| File name: | Google Play Gift Card Generator v1.0 By X-Line.exe |
| Full analysis: | https://app.any.run/tasks/aaac9e7c-da17-4a27-910f-941f40c242ce |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | May 29, 2025, 20:07:03 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
| MD5: | 81CA8BBF5805E9C054124233F9CDAD9B |
| SHA1: | EC5EF30310F49C2C454F34E562BDF27BB7CC34D3 |
| SHA256: | D06735CB757359E9D40E0DBCED56B861E4C147DE1B6A7ED5098C82B9C66FE689 |
| SSDEEP: | 98304:2TYyX1xyXubAe80/mIkGCpljvWw7qTeFpghH5m00zDQAvj1Tr+rjcTcBmZhP1Ftw:LdV0Qd2hj |
| .exe | | | Win32 Executable MS Visual C++ (generic) (46.3) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (41) |
| .exe | | | Win32 Executable (generic) (6.6) |
| .exe | | | Generic Win/DOS Executable (2.9) |
| .exe | | | DOS Executable Generic (2.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:05:16 13:35:25+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.4 |
| CodeSize: | 123392 |
| InitializedDataSize: | 6158848 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x5f70 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.2.1.1 |
| ProductVersionNumber: | 3.1.1.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| FileDescription: | lxowv |
| FileVersion: | 6.0.0.0 |
| InternalName: | lxowv.exe |
| LegalCopyright: | (C) 2026 |
| OriginalFileName: | lxowv.exe |
| ProductName: | lxowv |
| ProductVersion: | 3.1.1.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1056 | C:\Users\admin\AppData\Roaming\Sysmrdrv\sysmrdrv.exe | C:\Users\admin\AppData\Roaming\Sysmrdrv\sysmrdrv.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: System Exit code: 0 Version: 6.0.0.1 Modules
| |||||||||||||||
| 1512 | C:\Users\admin\AppData\Local\Temp\FC15.tmp.exe | C:\Users\admin\AppData\Local\Temp\FC15.tmp.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: System Exit code: 0 Version: 6.0.0.1 Modules
| |||||||||||||||
| 1676 | "C:\Users\admin\AppData\Local\Temp\temp_5526.exe" | C:\Users\admin\AppData\Local\Temp\temp_5526.exe | — | vcvxcxww.exe | |||||||||||
User: admin Company: Installer Integrity Level: MEDIUM Description: Installer Exit code: 0 Version: 1.0.0.1 Modules
| |||||||||||||||
| 1680 | "C:\Users\admin\AppData\Local\Temp\temp_5526.exe" | C:\Users\admin\AppData\Local\Temp\temp_5526.exe | vcvxcxww.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: System Exit code: 0 Version: 6.0.0.1 Modules
| |||||||||||||||
| 4020 | "C:\Users\admin\AppData\Roaming\Sysmrdrv\sysmrdrv.exe" | C:\Users\admin\AppData\Roaming\Sysmrdrv\sysmrdrv.exe | temp_5526.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: System Version: 6.0.0.1 Modules
| |||||||||||||||
| 4424 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5492 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5892 | "C:\Users\admin\AppData\Roaming\Sysmrdrv\sysmrdrv.exe" | C:\Users\admin\AppData\Roaming\Sysmrdrv\sysmrdrv.exe | FC15.tmp.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: System Exit code: 0 Version: 6.0.0.1 Modules
| |||||||||||||||
| 7204 | C:\Users\admin\AppData\Local\Temp\E731.tmp.exe | C:\Users\admin\AppData\Local\Temp\E731.tmp.exe | — | explorer.exe | |||||||||||
User: admin Company: Installer Integrity Level: MEDIUM Description: Installer Exit code: 0 Version: 1.0.0.1 Modules
| |||||||||||||||
| 7416 | C:\Users\admin\AppData\Roaming\sysmrdrv.exe | C:\Users\admin\AppData\Roaming\sysmrdrv.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: System Exit code: 0 Version: 6.0.0.1 Modules
| |||||||||||||||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000040312 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456BFA0DB55E4278845B426357D5B5F97B3 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000040312 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000040310 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456BFA0DB55E4278845B426357D5B5F97B3 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000040310 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:00000000000702E2 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456BFA0DB55E4278845B426357D5B5F97B3 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000050294 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456BFA0DB55E4278845B426357D5B5F97B3 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000050294 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | MRUListEx |
