File name:

Chime.exe.zip

Full analysis: https://app.any.run/tasks/6ed972c4-1ecd-4cc0-80b5-4af7cc43837c
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: January 22, 2026, 19:16:36
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
delphi
hijackloader
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

1B58A1220CD1B89166104D0A357810CB

SHA1:

82197D621268C451DD36BE1DC8E4073F3124B7BE

SHA256:

F9BC16F28A4822FBDC1CD4423E0A8289A1B721EF50819D76C96EC532FE88A744

SSDEEP:

98304:SsRsZtZZDhFMvZhW0xtQg1xiHubK/lXmxxzBS9FGWZKFi9JCLUtX6lq+zVylRZ9p:Fn6cTRe0e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • PScheduler.exe (PID: 4996)
    • HIJACKLOADER has been detected (YARA)

      • PScheduler.exe (PID: 4996)
      • Chime.exe (PID: 8644)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7428)
      • WinRAR.exe (PID: 6552)
      • nLnLDSdA.exe (PID: 768)
    • Executable content was dropped or overwritten

      • nLnLDSdA.exe (PID: 768)
  • INFO

    • Manual execution by a user

      • nLnLDSdA.exe (PID: 768)
      • WinRAR.exe (PID: 6552)
    • The sample compiled with chinese language support

      • WinRAR.exe (PID: 7428)
      • WinRAR.exe (PID: 6552)
      • nLnLDSdA.exe (PID: 768)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6552)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6552)
      • WinRAR.exe (PID: 7428)
      • nLnLDSdA.exe (PID: 768)
    • Compiled with Borland Delphi (YARA)

      • nLnLDSdA.exe (PID: 768)
    • Checks supported languages

      • nLnLDSdA.exe (PID: 768)
      • PScheduler.exe (PID: 4996)
      • Chime.exe (PID: 8644)
    • Checks proxy server information

      • slui.exe (PID: 8072)
    • There is functionality for taking screenshot (YARA)

      • nLnLDSdA.exe (PID: 768)
      • PScheduler.exe (PID: 4996)
    • Reads the computer name

      • nLnLDSdA.exe (PID: 768)
      • PScheduler.exe (PID: 4996)
      • Chime.exe (PID: 8644)
    • Creates files in the program directory

      • nLnLDSdA.exe (PID: 768)
    • Creates files or folders in the user directory

      • nLnLDSdA.exe (PID: 768)
    • Create files in a temporary directory

      • nLnLDSdA.exe (PID: 768)
      • Chime.exe (PID: 8644)
    • Reads the machine GUID from the registry

      • PScheduler.exe (PID: 4996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 2026:01:22 19:15:00
ZipCRC: 0x8ce53c5a
ZipCompressedSize: 4410279
ZipUncompressedSize: 9319436
ZipFileName: Chime.exe.bin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
161
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs slui.exe winrar.exe nlnldsda.exe #HIJACKLOADER pscheduler.exe #HIJACKLOADER chime.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
768"C:\Users\admin\Desktop\nLnLDSdA.exe" C:\Users\admin\Desktop\nLnLDSdA.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.11
Modules
Images
c:\users\admin\desktop\nlnldsda.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4996C:\ProgramData\PScheduler.exeC:\ProgramData\PScheduler.exe
nLnLDSdA.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
本地搜索
Version:
11, 0, 0, 1134
Modules
Images
c:\users\admin\appdata\local\temp\9994a6a.tmp
c:\programdata\pscheduler.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6552"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\Chime.exe" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7428"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Chime.exe.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
8072C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8644C:\Users\admin\AppData\Roaming\authorizehost\Chime.exeC:\Users\admin\AppData\Roaming\authorizehost\Chime.exe
nLnLDSdA.exe
User:
admin
Company:
Amazon.com Services LLC
Integrity Level:
MEDIUM
Description:
Amazon Chime
Exit code:
0
Version:
5.23.32022
Modules
Images
c:\windows\syswow64\rasapi32.dll
c:\users\admin\appdata\roaming\authorizehost\chime.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
6 540
Read events
6 501
Write events
26
Delete events
13

