File name:

25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b

Full analysis: https://app.any.run/tasks/25ab645b-d141-4dca-816e-47ffef8ceed8
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: April 25, 2025, 16:13:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
pastebin
autoit-loader
arechclient2
rat
stealer
backdoor
xor-url
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

6A2B1D09F72B5B1C0AE2547041BAAFB4

SHA1:

646EAA9FF2313F6B6FBED9A4CF001ECBB54DD62E

SHA256:

25CFD6E6A9544990093566D5EA9D7205A60599BFDA8C0F4D59FCA31E58A7640B

SSDEEP:

98304:03BZ4VsmgXiClymg6sqtxu1J9bL4BqfMzEt6Y79KhRKKtsYAjr8iEQf4KnCYahLv:I

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • cmd.exe (PID: 2504)
    • AutoIt loader has been detected (YARA)

      • Denmark.com (PID: 4000)
    • ARECHCLIENT2 has been detected (YARA)

      • RegAsm.exe (PID: 4620)
    • XORed URL has been found (YARA)

      • RegAsm.exe (PID: 4620)
  • SUSPICIOUS

    • Get information on the list of running processes

      • cmd.exe (PID: 1676)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1676)
    • Executing commands from ".cmd" file

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
    • Reads security settings of Internet Explorer

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
    • Starts CMD.EXE for commands execution

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
      • cmd.exe (PID: 1676)
    • Application launched itself

      • cmd.exe (PID: 1676)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 1676)
      • Denmark.com (PID: 4000)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 1676)
    • Starts application with an unusual extension

      • cmd.exe (PID: 1676)
    • The executable file from the user directory is run by the CMD process

      • Denmark.com (PID: 4000)
    • There is functionality for taking screenshot (YARA)

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
      • Denmark.com (PID: 4000)
    • The process creates files with name similar to system file names

      • Denmark.com (PID: 4000)
    • Process drops legitimate windows executable

      • Denmark.com (PID: 4000)
    • Starts a Microsoft application from unusual location

      • RegAsm.exe (PID: 4620)
    • Connects to unusual port

      • RegAsm.exe (PID: 4620)
  • INFO

    • Create files in a temporary directory

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
      • Denmark.com (PID: 4000)
    • Process checks computer location settings

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
    • Reads the computer name

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
      • Denmark.com (PID: 4000)
      • RegAsm.exe (PID: 4620)
    • Checks supported languages

      • 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe (PID: 1276)
      • Denmark.com (PID: 4000)
      • RegAsm.exe (PID: 4620)
    • Creates a new folder

      • cmd.exe (PID: 6028)
    • Reads mouse settings

      • Denmark.com (PID: 4000)
    • Creates files or folders in the user directory

      • Denmark.com (PID: 4000)
    • Manual execution by a user

      • cmd.exe (PID: 2504)
      • RegAsm.exe (PID: 4620)
    • Reads the machine GUID from the registry

      • RegAsm.exe (PID: 4620)
    • The sample compiled with english language support

      • Denmark.com (PID: 4000)
    • Checks proxy server information

      • RegAsm.exe (PID: 4620)
      • slui.exe (PID: 6184)
    • Reads the software policy settings

      • slui.exe (PID: 6184)
      • RegAsm.exe (PID: 4620)
      • slui.exe (PID: 6048)
    • Disables trace logs

      • RegAsm.exe (PID: 4620)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(4620) RegAsm.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exe
https://github.com
https://pastebin.com/raw/wikwTRQc
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:20:04+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 620544
UninitializedDataSize: 16896
EntryPoint: 0x38af
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
160
Monitored processes
22
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe no specs cmd.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs denmark.com choice.exe no specs cmd.exe conhost.exe no specs #ARECHCLIENT2 regasm.exe slui.exe ucpdmgr.exe no specs conhost.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
668\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
896C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1276"C:\Users\admin\AppData\Local\Temp\25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe" C:\Users\admin\AppData\Local\Temp\25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1676"C:\Windows\System32\cmd.exe" /c copy Signup Signup.cmd && Signup.cmdC:\Windows\SysWOW64\cmd.exe
25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2084\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2268"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2284findstr /I "wrsa opssvc" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2288"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2504cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HealthPulse.url" & echo URL="C:\Users\admin\AppData\Local\WellnessPulse Solutions\HealthPulse.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HealthPulse.url" & exitC:\Windows\SysWOW64\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
2 726
Read events
2 712
Write events
14
Delete events
0

Modification events

(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4620) RegAsm.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
4
Suspicious files
27
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Brainbinary
MD5:E00ED59F1A2F7375BCF0F5110BDA7978
SHA256:E4B7B20BD65BDD086D23C96A805102C6C4851ED54A7856FEB755140C3CBAE196
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Inventorybinary
MD5:3901643915A8A6C0F6A7446294C9D636
SHA256:4496F4E8AE6BA3496267A86DA17DB5D35E6D911FE1697D0D6864D7EF564236C9
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Memoriesbinary
MD5:2782C415CBC4318AEE91356FA12384D2
SHA256:4BE11AEB3451EAC721AE915E57035AB3DFF718FFB618FF582A2E0B9FB20FA60D
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Rwandabinary
MD5:ADB83BA926267F14F2E3138624397C49
SHA256:446910A22E3B6048B3D03C8259EE8974D0E488B6D5BC5830AA7A8B29FC38B518
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Restrictedbinary
MD5:92D5E494D6269E376F03BE7CB07B802B
SHA256:AB1415CCC7CDF2EF69B688624D85976B4043542CE809DF9AFC8F535DE79CE221
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Heraldbinary
MD5:9E741FB6466BA51C5A8A1232D206B762
SHA256:C81B026A504C5F9BC9627A6E5F8B7FB9BE20F02C94E32B20043325A9D51F4127
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Advertiserbinary
MD5:67F27D8BCDAAAD824A7462AE16D852A7
SHA256:7E463D5AF12370CFE559A01B1459EEE2545122F7204DEAE3A0D75F20E73F1D9D
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Reprintsbinary
MD5:354D1E554BC5D9CCA25DAB9DA3407BB6
SHA256:800B8D5418CC03A2918DAA4D4C73AF9364CE2DBE5DC64CF91EA99474D5ED8AD7
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Silverbinary
MD5:88E0E870B99F5E5407B7D30D5530A749
SHA256:2F0BC9DAC15396BAAD502CB0844573E51DB6D2BFAF2325F0166C04578A7DACD0
127625cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exeC:\Users\admin\AppData\Local\Temp\Cheatsbinary
MD5:58DC7A0F3D9E1BE3FD7A7A9AE2CB15DE
SHA256:878D463A9A0458F3459533ABC4A225AC6BBA5371730BC76AA92421AB71B96E18
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
44
DNS requests
22
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2104
svchost.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5360
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5360
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
2104
svchost.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 184.30.21.171
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.248
  • 172.211.123.250
whitelisted
uqDlTiUCyILSysyGbCWyxVsirR.uqDlTiUCyILSysyGbCWyxVsirR
unknown
login.live.com
  • 20.190.160.20
  • 20.190.160.130
  • 20.190.160.128
  • 40.126.32.74
  • 20.190.160.3
  • 40.126.32.76
  • 40.126.32.133
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
No debug info