File name:

vehiclesfotoe.zip

Full analysis: https://app.any.run/tasks/8421fef8-bd9b-4787-85fc-fd3378be635e
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: April 29, 2025, 16:33:17
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
hijackloader
loader
stealer
arechclient2
backdoor
rat
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

3FA2E433A3FA3AB7942F8ED9B69E4CF9

SHA1:

E7E7AF5678017E87D52D105042C8B800912DD01A

SHA256:

72D6492829A31D93853058E4ED4B0FAB7D78B98E074328F204A645C634E8C5FE

SSDEEP:

98304:bVX+rAVIXcKN0Ec4An27G/Gvgwr7DGJAJVha2E1eUH7nRpDVL2zjp3pc6EQAv69s:+PzDAOu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • DistributedBlade58.exe (PID: 8064)
      • DistributedBlade58.exe (PID: 8044)
      • DistributedBlade58.exe (PID: 1132)
      • DistributedBlade58.exe (PID: 7972)
    • HIJACKLOADER has been detected (YARA)

      • DistributedBlade58.exe (PID: 8064)
    • ARECHCLIENT2 has been detected (SURICATA)

      • MSLauncher.exe (PID: 7244)
    • Actions looks like stealing of personal data

      • MSLauncher.exe (PID: 7244)
  • SUSPICIOUS

    • Starts itself from another location

      • DistributedBlade58.exe (PID: 8044)
      • DistributedBlade58.exe (PID: 1132)
    • Executable content was dropped or overwritten

      • DistributedBlade58.exe (PID: 8044)
      • DistributedBlade58.exe (PID: 8064)
      • pwsh.exe (PID: 7608)
    • There is functionality for taking screenshot (YARA)

      • DistributedBlade58.exe (PID: 8064)
    • Connects to unusual port

      • MSLauncher.exe (PID: 7244)
    • Reads the date of Windows installation

      • pwsh.exe (PID: 7608)
  • INFO

    • Checks supported languages

      • DistributedBlade58.exe (PID: 8044)
      • DistributedBlade58.exe (PID: 8064)
      • MSLauncher.exe (PID: 7244)
      • 360Tray.exe (PID: 7236)
      • pwsh.exe (PID: 7608)
      • DistributedBlade58.exe (PID: 7972)
      • MSLauncher.exe (PID: 4608)
      • 360Tray.exe (PID: 8048)
      • DistributedBlade58.exe (PID: 1132)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7312)
    • Creates files in the program directory

      • DistributedBlade58.exe (PID: 8044)
    • Creates files or folders in the user directory

      • DistributedBlade58.exe (PID: 8064)
    • Manual execution by a user

      • DistributedBlade58.exe (PID: 8044)
      • pwsh.exe (PID: 7608)
    • Reads the computer name

      • DistributedBlade58.exe (PID: 8044)
      • DistributedBlade58.exe (PID: 8064)
      • MSLauncher.exe (PID: 7244)
      • 360Tray.exe (PID: 7236)
      • pwsh.exe (PID: 7608)
      • MSLauncher.exe (PID: 4608)
      • 360Tray.exe (PID: 8048)
      • DistributedBlade58.exe (PID: 1132)
      • DistributedBlade58.exe (PID: 7972)
    • The sample compiled with chinese language support

      • DistributedBlade58.exe (PID: 8064)
    • Create files in a temporary directory

      • DistributedBlade58.exe (PID: 8064)
      • 360Tray.exe (PID: 7236)
      • DistributedBlade58.exe (PID: 7972)
    • Reads the machine GUID from the registry

      • MSLauncher.exe (PID: 7244)
    • Disables trace logs

      • MSLauncher.exe (PID: 7244)
    • Process checks computer location settings

      • pwsh.exe (PID: 7608)
    • Checks proxy server information

      • MSLauncher.exe (PID: 7244)
      • slui.exe (PID: 4996)
    • Reads the software policy settings