Value: 0E000000040000000300000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar |
| Operation: | write | Name: | Locked |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7548 | Google Play Gift Card Generator v1.0 By X-Line.exe | C:\Users\admin\AppData\Roaming\vcvcv.exe | executable | |
MD5:3E06E418F438F814525C2BAD5BB80028 | SHA256:A73CFF305EDDEA87953AAC19C8EB192357E67898E630836082B9087D173AC2BC | |||
| 7592 | cxwcwxcww.exe | C:\Users\admin\AppData\Local\Temp\is-GQ2S7.tmp\cxwcwxcww.tmp | executable | |
MD5:FFD4DF78AA9788CA6A3DC61077AD50ED | SHA256:5F620B954086C437DAA38012076FE6C453F28F6FD2A1459018C26CB7BDCF20E6 | |||
| 5492 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 7548 | Google Play Gift Card Generator v1.0 By X-Line.exe | C:\Users\admin\AppData\Roaming\vcvxcxww.exe | executable | |
MD5:4F17FF0609C453A1D2DE788D8F9744C3 | SHA256:FBCBE26A6C1A6FC8B451D3AEC8A91384A15124C8CA9931363BDD9ED174631B11 | |||
| 7824 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qpprxy53.fvn.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7664 | cxwcwxcww.tmp | C:\Users\admin\AppData\Local\Temp\is-SLC3K.tmp\_isetup\_setup64.tmp | executable | |
MD5:4FF75F505FDDCC6A9AE62216446205D9 | SHA256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81 | |||
| 7748 | cxwcwxcww.tmp | C:\Users\admin\AppData\Roaming\Microsoft\SystemCertificates\is-83M3T.tmp | executable | |
MD5:E1C166179121741D0D0E7E3EB37483D7 | SHA256:042EDF9FA6AE5D48C84E66361312ADA77B419BE6D4DD0B1AA2CF538550B23AB6 | |||
| 7720 | cxwcwxcww.exe | C:\Users\admin\AppData\Local\Temp\is-SSTRL.tmp\cxwcwxcww.tmp | executable | |
MD5:FFD4DF78AA9788CA6A3DC61077AD50ED | SHA256:5F620B954086C437DAA38012076FE6C453F28F6FD2A1459018C26CB7BDCF20E6 | |||
| 7628 | vcvxcxww.exe | C:\ProgramData\6830FA554F652512029130\Browsers\Chrome_History.txt | — | |
MD5:— | SHA256:— | |||
| 7748 | cxwcwxcww.tmp | C:\Users\admin\AppData\Local\Temp\is-CSNAE.tmp\_isetup\_setup64.tmp | executable | |
MD5:4FF75F505FDDCC6A9AE62216446205D9 | SHA256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7628 | vcvxcxww.exe | POST | 200 | 185.156.72.8:80 | http://185.156.72.8/zpaxpjz/get.php | unknown | — | — | malicious |
7628 | vcvxcxww.exe | POST | 200 | 185.156.72.8:80 | http://185.156.72.8/zpaxpjz/get.php | unknown | — | — | malicious |
7628 | vcvxcxww.exe | POST | 200 | 185.156.72.8:80 | http://185.156.72.8/zpaxpjz/get.php | unknown | — | — | malicious |
7628 | vcvxcxww.exe | GET | 200 | 185.156.72.8:80 | http://185.156.72.8/1.exe | unknown | — | — | malicious |
7628 | vcvxcxww.exe | GET | — | 185.156.72.8:80 | http://185.156.72.8/3.exe | unknown | — | — | malicious |
7628 | vcvxcxww.exe | GET | 200 | 185.156.72.8:80 | http://185.156.72.8/2.exe | unknown | — | — | malicious |
4776 | SIHClient.exe | GET | 200 | 2.16.253.202:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.16.168.124:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.219.150.101:80 | www.microsoft.com | AKAMAI-AS | CL | whitelisted |
5796 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
208 | RUXIMICS.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7628 | vcvxcxww.exe | Misc activity | INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0) |
7628 | vcvxcxww.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Sending Screenshot in Archive via POST Request |
7628 | vcvxcxww.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 35 |
7628 | vcvxcxww.exe | Misc activity | INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0) |
7628 | vcvxcxww.exe | Misc activity | INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0) |
7628 | vcvxcxww.exe | Misc activity | INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0) |
7628 | vcvxcxww.exe | Misc activity | INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0) |
7628 | vcvxcxww.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
7628 | vcvxcxww.exe | A Network Trojan was detected | ET MALWARE Single char EXE direct download likely trojan (multiple families) |
7628 | vcvxcxww.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |