File name:

loader.exe

Full analysis: https://app.any.run/tasks/86fc17b7-835b-46bd-97fa-410b87072837
Verdict: Malicious activity
Threats:

DonutLoader is a versatile, open-source-based in-memory loader that turns .NET assemblies, executables, DLLs, and scripts into position-independent shellcode for execution entirely in RAM. Originally derived from the popular Donut tool, it enables threat actors to bypass traditional antivirus and EDR solutions by avoiding disk writes and injecting payloads directly into legitimate Windows processes.

Analysis date: April 22, 2026, 20:07:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
miner
lofty
loader
auto
generic
donutloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 11 sections
MD5:

F565F9BDF513897F94DE8FD32AC82C3E

SHA1:

9A50751FE405C9416564E01D7952EC94C8E75572

SHA256:

910E62ED170C06A24102706986D3789BAE2B3E0618B6D1BE876FE4054B732E7B

SSDEEP:

98304:nDZZkkQQfPifnPL85vlx6aX9ZC5pGVFwjyka/iDONC9alAOjTJsvgDk6Pt40RTEz:7iUr1bknoDkGbc6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Mutex associated with miner detected

      • loader.exe (PID: 1280)
    • Starts NET.EXE for service management

      • net.exe (PID: 7348)
      • cmd.exe (PID: 4300)
    • LOFTY has been detected

      • loader.exe (PID: 1280)
    • GENERIC has been found (auto)

      • loader.exe (PID: 1280)
    • DONUTLOADER has been detected (YARA)

      • loader.exe (PID: 1280)
    • GENERIC has been detected (SURICATA)

      • loader.exe (PID: 1280)
  • SUSPICIOUS

    • Query current time using 'w32tm.exe'

      • cmd.exe (PID: 7588)
    • Executable content was dropped or overwritten

      • loader.exe (PID: 1280)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7512)
      • MicrosoftEdge_X64_147.0.3912.72.exe (PID: 1500)
      • setup.exe (PID: 7456)
    • Executable started from TEMP via cmd.exe

      • cmd.exe (PID: 4336)
    • Executes application which crashes

      • ox_1776888464033.exe (PID: 6796)
    • Reads the date of Windows installation

      • loader.exe (PID: 1280)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 7512)
      • MicrosoftEdgeUpdate.exe (PID: 7896)
    • Silent install from TEMP directory

      • loader.exe (PID: 1280)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 7896)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 3140)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 2420)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4056)
    • Executes as Windows Service

      • MicrosoftEdgeUpdate.exe (PID: 3748)
    • Disables SEHOP

      • MicrosoftEdgeUpdate.exe (PID: 7896)
    • Application launched itself

      • MicrosoftEdgeUpdate.exe (PID: 3748)
      • msedgewebview2.exe (PID: 2840)
    • Searches for installed software

      • setup.exe (PID: 7456)
  • INFO

    • Reads security settings of Internet Explorer

      • loader.exe (PID: 1280)
      • MicrosoftEdgeUpdate.exe (PID: 7896)
    • The sample compiled with english language support

      • loader.exe (PID: 1280)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7512)
      • MicrosoftEdgeUpdate.exe (PID: 7896)
      • setup.exe (PID: 7456)
      • MicrosoftEdge_X64_147.0.3912.72.exe (PID: 1500)
    • Checks supported languages

      • loader.exe (PID: 1280)
      • ox_1776888464033.exe (PID: 6796)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7512)
      • MicrosoftEdgeUpdate.exe (PID: 7896)
      • MicrosoftEdgeUpdate.exe (PID: 5772)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdate.exe (PID: 5524)
      • MicrosoftEdgeUpdate.exe (PID: 2524)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 3140)
      • MicrosoftEdgeUpdate.exe (PID: 3748)
      • MicrosoftEdgeUpdate.exe (PID: 6260)
      • MicrosoftEdge_X64_147.0.3912.72.exe (PID: 1500)
      • setup.exe (PID: 7456)
      • MicrosoftEdgeUpdate.exe (PID: 2576)
      • msedgewebview2.exe (PID: 2432)
      • msedgewebview2.exe (PID: 2840)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 2420)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4056)
    • Reads the computer name

