Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: jarry-fixxer.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: pain-temper.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: jarry-deatile.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: growthselec.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: stripedre-lot.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: immolatechallen.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: crookedfoshe.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: strivehelpeu.bond |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: longingfluffyr.cyou |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: TeslaBrowser/5.5 |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: - Screen Resoluton: |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: - Physical Installed Memory: |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: Workgroup: - |
Source: 00000000.00000002.1710337843.0000000002D8B000.00000004.00000800.00020000.00000000.sdmp | String decryptor: c2CoW0--RIII |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov dword ptr [ebp-20h], 00000000h | 0_2_063ED840 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then jmp 06579D40h | 0_2_06579C80 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then jmp 06579D40h | 0_2_06579C88 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h | 1_2_003A0810 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 27BE92A4h | 1_2_003A0810 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ecx, edx | 1_2_003751B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx esi, byte ptr [eax] | 1_2_0036D9D4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 9B8995CDh | 1_2_00399BC0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+04h] | 1_2_00399D10 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+3CBACE16h] | 1_2_00369585 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then xor byte ptr [edi+edx], dl | 1_2_0036C5C1 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov byte ptr [esi], cl | 1_2_0038E6E0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+ecx+1Ch] | 1_2_00385810 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 1_2_00376819 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, esi | 1_2_00378074 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ecx, eax | 1_2_0038A840 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx esi, byte ptr [esp+edx+13h] | 1_2_0036A8B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov eax, edx | 1_2_0038D8BE |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then sub ebp, 01h | 1_2_003610AA |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov word ptr [eax], cx | 1_2_0037C090 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov word ptr [ebx], ax | 1_2_00387890 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov eax, edx | 1_2_0038D891 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, ecx | 1_2_0038F0FA |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov byte ptr [esi], cl | 1_2_0038F0FA |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ecx-2DB32252h] | 1_2_003768E1 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then not eax | 1_2_003768E1 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov eax, edx | 1_2_0038D84E |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, ecx | 1_2_0038F1BF |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov byte ptr [esi], cl | 1_2_0038F1BF |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx eax, byte ptr [esp+edx-6657724Dh] | 1_2_0038E9B2 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, ecx | 1_2_0038F181 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov byte ptr [esi], cl | 1_2_0038F181 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, ecx | 1_2_0038F1CD |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov byte ptr [esi], cl | 1_2_0038F1CD |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov dword ptr [esp+08h], eax | 1_2_0039B223 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, ebx | 1_2_0037CA70 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+000000F0h] | 1_2_0037827D |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp dword ptr [ebx+esi*8], BFC89635h | 1_2_0037827D |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+10FD35AFh] | 1_2_00389A60 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then lea esi, dword ptr [esp+000000F2h] | 1_2_00377A84 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov byte ptr [esi], cl | 1_2_0038EA8C |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+7F58515Ch] | 1_2_0038D280 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov byte ptr [ebx], dl | 1_2_0038D280 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ecx, edx | 1_2_003751B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 1_2_0038B320 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edi, byte ptr [edx+eax] | 1_2_00385B7B |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 1_2_00367370 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 1_2_00367370 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edi, byte ptr [ecx+esi] | 1_2_00362B60 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+02h] | 1_2_0039E384 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov dword ptr [esp+08h], esi | 1_2_0037ABEF |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then lea eax, dword ptr [ebp-01h] | 1_2_0039FBE0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp al, 5Ch | 1_2_00362420 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ebx, byte ptr [eax+edx] | 1_2_0037EC00 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+3CBACE16h] | 1_2_00369440 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov eax, dword ptr [esi+0Ch] | 1_2_003A04A0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov dword ptr [esp+08h], esi | 1_2_0037ABEF |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h | 1_2_003794D0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ecx, dword ptr [003A9444h] | 1_2_00376D22 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then lea esi, dword ptr [esp+000000F2h] | 1_2_00377A84 