| File name: | loader.exe |
| Full analysis: | https://app.any.run/tasks/86fc17b7-835b-46bd-97fa-410b87072837 |
| Verdict: | Malicious activity |
| Threats: | DonutLoader is a versatile, open-source-based in-memory loader that turns .NET assemblies, executables, DLLs, and scripts into position-independent shellcode for execution entirely in RAM. Originally derived from the popular Donut tool, it enables threat actors to bypass traditional antivirus and EDR solutions by avoiding disk writes and injecting payloads directly into legitimate Windows processes. |
| Analysis date: | April 22, 2026, 20:07:31 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 11 sections |
| MD5: | F565F9BDF513897F94DE8FD32AC82C3E |
| SHA1: | 9A50751FE405C9416564E01D7952EC94C8E75572 |
| SHA256: | 910E62ED170C06A24102706986D3789BAE2B3E0618B6D1BE876FE4054B732E7B |
| SSDEEP: | 98304:nDZZkkQQfPifnPL85vlx6aX9ZC5pGVFwjyka/iDONC9alAOjTJsvgDk6Pt40RTEz:7iUr1bknoDkGbc6 |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2026:04:22 12:59:24+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.44 |
| CodeSize: | 3724288 |
| InitializedDataSize: | 2471936 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x8c1000 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | - |
| FileDescription: | Loader |
| FileVersion: | 1.0.0.0 |
| InternalName: | loader.exe |
| LegalCopyright: | Copyright (C) 2025 |
| OriginalFileName: | loader.exe |
| ProductName: | Loader |
| ProductVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1280 | "C:\Users\admin\Desktop\loader.exe" | C:\Users\admin\Desktop\loader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Loader Version: 1.0.0.0 Modules
| |||||||||||||||
| 1500 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A5881C31-8FC5-4EA7-8A46-AA8CF86123CF}\MicrosoftEdge_X64_147.0.3912.72.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level | C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A5881C31-8FC5-4EA7-8A46-AA8CF86123CF}\MicrosoftEdge_X64_147.0.3912.72.exe | MicrosoftEdgeUpdate.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Installer Exit code: 0 Version: 147.0.3912.72 Modules
| |||||||||||||||
| 2420 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe" | C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe | — | MicrosoftEdgeUpdate.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Update COM Registration Helper Exit code: 0 Version: 1.3.229.3 Modules
| |||||||||||||||
| 2432 | "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\admin\AppData\Roaming\1575709424\Overlays\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\admin\AppData\Roaming\1575709424\Overlays\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=147.0.7727.102 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=147.0.3912.72 --initial-client-data=0x184,0x188,0x18c,0x160,0x194,0x7ffe22bc0d58,0x7ffe22bc0d64,0x7ffe22bc0d70 | C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe | — | msedgewebview2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge WebView2 Version: 147.0.3912.72 Modules
| |||||||||||||||
| 2524 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{ADF53516-534C-4166-A0A1-CE590495DA0C}" /silent | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | — | MicrosoftEdgeUpdate.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Update Exit code: 0 Version: 1.3.229.3 Modules
| |||||||||||||||
| 2576 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDcxMDQ3OTcyNSIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjE3NTAiIGRvd25sb2FkX3RpbWVfbXM9Ijk2MDMxIiBkb3dubG9hZGVkPSIxOTAxNTIyNDgiIHRvdGFsPSIxOTAxNTIyNDgiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjMyMjAzIi8-PC9hcHA-PC9yZXF1ZXN0Pg | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | MicrosoftEdgeUpdate.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Update Exit code: 0 Version: 1.3.229.3 Modules
| |||||||||||||||
| 2840 | "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=loader.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\admin\AppData\Roaming\1575709424\Overlays\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=UseChromeOSDirectVideoDecoder --disable-gpu-driver-bug-workarounds --disable-software-rasterizer --enable-accelerated-2d-canvas --enable-gpu-memory-buffer-video-frames --enable-gpu-rasterization --enable-native-gpu-memory-buffers --enable-oop-rasterization --enable-zero-copy --ignore-gpu-blacklist --num-raster-threads=4 --mojo-named-platform-channel-pipe=1280.4488.14816430355717741500 | C:\Program Files (x86)\Microsoft\EdgeWebView\Application\147.0.3912.72\msedgewebview2.exe | loader.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge WebView2 Version: 147.0.3912.72 Modules
| |||||||||||||||
| 3140 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe" | C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe | — | MicrosoftEdgeUpdate.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Update COM Registration Helper Exit code: 0 Version: 1.3.229.3 Modules
| |||||||||||||||
| 3748 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Update Exit code: 0 Version: 1.3.229.3 Modules
| |||||||||||||||
| 4056 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe" | C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.229.3\MicrosoftEdgeUpdateComRegisterShell64.exe | — | MicrosoftEdgeUpdate.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Update COM Registration Helper Exit code: 0 Version: 1.3.229.3 Modules
| |||||||||||||||
| (PID) Process: | (1280) loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1280) loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1280) loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (8188) WerFault.exe | Key: | \REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (8188) WerFault.exe | Key: | \REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (8188) WerFault.exe | Key: | \REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50 |
| Operation: | write | Name: | ProgramId |
Value: 000684d7560fbb18b757a525e271eb2dc6010000ffff | |||
| (PID) Process: | (8188) WerFault.exe | Key: | \REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50 |
| Operation: | write | Name: | FileId |
Value: 00000d73d709f61dcd7d58984dd154c50b925049689c | |||
| (PID) Process: | (8188) WerFault.exe | Key: | \REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50 |
| Operation: | write | Name: | LowerCaseLongPath |
Value: c:\users\admin\appdata\local\temp\ox_1776888464033.exe | |||
| (PID) Process: | (8188) WerFault.exe | Key: | \REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50 |
| Operation: | write | Name: | LongPathHash |
Value: ox_1776888464033|adde07f55a6aff50 | |||
| (PID) Process: | (8188) WerFault.exe | Key: | \REGISTRY\A\{cf0ecd2d-4206-ccf4-4257-ca8ab55c76bf}\Root\InventoryApplicationFile\ox_1776888464033|adde07f55a6aff50 |
| Operation: | write | Name: | Name |
Value: ox_1776888464033.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 8188 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ox_1776888464033_fcfff249ca5cccdf56dc408a58af357eee1dae_cd031579_dcbaba43-c355-4270-8d01-7a8e0cc584b0\Report.wer | — | |
MD5:— | SHA256:— | |||
| 1280 | loader.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\Retev[1].htm | executable | |
MD5:D712BE26FE4BBD0EE1FC9156EA74B705 | SHA256:600FD59A6114E08606F4BBC881C1C156193FF01371E1144A05CA787D365E067D | |||
| 8188 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BA2.tmp.dmp | binary | |
MD5:04732360BC170BD3DD678E07E561B926 | SHA256:39D5DF4E29AADBE27DCF5647961E5B3464FD0052BFC70A4CE99796ADEE1B2CEC | |||
| 1280 | loader.exe | C:\Users\admin\AppData\Local\Temp\ox_1776888464033.exe | executable | |
MD5:D712BE26FE4BBD0EE1FC9156EA74B705 | SHA256:600FD59A6114E08606F4BBC881C1C156193FF01371E1144A05CA787D365E067D | |||
| 8188 | WerFault.exe | C:\Windows\appcompat\Programs\Amcache.hve | binary | |
MD5:EE9EE221F8CD1BDFDE4F860A9A639497 | SHA256:97ED179B643AF2FA0961B7B37DC5B5631ADE3139CFA657DB16457DD1A77C3C0A | |||
| 8188 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C30.tmp.xml | xml | |
MD5:191C648D50245BC7CCC424D03475CE8D | SHA256:AF1B9C70B93285DCF4A610EB176D21E7FE59774C727BA28BFA2EE99A416730F2 | |||
| 8188 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C00.tmp.WERInternalMetadata.xml | xml | |
MD5:CC2A695FC6CAB89557B1027C6DBCBB60 | SHA256:9F5E0E44AD5CB04CE1BEF1B6AD8D7C0BE58B86B2456CB71D5E3882A9F0385A11 | |||
