File name:

xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe

Full analysis: https://app.any.run/tasks/7ba960d9-c318-439b-ac10-f2cddd59fd2d
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 25, 2026, 15:45:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
xworm
rat
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 9 sections
MD5:

4EC31D3EE14641F1C1031A73E60BA009

SHA1:

8F5EC21BB76F0CBDA45B09DF2807373235657EF8

SHA256:

E66623C956CB7C0568740E91BB7B98909C01C45919C72B04CF186ABA9005DA93

SSDEEP:

12288:rhrkXPlyCNg48X2AtSRZi6tFgPsusqE+cRwZta6g52xKtT:rhkXkpXGRZHFFugzwcGKB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been detected

      • xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe (PID: 5264)
      • audiodg.exe (PID: 4692)
      • WerFault.exe (PID: 7196)
      • WerFault.exe (PID: 3200)
      • shost.exe (PID: 5384)
      • audiodg.exe (PID: 8020)
    • XWORM has been detected (YARA)

      • shost.exe (PID: 5384)
  • SUSPICIOUS

    • The process executes files with name similar to system file names

      • xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe (PID: 5264)
      • shost.exe (PID: 5384)
    • The process creates files with name similar to system file names

      • xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe (PID: 5264)
      • WerFault.exe (PID: 3200)
      • WerFault.exe (PID: 7196)
    • Starts itself from another location

      • xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe (PID: 5264)
    • Executable content was dropped or overwritten

      • xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe (PID: 5264)
      • shost.exe (PID: 5384)
    • Using the short paths format

      • shost.exe (PID: 5384)
    • Executes application which crashes

      • audiodg.exe (PID: 4692)
      • audiodg.exe (PID: 8020)
  • INFO

    • Checks supported languages

      • xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe (PID: 5264)
      • audiodg.exe (PID: 4692)
      • shost.exe (PID: 5384)
      • audiodg.exe (PID: 8020)
    • Reads the computer name

      • xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe (PID: 5264)
      • audiodg.exe (PID: 4692)
      • audiodg.exe (PID: 8020)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 7196)
      • WerFault.exe (PID: 3200)
      • shost.exe (PID: 5384)
    • Create files in a temporary directory

      • shost.exe (PID: 5384)
    • The sample compiled with english language support

      • shost.exe (PID: 5384)
    • The sample compiled with bulgarian language support

      • shost.exe (PID: 5384)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:08:14 13:36:06+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 218112
InitializedDataSize: 164864
UninitializedDataSize: -
EntryPoint: 0x1a924
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
7
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XWORM xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe #XWORM audiodg.exe #XWORM shost.exe #XWORM audiodg.exe #XWORM werfault.exe #XWORM werfault.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
3200C:\WINDOWS\system32\WerFault.exe -u -p 4692 -s 788C:\Windows\System32\WerFault.exe
audiodg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
3996C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4692"C:\Users\admin\Documents\diagnostics\audiodg.exe"C:\Users\admin\Documents\diagnostics\audiodg.exe
xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\documents\diagnostics\audiodg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5264"C:\Users\admin\Desktop\xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe" C:\Users\admin\Desktop\xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5384"C:\Users\admin\Documents\diagnostics\shost.exe"C:\Users\admin\Documents\diagnostics\shost.exe
xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\documents\diagnostics\shost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7196C:\WINDOWS\system32\WerFault.exe -u -p 8020 -s 788C:\Windows\System32\WerFault.exe
audiodg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
8020"C:\Users\admin\Documents\diagnostics\audiodg.exe"C:\Users\admin\Documents\diagnostics\audiodg.exe
shost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\documents\diagnostics\audiodg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
15 739
Read events
15 738
Write events
1
Delete events
0

Modification events

(PID) Process:(3996) slui.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3d\52C64B7E
Operation:writeName:@%SystemRoot%\System32\sppcomapi.dll,-3200
Value:
Software Licensing
Executable files
1 079
Suspicious files
9
Text files
141
Unknown types
31

Dropped files

PID
Process
Filename
Type
5384shost.exeC:\Users\admin\AppData\Local\Temp\PROGRA~~1\554278501695.icoimage
MD5:FC7387DEE6FCD172DECBAE102437CE30
SHA256:E3530D306F7F383C6C3DCEAD7C0C5A0B8FBACB6B85B067AF05E98F4C6F502D61
5384shost.exeC:\Users\admin\Documents\logs.txttext
MD5:4D1810D60AB878181AD26B222777860C
SHA256:48D2A83C0C0FB0418063AA69D2F0831CD4CDE48BDD1490AB544DE09AF87183AF
5384shost.exeC:\Users\admin\AppData\Local\Temp\PROGRA~~1\879566119916.exe
MD5:
SHA256:
5384shost.exeC:\Users\admin\AppData\Local\Temp\RCXE30.tmp
MD5:
SHA256:
5384shost.exeC:\Users\admin\AppData\Local\Temp\PROGRA~~1\779072078903..exe
MD5:
SHA256:
5264xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exeC:\Users\admin\Desktop\xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93..exebinary
MD5:F782AD571735D22725AC7063FB0EFDB9
SHA256:6843E7E4385059EFF691FE449077143EB3E9C66022CF9CEF8D0FD300BE09AA33
5264xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exeC:\Users\admin\Documents\diagnostics\shost.exeexecutable
MD5:6A0948E2C99CBC462AD2D3F957832C1C
SHA256:A621D6107A2C26CED594747C3A2F7D938EA40B2527544FA3610C14C83F436E68
5384shost.exeC:\Users\admin\AppData\Local\Temp\RCXC80.tmpexecutable
MD5:F467DF7005BF3B4AC835CD9356F0B422
SHA256:DE992882DDD38F68A40CDE4FD124CBBDECB5313489F8E0D92D7EC73DC0F17AB3
5384shost.exeC:\Users\admin\AppData\Local\Temp\PROGRA~~1\105476921817.exeexecutable
MD5:7E7FA62D67F6FE8E5510F09189E85743
SHA256:1D8F19DD0A92E36D572A944D451BA3E0CD4125129C5762AA121BE42EED961347
5264xe66623c956cb7c0568740e91bb7b98909c01c45919c72b04cf186aba9005da93.exeC:\Users\admin\Documents\diagnostics\audiodg.exeexecutable
MD5:4FFB27AE71766BD752C5A6BD2826B7D4
SHA256:7E5A39A84A4E6FA368650CD74A600D37064344FDE4D32D8ED52937F84B58D49E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
23
DNS requests
11
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5276
MoUsoCoreWorker.exe
GET
304
51.104.136.2:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3094&FlightIds=&UpdateOfferedDays=4294967295&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&sku=48&ActivationChannel=Retail&AttrDataVer=186&IsMDMEnrolled=0&ProcessorCores=6&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&TotalPhysicalRAM=6144&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&UpdateServiceUrl=http%3A%2F%2Fneverupdatewindows10.com&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
US
whitelisted
3996
slui.exe
POST
500
48.192.1.64:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
US
xml
512 b
whitelisted
3280
svchost.exe
GET
200
23.52.181.212:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
US
binary
814 b
whitelisted
3280
svchost.exe
GET
200
23.52.181.212:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.3.crl
US
binary
400 b
whitelisted
8044
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
8044
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
3996
slui.exe
POST
500
48.192.1.65:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
US
xml
512 b
whitelisted
3280
svchost.exe
GET
200
23.52.181.212:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl
US
binary
813 b
whitelisted
3280
svchost.exe
GET
200
23.52.181.212:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
US
binary
407 b
whitelisted
3280
svchost.exe
GET
200
23.52.181.212:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
US
binary
420 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
8044
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5276
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8028
slui.exe
48.192.1.64:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
8044
svchost.exe
23.216.77.6:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
8044
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5276
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
3200
WerFault.exe
172.178.240.163:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7196
WerFault.exe
172.178.240.163:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
activation-v2.sls.microsoft.com
  • 48.192.1.64
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
google.com
  • 192.178.183.138
  • 192.178.183.102
  • 192.178.183.101
  • 192.178.183.113
  • 192.178.183.139
  • 192.178.183.100
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.52.181.212
whitelisted
watson.events.data.microsoft.com
  • 172.178.240.163
whitelisted
self.events.data.microsoft.com
  • 20.189.173.1
whitelisted

Threats

PID
Process
Class
Message
5276
MoUsoCoreWorker.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info