File name:

xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe

Full analysis: https://app.any.run/tasks/7622b2b1-1126-43fd-82e2-d15175ab2df4
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 24, 2026, 02:04:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
xworm
rat
auto-startup
pastebin
auto-reg
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 9 sections
MD5:

60CD4B48D72C378091446CD02C4912D7

SHA1:

0343123A428007EA2392D572290D72AFE2BCEC18

SHA256:

F95548A5DDFD55D58E5455EB0BF914653C75135FD9CF1A31B42102E14589A990

SSDEEP:

6144:Zv/ru9qf3zU15Fk99jxPYtOLoPDXzbflyDJG8/nNg48v2AtS2uWOXZizOtbzWAH5:1hrkXPly3Ng48v2AtSRZi6FF5Psu9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been found (auto)

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
      • audiodg.exe (PID: 5384)
    • XWORM has been detected

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
      • audiodg.exe (PID: 5384)
      • shost.exe (PID: 7596)
      • audiodg.exe (PID: 5448)
    • XWORM mutex has been found

      • audiodg.exe (PID: 5384)
      • audiodg.exe (PID: 5448)
      • winlogon (PID: 7560)
    • XWORM has been detected (YARA)

      • audiodg.exe (PID: 5384)
      • shost.exe (PID: 7596)
    • Changes the autorun value in the registry

      • audiodg.exe (PID: 5384)
    • Create files in the Startup directory

      • audiodg.exe (PID: 5384)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
    • Executable content was dropped or overwritten

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
      • shost.exe (PID: 7596)
      • audiodg.exe (PID: 5384)
    • Drops 7-zip archiver for unpacking

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
    • The process executes files with name similar to system file names

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
      • shost.exe (PID: 7596)
    • Using the short paths format

      • shost.exe (PID: 7596)
  • INFO

    • Checks supported languages

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
      • audiodg.exe (PID: 5384)
      • shost.exe (PID: 7596)
      • audiodg.exe (PID: 5448)
      • winlogon (PID: 7560)
    • The sample compiled with english language support

      • xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe (PID: 7780)
      • shost.exe (PID: 7596)
    • Reads the computer name

      • audiodg.exe (PID: 5384)
      • audiodg.exe (PID: 5448)
      • winlogon (PID: 7560)
    • Reads the machine GUID from the registry

      • audiodg.exe (PID: 5384)
      • audiodg.exe (PID: 5448)
      • winlogon (PID: 7560)
    • Create files in a temporary directory

      • shost.exe (PID: 7596)
    • Launching a file from the Startup directory

      • audiodg.exe (PID: 5384)
    • Manual execution by a user

      • winlogon (PID: 7560)
    • Launching a file from a Registry key

      • audiodg.exe (PID: 5384)
    • Reads Environment values

      • audiodg.exe (PID: 5384)
    • Creates files or folders in the user directory

      • audiodg.exe (PID: 5384)
      • shost.exe (PID: 7596)
    • Disables trace logs

      • audiodg.exe (PID: 5384)
    • The sample compiled with bulgarian language support

      • shost.exe (PID: 7596)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(5384) audiodg.exe
C2 (1)https://pastebin.com/raw/Fxzr3jeT:<666666>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeXWorm V5.6
USB drop nameUSB.exe
MutexteEgLm0aeViE3IZi
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:08:14 13:36:06+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 218112
InitializedDataSize: 166400
UninitializedDataSize: -
EntryPoint: 0x1a924
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XWORM xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe #XWORM audiodg.exe #XWORM shost.exe xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990..exe no specs #XWORM audiodg.exe no specs slui.exe #XWORM winlogon no specs

Process information

PID
CMD
Path
Indicators
Parent process
2392C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5384"C:\Users\admin\Documents\diagnostics\audiodg.exe"C:\Users\admin\Documents\diagnostics\audiodg.exe
xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\documents\diagnostics\audiodg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(5384) audiodg.exe
C2 (1)https://pastebin.com/raw/Fxzr3jeT:<666666>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeXWorm V5.6
USB drop nameUSB.exe
MutexteEgLm0aeViE3IZi
5448"C:\Users\admin\Documents\diagnostics\audiodg.exe"C:\Users\admin\Documents\diagnostics\audiodg.exe
shost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\documents\diagnostics\audiodg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7560C:\Users\admin\AppData\Local\winlogonC:\Users\admin\AppData\Local\winlogon
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\winlogon
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7596"C:\Users\admin\Documents\diagnostics\shost.exe"C:\Users\admin\Documents\diagnostics\shost.exe
xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\documents\diagnostics\shost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7664"C:\Users\admin\Desktop\xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990..exe"C:\Users\admin\Desktop\xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990..exexf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Uninstaller
Exit code:
3221226540
Version:
23.01
Modules
Images
c:\users\admin\desktop\xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990..exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7780"C:\Users\admin\Desktop\xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe" C:\Users\admin\Desktop\xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
7 378
Read events
7 362
Write events
16
Delete events
0

Modification events

(PID) Process:(2392) slui.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3d\52C64B7E
Operation:writeName:@%SystemRoot%\System32\sppcomapi.dll,-3200
Value:
Software Licensing
(PID) Process:(5384) audiodg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:winlogon
Value:
C:\Users\admin\AppData\Local\winlogon
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5384) audiodg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\audiodg_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
Executable files
1 107
Suspicious files
7
Text files
136
Unknown types
16

