File name:

xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe

Full analysis: https://app.any.run/tasks/e91746dc-9e42-4583-ad11-8f22f2777044
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: April 06, 2026, 21:04:41
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 9 sections
MD5:

408DBA8950A8CDEC097204D26E5DBAAF

SHA1:

242ACCC7A3EAC68D684F5F7A81B369FF43CA8427

SHA256:

D8854B77118AF5687147E5AFD5DD36C15252073EB14635E6D17AF4097F2CED2C

SSDEEP:

12288:rhrkXPlyZ48v2AtSRZi6FFgPsuPFYGq3DDRHJ3jyBMGogZ0vsx5UOaBvfXFYo:rhkXkZXuRZ3FFuN23DDRZY0VBVl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been detected (YARA)

      • xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe (PID: 8100)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe (PID: 8100)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:08:14 13:36:06+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 218112
InitializedDataSize: 164864
UninitializedDataSize: -
EntryPoint: 0x1a924
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XWORM xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe werfault.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
4136C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6148C:\WINDOWS\system32\WerFault.exe -u -p 8100 -s 300C:\Windows\System32\WerFault.exe
xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
8100"C:\Users\admin\Desktop\xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe" C:\Users\admin\Desktop\xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
9 630
Read events
9 629
Write events
1
Delete events
0

Modification events

(PID) Process:(4136) slui.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3d\52C64B7E
Operation:writeName:@%SystemRoot%\System32\sppcomapi.dll,-3200
Value:
Software Licensing
Executable files
0
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6148WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_xd8854b77118af56_f81464f37f38f76157ecf071898f328a86b2de9c_34fceb8d_bb9d0fb4-8966-4a9f-8456-0dbf5142bfef\Report.wer
MD5:
SHA256:
6148WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\xd8854b77118af5687147e5afd5dd36c15252073eb14635e6d17af4097f2ced2c.exe.8100.dmpbinary
MD5:E7AB52F8644A5443D501050326628C66
SHA256:AF4E6AA61EE0E6B8E43C6D0627350185126646E5153DC64DAF6BB2C926F0A5CC
6148WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFCA.tmp.dmpbinary
MD5:09DC2CAB4C3A1761A75B1EF72331A4F9
SHA256:5BDA2EB9843C58060E90046A96FB09B7F358733C5476B3F9BDDA4904BB3269D6
6148WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER13B3.tmp.WERInternalMetadata.xmlxml
MD5:1E869CE2E2CA0D47CF14E4182A8F6C37
SHA256:89E3C53D8D0592DE9D94CD3BC9528EFCCB2B0BF2BA919A960E710F11AA2CA0D4
6148WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1412.tmp.xmlxml
MD5:BEC262A9D7738D514B54DDC418DEDEBD
SHA256:2E0B89CFFB22EC777BA6C33FD546356B151B575DF63FAB526485C0A99868AD0F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
71
TCP/UDP connections
49
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5276
MoUsoCoreWorker.exe
GET
304
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3094&FlightIds=&UpdateOfferedDays=4294967295&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&sku=48&ActivationChannel=Retail&AttrDataVer=186&IsMDMEnrolled=0&ProcessorCores=6&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&TotalPhysicalRAM=6144&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&UpdateServiceUrl=http%3A%2F%2Fneverupdatewindows10.com&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
US
whitelisted
8044
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
8044
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
POST
400
40.126.31.129:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
5316
svchost.exe
POST
400
20.190.159.129:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
203 b
whitelisted
POST
400
40.126.31.129:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
5276
MoUsoCoreWorker.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
5316
svchost.exe
POST
200
40.126.31.129:443
https://login.live.com/RST2.srf
US
text
1.24 Kb
whitelisted
POST
400
40.126.31.129:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
5316
svchost.exe
POST
200
20.190.159.129:443
https://login.live.com/RST2.srf
US
1.24 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
5276
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8040
slui.exe
48.192.1.64:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8044
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
8044
svchost.exe
2.16.164.49:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
8044
svchost.exe
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5276
MoUsoCoreWorker.exe
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
8044
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5276
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
activation-v2.sls.microsoft.com
  • 48.192.1.64
whitelisted
google.com
  • 142.251.13.139
  • 142.251.13.138
  • 142.251.13.102
  • 142.251.13.113
  • 142.251.13.101
  • 142.251.13.100
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 23.59.18.102
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
login.live.com
  • 20.190.159.129
  • 40.126.31.0
  • 20.190.159.130
  • 20.190.159.71
  • 40.126.31.128
  • 40.126.31.73
  • 40.126.31.129
  • 40.126.31.131
  • 20.190.159.0
  • 40.126.31.1
  • 20.190.159.64
  • 20.190.159.68
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
watson.events.data.microsoft.com
  • 135.233.45.221
whitelisted
slscr.update.microsoft.com
  • 74.178.240.61
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 74.178.240.51
whitelisted

Threats

PID
Process
Class
Message
5276
MoUsoCoreWorker.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info