File name:

8fde286ee26e0300bda77f70fef1d4ea.exe

Full analysis: https://app.any.run/tasks/687f0c04-75d9-4eff-af14-a31b9401de48
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: July 12, 2025, 05:50:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
hijackloader
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 8 sections
MD5:

8FDE286EE26E0300BDA77F70FEF1D4EA

SHA1:

AB4D4800342DF69B27B040E848EE434606DAC214

SHA256:

610CF008CCEDDAFB1E7786F8BF0FE3D1D8344DD92E0C2B1B2F2F74B1CCD4E629

SSDEEP:

98304:EEROSUXeZacaett8HSATvJA3faTIYJpBv+XaID52Hqyt6eWqID6hShg7Q1zzMaZC:RwRj+Z4fTTgc1Nek

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • FrameworFusion.exe (PID: 6716)
    • Executing a file with an untrusted certificate

      • XPFix.exe (PID: 5620)
    • HIJACKLOADER has been detected (YARA)

      • FrameworFusion.exe (PID: 6716)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 6716)
      • FrameworFusion.exe (PID: 4192)
    • Process drops legitimate windows executable

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 4192)
      • FrameworFusion.exe (PID: 6716)
    • The process drops C-runtime libraries

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 4192)
    • Reads security settings of Internet Explorer

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
    • Reads the date of Windows installation

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • PorArray32.exe (PID: 6876)
    • Starts itself from another location

      • FrameworFusion.exe (PID: 4192)
  • INFO

    • The sample compiled with english language support

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 4192)
      • FrameworFusion.exe (PID: 6716)
    • Create files in a temporary directory

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 6716)
    • Reads the computer name

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 6716)
      • FrameworFusion.exe (PID: 4192)
      • PorArray32.exe (PID: 6876)
    • Checks supported languages

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 6716)
      • FrameworFusion.exe (PID: 4192)
      • PorArray32.exe (PID: 6876)
    • The sample compiled with chinese language support

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
      • FrameworFusion.exe (PID: 6716)
      • FrameworFusion.exe (PID: 4192)
    • Creates files or folders in the user directory

      • FrameworFusion.exe (PID: 6716)
    • Process checks computer location settings

      • 8fde286ee26e0300bda77f70fef1d4ea.exe (PID: 7052)
    • Creates files in the program directory

      • FrameworFusion.exe (PID: 4192)
    • Checks proxy server information

      • PorArray32.exe (PID: 6876)
      • slui.exe (PID: 2128)
    • Reads the software policy settings

      • slui.exe (PID: 2128)
      • PorArray32.exe (PID: 6876)
    • Reads the machine GUID from the registry

      • PorArray32.exe (PID: 6876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:10:03 07:51:28+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.33
CodeSize: 183296
InitializedDataSize: 359424
UninitializedDataSize: -
EntryPoint: 0x1a1b0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
6
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 8fde286ee26e0300bda77f70fef1d4ea.exe frameworfusion.exe #GENERIC frameworfusion.exe porarray32.exe xpfix.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2128C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4192"C:\Users\admin\AppData\Local\Temp\RarSFX0\FrameworFusion.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\FrameworFusion.exe
8fde286ee26e0300bda77f70fef1d4ea.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\frameworfusion.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5620"C:\Users\admin\AppData\Roaming\loadremote\XPFix.exe" "C:\Users\admin\AppData\Roaming\loadremote\XPFix.exe" /uC:\Users\admin\AppData\Roaming\loadremote\XPFix.exeFrameworFusion.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
360安全卫士 安全防护中心模块
Version:
1, 0, 0, 1013
6716C:\ProgramData\loadremote\FrameworFusion.exeC:\ProgramData\loadremote\FrameworFusion.exe
FrameworFusion.exe
User:
admin
Company:
Tenorshare Co.,Ltd.
Integrity Level:
MEDIUM
Description:
DataPreviewService.exe
Version:
2.2.0.2199
Modules
Images
c:\programdata\loadremote\frameworfusion.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6876C:\Users\admin\AppData\Local\PorArray32.exeC:\Users\admin\AppData\Local\PorArray32.exe
FrameworFusion.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
GPU ETW Event Viewer
Exit code:
0
Version:
10.0.26100.4188
Modules
Images
c:\users\admin\appdata\local\temp\46b5cb7.tmp
c:\users\admin\appdata\local\porarray32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7052"C:\Users\admin\AppData\Local\Temp\8fde286ee26e0300bda77f70fef1d4ea.exe" C:\Users\admin\AppData\Local\Temp\8fde286ee26e0300bda77f70fef1d4ea.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\8fde286ee26e0300bda77f70fef1d4ea.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
1 668
Read events
1 668
Write events
0
Delete events
0