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 1_2_00397550 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then push 00000000h | 1_2_0036AD40 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then push dword ptr [esi+10h] | 1_2_0036AD40 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx eax, byte ptr [esp+ebx-5D9A6F40h] | 1_2_0037C5A1 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ecx, ebx | 1_2_0039FDA0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+08h] | 1_2_0039EE3A |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, dword ptr [esp+4Ch] | 1_2_0037CE30 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov edx, dword ptr [esp+4Ch] | 1_2_0037CE39 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax+7D2E64A5h] | 1_2_0037CE39 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h | 1_2_0039D620 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movzx ebx, byte ptr [ecx+edx] | 1_2_0039DE10 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ecx, dword ptr [ebp-4Ch] | 1_2_00386600 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then movsx edx, byte ptr [esi+eax] | 1_2_0037EE70 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then cmp word ptr [edi+eax+02h], 0000h | 1_2_00378F18 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then mov ebx, edx | 1_2_0039F785 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 4x nop then call 00399650h | 1_2_0036DFD7 |
Source: Network traffic | Suricata IDS: 2059239 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (strivehelpeu .bond) : 192.168.2.4:53887 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059223 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (growthselec .bond) : 192.168.2.4:54397 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059237 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stripedre-lot .bond) : 192.168.2.4:50141 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059229 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (jarry-fixxer .bond) : 192.168.2.4:65226 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49735 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49731 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49733 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49737 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2059219 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crookedfoshe .bond) : 192.168.2.4:55507 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059225 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immolatechallen .bond) : 192.168.2.4:51568 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059233 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pain-temper .bond) : 192.168.2.4:58618 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49734 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2059227 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (jarry-deatile .bond) : 192.168.2.4:58897 -> 1.1.1.1:53 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49732 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49742 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2059230 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (jarry-fixxer .bond in TLS SNI) : 192.168.2.4:49744 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49732 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49744 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49733 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49731 -> 104.21.78.5:443 |
Source: Network traffic | Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 104.21.78.5:443 |
Source: xow.exe, 00000001.00000002.1938561850.00000000008B5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft. |
Source: xow.exe, 00000000.00000002.1710337843.00000000032BB000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1710337843.0000000002C51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: xow.exe, 00000000.00000002.1728368665.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1728368665.0000000003C75000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1734276448.0000000006380000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-net |
Source: xow.exe, 00000000.00000002.1728368665.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1728368665.0000000003C75000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1734276448.0000000006380000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-netJ |
Source: xow.exe, 00000000.00000002.1728368665.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1728368665.0000000003C75000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1734276448.0000000006380000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://github.com/mgravell/protobuf-neti |
Source: xow.exe, 00000001.00000002.1938561850.0000000000873000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://growthselec.bond:443/api |
Source: xow.exe, 00000001.00000002.1938561850.00000000008B5000.00000004.00000020.00020000.00000000.sdmp, xow.exe, 00000001.00000002.1939889163.0000000003030000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond/ |
Source: xow.exe, 00000001.00000002.1939178246.000000000090A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond/D |
Source: xow.exe, 00000001.00000002.1939178246.000000000090A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond/P |
Source: xow.exe, 00000001.00000002.1938561850.000000000085C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond/api |
Source: xow.exe, 00000001.00000002.1938561850.000000000085C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond/apiF |
Source: xow.exe, 00000001.00000002.1938561850.0000000000873000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond:443/api |
Source: xow.exe, 00000001.00000002.1938561850.0000000000873000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond:443/api4p.default-release/key4.dbPK |
Source: xow.exe, 00000001.00000002.1938561850.0000000000873000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond:443/apiS |
Source: xow.exe, 00000001.00000002.1938561850.0000000000873000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://jarry-fixxer.bond:443/apiu |
