{"id":20341,"date":"2024-03-12T23:03:59","date_gmt":"2024-03-12T23:03:59","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=20341"},"modified":"2024-06-27T18:44:51","modified_gmt":"2024-06-27T18:44:51","slug":"puabundlerwin32-utorrent_bundleinstaller-explained","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/puabundlerwin32-utorrent_bundleinstaller-explained\/","title":{"rendered":"PUABundler:Win32\/uTorrent_BundleInstaller"},"content":{"rendered":"<p><strong>PUABundler:Win32\/uTorrent_BundleInstaller<\/strong> is a Microsoft Defender detection that is associated with the installer of the once popular uTorrent client. It is detected by antiviruses because it contains a fair amount of additional software that is unwanted (PUA). Such programs can pose a security threat to your system. Let&#8217;s find out what&#8217;s wrong with it.<\/p>\n<h2>Why is uTorrent detected as uTorrent_BundleInstaller?<\/h2>\n<p>While being totally legitimate in its original form, uTorrent has some pitfalls to avoid. The main issue here is that it comes bundled with other software that is considered adware or <a href=\"https:\/\/gridinsoft.com\/unwanted-program\">potentially unwanted programs<\/a>. Let&#8217;s look at what I\u2019ve found during my research.<\/p>\n<p>When installing the software itself, the application contacts a third-party offer provider before getting the user&#8217;s consent:<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torr-1024x530.png\" alt=\"uTorrent Installer contacts a third-part provider\" width=\"751\" height=\"388\" class=\"aligncenter size-large wp-image-20399\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torr-1024x530.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torr-300x155.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torr-768x397.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torr-1536x795.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torr-1568x811.png 1568w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torr.png 1666w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/p>\n<p>During the installation process, it offers to install several unrelated applications. Apart from being of dubious relevance, their banners do not provide a noticeable choice between installing and declining. This format is clearly intended to confuse the user and &#8220;soft coerce&#8221; the installation. Furthermore, <a href=\"https:\/\/forum.utorrent.com\/topic\/95041-warning-epicscale-riskware-installed-with-latest-utorrent\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">users repeatedly complain<\/a> of uncoordinated software.<\/p>\n<figure id=\"attachment_20402\" aria-describedby=\"caption-attachment-20402\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/unrelated-software-1024x367.webp\" alt=\"PUABundler:Win32\/uTorrent_BundleInstaller has bundled software\" width=\"750\" height=\"269\" class=\"size-large wp-image-20402\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/unrelated-software-1024x367.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/unrelated-software-300x108.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/unrelated-software-768x275.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/unrelated-software-1536x551.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/unrelated-software-2048x734.webp 2048w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/unrelated-software-1568x562.webp 1568w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-20402\" class=\"wp-caption-text\">Unrelated software that is offered with uTorrent installation<\/figcaption><\/figure>\n<p>In addition to the mentioned problems, there is evidence that together with uTorrent additionally installed a program such as <a href=\"https:\/\/forum.utorrent.com\/topic\/95041-warning-epicscale-riskware-installed-with-latest-utorrent\/\" rel=\"noopener noreferrer nofollow\" target=\"_blanl\">EpicScale<\/a>. It uses the idle time of your computer&#8217;s processor for its own needs. The idle capacity, according to the company, is used for solving various mathematical calculations and <a href=\"https:\/\/gridinsoft.com\/coin-miner\">even mining cryptocurrencies<\/a>.<\/p>\n<h3>Large amount of adware<\/h3>\n<p>Using uTorrent is <strong>often accompanied by a lot of annoying advertising<\/strong> windows and pop-ups. <a href=\"https:\/\/gridinsoft.com\/adware\">Annoying ads appear<\/a> not only in the client window but also start to appear when using a PC. This is not only annoying for the user, but can also become a source of malware risk.<\/p>\n<figure id=\"attachment_20403\" aria-describedby=\"caption-attachment-20403\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Adware-1024x388.webp\" alt=\"Pop-ups\" width=\"750\" height=\"284\" class=\"size-large wp-image-20403\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Adware-1024x388.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Adware-300x114.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Adware-768x291.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Adware-1536x581.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Adware-1568x593.webp 1568w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Adware.webp 1897w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-20403\" class=\"wp-caption-text\">Pop-ups distributed by uTorrent<\/figcaption><\/figure>\n<p>Unwanted programs like those presented by PUABundler:Win32\/uTorrent_BundleInstaller can cause problems for users. They are especially known for changing browser settings, displaying advertisements or collecting data without their consent. In addition there is a user-confirmed fact that ads initiated by <a href=\"https:\/\/www.reddit.com\/r\/CrackWatch\/comments\/6ao38e\/warning_a_utorrent_ad_is_using_a_flash_exploit_to\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">uTorrent uses an exploit to install malware<\/a>.<\/p>\n<h3>Security vulnerabilities<\/h3>\n<p>In 2018, <a href=\"https:\/\/thehackernews.com\/2018\/02\/torrent-download-software.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">researchers discovered a vulnerability<\/a> in uTorrent&#8217;s web interface that allowed attackers to <strong>remotely execute code on a user&#8217;s computer<\/strong>. This could have been used to attack users who downloaded and ran the uTorrent client with open Internet access. <\/p>\n<pre style=\"background-color:#00454f;color:#c4fffd;font-size:14px;\">\r\n$ curl -si http:\/\/localhost:19575\/users.conf\r\nHTTP\/1.1 200 OK\r\nDate: Wed, 31 Jan 2018 19:46:44 GMT\r\nLast-Modified: Wed, 31 Jan 2018 19:37:50 GMT\r\nEtag: \"5a721b0e.92\"\r\nContent-Type: text\/plain\r\nContent-Length: 92\r\nConnection: close\r\nAccept-Ranges: bytes\r\n\r\nlocalapi29c802274dc61fb4 bc676961df0f684b13adae450a57a91cd3d92c03 94bc897965398c8a07ff 2 1\r\n<\/pre>\n<p>Of course, <strong>after the wave of complaints raised by users, this vulnerability was fixed<\/strong>. But nobody guarantees that such an incident will happen again, especially considering uTorrent&#8217;s already dubious reputation.<\/p>\n<h3>Three uTorrent Installers \u2013 Why and for What?<\/h3>\n<p>One interesting fact: on the uTorrent website you can download not one, but three different installers, all of the same version. The difference between the web and desktop versions is obvious, but there are <strong>two desktop versions<\/strong>. They are downloaded <strong>from different links<\/strong>, and the only visible difference is smaller file size.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torre-1024x270.webp\" alt=\"PUABundler:Win32\/uTorrent_BundleInstaller has different installers\" width=\"750\" height=\"198\" class=\"aligncenter size-large wp-image-20405\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torre-1024x270.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torre-300x79.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torre-768x203.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torre-1536x405.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torre-2048x540.webp 2048w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Torre-1568x414.webp 1568w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>Perhaps the difference between the three versions of the uTorrent installation file is what additional programs or changes are included in each of them. <strong>These changes may be minimal<\/strong> and may touch, for example, pre-installed settings or advertising modules included in the client. Considering that their build times differ by mere seconds, they are unlikely to come from different developers. However, even such a <strong>small change may allow you to bypass detection<\/strong> by some antivirus vendors, or at least change the detection name.<\/p>\n<h2>How to remove PUABundler:Win32\/uTorrent_BundleInstaller and unwanted programs?<\/h2>\n<p>If you have installed uTorrent and skipped the installation without paying attention to what it offers to install, it is rather probable that you have a lot of unwanted software installed in your system. Consider checking the list of installed apps and browser extensions, and <strong>remove anything you do not remember<\/strong> installing. This stuff may be related to PUABundler:Win32\/uTorrent_BundleInstaller.<\/p>\n<p>But since the unwanted programs often aim at making manual removal harder, I recommend using GridinSoft Anti-Malware.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp\" alt=\"GridinSoft Anti-Malware main screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22665\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.<\/p>\n<div style=\"text-align:center\"><a href=\"\/download\/antimalware\" class=\"btn border-black\" rel=\"nofollow\">Download Anti-Malware<\/a><\/div>\n<p>After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click \"Advanced mode\" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp\" alt=\"Scan results screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22666\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Click \"Clean Now\" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp\" alt=\"Removal finished\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22667\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n","protected":false},"excerpt":{"rendered":"<p>PUABundler:Win32\/uTorrent_BundleInstaller is a Microsoft Defender detection that is associated with the installer of the once popular uTorrent client. It is detected by antiviruses because it contains a fair amount of additional software that is unwanted (PUA). Such programs can pose a security threat to your system. Let&#8217;s find out what&#8217;s wrong with it. Why is [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":20363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[4,17],"tags":[993,474,223],"class_list":{"0":"post-20341","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips-tricks","8":"category-labs","9":"tag-torrent","10":"tag-unwanted-programs","11":"tag-windows-defender"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/GS_Blog_banner_PUABundler_Win32_uTorrent_BundleInstaller-Dangerous-Bundle-Installer_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=20341"}],"version-history":[{"count":24,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20341\/revisions"}],"predecessor-version":[{"id":23169,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20341\/revisions\/23169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/20363"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=20341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=20341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=20341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}