      • loader.exe (PID: 1280)
      • ox_1776888464033.exe (PID: 6796)
      • MicrosoftEdgeUpdate.exe (PID: 7896)
      • MicrosoftEdgeUpdate.exe (PID: 5772)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 2420)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 4056)
      • MicrosoftEdgeUpdate.exe (PID: 5524)
      • MicrosoftEdgeUpdate.exe (PID: 2524)
      • MicrosoftEdgeUpdate.exe (PID: 7948)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 3140)
      • MicrosoftEdgeUpdate.exe (PID: 3748)
      • MicrosoftEdgeUpdate.exe (PID: 6260)
      • MicrosoftEdge_X64_147.0.3912.72.exe (PID: 1500)
      • setup.exe (PID: 7456)
      • MicrosoftEdgeUpdate.exe (PID: 2576)
      • msedgewebview2.exe (PID: 2840)
    • Reads the machine GUID from the registry

      • loader.exe (PID: 1280)
    • Creates files or folders in the user directory

      • loader.exe (PID: 1280)
      • WerFault.exe (PID: 8188)
      • msedgewebview2.exe (PID: 2840)
      • msedgewebview2.exe (PID: 2432)
    • Create files in a temporary directory

      • loader.exe (PID: 1280)
      • MicrosoftEdgeUpdate.exe (PID: 7896)
    • Process checks computer location settings

      • loader.exe (PID: 1280)
      • MicrosoftEdgeUpdate.exe (PID: 7896)
      • setup.exe (PID: 7456)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 5524)
      • MicrosoftEdgeUpdate.exe (PID: 6260)
      • MicrosoftEdgeUpdate.exe (PID: 2576)
    • Creates a software uninstall entry

      • setup.exe (PID: 7456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2026:04:22 12:59:24+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.44
CodeSize: 3724288
InitializedDataSize: 2471936
UninitializedDataSize: -
EntryPoint: 0x8c1000
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: -
FileDescription: Loader
FileVersion: 1.0.0.0
InternalName: loader.exe
LegalCopyright: Copyright (C) 2025
OriginalFileName: loader.exe
ProductName: Loader
ProductVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
167
Monitored processes
29
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #DONUTLOADER loader.exe cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs w32tm.exe no specs cmd.exe no specs conhost.exe no specs ox_1776888464033.exe werfault.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe no specs microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe microsoftedge_x64_147.0.3912.72.exe setup.exe microsoftedgeupdate.exe msedgewebview2.exe msedgewebview2.exe no specs loader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1280"C:\Users\admin\Desktop\loader.exe" C:\Users\admin\Desktop\loader.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Loader
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ucrtbase.dll
1500"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A5881C31-8FC5-4EA7-8A46-AA8CF86123CF}\MicrosoftEdge_X64_147.0.3912.72.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-levelC:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A5881C31-8FC5-4EA7-8A46-AA8CF86123CF}\MicrosoftEdge_X64_147.0.3912.72.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge Installer
Exit code:
0
Version:
147.0.3912.72
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\install\{a5881c31-8fc5-4ea7-8a46-aa8cf86123cf}\microsoftedge_x64_147.0.3912.72.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
2420"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe" C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge Update COM Registration Helper
Exit code:
0
Version:
1.3.229.3
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.229.3\microsoftedgeupdatecomregistershell64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2432"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\admin\AppData\Roaming\1575709424\Overlays\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\admin\AppData\Roaming\1575709424\Overlays\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=147.0.7727.102 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=147.0.3912.72 --initial-client-data=0x184,0x188,0x18c,0x160,0x194,0x7ffe22bc0d58,0x7ffe22bc0d64,0x7ffe22bc0d70C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
147.0.3912.72
Modules
Images
c:\program files (x86)\microsoft\edgewebview\application\147.0.3912.72\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edgewebview\application\147.0.3912.72\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
2524"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{ADF53516-534C-4166-A0A1-CE590495DA0C}" /silentC:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.229.3
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
2576"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDcxMDQ3OTcyNSIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjE3NTAiIGRvd25sb2FkX3RpbWVfbXM9Ijk2MDMxIiBkb3dubG9hZGVkPSIxOTAxNTIyNDgiIHRvdGFsPSIxOTAxNTIyNDgiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjMyMjAzIi8-PC9hcHA-PC9yZXF1ZXN0PgC:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
MicrosoftEdgeUpdate.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.229.3
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
2840"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=loader.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\admin\AppData\Roaming\1575709424\Overlays\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=UseChromeOSDirectVideoDecoder --disable-gpu-driver-bug-workarounds --disable-software-rasterizer --enable-accelerated-2d-canvas --enable-gpu-memory-buffer-video-frames --enable-gpu-rasterization --enable-native-gpu-memory-buffers --enable-oop-rasterization --enable-zero-copy --ignore-gpu-blacklist --num-raster-threads=4 --mojo-named-platform-channel-pipe=1280.4488.14816430355717741500C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe
loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
147.0.3912.72
Modules
Images
c:\program files (x86)\microsoft\edgewebview\application\147.0.3912.72\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edgewebview\application\147.0.3912.72\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\version.dll
3140"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe" C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge Update COM Registration Helper
Exit code:
0
Version:
1.3.229.3
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.229.3\microsoftedgeupdatecomregistershell64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3748"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svcC:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.229.3
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
4056"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe" C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge Update COM Registration Helper
Exit code:
0
Version:
1.3.229.3
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.229.3\microsoftedgeupdatecomregistershell64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
29 758
Read events
25 824
Write events
3 808
Delete events
126

Modification events

(PID) Process:(1280) loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1280) loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1280) loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(8188) WerFault.exeKey:\REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(8188) WerFault.exeKey:\REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
(PID) Process:(8188) WerFault.exeKey:\REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50
Operation:writeName:ProgramId
Value:
000684d7560fbb18b757a525e271eb2dc6010000ffff
(PID) Process:(8188) WerFault.exeKey:\REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50
Operation:writeName:FileId
Value:
00000d73d709f61dcd7d58984dd154c50b925049689c
(PID) Process:(8188) WerFault.exeKey:\REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50
Operation:writeName:LowerCaseLongPath
Value:
c:\users\admin\appdata\local\temp\ox_1776888464033.exe
(PID) Process:(8188) WerFault.exeKey:\REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50
Operation:writeName:LongPathHash
Value:
ox_1776888464033|adde07f55a6aff50
(PID) Process:(8188) WerFault.exeKey:\REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50
Operation:writeName:Name
Value:
ox_1776888464033.exe
Executable files
212
Suspicious files
10
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
8188WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ox_1776888464033_fcfff249ca5cccdf56dc408a58af357eee1dae_cd031579_dcbaba43-c355-4270-8d01-7a8e0cc584b0\Report.wer
MD5:
SHA256:
1280loader.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\Retev[1].htmexecutable
MD5:D712BE26FE4BBD0EE1FC9156EA74B705
SHA256:600FD59A6114E08606F4BBC881C1C156193FF01371E1144A05CA787D365E067D
8188WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1BA2.tmp.dmpbinary
MD5:04732360BC170BD3DD678E07E561B926
SHA256:39D5DF4E29AADBE27DCF5647961E5B3464FD0052BFC70A4CE99796ADEE1B2CEC
1280loader.exeC:\Users\admin\AppData\Local\Temp\ox_1776888464033.exeexecutable
MD5:D712BE26FE4BBD0EE1FC9156EA74B705
SHA256:600FD59A6114E08606F4BBC881C1C156193FF01371E1144A05CA787D365E067D
8188WerFault.exeC:\Windows\appcompat\Programs\Amcache.hvebinary
MD5:EE9EE221F8CD1BDFDE4F860A9A639497
SHA256:97ED179B643AF2FA0961B7B37DC5B5631ADE3139CFA657DB16457DD1A77C3C0A
8188WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1C30.tmp.xmlxml
MD5:191C648D50245BC7CCC424D03475CE8D
SHA256:AF1B9C70B93285DCF4A610EB176D21E7FE59774C727BA28BFA2EE99A416730F2
8188WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1C00.tmp.WERInternalMetadata.xmlxml
MD5:CC2A695FC6CAB89557B1027C6DBCBB60
SHA256:9F5E0E44AD5CB04CE1BEF1B6AD8D7C0BE58B86B2456CB71D5E3882A9F0385A11
7512MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU49B7.tmp\MicrosoftEdgeUpdateOnDemand.exeexecutable
MD5:7BCCF980A418155EED445DD5B84B96E0
SHA256:6B6750096417F6E91C4F649B34AFD5DF5216DA169A696BC9E241BD836A67BBFD
7512MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU49B7.tmp\MicrosoftEdgeUpdateBroker.exeexecutable
MD5:E212E9CE45C567C7DBCE9BB326EF41E3
SHA256:9069297ADD7ADC264CBE198B6B2342C8248B994CBA1857231D9B6972339609AC
7512MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU49B7.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeexecutable
MD5:4915479A8F28D2E3AD6B4F787A30574D
