File name:

autoit_softradar-com.exe

Full analysis: https://app.any.run/tasks/7a19c009-1171-4c4b-998f-92631281b15d
Verdict: Malicious activity
Analysis date: April 26, 2025, 06:37:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

A65B5DF1A846FB0BB7AD4B2DA19BBBCD

SHA1:

B93C659C6F9ECA5CDAEA8E552C0466CAC3EA61D6

SHA256:

19F91EE8A2ACF408D69BE07E1C4A99992213E565B9C8BB6D5C52F59F79707DA3

SSDEEP:

393216:TDaWWhLNL186VkPwBOf74ycQf2TftfJBYT6IL/owfe:TDaWWdNxpg2icfRC7L/xm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • autoit_softradar-com.exe (PID: 4336)
    • Creates a software uninstall entry

      • autoit_softradar-com.exe (PID: 4336)
    • There is functionality for taking screenshot (YARA)

      • autoit_softradar-com.exe (PID: 4336)
    • The process creates files with name similar to system file names

      • autoit_softradar-com.exe (PID: 4336)
    • Creates/Modifies COM task schedule object

      • autoit_softradar-com.exe (PID: 4336)
    • Executable content was dropped or overwritten

      • autoit_softradar-com.exe (PID: 4336)
  • INFO

    • The sample compiled with english language support

      • autoit_softradar-com.exe (PID: 4336)
    • Checks supported languages

      • autoit_softradar-com.exe (PID: 4336)
    • Creates files in the program directory

      • autoit_softradar-com.exe (PID: 4336)
    • Reads the computer name

      • autoit_softradar-com.exe (PID: 4336)
    • Create files in a temporary directory

      • autoit_softradar-com.exe (PID: 4336)
    • The sample compiled with german language support

      • autoit_softradar-com.exe (PID: 4336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:56:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.3.16.1
ProductVersionNumber: 3.3.16.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: AutoIt Team
FileDescription: AutoIt v3 Setup
FileVersion: 3.3.16.1
LegalCopyright: @ 1999-2021 Jonathan Bennett & AutoIt Team
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start autoit_softradar-com.exe slui.exe no specs autoit_softradar-com.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4336"C:\Users\admin\AppData\Local\Temp\autoit_softradar-com.exe" C:\Users\admin\AppData\Local\Temp\autoit_softradar-com.exe
explorer.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
HIGH
Description:
AutoIt v3 Setup
Version:
3.3.16.1
Modules
Images
c:\users\admin\appdata\local\temp\autoit_softradar-com.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6488C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6632"C:\Users\admin\AppData\Local\Temp\autoit_softradar-com.exe" C:\Users\admin\AppData\Local\Temp\autoit_softradar-com.exeexplorer.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Setup
Exit code:
3221226540
Version:
3.3.16.1
Modules
Images
c:\users\admin\appdata\local\temp\autoit_softradar-com.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
380
Read events
355
Write events
25
Delete events
0

Modification events

(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.au3
Operation:writeName:PerceivedType
Value:
text
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.au3\ShellNew
Operation:writeName:FileName
Value:
Template.au3
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AutoIt v3\AutoIt
Operation:writeName:InstallDir
Value:
C:\Program Files (x86)\AutoIt3
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AutoIt v3\AutoIt
Operation:writeName:Version
Value:
v3.3.16.1
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_CURRENT_USER\SOFTWARE\AutoIt v3\Aut2Exe
Operation:writeName:LastExeDir
Value:
My Documents
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_CURRENT_USER\SOFTWARE\AutoIt v3\Aut2Exe
Operation:writeName:LastScriptDir
Value:
My Documents
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_CURRENT_USER\SOFTWARE\AutoIt v3\Aut2Exe
Operation:writeName:LastIconDir
Value:
C:\Program Files (x86)\AutoIt3\Aut2Exe\Icons
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_CURRENT_USER\SOFTWARE\AutoIt v3\Aut2Exe
Operation:writeName:LastIcon
Value:
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_CURRENT_USER\SOFTWARE\AutoIt v3\Aut2Exe
Operation:writeName:LastCompression
Value:
2
(PID) Process:(4336) autoit_softradar-com.exeKey:HKEY_CURRENT_USER\SOFTWARE\AutoIt v3\Aut2Exe
Operation:writeName:AllowDecompile
Value:
1
Executable files
24
Suspicious files
37
Text files
1 067
Unknown types
0

Dropped files

PID
Process
Filename
Type
4336autoit_softradar-com.exeC:\Program Files (x86)\AutoIt3\AutoIt.chm
MD5:
SHA256:
4336autoit_softradar-com.exeC:\Program Files (x86)\AutoIt3\AutoIt3_x64.exeexecutable
MD5:8FA52F316C393496F272357191DB6DEB
SHA256:92C6531A09180FAE8B2AAE7384B4CEA9986762F0C271B35DA09B4D0E733F9F45
4336autoit_softradar-com.exeC:\Program Files (x86)\AutoIt3\Include\APIDiagConstants.au3text
MD5:92A85EA19C1232CFB98A49F5452E441A
SHA256:6F8114A19A7992C7263687BDBF7B6E03A858930C1DAD8879BCB02E2B08AE78AA
4336autoit_softradar-com.exeC:\Users\admin\AppData\Local\Temp\nsmBB74.tmp\ioX64Options.initext
MD5:B7DAECFA83B6DB257578441991630153
SHA256:244F61A89801AB52A66E7579C16D92A6A60E063F8F972F601FF0EE2BC73AE0B2
4336autoit_softradar-com.exeC:\Program Files (x86)\AutoIt3\AutoIt v3 Website.urlbinary
MD5:7B6871AD1DE81E0201386EEB8A71498F
SHA256:A8697C79934FF08407412D2C0C0492217709841638F1FD7FC6D8A68C105EED0B
4336autoit_softradar-com.exeC:\Users\admin\AppData\Local\Temp\nsmBB74.tmp\ioDefaultOpen.initext
MD5:8C032D104411DA01E43D8E8B9AD88EB4
SHA256:659CAD01FE631A96E0856C44D4114E12AC0E5402F863C2B1213A87D375C26F59
4336autoit_softradar-com.exeC:\Users\admin\AppData\Local\Temp\nsmBB74.tmp\UserInfo.dllexecutable
MD5:2F69AFA9D17A5245EC9B5BB03D56F63C
SHA256:E54989D2B83E7282D0BEC56B098635146AAB5D5A283F1F89486816851EF885A0
4336autoit_softradar-com.exeC:\Users\admin\AppData\Local\Temp\nsmBB74.tmp\InstallOptions.dllexecutable
MD5:ECE25721125D55AA26CDFE019C871476
SHA256:C7FEF6457989D97FECC0616A69947927DA9D8C493F7905DC8475C748F044F3CF
4336autoit_softradar-com.exeC:\Users\admin\AppData\Local\Temp\nsmBB74.tmp\ioPreviousVersion.initext
MD5:8C032D104411DA01E43D8E8B9AD88EB4
SHA256:659CAD01FE631A96E0856C44D4114E12AC0E5402F863C2B1213A87D375C26F59
4336autoit_softradar-com.exeC:\Program Files (x86)\AutoIt3\AutoIt3Help.exeexecutable
MD5:80CC9322DF68C420FFF96DE7C5C411A5
SHA256:218BEDB6E3BD39365A6907D00982E6BAF2DA54FDEB7D06BBC2AF88E86F88AD0D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
19
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1616
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1616
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1616
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.251.13.101
  • 142.251.13.138
  • 142.251.13.139
  • 142.251.13.113
  • 142.251.13.100
  • 142.251.13.102
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.5
  • 20.190.160.14
  • 20.190.160.131
  • 20.190.160.67
  • 20.190.160.128
  • 40.126.32.133
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info