| File name: | loader.exe |
| Full analysis: | https://app.any.run/tasks/90735ac4-a3ac-4113-af54-ded480788f55 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | April 09, 2025, 09:55:10 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 12 sections |
| MD5: | 89E72E7B505E4B2DFCEC1399BB670762 |
| SHA1: | BB8FF890DE75F6FE98EC37005F5A6666CEBF2EBD |
| SHA256: | CC6BE9BE83C5125545564B606915E2FDC71F870975340DC7181800A4E59C0326 |
| SSDEEP: | 98304:BoMQNDF3vVN2k71AHzFTI+h6a+fP0aIzuzN7b9O+eZHoAZjoZwnKUdO7zz5avxzb:I3xzDrREujBExmS |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:04:08 17:30:32+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.43 |
| CodeSize: | 2444800 |
| InitializedDataSize: | 296960 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x8e4058 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 668 | "C:\WINDOWS\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896 | C:\Windows\System32\SearchFilterHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Windows Search Filter Host Version: 7.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 904 | "C:\Users\admin\AppData\Local\Temp\loader.exe" | C:\Users\admin\AppData\Local\Temp\loader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1240 | "C:\WINDOWS\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Version: 7.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1660 | C:\WINDOWS\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe | C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft (R) Diagnostics Hub Standard Collector Version: 11.00.19041.3930 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2384 | C:\WINDOWS\system32\TieringEngineService.exe | C:\Windows\System32\TieringEngineService.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Storage Tiers Management Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3096 | C:\WINDOWS\system32\AppVClient.exe | C:\Windows\System32\AppVClient.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Application Virtualization Client Service Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4040 | "C:\WINDOWS\System32\GameInputSvc.exe" Global\GameInputSession_5 | C:\Windows\System32\GameInputSvc.exe | — | GameInputSvc.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: GameInput Host Service Version: 0.2309.19041.4046 Modules
| |||||||||||||||
| 4120 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Update Exit code: 0 Version: 1.3.147.37 Modules
| |||||||||||||||
| 4784 | "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe" | C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | services.exe | ||||||||||||
User: SYSTEM Company: Adobe Inc. Integrity Level: SYSTEM Description: Acrobat Update Service Version: 1.824.460.1042 Modules
| |||||||||||||||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Both | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Both | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25D72A6A-8A84-4E25-886B-02FD23A7A104}\InprocHandler32 |
| Operation: | write | Name: | ThreadingModel |
Value: Both | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{491B3F26-48E7-4BF4-9079-EEAC5D81371F}\InProcServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Both | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25D72A6A-8A84-4E25-886B-02FD23A7A104}\InprocHandler32 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6324) MicrosoftEdgeUpdate.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25D72A6A-8A84-4E25-886B-02FD23A7A104} |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 904 | loader.exe | C:\Windows\System32\FXSSVC.exe | executable | |
MD5:DAD479FB33229D795709031D98875CB8 | SHA256:1BDCD531DBDAA01C16A4D38E017974F8FF2649216465E9794F1CB4F63929997F | |||
| 904 | loader.exe | C:\Windows\System32\GameInputSvc.exe | executable | |
MD5:D90D7E7E4458B9B2A0ECD70D3FCB3303 | SHA256:7BE2755668E7CB1A140949A2EF7EF990B8D72CD7BCDC9C023F9C34932C22AD4E | |||
| 904 | loader.exe | C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | executable | |
MD5:52D6EBACC8AA07D02FA0C5A1407BD3AA | SHA256:18396641AFD30D31949DB8EDD10E23B6DAA52560AB963C77C027C91CE3CEDB8C | |||
| 904 | loader.exe | C:\Program Files\Google\Chrome\Application\122.0.6261.70\elevation_service.exe | executable | |
MD5:E9CABF6AE3553EDC067FBB686017F717 | SHA256:48788F88D5620B439F59ED00F6FBD345AE92AC0A2F41159DCA3A05067C9BB0FD | |||
| 4120 | MicrosoftEdgeUpdate.exe | C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log | binary | |
MD5:97B55B812DFB5E9BF926522873A647D4 | SHA256:3C17893DB8E4E354407174BA0F88D54081745F91B5872CB62E9DF307004582A2 | |||
| 904 | loader.exe | C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | executable | |
MD5:B904AD10CB1CACDF32FCE10173ED081B | SHA256:ABD809DE149DDA9157C0EDECAFE28D4F87276E2967A6400428A66A224B0658FD | |||
| 6644 | FlashPlayerUpdateService.exe | C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:669DB7069BCD46E2D1985207949A4D23 | SHA256:C93AAB39FF73EE7BCED1F0FC562074853F028497F2C36170B38C367A0B25A626 | |||
| 904 | loader.exe | C:\Users\admin\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:DCA9A6FF31FF1EB558AA6378EFCC3FFC | SHA256:6D750F8F6E41730A2F86DA643DE3EAB0467FA89074900FF591B8462510894DFE | |||
| 3096 | AppVClient.exe | C:\Windows\System32\config\systemprofile\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:0CCB2EE792B7C15D90DA9EFCF062589D | SHA256:6A48DB8FF4774C0CC7E71EA5B0B490F24D7C34B8127BF8D09CA8F903251F079D | |||
| 904 | loader.exe | C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe | executable | |
MD5:6B6135AF6830574B1C2F52321AE2EEB2 | SHA256:4AAB30E8AF419F08C20472932F0983E55936CF6E68856DF5118087DFBF6B0364 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
904 | loader.exe | POST | 200 | 52.11.240.239:80 | http://pywolwnvd.biz/xbnaul | unknown | — | — | malicious |
1660 | DiagnosticsHub.StandardCollector.Service.exe | POST | 200 | 52.11.240.239:80 | http://pywolwnvd.biz/iflfpdyfwvt | unknown | — | — | malicious |
— | — | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1660 | DiagnosticsHub.StandardCollector.Service.exe | POST | 200 | 13.213.51.196:80 | http://ssbzmoy.biz/pwa | unknown | — | — | unknown |
904 | loader.exe | POST | 200 | 52.11.240.239:80 | http://cvgrf.biz/wnrdp | unknown | — | — | malicious |
904 | loader.exe | POST | 200 | 13.213.51.196:80 | http://ssbzmoy.biz/iflfpdyfwvt | unknown | — | — | malicious |
904 | loader.exe | GET | 200 | 199.59.243.228:80 | http://ww7.przvgke.biz/lyppxoq?usid=17&utid=38057269446 | unknown | — | — | malicious |
904 | loader.exe | POST | 200 | 3.229.117.57:80 | http://npukfztj.biz/hu | unknown | — | — | malicious |
904 | loader.exe | POST | 302 | 72.52.178.23:80 | http://przvgke.biz/lyppxoq | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
— | — | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
904 | loader.exe | 52.11.240.239:80 | pywolwnvd.biz | AMAZON-02 | US | malicious |
904 | loader.exe | 13.213.51.196:80 | ssbzmoy.biz | AMAZON-02 | SG | malicious |
1660 | DiagnosticsHub.StandardCollector.Service.exe | 52.11.240.239:80 | pywolwnvd.biz | AMAZON-02 | US | malicious |
1660 | DiagnosticsHub.StandardCollector.Service.exe | 13.213.51.196:80 | ssbzmoy.biz | AMAZON-02 | SG | malicious |
3812 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
pywolwnvd.biz |
| malicious |
ssbzmoy.biz |
| malicious |
cvgrf.biz |
| malicious |
npukfztj.biz |
| malicious |
przvgke.biz |
| unknown |
ww7.przvgke.biz |
| malicious |
clients2.google.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
904 | loader.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
904 | loader.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
904 | loader.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
904 | loader.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
904 | loader.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
904 | loader.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
2196 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) |
2196 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) |
7616 | svchost.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
7616 | svchost.exe | Misc activity | ET INFO EXE - Served Attached HTTP |