File name:

b6Dy8GGKZL.zip

Full analysis: https://app.any.run/tasks/239dc0bb-e54a-4bc4-9322-392f2561defb
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: January 22, 2026, 18:41:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
delphi
hijackloader
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

772064997CB9861B7DCF700031ABDBBC

SHA1:

E977D08B472CD61D3535CE11A66BC67F91A050C2

SHA256:

C54B0065D40FC2053AC94E2ED80743CD14ACF6BCEA1FAADB0C4771D6EE880FD8

SSDEEP:

98304:Fp0zbNq6PeNcdzEN0qLc7bMBWBw6h7tfpkcexHOyddYIS/n9gDBcbN2k9A8+8qIa:QH543

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • PScheduler.exe (PID: 1316)
    • HIJACKLOADER has been detected (YARA)

      • Chime.exe (PID: 3560)
      • PScheduler.exe (PID: 1316)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 1352)
      • nLnLDSdA.exe (PID: 7976)
    • Executable content was dropped or overwritten

      • nLnLDSdA.exe (PID: 7976)
  • INFO

    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 1352)
      • nLnLDSdA.exe (PID: 7976)
    • Checks supported languages

      • nLnLDSdA.exe (PID: 7976)
      • PScheduler.exe (PID: 1316)
      • Chime.exe (PID: 3560)
    • Manual execution by a user

      • nLnLDSdA.exe (PID: 7976)
    • Compiled with Borland Delphi (YARA)

      • nLnLDSdA.exe (PID: 7976)
    • There is functionality for taking screenshot (YARA)

      • nLnLDSdA.exe (PID: 7976)
      • PScheduler.exe (PID: 1316)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 1352)
      • nLnLDSdA.exe (PID: 7976)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1352)
    • Reads the computer name

      • nLnLDSdA.exe (PID: 7976)
      • PScheduler.exe (PID: 1316)
      • Chime.exe (PID: 3560)
    • Creates files in the program directory

      • nLnLDSdA.exe (PID: 7976)
    • Creates files or folders in the user directory

      • nLnLDSdA.exe (PID: 7976)
    • Reads the machine GUID from the registry

      • PScheduler.exe (PID: 1316)
    • Create files in a temporary directory

      • nLnLDSdA.exe (PID: 7976)
      • Chime.exe (PID: 3560)
    • Checks proxy server information

      • slui.exe (PID: 5164)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2026:01:22 11:17:00
ZipCRC: 0xf0b10440
ZipCompressedSize: 127488
ZipUncompressedSize: 127488
ZipFileName: NLETransitionMgr.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
161
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe nlnldsda.exe slui.exe #HIJACKLOADER pscheduler.exe #HIJACKLOADER chime.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1316C:\ProgramData\PScheduler.exeC:\ProgramData\PScheduler.exe
nLnLDSdA.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
本地搜索
Version:
11, 0, 0, 1134
Modules
Images
c:\users\admin\appdata\local\temp\8a73522.tmp
c:\programdata\pscheduler.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1352"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\b6Dy8GGKZL.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3560C:\Users\admin\AppData\Roaming\authorizehost\Chime.exeC:\Users\admin\AppData\Roaming\authorizehost\Chime.exe
nLnLDSdA.exe
User:
admin
Company:
Amazon.com Services LLC
Integrity Level:
MEDIUM
Description:
Amazon Chime
Exit code:
0
Version:
5.23.32022
Modules
Images
c:\windows\syswow64\rasapi32.dll
c:\users\admin\appdata\roaming\authorizehost\chime.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5164C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7976"C:\Users\admin\Desktop\nLnLDSdA.exe" C:\Users\admin\Desktop\nLnLDSdA.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.11
Modules
Images
c:\users\admin\desktop\nlnldsda.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
4 402
Read events
4 368
Write events
21
Delete events
13

Modification events

(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Downloads\chromium_build 1.zip
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\b6Dy8GGKZL.zip
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(1352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
27
Suspicious files
8
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1352WinRAR.exeC:\Users\admin\Desktop\Sengrung.qyjtbinary
MD5:3D3274FCE7D1C2A89185A9AEC8771FAD
SHA256:A3D7CBEF100956ED9874EB2BE13351360FC077F9D9FB05D840AB7EC338A9AD5C
1352WinRAR.exeC:\Users\admin\Desktop\nLnLDSdA.exeexecutable
MD5:A4B240CCE6E3DA6E959F33BD82394034
SHA256:44F009CA786BC541CDA11C61BAB7B272E96CE9E3D656C10BDAC2E126F3A9CC35
1352WinRAR.exeC:\Users\admin\Desktop\DBGHelp.dllexecutable
MD5:3094481F0CB0531B407D2388ECB4B85F
SHA256:C1275DDF04A0942B416C1A0B2D32003A4EDA732C6F97C74181C236E35D12420F
1352WinRAR.exeC:\Users\admin\Desktop\NLETransitionMgr.dllexecutable
MD5:B27EC2286DAA245CEB0688DF5B7F574D
SHA256:41050F6F6919A4516D481F7C9B5FE6074C447AFC6E9CC28D180982EEA50AE165
1352WinRAR.exeC:\Users\admin\Desktop\WS_Log.dllexecutable
MD5:D297FE804BDCD33BB43E120804E596F6
SHA256:B3C55F0EB33BFA8CA2EFC6A5F6672366A0D1E191B8AABD2D37490D03F38462DC
1352WinRAR.exeC:\Users\admin\Desktop\WsBurn.dllexecutable
MD5:C6328E8342538B7E2502B752E5CB1E28
SHA256:8FCAE9719A3F831CB73EF50B587A6222FF73D6C1A6AE617636CB31C6E02D5E3A
1352WinRAR.exeC:\Users\admin\Desktop\BugSplat.dllexecutable
MD5:27D48C6C48D5259A4E2AD7BE369CE906
SHA256:4B33EE0E8A4153C0C8CCD945ADB18D8F91B5B824746A15986BF6781F081F9968
1352WinRAR.exeC:\Users\admin\Desktop\NLEService.dllexecutable
MD5:77BFFD6A7270BF001AABA999DE8394F9
SHA256:15C4860F2E0530BC896F9B07F893B32B13CFFE40C909293B6232BD5696A5F71A
1352WinRAR.exeC:\Users\admin\Desktop\WSUtilities.dllexecutable
MD5:54B87D3271A4FA9B1E1FEA51C2EF9C14
SHA256:30B9B877AA1112105069BE6B4DE794B7A7147A1D968E71FA63F2EDC7397E126F
1352WinRAR.exeC:\Users\admin\Desktop\COMSupport.dllexecutable
MD5:976EF4AF05E92E4DBB612756E6798A37
SHA256:B1038928A6DA2A1B5064A27187403563F3AB7E8D4EC034DFA8D5D3F6BE231191
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
173
TCP/UDP connections
179
DNS requests
27
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4280
svchost.exe
POST
404
40.126.31.128:443
https://login.live.com/RST2.srf
US
xml
341 b
whitelisted
4280
svchost.exe
POST
404
40.126.31.128:443
https://login.live.com/RST2.srf
US
xml
341 b
whitelisted
4280
svchost.exe
POST
404
40.126.31.128:443
https://login.live.com/RST2.srf
US
xml
341 b
whitelisted
2312
SIHClient.exe
GET
404
135.233.95.144:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
2312
SIHClient.exe
GET
404
135.233.95.144:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
2312
SIHClient.exe
GET
404
13.95.31.18:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
xml
341 b
whitelisted
2312
SIHClient.exe
GET
404
13.95.31.18:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
xml
341 b
whitelisted
2312
SIHClient.exe
GET
404
135.233.95.144:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
2312
SIHClient.exe
GET
404
135.233.95.144:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
5568
SearchApp.exe
GET
404
2.16.204.152:443
https://th.bing.com/th?id=OVP.yEhYwYYHoLNjLCXGQ6RzIQHgFo&w=188&h=110&c=1&rs=1&p=0
NL
xml
341 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
8800
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
Not routed
whitelisted
8376
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
4280
svchost.exe
40.126.31.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3412
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8376
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6712
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 172.217.18.14
whitelisted
login.live.com
  • 40.126.31.128
  • 40.126.31.2
  • 40.126.31.1
  • 40.126.31.69
  • 40.126.31.0
  • 40.126.31.71
  • 40.126.31.67
  • 40.126.31.130
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 135.233.95.144
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
  • 2603:1030:10:12::2fe
whitelisted
18.31.95.13.in-addr.arpa
whitelisted
e.f.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.1.0.0.0.1.0.0.0.3.0.1.3.0.6.2.ip6.arpa
whitelisted
th.bing.com
  • 2.16.204.152
  • 2.16.204.148
  • 2.16.204.149
  • 2.16.204.144
  • 2.16.204.151
  • 2.16.204.146
  • 2.16.204.150
  • 2.16.204.157
  • 2.16.204.156
whitelisted
www.bing.com
  • 2.16.204.150
  • 2.16.204.157
  • 2.16.204.149
  • 2.16.204.144
  • 2.16.204.152
  • 2.16.204.146
  • 2.16.204.156
  • 2.16.204.151
  • 2.16.204.148
  • 2.16.204.136
  • 2.16.204.139
  • 2.16.204.143
  • 2.16.204.160
  • 2.16.204.134
  • 2.16.204.142
  • 2.16.204.138
  • 2.16.204.141
whitelisted

Threats

No threats detected
No debug info