibGVkIjpmYWxzZSwibGFuZ3VhZ2UiOiJlbi11cyIsImFkU2Vuc2VJZCI6MTg4MjMzNDg4MCwiZGltZW5zaW9uMSI6Ijk0MDY1NTIxLjE3MzM5MTk0MjkiLCJkaW1lbnNpb242IjoxLCJ0aXRsZSI6Is68VG9ycmVudCBXZWIiLCJzY3JlZW5OYW1lIjoiZGFzaGJvYXJkIiwicGFnZSI6Ii9kYXNoYm9hcmQiLCJkaW1lbnNpb24yIjoxNzMzOTE5NDI5MTUyLCJkaW1lbnNpb24zIjowLCJkaW1lbnNpb243IjoiNTExZmI5ZDRiOWI3ZWYxMWI0ZWExOGY3Nzg2Zjk2ZWUiLCJoaXRUeXBlIjoicGFnZXZpZXciLCJfdGkiOjE3MzM5MTk0MjkyNTQsIl90byI6MTksIl9oYyI6MSwiX2oxIjoiMTA2NjY2OTY0MCIsIl9qMiI6Ijg3MDQwMTQ4NCIsIl9yIjoxLCJ0cmFuc3BvcnRVcmwiOiJodHRwczovL3d3dy5nb29nbGUtYW5hbHl0aWNzLmNvbS9yL2NvbGxlY3QiLCJfcyI6MSwiZXZlbnROYW1lIjoidXR3ZWJfdWkiLCJCVUlMRF9OVU1CRVIiOiIxMDg0MCJ9
unknown
whitelisted
1144
utweb.exe
POST
200
3.209.210.156:80
http://i-4101.b-10840.utweb_ui.bench.utorrent.com/e?i=4101&e=eyJhY3Rpb24iOiJ2MS4xMDg0MC5kZS51c2VyLnBsYWNlaG9sZGVyLjE3MzM5MTk0Mjc4ODEucGxhY2Vob2xkZXIiLCJhcHBOYW1lIjoidXR3ZWIiLCJhcHBWZXJzaW9uIjoiMS40LjAuNjA0Mi4xMDg0MCIsImlzVXR3ZWIiOnRydWUsInR1dG9yaWFsVmlkZW9IYXNoTGlzdCI6WyI4MGIzOWEyZTM3YWEzNTJjZDJmY2JmYmVmN2M0YTZlOWU4Y2ZlNDM4IiwiOWEyM2JlNmM1NWQ1ZjhkMWUyODI2MGU0MDNiYWU1NDEyNDQzNTc5ZSIsIjM4ZTk3MjM0ZmQ2MGM0ZjMwMzQ0ZDlmYWU4MDg5OWE3NWZjZmJmZmUiLCI2MWIzYjg4NTZjNDgzOWVkZjUxZjVjMjM0NjU5OWI2YmVjNTI0MTQ1IiwiNTYyZTI5Yzc4MzZkYWRiY2Y1NWIzZGViZjgzMDYzMjcxNzY5Yzk0ZiJdLCJ1dWlkIjoiNTExZmI5ZDRiOWI3ZWYxMWI0ZWExOGY3Nzg2Zjk2ZWUiLCJiZW5jaEdlbyI6ImRlIiwidXR3ZWJTYW1wbGVSYXRlIjoxLCJnYUJsb2NrZXJEZXRlY3RlZCI6bnVsbCwibmFtZSI6InQwIiwidHJhY2tpbmdJZCI6IlVBLTg4Njk4MTAyLTEwIiwiY29va2llTmFtZSI6Il9nYSIsImNvb2tpZURvbWFpbiI6InJhaW5iZXJyeXR2LmNvbSIsImNvb2tpZVBhdGgiOiIvIiwiY29va2llRXhwaXJlcyI6NjMwNzIwMDAsImxlZ2FjeUhpc3RvcnlJbXBvcnQiOnRydWUsImFsbG93TGlua2VyIjpmYWxzZSwiYWxsb3dBbmNob3IiOnRydWUsInNhbXBsZVJhdGUiOjEwMCwic2l0ZVNwZWVkU2FtcGxlUmF0ZSI6MSwiYWx3YXlzU2VuZFJlZmVycmVyIjpmYWxzZSwic3RvcmFnZSI6ImNvb2tpZSIsIl9nZSI6dHJ1ZSwiYXBpVmVyc2lvbiI6MSwiY2xpZW50VmVyc2lvbiI6Imo1NiIsIl9nY24iOiJfZ2lkIiwiY2xpZW50SWQiOiI5NDA2NTUyMS4xNzMzOTE5NDI5IiwiX2dpZCI6IjYzNjk0NDk4OC4xNzMzOTE5NDI5IiwibG9jYXRpb24iOiJodHRwczovL3V0d2ViLnJhaW5iZXJyeXR2LmNvbS9ndWkvaW5kZXguaHRtbD92PTEuNC4wLjYwNDIiLCJzY3JlZW5SZXNvbHV0aW9uIjoiMTI4MHg3MjAiLCJzY3JlZW5Db2xvcnMiOiIyNC1iaXQiLCJ2aWV3cG9ydFNpemUiOiIxMjcyeDYwNiIsImVuY29kaW5nIjoiVVRGLTgiLCJqYXZhRW5hYmxlZCI6ZmFsc2UsImxhbmd1YWdlIjoiZW4tdXMiLCJhZFNlbnNlSWQiOjE4ODIzMzQ4ODAsImRpbWVuc2lvbjEiOiI5NDA2NTUyMS4xNzMzOTE5NDI5IiwiZGltZW5zaW9uNiI6MSwidGl0bGUiOiLOvFRvcnJlbnQgV2ViIiwic2NyZWVuTmFtZSI6ImRhc2hib2FyZCIsInBhZ2UiOiIvZGFzaGJvYXJkIiwiZGltZW5zaW9uMiI6MTczMzkxOTQyOTE1NCwiZGltZW5zaW9uMyI6MCwiZGltZW5zaW9uNyI6IjUxMWZiOWQ0YjliN2VmMTFiNGVhMThmNzc4NmY5NmVlIiwiaGl0VHlwZSI6ImV2ZW50IiwiX3RpIjoxNzMzOTE5NDI5MjU0LCJfdG8iOjE4LCJfaGMiOjIsIl9qMSI6IiIsIl9qMiI6IiIsIl9zIjoyLCJldmVudENhdGVnb3J5IjoidXNlciIsImV2ZW50QWN0aW9uIjoiZmlyc3RfcnVuIiwiZXZlbnRMYWJlbCI6MTczMzkxOTQyNzg4MSwiZXZlbnROYW1lIjoidXR3ZWJfdWkiLCJCVUlMRF9OVU1CRVIiOiIxMDg0MCJ9
unknown
whitelisted
1144
utweb.exe
POST
200
3.209.210.156:80
http://i-4101.b-10840.utweb_ui.bench.utorrent.com/e?i=4101&e=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
unknown
whitelisted
1144
utweb.exe
POST
200
3.209.210.156:80
http://i-4101.b-10840.utweb_ui.bench.utorrent.com/e?i=4101&e=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
unknown
whitelisted
524
svchost.exe
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
524
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
524
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 184.24.77.37
  • 184.24.77.35
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.bing.com
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.184
  • 104.126.37.160
  • 104.126.37.168
  • 104.126.37.163
  • 104.126.37.161
  • 104.126.37.152
  • 104.126.37.171
  • 2.23.209.144
  • 2.23.209.152
  • 2.23.209.156
  • 2.23.209.160
  • 2.23.209.157
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.177
  • 2.23.209.185
  • 2.23.209.182
  • 2.23.209.176
  • 2.23.209.178
  • 2.23.209.186
  • 2.23.209.179
  • 2.23.209.188
  • 2.23.209.173
  • 2.23.209.140
  • 2.23.209.132
  • 2.23.209.142
  • 2.23.209.131
  • 2.23.209.137
  • 2.23.209.130
  • 2.23.209.133
  • 2.23.209.136
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.76
  • 40.126.32.72
  • 20.190.160.14
whitelisted
go.microsoft.com
  • 23.218.210.69
  • 184.28.89.167
whitelisted
d259em5jkzx24q.cloudfront.net
  • 18.66.137.230
  • 18.66.137.69
  • 18.66.137.201
  • 18.66.137.210
whitelisted
download-lb.utorrent.com
  • 67.215.238.66
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Process
Message
utweb_installer.exe
LoadingPage
utweb_installer.exe
LicensePage
utweb_installer.exe
ProductPage
utweb_installer.exe
DownloadPageISV
utweb_installer.exe
FinishPageISV
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\ISV5595.tmp\saBSI\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory