File name:

uTorria-a4311570.exe

Full analysis: https://app.any.run/tasks/7c6785a1-9df3-45c9-bd1f-7ec1268c0328
Verdict: Malicious activity
Analysis date: April 23, 2026, 18:05:40
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 3 sections
MD5:

2C54DBD9AB33150BC490C3759EED6E50

SHA1:

19A3E319F9765FA8C61A0268BC1D0E2EE38D70B0

SHA256:

74957701DDC79294A7B68C596479AC91364D04B8F60AF7DFF0922EF7FE1C8E21

SSDEEP:

98304:DJh2zPIOT2Ro631U32iWqik+/dXJ1WuRd8yz6FIRuQwiDLxv1ToKxLxrRbMUlQQ+:7Djppobik1zWcuAr5njJ5jFEC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • uTorria-a4311570.exe (PID: 7476)
      • uTorria-a4311570.exe (PID: 2432)
  • SUSPICIOUS

    • Application launched itself

      • uTorria-a4311570.exe (PID: 7476)
    • Reads the date of Windows installation

      • uTorria-a4311570.exe (PID: 7476)
  • INFO

    • Checks supported languages

      • uTorria-a4311570.exe (PID: 7476)
      • uTorria-a4311570.exe (PID: 2432)
    • The sample compiled with english language support

      • uTorria-a4311570.exe (PID: 7476)
    • Reads the computer name

      • uTorria-a4311570.exe (PID: 7476)
      • uTorria-a4311570.exe (PID: 2432)
    • Launching a file from a Registry key

      • uTorria-a4311570.exe (PID: 7476)
      • uTorria-a4311570.exe (PID: 2432)
    • Process checks computer location settings

      • uTorria-a4311570.exe (PID: 7476)
    • Reads security settings of Internet Explorer

      • uTorria-a4311570.exe (PID: 7476)
    • There is functionality for taking screenshot (YARA)

      • uTorria-a4311570.exe (PID: 2432)
    • UPX packer has been detected

      • uTorria-a4311570.exe (PID: 2432)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:11:07 18:10:05+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 13041664
InitializedDataSize: 438272
UninitializedDataSize: 21684224
EntryPoint: 0x211cf90
OSVersion: 6
ImageVersion: 1
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.3.14
ProductVersionNumber: 1.0.3.14
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: uTorria
FileVersion: 1.0.3.14
LegalTrademarks1: All Rights Reserved
LegalTrademarks2: All Rights Reserved
OriginalFileName: uTorria.exe
ProductName: uTorria
ProductVersion: 1
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
2
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start utorria-a4311570.exe utorria-a4311570.exe

Process information

PID
CMD
Path
Indicators
Parent process
2432"C:\Users\admin\AppData\Local\Temp\uTorria-a4311570.exe" -install posX=1358 posY=339 C:\Users\admin\AppData\Local\Temp\uTorria-a4311570.exeC:\Users\admin\AppData\Local\Temp\uTorria-a4311570.exe
uTorria-a4311570.exe
User:
admin
Company:
uTorria
Integrity Level:
HIGH
Version:
1.0.3.14
Modules
Images
c:\users\admin\appdata\local\temp\utorria-a4311570.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7476"C:\Users\admin\AppData\Local\Temp\uTorria-a4311570.exe" C:\Users\admin\AppData\Local\Temp\uTorria-a4311570.exe
explorer.exe
User:
admin
Company:
uTorria
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.3.14
Modules
Images
c:\users\admin\appdata\local\temp\utorria-a4311570.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
2 798
Read events
2 777
Write events
19
Delete events
2

Modification events

(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\uTorria\main
Operation:writeName:associateWithUtorria
Value:
true
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CLASSES_ROOT\Applications
Operation:delete valueName:uTorria.exe
Value:
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
141
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\uTorria\main
Operation:writeName:visibility
Value:
2
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\uTorria\main
Operation:writeName:windowRect
Value:
@Rect(-3 0 1366 748)
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\uTorria\main
Operation:writeName:AllowNotify
Value:
1
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\uTorria\main
Operation:writeName:closeToTray
Value:
true
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\uTorria\main
Operation:writeName:installAppDir
Value:
C:\Program Files\uTorria\
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:uTorria
Value:
"C:\Program Files\uTorria\uTorria.exe" /autostart
(PID) Process:(7476) uTorria-a4311570.exeKey:HKEY_CURRENT_USER\SOFTWARE\uTorria\main
Operation:writeName:saveDir
Value:
C:/uTorria/Downloads/
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2432uTorria-a4311570.exeC:\ProgramData\uTorria\uTorriaInstallera4311570.txttext
MD5:5C71B315DC96BA41EDB64614A3B7F968
SHA256:9253A4708773862F482DA7BDC868767E09C94222294B806CAD07CADF8D91DC4E
7476uTorria-a4311570.exeC:\ProgramData\uTorria\log\23042026_14_05_46\7476.logtext
MD5:0C61A48C05CF6BC13E953F2F449EAD85
SHA256:A80C79A4DC857B4D2647320F20ABE2C9C100E5748A5B7F8604A81AF66D4921A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
28
DNS requests
17
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5276
MoUsoCoreWorker.exe
GET
304
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3094&FlightIds=&UpdateOfferedDays=4294967295&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&sku=48&ActivationChannel=Retail&AttrDataVer=186&IsMDMEnrolled=0&ProcessorCores=6&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&TotalPhysicalRAM=6144&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&UpdateServiceUrl=http%3A%2F%2Fneverupdatewindows10.com&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
US
whitelisted
2588
SIHClient.exe
GET
304
74.178.240.61:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
2588
SIHClient.exe
GET
200
135.233.95.135:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
whitelisted
2588
SIHClient.exe
GET
200
74.178.240.61:443
https://slscr.update.microsoft.com/sls/ping
US
whitelisted
2588
SIHClient.exe
GET
304
74.178.240.61:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
5316
svchost.exe
POST
200
20.190.160.131:443
https://login.live.com/RST2.srf
US
xml
1.24 Kb
whitelisted
5316
svchost.exe
POST
400
20.190.160.131:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
680
svchost.exe
GET
304
40.127.240.158:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
whitelisted
5316
svchost.exe
POST
400
20.190.160.131:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
204 b
whitelisted
5316
svchost.exe
GET
200
23.11.41.157:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAz1vQYrVgL0erhQLCPM8GY%3D
NL
binary
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
5276
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
48.192.1.64:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
680
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
2432
uTorria-a4311570.exe
188.42.196.52:443
api.utorria.ru
SERVERS-COM
US
whitelisted
3428
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5316
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5316
svchost.exe
23.11.41.157:80
ocsp.digicert.com
AKAMAI-AMS
NL
whitelisted
680
svchost.exe
23.216.77.6:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted

DNS requests

Domain
IP
Reputation
activation-v2.sls.microsoft.com
  • 48.192.1.64
whitelisted
google.com
  • 142.251.13.138
  • 142.251.13.101
  • 142.251.13.100
  • 142.251.13.139
  • 142.251.13.113
  • 142.251.13.102
whitelisted
api.utorria.ru
  • 188.42.196.52
  • 188.42.196.5
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.131
  • 40.126.32.72
  • 20.190.160.2
  • 40.126.32.134
  • 40.126.32.68
  • 20.190.160.20
  • 20.190.160.14
  • 20.190.160.132
whitelisted
ocsp.digicert.com
  • 23.11.41.157
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 88.221.169.152
whitelisted
slscr.update.microsoft.com
  • 74.178.240.61
whitelisted

Threats

PID
Process
Class
Message
680
svchost.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Process
Message
uTorria-a4311570.exe
SettingsStorage::setVisibility= QFlags<Qt::WindowState>(WindowMaximized)
uTorria-a4311570.exe
SettingsStorage::setValue ""
uTorria-a4311570.exe
SettingsStorage::SettingsStorage()
uTorria-a4311570.exe
m_settings QSettings::NoError
uTorria-a4311570.exe
SettingsStorage::setValue ""
uTorria-a4311570.exe
SettingsStorage::setAssociateWithUtorria
uTorria-a4311570.exe
SettingsStorage::setValue ""
uTorria-a4311570.exe
SettingsStorage::setWindowRect RESULT= QRect(-3,0 1366x748)
uTorria-a4311570.exe
m_settings "\\HKEY_CURRENT_USER\\Software\\uTorria\\"
uTorria-a4311570.exe
SettingsStorage::setValue ""