Dropped files

PID
Process
Filename
Type
7596shost.exeC:\Users\admin\AppData\Local\Temp\PROGRA~~1\336385421783.exeexecutable
MD5:0FE7B22CBF619CF188638A6025B81DEB
SHA256:B4DD76CDCFE1DDBD6F4F8436EEF5919D46A06EAE7FD26081E503B77DB450B7CF
7780xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exeC:\Users\admin\Desktop\xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990..exeexecutable
MD5:AD782FFAC62E14E2269BF1379BCCBAAE
SHA256:1C8A77DB924EBEB952052334DC95ADD388700C02B073B07973CD8FE0A0A360B8
7780xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exeC:\Users\admin\Documents\diagnostics\audiodg.exeexecutable
MD5:9367EAFEFD3471A59DF9EE9FFA198573
SHA256:76957A7DB92ABF1667474A4E45477CEA7297E9A25C78C1FADD94795FC5390833
7596shost.exeC:\Users\admin\AppData\Local\Temp\PROGRA~~1\168605747020.exe
MD5:
SHA256:
7596shost.exeC:\Users\admin\AppData\Local\Temp\RCXB80.tmp
MD5:
SHA256:
7596shost.exeC:\Users\admin\AppData\Local\Temp\PROGRA~~1\344642079206..exe
MD5:
SHA256:
7780xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exeC:\Users\admin\Documents\diagnostics\shost.exeexecutable
MD5:3092A94AC93F0C73C603D2050928A151
SHA256:290179E7BD2E7910ACFB98B8C0C01A3E0E660ABC2FA2D938F6BA356258562E95
7596shost.exeC:\Users\admin\AppData\Local\Temp\RCX992.tmpexecutable
MD5:F467DF7005BF3B4AC835CD9356F0B422
SHA256:DE992882DDD38F68A40CDE4FD124CBBDECB5313489F8E0D92D7EC73DC0F17AB3
7780xf95548a5ddfd55d58e5455eb0bf914653c75135fd9cf1a31b42102e14589a990.exeC:\Users\admin\Documents\diagnostics\RCX8F4.tmpexecutable
MD5:6256BB55FDEF9DE0D1079211BEB38BB1
SHA256:F5B2FF5F789D67C68887A8A60B0D4F7EB4BDB9A3525930B4211898B9F1953F82
7596shost.exeC:\Users\admin\Documents\logs.txttext
MD5:4D1810D60AB878181AD26B222777860C
SHA256:48D2A83C0C0FB0418063AA69D2F0831CD4CDE48BDD1490AB544DE09AF87183AF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
147
TCP/UDP connections
40
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5276
MoUsoCoreWorker.exe
GET
304
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3094&FlightIds=&UpdateOfferedDays=4294967295&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&sku=48&ActivationChannel=Retail&AttrDataVer=186&IsMDMEnrolled=0&ProcessorCores=6&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&TotalPhysicalRAM=6144&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&UpdateServiceUrl=http%3A%2F%2Fneverupdatewindows10.com&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
US
whitelisted
POST
400
40.126.31.129:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
204 b
whitelisted
5316
svchost.exe
POST
400
40.126.31.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
204 b
whitelisted
5316
svchost.exe
POST
400
40.126.31.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
204 b
whitelisted
5316
svchost.exe
POST
200
40.126.31.129:443
https://login.live.com/RST2.srf
US
xml
1.24 Kb
whitelisted
5384
audiodg.exe
GET
404
104.20.29.150:443
https://pastebin.com/raw/Fxzr3jeT
US
html
689 b
unknown
3352
svchost.exe
GET
200
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/WaasMedic?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&appVer=10.0.19041.3758&ring=Retail&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4
US
text
3.41 Kb
whitelisted
3352
svchost.exe
GET
200
72.246.29.11:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
5384
audiodg.exe
GET
404
104.20.29.150:443
https://pastebin.com/raw/Fxzr3jeT
US
html
689 b
unknown
POST
400
40.126.31.129:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
204 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
5276
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5412
slui.exe
128.24.231.64:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3352
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2.16.110.171:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
3352
svchost.exe
23.55.110.211:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
3352
svchost.exe
72.246.29.11:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5276
MoUsoCoreWorker.exe
72.246.29.11:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
2392
slui.exe
128.24.231.64:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
activation-v2.sls.microsoft.com
  • 128.24.231.64
whitelisted
www.bing.com
  • 2.16.110.171
whitelisted
google.com
  • 192.178.183.102
  • 192.178.183.101
  • 192.178.183.100
  • 192.178.183.113
  • 192.178.183.138
  • 192.178.183.139
whitelisted
crl.microsoft.com
  • 23.55.110.211
  • 23.55.110.193
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 72.246.29.11
  • 88.221.169.152
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.71
  • 40.126.31.0
  • 20.190.159.23
  • 40.126.31.129
  • 40.126.31.3
  • 20.190.159.131
  • 40.126.31.73
  • 40.126.31.67
whitelisted
pastebin.com
  • 104.20.29.150
  • 172.66.171.73
whitelisted
slscr.update.microsoft.com
  • 20.165.94.63
whitelisted

Threats

PID
Process
Class
Message
3352
svchost.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2232
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
No debug info