Source: xow.exe, 00000000.00000002.1728368665.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1728368665.0000000003C75000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1734276448.0000000006380000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/11564914/23354; |
Source: xow.exe, 00000000.00000002.1728368665.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1728368665.0000000003C75000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1734276448.0000000006380000.00000004.08000000.00040000.00000000.sdmp, xow.exe, 00000000.00000002.1710337843.0000000002C51000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/14436606/23354 |
Source: xow.exe, 00000000.00000002.1728368665.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1728368665.0000000003C75000.00000004.00000800.00020000.00000000.sdmp, xow.exe, 00000000.00000002.1734276448.0000000006380000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://stackoverflow.com/q/2152978/23354 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_02BECEB0 | 0_2_02BECEB0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06226643 | 0_2_06226643 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06224CE0 | 0_2_06224CE0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0622AB50 | 0_2_0622AB50 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062239E8 | 0_2_062239E8 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06224CD2 | 0_2_06224CD2 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0622BDE7 | 0_2_0622BDE7 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06220033 | 0_2_06220033 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06220040 | 0_2_06220040 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E0040 | 0_2_062E0040 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E1248 | 0_2_062E1248 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E0367 | 0_2_062E0367 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062FE088 | 0_2_062FE088 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F8F09 | 0_2_062F8F09 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F8F18 | 0_2_062F8F18 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F9368 | 0_2_062F9368 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F6FA8 | 0_2_062F6FA8 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F6F9A | 0_2_062F6F9A |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062FC420 | 0_2_062FC420 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F001F | 0_2_062F001F |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F0040 | 0_2_062F0040 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062FC110 | 0_2_062FC110 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F79E3 | 0_2_062F79E3 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F79F0 | 0_2_062F79F0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_063EF3B0 | 0_2_063EF3B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_063E001E | 0_2_063E001E |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06578240 | 0_2_06578240 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0657D078 | 0_2_0657D078 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06578230 | 0_2_06578230 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0657D06A | 0_2_0657D06A |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0669F6E0 | 0_2_0669F6E0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0669F9E8 | 0_2_0669F9E8 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06680040 | 0_2_06680040 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0668003D | 0_2_0668003D |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0669E588 | 0_2_0669E588 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003A08F0 | 1_2_003A08F0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003751B0 | 1_2_003751B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0036D9D4 | 1_2_0036D9D4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003A11C0 | 1_2_003A11C0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00385200 | 1_2_00385200 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00370B55 | 1_2_00370B55 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003813B0 | 1_2_003813B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00399D10 | 1_2_00399D10 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00369585 | 1_2_00369585 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00387E50 | 1_2_00387E50 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038E6E0 | 1_2_0038E6E0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037F020 | 1_2_0037F020 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00385810 | 1_2_00385810 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003A0010 | 1_2_003A0010 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00378074 | 1_2_00378074 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038404D | 1_2_0038404D |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039B040 | 1_2_0039B040 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0036A8B0 | 1_2_0036A8B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038D8BE | 1_2_0038D8BE |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003A00B0 | 1_2_003A00B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003658A0 | 1_2_003658A0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037C090 | 1_2_0037C090 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00387890 | 1_2_00387890 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038F0FA | 1_2_0038F0FA |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003638E0 | 1_2_003638E0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003768E1 | 1_2_003768E1 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037712E | 1_2_0037712E |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00366100 | 1_2_00366100 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038A972 | 1_2_0038A972 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003A0140 | 1_2_003A0140 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039F1A2 | 1_2_0039F1A2 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038F181 | 1_2_0038F181 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00398180 | 1_2_00398180 