Modification events

No data
Executable files
16
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
70528fde286ee26e0300bda77f70fef1d4ea.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\BugSplat64.dllexecutable
MD5:E41209AFB442B87D598F845EB549C387
SHA256:8FE9BE5391CEF47155BA98879EC86747B9E5E31C5D1F18079FD389C52901B4B9
4192FrameworFusion.exeC:\ProgramData\loadremote\AnyDataRecoverySDK.dllexecutable
MD5:A2BF301227D64DFEA4DAEEA9F179E677
SHA256:B71A0F99B2F1E4FC6628ADD1EC2D633FDDFFB5D21BDF2BBAF75E43861D5F6932
4192FrameworFusion.exeC:\ProgramData\loadremote\lib_TSCommunication_sdk.dllexecutable
MD5:BACA87B0B1135EE07F1CD7A7FA06671E
SHA256:9E08E9C16BB2B5F02BF7C9122F0460EED720827BAE8E9C826DC6463C98AE4CA9
70528fde286ee26e0300bda77f70fef1d4ea.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Boun.vwbinary
MD5:DB2ED7DB735EC09CF95A9FFF24963E64
SHA256:E3E79A94EC78DE15E9476972C1506EF21D3D95DA7377BC42A385896D3CDFBBD2
70528fde286ee26e0300bda77f70fef1d4ea.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\TSLogSDK.dllexecutable
MD5:0F61EC1794EDAFA62A4C737D7995F92A
SHA256:AD2933BDE1C9FC096CBD7D519E8F2234A3094FA20975DE6B2014A5C3A1F72E2F
4192FrameworFusion.exeC:\ProgramData\loadremote\BugSplat64.dllexecutable
MD5:E41209AFB442B87D598F845EB549C387
SHA256:8FE9BE5391CEF47155BA98879EC86747B9E5E31C5D1F18079FD389C52901B4B9
70528fde286ee26e0300bda77f70fef1d4ea.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\zlibwapi.dllexecutable
MD5:A5865C36D6794B2AF292C0DF174E7E90
SHA256:F76C0E6779655910B3DA012A01A09E08AD64F9905FF3E8D2AC7BDF06788F91FF
4192FrameworFusion.exeC:\ProgramData\loadremote\VCRUNTIME140.dllexecutable
MD5:D3ACD80CD5759CFD9AC4EB0F1900AD9A
SHA256:B490A65A7A23AB2387339F081B8F1D9665A13B03023DBB3BCAFE016324857ABE
4192FrameworFusion.exeC:\ProgramData\loadremote\zlibwapi.dllexecutable
MD5:A5865C36D6794B2AF292C0DF174E7E90
SHA256:F76C0E6779655910B3DA012A01A09E08AD64F9905FF3E8D2AC7BDF06788F91FF
4192FrameworFusion.exeC:\ProgramData\loadremote\Boun.vwbinary
MD5:DB2ED7DB735EC09CF95A9FFF24963E64
SHA256:E3E79A94EC78DE15E9476972C1506EF21D3D95DA7377BC42A385896D3CDFBBD2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
24
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2668
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5848
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5848
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2940
svchost.exe
GET
200
104.76.201.34:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6404
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2668
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2668
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.36
  • 23.216.77.19
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.128
  • 20.190.159.128
  • 20.190.159.131
  • 40.126.31.130
  • 20.190.159.4
  • 20.190.159.0
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.11
whitelisted
westcnds.asia
  • 104.21.96.1
  • 104.21.80.1
  • 104.21.48.1
  • 104.21.112.1
  • 104.21.64.1
  • 104.21.16.1
  • 104.21.32.1
unknown
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info