| File name: | 8fde286ee26e0300bda77f70fef1d4ea.exe |
| Full analysis: | https://app.any.run/tasks/687f0c04-75d9-4eff-af14-a31b9401de48 |
| Verdict: | Malicious activity |
| Threats: | HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses. |
| Analysis date: | July 12, 2025, 05:50:31 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 8 sections |
| MD5: | 8FDE286EE26E0300BDA77F70FEF1D4EA |
| SHA1: | AB4D4800342DF69B27B040E848EE434606DAC214 |
| SHA256: | 610CF008CCEDDAFB1E7786F8BF0FE3D1D8344DD92E0C2B1B2F2F74B1CCD4E629 |
| SSDEEP: | 98304:EEROSUXeZacaett8HSATvJA3faTIYJpBv+XaID52Hqyt6eWqID6hShg7Q1zzMaZC:RwRj+Z4fTTgc1Nek |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2023:10:03 07:51:28+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.33 |
| CodeSize: | 183296 |
| InitializedDataSize: | 359424 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1a1b0 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2128 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4192 | "C:\Users\admin\AppData\Local\Temp\RarSFX0\FrameworFusion.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX0\FrameworFusion.exe | 8fde286ee26e0300bda77f70fef1d4ea.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 5620 | "C:\Users\admin\AppData\Roaming\loadremote\XPFix.exe" "C:\Users\admin\AppData\Roaming\loadremote\XPFix.exe" /u | C:\Users\admin\AppData\Roaming\loadremote\XPFix.exe | — | FrameworFusion.exe | |||||||||||
User: admin Company: 360.cn Integrity Level: MEDIUM Description: 360安全卫士 安全防护中心模块 Version: 1, 0, 0, 1013 | |||||||||||||||
| 6716 | C:\ProgramData\loadremote\FrameworFusion.exe | C:\ProgramData\loadremote\FrameworFusion.exe | FrameworFusion.exe | ||||||||||||
User: admin Company: Tenorshare Co.,Ltd. Integrity Level: MEDIUM Description: DataPreviewService.exe Version: 2.2.0.2199 Modules
| |||||||||||||||
| 6876 | C:\Users\admin\AppData\Local\PorArray32.exe | C:\Users\admin\AppData\Local\PorArray32.exe | FrameworFusion.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: GPU ETW Event Viewer Exit code: 0 Version: 10.0.26100.4188 Modules
| |||||||||||||||
| 7052 | "C:\Users\admin\AppData\Local\Temp\8fde286ee26e0300bda77f70fef1d4ea.exe" | C:\Users\admin\AppData\Local\Temp\8fde286ee26e0300bda77f70fef1d4ea.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7052 | 8fde286ee26e0300bda77f70fef1d4ea.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\BugSplat64.dll | executable | |
MD5:E41209AFB442B87D598F845EB549C387 | SHA256:8FE9BE5391CEF47155BA98879EC86747B9E5E31C5D1F18079FD389C52901B4B9 | |||
| 4192 | FrameworFusion.exe | C:\ProgramData\loadremote\AnyDataRecoverySDK.dll | executable | |
MD5:A2BF301227D64DFEA4DAEEA9F179E677 | SHA256:B71A0F99B2F1E4FC6628ADD1EC2D633FDDFFB5D21BDF2BBAF75E43861D5F6932 | |||
| 4192 | FrameworFusion.exe | C:\ProgramData\loadremote\lib_TSCommunication_sdk.dll | executable | |
MD5:BACA87B0B1135EE07F1CD7A7FA06671E | SHA256:9E08E9C16BB2B5F02BF7C9122F0460EED720827BAE8E9C826DC6463C98AE4CA9 | |||
| 7052 | 8fde286ee26e0300bda77f70fef1d4ea.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\Boun.vw | binary | |
MD5:DB2ED7DB735EC09CF95A9FFF24963E64 | SHA256:E3E79A94EC78DE15E9476972C1506EF21D3D95DA7377BC42A385896D3CDFBBD2 | |||
| 7052 | 8fde286ee26e0300bda77f70fef1d4ea.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\TSLogSDK.dll | executable | |
MD5:0F61EC1794EDAFA62A4C737D7995F92A | SHA256:AD2933BDE1C9FC096CBD7D519E8F2234A3094FA20975DE6B2014A5C3A1F72E2F | |||
| 4192 | FrameworFusion.exe | C:\ProgramData\loadremote\BugSplat64.dll | executable | |
MD5:E41209AFB442B87D598F845EB549C387 | SHA256:8FE9BE5391CEF47155BA98879EC86747B9E5E31C5D1F18079FD389C52901B4B9 | |||
| 7052 | 8fde286ee26e0300bda77f70fef1d4ea.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\zlibwapi.dll | executable | |
MD5:A5865C36D6794B2AF292C0DF174E7E90 | SHA256:F76C0E6779655910B3DA012A01A09E08AD64F9905FF3E8D2AC7BDF06788F91FF | |||
| 4192 | FrameworFusion.exe | C:\ProgramData\loadremote\VCRUNTIME140.dll | executable | |
MD5:D3ACD80CD5759CFD9AC4EB0F1900AD9A | SHA256:B490A65A7A23AB2387339F081B8F1D9665A13B03023DBB3BCAFE016324857ABE | |||
| 4192 | FrameworFusion.exe | C:\ProgramData\loadremote\zlibwapi.dll | executable | |
MD5:A5865C36D6794B2AF292C0DF174E7E90 | SHA256:F76C0E6779655910B3DA012A01A09E08AD64F9905FF3E8D2AC7BDF06788F91FF | |||
| 4192 | FrameworFusion.exe | C:\ProgramData\loadremote\Boun.vw | binary | |
MD5:DB2ED7DB735EC09CF95A9FFF24963E64 | SHA256:E3E79A94EC78DE15E9476972C1506EF21D3D95DA7377BC42A385896D3CDFBBD2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 23.216.77.25:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2668 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5848 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5848 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2940 | svchost.exe | GET | 200 | 104.76.201.34:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6404 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 23.216.77.25:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2668 | svchost.exe | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2668 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
westcnds.asia |
| unknown |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |