File name:

AutoClicker-3.1.exe

Full analysis: https://app.any.run/tasks/fe8a869c-8693-4007-8b49-6f74cf90d05a
Verdict: Malicious activity
Analysis date: February 20, 2025, 16:02:25
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

C208A15591828AC1B1C825F33FD55C8A

SHA1:

BEA4A247ECE1A749D0994FC085FBD2D7C90A21E7

SHA256:

A6EE6130D83BBE55E9DACDFF2005950D69FC2D3C54E28467B82C148E274D90DA

SSDEEP:

24576:DgbEyQp78U5uWicSSdhQ+BrWbOT23S7JN+EKqvCr9xUQp4JghhGsBiMwy+jlXa2w:DgbEp78U5uWicSSdhQ+BrWbOT23S7JNM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • SQL CE related mutex has been found

      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • There is functionality for taking screenshot (YARA)

      • AutoClicker-3.1.exe (PID: 1556)
  • INFO

    • Manual execution by a user

      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • Reads the computer name

      • AutoClicker-3.1.exe (PID: 1556)
      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • The sample compiled with english language support

      • AutoClicker-3.1.exe (PID: 1556)
    • Reads mouse settings

      • AutoClicker-3.1.exe (PID: 1556)
    • Reads the machine GUID from the registry

      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • Checks supported languages

      • SkinChanger Bluestacks 5.exe (PID: 5028)
      • AutoClicker-3.1.exe (PID: 1556)
    • Checks proxy server information

      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • Creates files or folders in the user directory

      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • Create files in a temporary directory

      • AutoClicker-3.1.exe (PID: 1556)
      • SkinChanger Bluestacks 5.exe (PID: 5028)
    • The process uses AutoIt

      • AutoClicker-3.1.exe (PID: 1556)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:21 17:26:11+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 524800
InitializedDataSize: 126976
UninitializedDataSize: -
EntryPoint: 0x16310
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 3.1.0.0
ProductVersionNumber: 3.1.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: www.opautoclicker.com
FileDescription: OP Auto Clicker
FileVersion: 3.1
LegalCopyright: www.opautoclicker.com
ProductName: OP Auto Clicker
ProductVersion: 3.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start autoclicker-3.1.exe no specs skinchanger bluestacks 5.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1556"C:\Users\admin\AppData\Local\Temp\AutoClicker-3.1.exe" C:\Users\admin\AppData\Local\Temp\AutoClicker-3.1.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
OP Auto Clicker
Exit code:
0
Version:
3.1
Modules
Images
c:\users\admin\appdata\local\temp\autoclicker-3.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
5028"C:\Users\admin\Desktop\SkinChanger Bluestacks 5.exe" C:\Users\admin\Desktop\SkinChanger Bluestacks 5.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Notifications host process
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\skinchanger bluestacks 5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
1 049
Read events
985
Write events
63
Delete events
1

Modification events

(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
Operation:writeName:LocalBase
Value:
C:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
Operation:writeName:DTDFile
Value:
C:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
Operation:writeName:LocalDelta
Value:
C:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNSD.XML
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
Operation:writeName:RemoteDelta
Value:
C:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNSR.XML
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
Operation:writeName:UniqueID
Value:
{D7877C86-482D-4D92-95F4-22FF8009A5A0}
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
Operation:writeName:ComputerName
Value:
DESKTOP-JGLLJLD
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
Operation:writeName:VolumeSerialNumber
Value:
649566714
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Player\Settings
Operation:delete valueName:Client ID
Value:
{CECDFD5C-8F08-4FEF-8713-FAA895A422EB}
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
Operation:writeName:ProxyStyle
Value:
1
(PID) Process:(5028) SkinChanger Bluestacks 5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
Operation:writeName:ProxyName
Value:
Executable files
0
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
1556AutoClicker-3.1.exeC:\Users\admin\AppData\Local\Temp\ACLib\record.icoimage
MD5:1111E06679F96FF28C1E229B06CE7B41
SHA256:59D5E9106E907FA61A560294A51C14ABCDE024FDD690E41A7F4D6C88DB7287A6
5028SkinChanger Bluestacks 5.exeC:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTDxml
MD5:90BE2701C8112BEBC6BD58A7DE19846E
SHA256:644FBCDC20086E16D57F31C5BAD98BE68D02B1C061938D2F5F91CBE88C871FBF
5028SkinChanger Bluestacks 5.exeC:\Users\admin\AppData\Local\Temp\king.wavbinary
MD5:377EEB8A80733BDA6AE558A44B63D83D
SHA256:AF9220C3D067CE69CFE82C7C4DD716325828066AC0612E422A52C4091A3C7B34
1556AutoClicker-3.1.exeC:\Users\admin\AppData\Local\Temp\gvtixgrtext
MD5:5572DABBC0993CD6D2AD0875F2BE32D5
SHA256:4B48674022F1674415C5FD2E2AD23E6CABAD86FB1848464A33BAD1E3A70A52B5
1556AutoClicker-3.1.exeC:\Users\admin\AppData\Local\Temp\ACLib\stop.icoimage
MD5:7824CEFAD2522BE614AE5B7BDBF88339
SHA256:9E869F60EA0A0DE06C7D562FF56D1AC53C534849C919E4B12344E73513649483
5028SkinChanger Bluestacks 5.exeC:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XMLtext
MD5:5433EAB10C6B5C6D55B7CBD302426A39
SHA256:23DBF7014E99E93AF5F2760F18EE1370274F06A453145C8D539B66D798DAD131
5028SkinChanger Bluestacks 5.exeC:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.baktext
MD5:7050D5AE8ACFBE560FA11073FEF8185D
SHA256:CB87767C4A384C24E4A0F88455F59101B1AE7B4FB8DE8A5ADB4136C5F7EE545B
1556AutoClicker-3.1.exeC:\Users\admin\AppData\Local\Temp\ACLib\playback.icoimage
MD5:A20254EA7F9EF810C1681FA314EDAA28
SHA256:5375290E66A20BFF81FB4D80346756F2D442184789681297CD1B84446A3FE80D
5028SkinChanger Bluestacks 5.exeC:\Users\admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdbbinary
MD5:0C4B629A650F5157C2EDD564EFC53B90
SHA256:8072277B8392F8C086F9B9A9AF98E9222C02340291DD5431AA3513630D2051D8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
30
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1468
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4144
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4144
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5308
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1468
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
23.15.178.200:443
Akamai International B.V.
DE
unknown
1176
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
2.19.106.8:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
google.com
  • 142.250.74.206
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.134
  • 40.126.32.136
  • 20.190.160.130
  • 20.190.160.67
  • 20.190.160.128
  • 20.190.160.131
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 2.19.106.8
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted

Threats

No threats detected
No debug info