File name:

infect.txt

Full analysis: https://app.any.run/tasks/76de2369-fbf5-425d-a276-e6e4fb80107d
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: March 03, 2025, 14:43:51
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
stealer
xor-url
generic
arechclient2
rat
backdoor
Indicators:
MIME: text/plain
File info: ASCII text, with no line terminators
MD5:

63DAA597BE58D84D6DF3A9C047D08DDE

SHA1:

3AB5D51205DDF38B7A2D72C556856BF53C9572CB

SHA256:

A16F1974562966DE799F8239B1BB783821617BE8177314ABFEC2DF602C72CC41

SSDEEP:

6:HHCS/STfNjvuGqSgAokkJdT14Ee2vCoj7454kuGVlvR+VVlh1kr:HiaejmG/gA5k625j/VIr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 5260)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5260)
    • ARECHCLIENT2 has been detected (YARA)

      • MSBuild.exe (PID: 2416)
    • XORed URL has been found (YARA)

      • MSBuild.exe (PID: 2416)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 2416)
  • SUSPICIOUS

    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 5260)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 5260)
      • AUpdate.exe (PID: 968)
    • Extracts files to a directory (POWERSHELL)

      • powershell.exe (PID: 5260)
    • The process creates files with name similar to system file names

      • powershell.exe (PID: 5260)
      • AUpdate.exe (PID: 968)
    • Process drops SQLite DLL files

      • AUpdate.exe (PID: 968)
      • powershell.exe (PID: 5260)
    • Starts CMD.EXE for commands execution

      • AUpdate.exe (PID: 968)
    • Connects to unusual port

      • MSBuild.exe (PID: 2416)
  • INFO

    • Manual execution by a user

      • powershell.exe (PID: 5260)
      • WINWORD.EXE (PID: 5964)
      • vlc.exe (PID: 2516)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4268)
    • Reads the software policy settings

      • slui.exe (PID: 1676)
    • Disables trace logs

      • powershell.exe (PID: 5260)
    • The sample compiled with english language support

      • powershell.exe (PID: 5260)
      • AUpdate.exe (PID: 968)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 5260)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5260)
    • Checks supported languages

      • AUpdate.exe (PID: 968)
      • MSBuild.exe (PID: 2416)
    • Checks proxy server information

      • powershell.exe (PID: 5260)
    • Create files in a temporary directory

      • AUpdate.exe (PID: 968)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 2416)
    • Creates files or folders in the user directory

      • AUpdate.exe (PID: 968)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(2416) MSBuild.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exeB
https://github.com
https://pastebin.com/raw/DWCCqGB0
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
156
Monitored processes
15
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start notepad.exe no specs sppextcomobj.exe no specs slui.exe powershell.exe conhost.exe no specs slui.exe aupdate.exe cmd.exe no specs conhost.exe no specs #ARECHCLIENT2 msbuild.exe rundll32.exe no specs winword.exe ai.exe no specs vlc.exe no specs openwith.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
968"C:\Users\admin\AppData\Local\Temp\MaxiAir\AUpdate.exe"C:\Users\admin\AppData\Local\Temp\MaxiAir\AUpdate.exe
powershell.exe
User:
admin
Company:
IObit
Integrity Level:
MEDIUM
Description:
Driver Booster
Exit code:
1
Version:
11.0.0.21
Modules
Images
c:\users\admin\appdata\local\temp\maxiair\aupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\wintrust.dll
c:\windows\syswow64\msvcrt.dll
1052"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "7947EABF-E344-4EE0-B6CF-F10235AB8A92" "FC66034A-4A9A-440D-AB7B-170FAA5078C3" "5964"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Exit code:
0
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1676"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2316\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2416C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\users\admin\appdata\local\temp\toqj
c:\windows\syswow64\mshtml.dll
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
xor-url
(PID) Process(2416) MSBuild.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exeB
https://github.com
https://pastebin.com/raw/DWCCqGB0
2516"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\admin\AppData\Roaming\Oraclepower\eyestalk.wav"C:\Program Files\VideoLAN\VLC\vlc.exeexplorer.exe
User:
admin
Company:
VideoLAN
Integrity Level:
MEDIUM
Description:
VLC media player
Exit code:
0
Version:
3.0.11
Modules
Images
c:\program files\videolan\vlc\vlc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4200C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeAUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4268"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\infect.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4608C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4812C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
17 935
Read events
17 675
Write events
239
Delete events
21

Modification events

(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:writeName:7;(
Value:
373B28004C1700000100000000000000492AC9104B8CDB0100000000
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:writeName:<(
Value:
7F3C28004C1700000400000000000000FBF7FF104B8CDB018C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:delete valueName:<(
Value:
㱿(ᝌ
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\5964
Operation:writeName:0
Value:
0B0E105563BC5896894E4FB437D7A9F6582DB0230046E2C5FE85B189E3ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511CC2ED2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(5964) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
Executable files
29
Suspicious files
49
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
5260powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0nkye5tc.qes.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5260powershell.exeC:\Users\admin\AppData\Local\Temp\MaxiAir\DataState.dllexecutable
MD5:01C2E74799BFEC9B06546ADCC8DB2337
SHA256:0B9E80726A2DC59741FB7D951B1BD31DE99C2C79F714F3101988B2EB3F6EEFF4
5260powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hkcrces5.nng.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5260powershell.exeC:\Users\admin\AppData\Local\Temp\MaxiAir\AUpdate.exeexecutable
MD5:CA781243E6988A1A30DA6AF5C350456D
SHA256:C833092C1AA94B54C30F5ED7F0C989F05F7FE9A395FEFA217B3671391236A904
5260powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:3674E7F172704C8B801D7DF18CD68F1B
SHA256:38DAEF5BFE6876E31EF642C5E01906C1C06E2B3812BFD72572B9A4D0B5C31E45
5260powershell.exeC:\Users\admin\AppData\Local\Temp\MaxiAir\chapbook.docbinary
MD5:A0C43AA393DC575EFBCD737DC53E96D7
SHA256:2601583CE624C987A91DEAE41317BC19278316E256F8ED6396DD1CC6DBC85240
5260powershell.exeC:\Users\admin\AppData\Local\Temp\MaxiAir\madBasic_.bplexecutable
MD5:641C567225E18195BC3D2D04BDE7440B
SHA256:C2DF993943C87B1E0F07DDD7A807BB66C2EF518C7CF427F6AA4BA0F2543F1EA0
5260powershell.exeC:\Users\admin\AppData\Local\Temp\MaxiAir\ProductNews2.dllexecutable
MD5:F9921CF2960C394C07F79FAC5AB35893
SHA256:6F0F83FDFC0A51C2C885A18ACAE335C1CE3815305CEBCF9A9E619D26F37BDC54
5260powershell.exeC:\Users\admin\AppData\Local\Temp\MaxiAir\madDisAsm_.bplexecutable
MD5:3936A92320F7D4CEC5FA903C200911C7
SHA256:2AEC41414ACA38DE5ABA1CAB7BDA2030E1E2B347E0AE77079533722C85FE4566
5260powershell.exeC:\Users\admin\AppData\Local\Temp\MaxiAir\rtl120.bplexecutable
MD5:ADF82ED333FB5567F8097C7235B0E17F
SHA256:D6DD7A4F46F2CFDE9C4EB9463B79D5FF90FC690DA14672BA1DA39708EE1B9B50
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
48
DNS requests
28
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2924
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5964
WINWORD.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6800
SIHClient.exe
GET
200
23.215.121.133:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
144.172.97.7:80
http://144.172.97.7/s2/w1
unknown
unknown
6800
SIHClient.exe
GET
200
23.215.121.133:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6480
backgroundTaskHost.exe
20.74.47.205:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2924
SearchApp.exe
2.19.122.14:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
2924
SearchApp.exe
204.79.197.222:443
fp.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.136
  • 40.126.32.133
  • 20.190.160.128
  • 40.126.32.138
  • 40.126.32.68
  • 20.190.160.64
  • 20.190.160.131
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.19.122.14
  • 2.19.122.15
  • 2.19.122.17
  • 2.19.122.9
  • 2.19.122.11
  • 2.19.122.16
  • 2.19.122.10
  • 2.19.122.7
  • 2.19.122.6
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
th.bing.com
  • 2.16.204.142
  • 2.16.204.138
  • 2.16.204.158
  • 2.16.204.156
  • 2.16.204.133
  • 2.16.204.139
  • 2.16.204.137
  • 2.16.204.134
  • 2.16.204.136
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET INFO URL Shortening Service Domain in DNS Lookup (shorturl .at)
2196
svchost.exe
Misc activity
INFO [ANY.RUN] Possible short link service (shorturl .at)
5260
powershell.exe
Misc activity
ET INFO Observed URL Shortening Service Domain (shorturl .at) in TLS SNI
2196
svchost.exe
Misc activity
INFO [ANY.RUN] Possible short link service (shorturl .at)
No debug info