| 7512 | MicrosoftEdgeWebview2Setup.exe | C:\Program Files (x86)\Microsoft\Temp\EU49B7.tmp\MicrosoftEdgeUpdateOnDemand.exe | executable | |
MD5:7BCCF980A418155EED445DD5B84B96E0 | SHA256:6B6750096417F6E91C4F649B34AFD5DF5216DA169A696BC9E241BD836A67BBFD | |||
| 7512 | MicrosoftEdgeWebview2Setup.exe | C:\Program Files (x86)\Microsoft\Temp\EU49B7.tmp\MicrosoftEdgeUpdateBroker.exe | executable | |
MD5:E212E9CE45C567C7DBCE9BB326EF41E3 | SHA256:9069297ADD7ADC264CBE198B6B2342C8248B994CBA1857231D9B6972339609AC | |||
| 7512 | MicrosoftEdgeWebview2Setup.exe | C:\Program Files (x86)\Microsoft\Temp\EU49B7.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe | executable | |
MD5:4915479A8F28D2E3AD6B4F787A30574D | SHA256:122EBEBBCD93B4F9DE1E1938D9DDA5D46F5C7B6DA1E0CE2C2EC1CBE2058C5AF1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6076 | svchost.exe | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | binary | 825 b | whitelisted |
5276 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | binary | 825 b | whitelisted |
6076 | svchost.exe | GET | 200 | 23.59.18.102:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | US | binary | 814 b | whitelisted |
5276 | MoUsoCoreWorker.exe | GET | 200 | 23.59.18.102:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | US | binary | 814 b | whitelisted |
2436 | slui.exe | POST | 500 | 48.192.1.64:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | xml | 512 b | whitelisted |
— | — | GET | 200 | 188.114.97.3:443 | https://vcc-redistributable.help/Stb/Retev.php?bl=oy7DDikwUmXxyY968EPRE008.txt | US | executable | 277 Kb | unknown |
— | — | POST | 200 | 40.126.31.1:443 | https://login.live.com/RST2.srf | US | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 40.126.31.1:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | US | text | 204 b | whitelisted |
1280 | loader.exe | GET | 200 | 188.114.96.3:443 | https://vcc-redistributable.help/Stb/Retev.php?bl=oy7DDikwUmXxyY968EPRE008.txt | US | executable | 277 Kb | malicious |
2436 | slui.exe | POST | 500 | 48.192.1.64:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
— | — | 48.192.1.64:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
— | — | 2.16.241.205:443 | www.bing.com | AKAMAI-ASN1 | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
5276 | MoUsoCoreWorker.exe | 2.16.164.49:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
6076 | svchost.exe | 2.16.164.49:80 | crl.microsoft.com | AKAMAI-ASN1 | NL | whitelisted |
6076 | svchost.exe | 23.59.18.102:80 | www.microsoft.com | AKAMAI-AS | US | whitelisted |
5276 | MoUsoCoreWorker.exe | 23.59.18.102:80 | www.microsoft.com | AKAMAI-AS | US | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
vcc-redistributable.help |
| unknown |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Observed UA-CPU Header |
— | — | A Network Trojan was detected | ET MALWARE Possible Windows executable sent when remote host claims to send html content |
1280 | loader.exe | Misc activity | ET INFO Observed UA-CPU Header |
1280 | loader.exe | A Network Trojan was detected | ET MALWARE Possible Windows executable sent when remote host claims to send html content |
— | — | Potentially Bad Traffic | SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader) |
1280 | loader.exe | Potentially Bad Traffic | SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader) |
— | — | Potentially Bad Traffic | SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader) |
— | — | Misc activity | ET INFO Packed Executable Download |
1280 | loader.exe | Potentially Bad Traffic | SUSPICIOUS [ANY.RUN] Possible Win32/Generic Loader User-agent observed (loader) |
1280 | loader.exe | Misc activity | ET INFO Packed Executable Download |
Process | Message |
|---|---|
loader.exe | WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
|
loader.exe | WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
|
loader.exe | WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
|
loader.exe | WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
|
msedgewebview2.exe | RecursiveDirectoryCreate( C:\Users\admin\AppData\Roaming\1575709424\Overlays directory exists )
|