File name:

Loader.exe

Full analysis: https://app.any.run/tasks/3b84bc71-1cbc-4196-aa55-fa565fc72884
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 06, 2025, 03:32:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 9 sections
MD5:

4CB926D23355848E8A0FD14A11EF21CB

SHA1:

1240ADE3EB5015BD4E33A752A75664661904CD8B

SHA256:

F9F64E15ABCBB2AC1F80ECEBD148512329356904BD593646860CE2AE77D466F6

SSDEEP:

98304:yqJ5vA/FWcI5kxXHZGZUrcmF4tUdQVHMXx6P1w2WzijXO/ZaTGAZtZsHI2n1WwLe:mlKIaRi4SkQQ1+0i

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process requests binary or script from the Internet

      • Loader.exe (PID: 6540)
    • Executable content was dropped or overwritten

      • Loader.exe (PID: 6540)
    • Reads security settings of Internet Explorer

      • Loader.exe (PID: 6540)
    • There is functionality for communication over UDP network (YARA)

      • Loader.exe (PID: 6540)
    • Reads Internet Explorer settings

      • Loader.exe (PID: 6540)
    • Reads Microsoft Outlook installation path

      • Loader.exe (PID: 6540)
    • Potential Corporate Privacy Violation

      • Loader.exe (PID: 6540)
    • Process drops legitimate windows executable

      • Loader.exe (PID: 6540)
  • INFO

    • The sample compiled with english language support

      • Loader.exe (PID: 6540)
    • Checks supported languages

      • Loader.exe (PID: 6540)
    • Reads the computer name

      • Loader.exe (PID: 6540)
    • Creates files or folders in the user directory

      • Loader.exe (PID: 6540)
    • Create files in a temporary directory

      • Loader.exe (PID: 6540)
    • Reads the machine GUID from the registry

      • Loader.exe (PID: 6540)
    • Compiled with Borland Delphi (YARA)

      • Loader.exe (PID: 6540)
    • Reads the software policy settings

      • Loader.exe (PID: 6540)
    • Checks proxy server information

      • Loader.exe (PID: 6540)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.scr | Windows screen saver (46.4)
.dll | Win32 Dynamic Link Library (generic) (23.3)
.exe | Win32 Executable (generic) (15.9)
.exe | Generic Win/DOS Executable (7)
.exe | DOS Executable Generic (7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 1894400
InitializedDataSize: 2150400
UninitializedDataSize: -
EntryPoint: 0x7b24d3
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 3.2.7.0
ProductVersionNumber: 3.2.7.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: GamingOnSteroids
FileDescription: Loader
FileVersion: 3.2.8.0
InternalName: Loader
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: Loader
ProductName: GamingOnSteroids
ProductVersion: 3.2.8.0
Comments: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start loader.exe sppextcomobj.exe no specs slui.exe no specs loader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496"C:\Users\admin\AppData\Local\Temp\Loader.exe" C:\Users\admin\AppData\Local\Temp\Loader.exeexplorer.exe
User:
admin
Company:
GamingOnSteroids
Integrity Level:
MEDIUM
Description:
Loader
Exit code:
3221226540
Version:
3.2.8.0
Modules
Images
c:\users\admin\appdata\local\temp\loader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1348C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6540"C:\Users\admin\AppData\Local\Temp\Loader.exe" C:\Users\admin\AppData\Local\Temp\Loader.exe
explorer.exe
User:
admin
Company:
GamingOnSteroids
Integrity Level:
HIGH
Description:
Loader
Version:
3.2.8.0
Modules
Images
c:\users\admin\appdata\local\temp\loader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6744"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 054
Read events
1 050
Write events
4
Delete events
0

Modification events

(PID) Process:(6540) Loader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\GoS
Operation:writeName:URL Protocol
Value:
(PID) Process:(6540) Loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6540) Loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6540) Loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
4
Suspicious files
7
Text files
23
Unknown types
0

Dropped files

PID
Process
Filename
Type
6540Loader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dbinary
MD5:293227CDE2F88DA4A8A06039947FB390
SHA256:BE030B65A7263FB06208FC232EB0E1A21E45B1E0848A1C65FEFA342EE7AA1900
6540Loader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Ebinary
MD5:D08B946A3BAF0D0783D53B1E750CB537
SHA256:8CB2A66A7169DD8D6FFA4DE5D4A1C0D5EF41931E35CD44C8FDC59B35CFF36176
6540Loader.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\index[1].htmhtml
MD5:84E0E174C1D7F937750394653F5D9D66
SHA256:D174A4CBADE004F258A5B1A09540AC8B5E8E1347A5F64AC0D3C6B6F258F0BE02
6540Loader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A94CE6636EF706F1DF297C4847F365AFbinary
MD5:8F86F743C90C7D5A2B94EE054E57B3AA
SHA256:6FDA6A9D1813940865C7986CFF24C41C4FE5B2F935B3FAA571529020BBF64B47
6540Loader.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\index[1].htmlhtml
MD5:CEDAE6549B5223DFEF46C6E3B7557752
SHA256:DA104FBC842341F434726B135CD6A46E13E12FB37227C2BF6443B477A8686462
6540Loader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A94CE6636EF706F1DF297C4847F365AFbinary
MD5:A652312886F042725A53E667B907B3DE
SHA256:EF3437A1FC45C60AE87821D97BE522BA6DF270037CCED6391609F0174D731D55
6540Loader.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\412553-guest257351[1].htmhtml
MD5:C382CDB96792DF2DCCB1845880036350
SHA256:6AD56BC2AF7112D28EB2A361AF6D49B1A8007E97F50C2B11C179330D56F439FB
6540Loader.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\hf-lib[1].phptext
MD5:03F4D3340ED6385DD89ACC667595C3BF
SHA256:80260CDA4183445E56E98E38CF6F8F5C443AF343B08D752953D3D6A8D8619FCC
6540Loader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850Dbinary
MD5:00EF6DFE81EA0F05599798A6A4FB81A0
SHA256:C8B4A5EDCDC21B6F115F8B32F121257EC3A302D49AC8E9175489EFCD4550375C
6540Loader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711Ebinary
MD5:E5F2B478892A768EF7F2A2D14ACA864B
SHA256:E3504EA46ADE28964810DAB76AEB6DBCFBF8EFE2CF41DD86264BB4B40C482DD5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
36
TCP/UDP connections
25
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3300
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3300
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6540
Loader.exe
POST
302
185.30.164.14:80
http://gamingonsteroids.com/gos.php?app=core&module=global&section=login&do=process
unknown
unknown
6540
Loader.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
whitelisted
6540
Loader.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
6540
Loader.exe
POST
200
185.30.164.14:80
http://gamingonsteroids.com/loader_files/webinfo.log
unknown
unknown
6540
Loader.exe
GET
200
104.18.38.233:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEDv7hsidjOG8pPgEVazKqYE%3D
unknown
whitelisted
6540
Loader.exe
POST
200
185.30.164.14:80
http://gamingonsteroids.com/loader_files/lol_sprites/spritelist.log
unknown
unknown
6540
Loader.exe
GET
200
185.30.164.14:80
http://gamingonsteroids.com/user/412553-guest257351/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
3216
svchost.exe
172.172.255.216:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
3300
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3300
SIHClient.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
client.wns.windows.com
  • 172.172.255.216
whitelisted
login.live.com
  • 20.190.159.23
  • 40.126.31.2
  • 40.126.31.128
  • 20.190.159.2
  • 40.126.31.0
  • 20.190.159.75
  • 40.126.31.3
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
gamingonsteroids.com
  • 185.30.164.14
unknown

Threats

PID
Process
Class
Message
6540
Loader.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
No debug info