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037D9F0 | 1_2_0037D9F0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003771DE | 1_2_003771DE |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038F1CD | 1_2_0038F1CD |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00395220 | 1_2_00395220 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039B223 | 1_2_0039B223 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0036CA1A | 1_2_0036CA1A |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039BA0B | 1_2_0039BA0B |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037CA70 | 1_2_0037CA70 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037827D | 1_2_0037827D |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00389A60 | 1_2_00389A60 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00394244 | 1_2_00394244 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00364290 | 1_2_00364290 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037A290 | 1_2_0037A290 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038EA8C | 1_2_0038EA8C |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039AA80 | 1_2_0039AA80 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003892FB | 1_2_003892FB |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00381AD0 | 1_2_00381AD0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003751B0 | 1_2_003751B0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038831E | 1_2_0038831E |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00385B7B | 1_2_00385B7B |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00367370 | 1_2_00367370 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00398B8B | 1_2_00398B8B |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00388B85 | 1_2_00388B85 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003993F0 | 1_2_003993F0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039FBE0 | 1_2_0039FBE0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00390BD7 | 1_2_00390BD7 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003913CB | 1_2_003913CB |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00364BC0 | 1_2_00364BC0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003723C0 | 1_2_003723C0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037AC14 | 1_2_0037AC14 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038DC50 | 1_2_0038DC50 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00369440 | 1_2_00369440 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003A0C40 | 1_2_003A0C40 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003794D0 | 1_2_003794D0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00397D17 | 1_2_00397D17 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00365D60 | 1_2_00365D60 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0036AD40 | 1_2_0036AD40 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037D5A0 | 1_2_0037D5A0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039FDA0 | 1_2_0039FDA0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00366590 | 1_2_00366590 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038763A | 1_2_0038763A |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0037CE39 | 1_2_0037CE39 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00386600 | 1_2_00386600 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00399650 | 1_2_00399650 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00362EA0 | 1_2_00362EA0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00392699 | 1_2_00392699 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039D690 | 1_2_0039D690 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003A0F00 | 1_2_003A0F00 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0039476B | 1_2_0039476B |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00371F62 | 1_2_00371F62 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00394F40 | 1_2_00394F40 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00368FB0 | 1_2_00368FB0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_0038F7F0 | 1_2_0038F7F0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003717ED | 1_2_003717ED |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_003747C0 | 1_2_003747C0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 1_2_00381FC0 | 1_2_00381FC0 |
Source: xow.exe, 00000000.00000002.1731319915.0000000005410000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameGmvurilpfck.dll" vs xow.exe |
Source: xow.exe, 00000000.00000002.1728368665.0000000003D3D000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs xow.exe |
Source: xow.exe, 00000000.00000002.1728368665.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs xow.exe |
Source: xow.exe, 00000000.00000002.1728368665.0000000003C75000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs xow.exe |
Source: xow.exe, 00000000.00000002.1710337843.00000000032BB000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs xow.exe |
Source: xow.exe, 00000000.00000002.1709143472.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs xow.exe |
Source: xow.exe, 00000000.00000002.1734839973.00000000064F0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs xow.exe |
Source: xow.exe, 00000000.00000002.1734276448.0000000006380000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameprotobuf-net.dllJ vs xow.exe |
Source: xow.exe, 00000000.00000002.1710337843.0000000002C51000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs xow.exe |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, User.cs | Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, TaskPrincipal.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, Task.cs | Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, TaskSecurity.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, TaskSecurity.cs | Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, TaskFolder.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, Task.cs | Security API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, TaskSecurity.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges() |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, TaskSecurity.cs | Security API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule) |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, TaskFolder.cs | Security API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections) |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, User.cs | Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type) |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, TaskPrincipal.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: xow.exe, -.cs | .Net Code: _0001 System.AppDomain.Load(byte[]) |