SHA256:122EBEBBCD93B4F9DE1E1938D9DDA5D46F5C7B6DA1E0CE2C2EC1CBE2058C5AF1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
79
TCP/UDP connections
50
DNS requests
29
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6076
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
5276
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
6076
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
5276
MoUsoCoreWorker.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
2436
slui.exe
POST
500
48.192.1.64:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
US
xml
512 b
whitelisted
GET
200
188.114.97.3:443
https://vcc-redistributable.help/Stb/Retev.php?bl=oy7DDikwUmXxyY968EPRE008.txt
US
executable
277 Kb
unknown
POST
200
40.126.31.1:443
https://login.live.com/RST2.srf
US
xml
1.24 Kb
whitelisted
POST
400
40.126.31.1:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
204 b
whitelisted
1280
loader.exe
GET
200
188.114.96.3:443
https://vcc-redistributable.help/Stb/Retev.php?bl=oy7DDikwUmXxyY968EPRE008.txt
US
executable
277 Kb
malicious
2436
slui.exe
POST
500
48.192.1.64:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
US
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
48.192.1.64:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2.16.241.205:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
5276
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6076
svchost.exe
2.16.164.49:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6076
svchost.exe
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5276
MoUsoCoreWorker.exe
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
activation-v2.sls.microsoft.com
  • 48.192.1.64
whitelisted
www.bing.com
  • 2.16.241.205
  • 2.16.241.207
  • 2.16.241.218
whitelisted
google.com
  • 142.251.110.101
  • 142.251.110.102
  • 142.251.110.138
  • 142.251.110.100
  • 142.251.110.113
  • 142.251.110.139
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 23.55.110.211
  • 23.55.110.193
whitelisted
www.microsoft.com
  • 23.59.18.102
  • 88.221.169.152
whitelisted
vcc-redistributable.help
  • 188.114.96.3
  • 188.114.97.3
unknown
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.71
  • 40.126.31.131
  • 20.190.159.75
  • 40.126.31.67
  • 20.190.159.68
  • 40.126.31.3
  • 40.126.31.73
  • 40.126.31.128
whitelisted
watson.events.data.microsoft.com
  • 135.233.45.221
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO Observed UA-CPU Header
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
1280
loader.exe
Misc activity
ET INFO Observed UA-CPU Header
1280
loader.exe
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader)
1280
loader.exe
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader)
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader)
Misc activity
ET INFO Packed Executable Download
1280
loader.exe
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader)
1280
loader.exe
Misc activity
ET INFO Packed Executable Download
Process
Message
loader.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
loader.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
loader.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
loader.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
msedgewebview2.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Roaming\1575709424\Overlays directory exists )