PUP.Bittorrent Classic

SpyHunter Detects & Remove PUP.Bittorrent Classic

Analysis Report

General information

Family Name: PUP.Bittorrent Classic
Signature status: Root Not Trusted

Known Samples

MD5: db90a1ef38c7f4be04470424c229ba2c
SHA1: 1ce366703e6df90ecbc8320b91c5a6590fc39c14
SHA256: E0A7EEB4AFFB9C76453A47DE97EC58F596F118AFFEDD424F6F2D40D54EC2632D
File Size: 281.10 KB, 281096 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name BitTorrent Limited
File Description BitTorrent Web
File Version 1.5.0.6335
Internal Name utweb
Legal Copyright (c) 2025 BitTorrent Limited All Rights Reserved.
Product Name BitTorrent Web
Product Version 1.5.0.6335

Digital Signatures

Signer Root Status
BitTorrent Inc DigiCert Trusted Root G4 Root Not Trusted

File Traits

  • Installer Manifest
  • Nullsoft Installer
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsr3c1b.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsr3c1b.tmp\nsdialogs.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsr3c1b.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsr3c1b.tmp\uac.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~nsua.tmp\un_a.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Msbsdoxg\AppData\Local\Temp\~nsuA.tmp\Un_A.exe RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Msbsdoxg\AppData\Local\Temp\~nsuA.tmp\Un_A.exe\??\C:\Users\Msbsdoxg\AppData\Local\Temp\~nsuA.tmp RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Msbsdoxg\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=c:\users\user\downloads\

Trending

Most Viewed

Loading...