Threat Database Trojans Trojan.AutoIt.Agent

Trojan.AutoIt.Agent

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 2,188
Threat Level: 80 % (High)
Infected Computers: 90,665
First Seen: December 11, 2012
Last Seen: February 4, 2026
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Panda Trj/CI.A
AVG Generic6_c.BUMR
Fortinet W32/Grp.GA!tr
Ikarus Win32.AutoIt
AhnLab-V3 Backdoor/Win32.ZAccess
Microsoft TrojanDownloader:AutoIt/Agent.J
AntiVir TR/Agent.281211
Comodo UnclassifiedMalware
Sophos Mal/Generic-L
Kaspersky Backdoor.Win32.ZAccess.zii
Avast Win32:AutoIt-ALZ [Trj]
Symantec WS.Reputation.1
K7AntiVirus Riskware
McAfee Generic.grp!ga
CAT-QuickHeal TrojanDownloader.Agent

SpyHunter Detects & Remove Trojan.AutoIt.Agent

File System Details

Trojan.AutoIt.Agent may create the following file(s):
# File Name MD5 Detections
1. ythgrfed.exe 3ba321ee9799577ab20f40743f90421a 258
2. AutoUpdateSdog.exe e8ac2169a4fa3b936fec6821383ad60b 184
3. update.exe 6990ca67da0cea7582fa7c3d93724963 98
4. temp5.exe 5e25abc3a3ad181d2213e47fa36c4a37 67
5. helper.exe 66a55f9baf27d573e0b4116b4d552380 42
6. dpnlobby.exe 8d0a7ac3647224c6c882e164a578c17d 29
7. hbaapi.exe ccc105240431ddfad7649840245d2e9f 25
8. SoftwareUpdaterService.exe ce4c37b485f6c2a463e70348fbb5575f 24
9. 2 Stefanie Y C R.exe.vir 866cbcecf93ef70863af7cc8495f4031 19
10. afd519f0a8b99b9c3ea46000ec8699b11284eef09727ee668a4efde8ba25ffca 54b97b5e2b29aee504559abc6aa0ed70 15
11. app.exe bf2aa49a532f3a01ff926884bdcbb1eb 15
12. Windows.Shell.Search.UriHandler.exe d8e82701d83d054c0eb90c34ea8b319d 14
13. service2.exe e8b4c4df28c72f033a5a8e39c98f3064 12
14. 90b0abb7b61c8ee659bc4d1c863f9e2b42213632 bc7eec8a90f799f80dda8177f2abb3a2 10
15. wdc.exe ea465f0ce93c67dd6e083fbd79d03d17 9
16. initsrv.exe d249778acb9923f3bf6adf075a8778de 8
17. system.pifx c68c74df81edfea4c3ceb9861b5d69e9 8
18. shtsenv.exe f8438b55ff1d37ea940bfdf19dad99da 6
19. assets .exe 1e4feeeb8674a01df333c9cb6f858ae8 5
20. qxgMPdgN8RB2.exe#338d2c2a 7bb1ba7cfadbc02522b1113f488f9e3a 5
21. Activation.exe fdf2edc611c6a1b0d14290cb75326763 4
22. steam key generator.exe 3313ab2e6adab202c44a2354374a43aa 4
23. adobeart.exe bdf282bbd43e8de3654a440255da1632 4
24. csrss.exe 385c0e62425caba1cda72dbac1e8b318 3
25. unp2451684.tmp 0af565985c8d1e27b520af2122489a75 2
More files

Registry Details

Trojan.AutoIt.Agent may create the following registry entry or registry entries:
File name without path
! My Image.scr
tmpe0d.tmp.google.exe
Regexp file mask
%APPDATA%\cmitros.exe
%APPDATA%\install\win32.exe
%APPDATA%\keep.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\20109297886[NUMBERS].exe
%appdata%\microsoft\windows\start menu\programs\startup\autoupdatedl.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\cmitros.exe
%APPDATA%\regsvr.exe
%HOMEDRIVE%\Google\EXLE.exe
%HOMEDRIVE%\googlechrome\googlechrome.a3x
%HOMEDRIVE%\googlechrome\googlechrome.exe
%HOMEDRIVE%\googlechrome\googlechrome.lnk
%HOMEDRIVE%\googlechrome\GoogleUpdate.lnk
%HOMEDRIVE%\googlechrome\WindowsUpdate.lnk
%HOMEDRIVE%\mozillafirefox\googlechrome.exe
%LOCALAPPDATA%\start\update.exe
%temp%\file.exe
%WINDIR%\svhost.exe
%WINDIR%\system32\install\win32.exe
%WINDIR%\SysWOW64\install\win32.exe

Directories

Trojan.AutoIt.Agent may create the following directory or directories:

%APPDATA%\Windata
%APPDATA%\lazagne
%USERPROFILE%\LegacyNetUXHost
%WINDIR%\cidd_p

Analysis Report

General information

Family Name: Trojan.AutoIt.Agent
Signature status: Root Not Trusted

Known Samples

MD5: 1f5a392162ea2a41660ad97f3f7f235a
SHA1: d2f47962ac3195e907e3a8155d8e30315adb645c
SHA256: FA9AD80AA8BDF9A747AD48FFC42741FE9C49F1895FDB01932F4AEB2A84E7C420
File Size: 1.15 MB, 1154408 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments SIMATIC IPC
File Description Configuration Utility
File Version 3.6.0.1029
Legal Copyright Copyright (C) 2020, Siemens AG
Product Version 3.3.14.5

Digital Signatures

Signer Root Status
SIEMENS AG VeriSign Class 3 Public Primary Certification Authority - G5 Root Not Trusted

File Traits

  • HighEntropy
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 4,168
Potentially Malicious Blocks: 0
Whitelisted Blocks: 4,168
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 1 0 0 0 0 0 0 0 1 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 2 3 0 1 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 2 2 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 1 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Autoit
  • Delf.Q
  • Philadelphia.A
  • Philadelphia.B

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetAsyncKeyState

Trending

Most Viewed

Loading...