Modification events

(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Downloads\chromium_build 1.zip
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Chime.exe.zip
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
27
Suspicious files
9
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7428WinRAR.exeC:\Users\admin\Desktop\Chime.exe.bincompressed
MD5:772064997CB9861B7DCF700031ABDBBC
SHA256:C54B0065D40FC2053AC94E2ED80743CD14ACF6BCEA1FAADB0C4771D6EE880FD8
6552WinRAR.exeC:\Users\admin\Desktop\NLETransitionMgr.dllexecutable
MD5:B27EC2286DAA245CEB0688DF5B7F574D
SHA256:41050F6F6919A4516D481F7C9B5FE6074C447AFC6E9CC28D180982EEA50AE165
6552WinRAR.exeC:\Users\admin\Desktop\Sengrung.qyjtbinary
MD5:3D3274FCE7D1C2A89185A9AEC8771FAD
SHA256:A3D7CBEF100956ED9874EB2BE13351360FC077F9D9FB05D840AB7EC338A9AD5C
6552WinRAR.exeC:\Users\admin\Desktop\DBGHelp.dllexecutable
MD5:3094481F0CB0531B407D2388ECB4B85F
SHA256:C1275DDF04A0942B416C1A0B2D32003A4EDA732C6F97C74181C236E35D12420F
6552WinRAR.exeC:\Users\admin\Desktop\nLnLDSdA.exeexecutable
MD5:A4B240CCE6E3DA6E959F33BD82394034
SHA256:44F009CA786BC541CDA11C61BAB7B272E96CE9E3D656C10BDAC2E126F3A9CC35
6552WinRAR.exeC:\Users\admin\Desktop\BugSplat.dllexecutable
MD5:27D48C6C48D5259A4E2AD7BE369CE906
SHA256:4B33EE0E8A4153C0C8CCD945ADB18D8F91B5B824746A15986BF6781F081F9968
6552WinRAR.exeC:\Users\admin\Desktop\WS_ImageProc.dllexecutable
MD5:23B3A972DC6E25581B6FA9E01BAFC375
SHA256:58EF42507D9FC1E8A7B240EF5CDDC9F600C3D9A61EE6A42A4045278BB332B86A
6552WinRAR.exeC:\Users\admin\Desktop\WS_Log.dllexecutable
MD5:D297FE804BDCD33BB43E120804E596F6
SHA256:B3C55F0EB33BFA8CA2EFC6A5F6672366A0D1E191B8AABD2D37490D03F38462DC
6552WinRAR.exeC:\Users\admin\Desktop\SlideShowEditor.initext
MD5:BAB28424AF84ABFE9985AA887856AFCB
SHA256:D8DA65ACC79167D53DECAB2D59C3F6DBFBA37FB20FCDBFE3E260A9A8B45597F1
6552WinRAR.exeC:\Users\admin\Desktop\COMSupport.dllexecutable
MD5:976EF4AF05E92E4DBB612756E6798A37
SHA256:B1038928A6DA2A1B5064A27187403563F3AB7E8D4EC034DFA8D5D3F6BE231191
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
88
TCP/UDP connections
134
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6820
backgroundTaskHost.exe
POST
404
20.199.58.43:443
https://arc.msn.com/v4/api/register?asid=508AF97DED5C471DB201D1C161350326&placement=cdmdevreg&country=US&locale=en-US&poptin=0&fmt=json&arch=AMD64&chassis=1&concp=0&d3dfl=D3D_FEATURE_LEVEL_12_1&devfam=Windows.Desktop&devosver=10.0.19045.4046&dinst=1661339444&dmret=0&flightbranch=&flightring=Retail&icluc=0&localid=w%3AAC7699B0-48EA-FD22-C8DC-06A02098A0F0&oem=DELL&osbranch=vb_release&oslocale=en-US&osret=1&ossku=Professional&osskuid=48&prccn=6&prccs=3094&prcmf=AuthenticAMD&procm=AMD%20Ryzen%205%203500%206-Core%20Processor&ram=6144&tinst=Client&tl=1&pat=0&smc=0&sac=0&disphorzres=1360&dispsize=47.3&dispvertres=768&ldisphorzres=1360&ldispvertres=768&moncnt=1&cpdsk=260281&frdsk=220338&lo=4405636&tsu=1796166
US
xml
341 b
whitelisted
3292
svchost.exe
GET
404
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
US
xml
341 b
whitelisted
3292
svchost.exe
GET
404
23.53.41.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
xml
341 b
whitelisted
4280
svchost.exe
POST
404
20.190.160.132:443
https://login.live.com/RST2.srf
US
xml
341 b
whitelisted
2364
SIHClient.exe
GET
404
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
2364
SIHClient.exe
GET
404
13.95.31.18:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
xml
341 b
whitelisted
2364
SIHClient.exe
GET
404
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
2364
SIHClient.exe
GET
404
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
2364
SIHClient.exe
GET
404
13.95.31.18:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
xml
341 b
whitelisted
2364
SIHClient.exe
GET
404
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
xml
341 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
8356
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
Not routed
whitelisted
6392
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2.16.204.152:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
2.16.204.139:443
th.bing.com
AKAMAI-ASN1
NL
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
6712
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6820
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6820
backgroundTaskHost.exe
20.223.35.26:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
th.bing.com
  • 2.16.204.139
  • 2.16.204.153
  • 2.16.204.141
  • 2.16.204.138
  • 2.16.204.134
  • 2.16.204.160
  • 2.16.204.135
  • 2.16.204.142
  • 2.16.204.161
whitelisted
www.bing.com
  • 2.16.204.152
  • 2.16.204.160
  • 2.16.204.145
  • 2.16.204.148
  • 2.16.204.155
  • 2.16.204.158
  • 2.16.204.151
  • 2.16.204.149
  • 2.16.204.153
whitelisted
google.com
  • 172.217.18.14
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
activation-v2.sls.microsoft.com
  • 48.192.1.64
whitelisted
self.events.data.microsoft.com
  • 13.69.239.73
whitelisted
www.microsoft.com
  • 23.59.18.102
whitelisted
crl.microsoft.com
  • 23.53.41.90
  • 23.53.40.178
  • 23.53.42.18
  • 23.53.41.248
whitelisted

Threats

No threats detected
No debug info