      • slui.exe (PID: 7492)
      • slui.exe (PID: 4996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:29 11:39:14
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Package/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
15
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe rundll32.exe no specs distributedblade58.exe #HIJACKLOADER distributedblade58.exe #ARECHCLIENT2 mslauncher.exe 360tray.exe no specs slui.exe pwsh.exe conhost.exe no specs distributedblade58.exe no specs distributedblade58.exe no specs mslauncher.exe no specs 360tray.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1132"C:\Users\admin\AppData\Local\Temp\Package\DistributedBlade58.exe"C:\Users\admin\AppData\Local\Temp\Package\DistributedBlade58.exepwsh.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\package\distributedblade58.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
4608C:\Users\admin\AppData\Local\Temp\MSLauncher.exeC:\Users\admin\AppData\Local\Temp\MSLauncher.exeDistributedBlade58.exe
User:
admin
Company:
Blizzard Entertainment
Integrity Level:
MEDIUM
Description:
Battle.net Launcher
Exit code:
0
Version:
2.34.0.14907
Modules
Images
c:\users\admin\appdata\local\temp\ffd3c47.tmp
c:\users\admin\appdata\local\temp\mslauncher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4996C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7236"C:\Users\admin\AppData\Roaming\PoFirefox\360Tray.exe" "C:\Users\admin\AppData\Roaming\PoFirefox\360Tray.exe" /onuiC:\Users\admin\AppData\Roaming\PoFirefox\360Tray.exeDistributedBlade58.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
360安全卫士 安全防护中心模块
Exit code:
0
Version:
12, 0, 0, 1761
Modules
Images
c:\windows\syswow64\input.dll
c:\users\admin\appdata\roaming\pofirefox\360tray.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7244C:\Users\admin\AppData\Local\Temp\MSLauncher.exeC:\Users\admin\AppData\Local\Temp\MSLauncher.exe
DistributedBlade58.exe
User:
admin
Company:
Blizzard Entertainment
Integrity Level:
MEDIUM
Description:
Battle.net Launcher
Version:
2.34.0.14907
Modules
Images
c:\users\admin\appdata\local\temp\f011be3.tmp
c:\users\admin\appdata\local\temp\mslauncher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7312"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\vehiclesfotoe.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7460C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7492"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7608"C:\Program Files\PowerShell\7\pwsh.exe" -WorkingDirectory ~C:\Program Files\PowerShell\7\pwsh.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
pwsh
Version:
7.3.5.500
Modules
Images
c:\program files\powershell\7\pwsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7656\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepwsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
11 164
Read events
11 142
Write events
22
Delete events
0

Modification events

(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\vehiclesfotoe.zip
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7312) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7244) MSLauncher.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7244) MSLauncher.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
14
Suspicious files
23
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
8064DistributedBlade58.exeC:\Users\admin\AppData\Local\Temp\F011BE3.tmp
MD5:
SHA256:
7312WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7312.23043\Package\dx0.dllexecutable
MD5:693DFBB9B324E80B70660927CA1DEA69
SHA256:7C28D90E3484B566EE00ADAB4679A3D1C51F86F01560035D86C8F7788AC05234
7312WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7312.23043\Package\DistributedBlade58.exeexecutable
MD5:9E90C7BA64A66D9AB4703AF006540193
SHA256:A519304C3BBA23EAE2045A85E01AAE44E6556B2F787966654B7209DB13CFA0C4
8044DistributedBlade58.exeC:\ProgramData\PoFirefox\IconX.dllexecutable
MD5:D2DBDD831DDCE917D58571E0FD70A742
SHA256:0F4AF1600462AA57259FD9D935E2DBB5CA22336CF6515F4A390B04CD5DA7955F
8044DistributedBlade58.exeC:\ProgramData\PoFirefox\DistributedBlade58.exeexecutable
MD5:9E90C7BA64A66D9AB4703AF006540193
SHA256:A519304C3BBA23EAE2045A85E01AAE44E6556B2F787966654B7209DB13CFA0C4
8044DistributedBlade58.exeC:\ProgramData\PoFirefox\dx0.dllexecutable
MD5:693DFBB9B324E80B70660927CA1DEA69
SHA256:7C28D90E3484B566EE00ADAB4679A3D1C51F86F01560035D86C8F7788AC05234
7312WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7312.23043\Package\Klaind.xntjbinary
MD5:9E9DF19271265E7E5CB5029DFB55ED30
SHA256:4F3460ADCCB48170B0E7A47ECD1AC74654E5DC4EDB34C8759D9D5521357F98D0
7312WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7312.23043\Package\Maik.xtbinary
MD5:ACE46038DC3BF9FB1E177950555CF701
SHA256:B7570587305E05D79B85FF769A9FD46723B68E0C7ECA2DD87AF4AC1BC6B0C6D3
7608pwsh.exeC:\Users\admin\AppData\Local\Microsoft\PowerShell\7.3.5\update1_v7.5.1_2025-04-24
MD5:
SHA256:
8064DistributedBlade58.exeC:\Users\admin\AppData\Local\Temp\F203EBD.tmpbinary
MD5:E67947A865CE366BA37F3E80F95DEBBE
SHA256:639332CA650D57ED54FF5DA97B660FBCE479817C6C3D111FBA0E451071513CA6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
53
DNS requests
31
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8160
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8160
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7244
MSLauncher.exe
GET
200
107.189.19.196:9000
http://107.189.19.196:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8
unknown
unknown
2924
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7608
pwsh.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7608
pwsh.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
2924
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5496
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.129
  • 20.190.159.71
  • 20.190.159.0
  • 40.126.31.69
  • 20.190.159.75
  • 40.126.31.1
  • 40.126.31.130
  • 20.190.159.128
  • 40.126.31.131
  • 40.126.31.2
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.64
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
www.bing.com
  • 2.16.241.205
  • 2.16.241.222
  • 2.16.241.207
  • 2.16.241.218
whitelisted

Threats

PID
Process
Class
Message
7244
MSLauncher.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)
7244
MSLauncher.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M3 (GET)
7608
pwsh.exe
Not Suspicious Traffic
INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net)
No debug info