Source: xow.exe, -.cs | .Net Code: _0001 System.Reflection.Assembly.Load(byte[]) |
Source: 0.2.xow.exe.6380000.9.raw.unpack, TypeModel.cs | .Net Code: TryDeserializeList |
Source: 0.2.xow.exe.6380000.9.raw.unpack, ListDecorator.cs | .Net Code: Read |
Source: 0.2.xow.exe.6380000.9.raw.unpack, TypeSerializer.cs | .Net Code: CreateInstance |
Source: 0.2.xow.exe.6380000.9.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateInstance |
Source: 0.2.xow.exe.6380000.9.raw.unpack, TypeSerializer.cs | .Net Code: EmitCreateIfNull |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.xow.exe.64f0000.10.raw.unpack, XmlSerializationHelper.cs | .Net Code: ReadObjectProperties |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, ReflectionHelper.cs | .Net Code: InvokeMethod |
Source: 0.2.xow.exe.3e35d40.3.raw.unpack, XmlSerializationHelper.cs | .Net Code: ReadObjectProperties |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062204EB push ecx; ret | 0_2_062204EC |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062235AC push es; ret | 0_2_062235D4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06228972 push es; iretd | 0_2_062289C4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E6E70 push ebp; retn 0005h | 0_2_062E6E72 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E6E51 push ebp; retn 0005h | 0_2_062E6E52 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E6EE1 push edi; retn 0005h | 0_2_062E6EE2 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E67A8 push eax; retn 0005h | 0_2_062E67AA |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E44C0 push esp; retn 0005h | 0_2_062E44C1 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E6A00 push edx; retn 0005h | 0_2_062E6A02 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062EF24A push 8B03D930h; retf | 0_2_062EF24F |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E683F push eax; retn 0005h | 0_2_062E6842 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E6871 push ecx; retn 0005h | 0_2_062E6872 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E10C9 push ss; retn 0005h | 0_2_062E10CA |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E1111 push ss; retn 0005h | 0_2_062E1112 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062E695F push ecx; retn 0005h | 0_2_062E6962 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F5A29 push es; ret | 0_2_062F5A34 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F3627 push es; retf | 0_2_062F3628 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F5AA2 push es; ret | 0_2_062F5AA4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F773B push es; retf 2F70h | 0_2_062F775C |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062FB42D push FFFFFFE9h; retf | 0_2_062FB441 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F8C9A push es; iretd | 0_2_062F8CA4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F5D6D push es; ret | 0_2_062F5D70 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_062F59DD push es; ret | 0_2_062F59E0 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_063E0445 push es; ret | 0_2_063E044D |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_065752E3 push esp; ret | 0_2_065752E4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0657637D push es; retf | 0_2_065763E4 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06576B25 pushfd ; ret | 0_2_06576B26 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06576F93 pushfd ; ret | 0_2_06576F94 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_0657CBBC push ECA1FABBh; ret | 0_2_0657CBC7 |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_06575BAE push eax; ret | 0_2_06575BAF |
Source: C:\Users\user\Desktop\xow.exe | Code function: 0_2_065797AE pushfd ; ret | 0_2_065797AF |
Source: 0.2.xow.exe.41fb1a8.4.raw.unpack, Xoe0bmO6eH34y5BAeGj.cs | High entropy of concatenated method names: 'J3eHsPbmYt', 'S7yHzHXoIJ', 'eBXlX3DAAw', 'fr8lgvGbdy', 'F6mlDXX3Li', 'NxLlEfQ7QM', 'kOYl9B4MPb', 'n2Ecl09rbs', 'MDFlmpP4Q5', 'q9nlJrcTMt' |
Source: 0.2.xow.exe.41fb1a8.4.raw.unpack, fxRsk0JQH8rCryI7UBD.cs | High entropy of concatenated method names: 'JmWJ8VhGqF', 'zGjJYY48VB', 'egBJ72aZjq', 'TUsJ6hrKom', 'MZkJs3B5Ec', 'SnNJz9M27V', 'HJSVXAfZ5A', 'CNdVgHBOa5', 'Of1VDbmI4L', 'wafVEeoV27' |
Source: 0.2.xow.exe.41fb1a8.4.raw.unpack, i0nD9NjKF6abKEWehWn.cs | High entropy of concatenated method names: 'QGfjIX8Doc', 'sYUjYeFOYx', 'VRYj2ECsLH', 'hFNj7kAGIk', 'be5jnDhsB2', 'ewdj6rM0tI', 'nlrjsjX1ea', 'LEVjz7KcUO', 'b74uX5W02m', 'BVjugYi515' |
Source: 0.2.xow.exe.41fb1a8.4.raw.unpack, beqJPMuTha87cOwuRYs.cs | High entropy of concatenated method names: 'gPTLQ3QJVhnD8dYhZwO', 'rRGyXFQVMVDbxeGyagT', 'paQOURxWOf', 'vh0ry9Sq2v', 'B1pOyRbMi8', 'MxwONILbJg', 'WKDOra8MCb', 'FkBOa6uI2r', 'Xm9Ib8nI9k', 'RNUueXAerl' |
Source: 0.2.xow.exe.41fb1a8.4.raw.unpack, KkvJE8Oq2l3Z99hKUYJ.cs | High entropy of concatenated method names: 'Xo6OKh7qaB', 'HCjOL89FwU', 'cvJOQTxDWb', 'BvJOZLZTkk', 'RaZO8ycjGy', 'fcYOIpxirJ', 'JGXOYLDNTO', 'EMNO2fBwus', 'AQAO7Rq7Km', 'MqVOne4UTR' |
Source: 0.2.xow.exe.41fb1a8.4.raw.unpack, l1ZFxvG20U50TtBXGGb.cs | High entropy of concatenated method names: 'IV2jrHLawY', 'pBRjaBE220', 'qy6j5n7ObR', 'Igb5soLRuwU5tqwDUfQ', 'OZ0T8ULwlNfRekVUfay', 'RoiGn6QCkU', 'fK2G68trrJ', 'HALGsVjdfo', 'RVJGzpeKqB', 'qsyjXP2x9a' |
Source: 0.2.xow.exe.41fb1a8.4.raw.unpack, mCiNYSgGZUqW6wDP3hW.cs | High entropy of concatenated method names: 'GGZguoL8Ni', 'HPjgOhMYhu', 'Rk2gyADIE8', 'IMjgrsbxxs', 'aDJg5XAWIs', 'b6Bgl3IxF6', 'ylrgByK6A8', 'qe6gCL0Frm', 'yuigRpdyQ4', 'yt1gvuf9QD' |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\xow.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |