File name:

y

Full analysis: https://app.any.run/tasks/03fd58f5-9fbc-4cf3-9fc8-f6d87f727e47
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: March 31, 2025, 15:11:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
stealer
arechclient2
backdoor
rat
hijackloader
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

C60F7746BCDA81F8EEC9770C9FFD84C0

SHA1:

9D94AC6D422B5A95A3AF7EA1D44A2E6B4C050943

SHA256:

E6B4BC4EA5919D650D663BE4686A5D138CA01950C9CD3473AE10AE4854460E0E

SSDEEP:

98304:6/9ADTpciOT2D4qJHFYLZ5zoXhj0meKCXQ981Vz5DatQT94FYzzPxLleHkbnByL/:zCtXQNLvqWPP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • y.exe (PID: 720)
      • vcpkgsrv.exe (PID: 2384)
    • HIJACKLOADER has been detected (YARA)

      • vcpkgsrv.exe (PID: 2136)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 5988)
    • ARECHCLIENT2 has been detected (SURICATA)

      • MSBuild.exe (PID: 5988)
  • SUSPICIOUS

    • Starts itself from another location

      • y.exe (PID: 6032)
      • vcpkgsrv.exe (PID: 2384)
    • Executable content was dropped or overwritten

      • y.exe (PID: 6032)
      • y.exe (PID: 720)
      • vcpkgsrv.exe (PID: 2384)
    • Process drops legitimate windows executable

      • y.exe (PID: 720)
      • vcpkgsrv.exe (PID: 2384)
    • Starts a Microsoft application from unusual location

      • vcpkgsrv.exe (PID: 2384)
    • The process drops C-runtime libraries

      • y.exe (PID: 720)
      • vcpkgsrv.exe (PID: 2384)
    • Starts CMD.EXE for commands execution

      • vcpkgsrv.exe (PID: 2136)
    • Connects to unusual port

      • MSBuild.exe (PID: 5988)
    • Executes application which crashes

      • y.exe (PID: 720)
  • INFO

    • The sample compiled with english language support

      • y.exe (PID: 6032)
      • y.exe (PID: 720)
      • vcpkgsrv.exe (PID: 2384)
    • Create files in a temporary directory

      • y.exe (PID: 6032)
      • y.exe (PID: 720)
      • vcpkgsrv.exe (PID: 2136)
    • Checks supported languages

      • y.exe (PID: 720)
      • y.exe (PID: 6032)
      • vcpkgsrv.exe (PID: 2384)
      • vcpkgsrv.exe (PID: 2136)
      • MSBuild.exe (PID: 5988)
    • Reads the computer name

      • vcpkgsrv.exe (PID: 2384)
      • vcpkgsrv.exe (PID: 2136)
      • MSBuild.exe (PID: 5988)
    • Creates files or folders in the user directory

      • vcpkgsrv.exe (PID: 2384)
      • WerFault.exe (PID: 1040)
      • WerFault.exe (PID: 1512)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 5988)
    • Disables trace logs

      • MSBuild.exe (PID: 5988)
    • Checks proxy server information

      • MSBuild.exe (PID: 5988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:05 13:00:43+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.34
CodeSize: 442880
InitializedDataSize: 237056
UninitializedDataSize: -
EntryPoint: 0x46a50
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 8.3.6.0
ProductVersionNumber: 8.3.6.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: ASCII
CompanyName: Neckline
FileDescription: Greenbottle
FileVersion: 8.3.6.0
InternalName: burn
OriginalFileName: valse.exe
ProductName: Greenbottle
ProductVersion: 8.3.6.0
LegalCopyright: Copyright (c) Neckline. All rights reserved.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
11
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start y.exe #GENERIC y.exe #GENERIC vcpkgsrv.exe #HIJACKLOADER vcpkgsrv.exe no specs sppextcomobj.exe no specs slui.exe no specs #ARECHCLIENT2 msbuild.exe cmd.exe no specs conhost.exe no specs werfault.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720"C:\Users\admin\AppData\Local\Temp\{DA4CDB0B-6735-40C9-9217-CDDEF98F9CC3}\.cr\y.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\y.exe" -burn.filehandle.attached=752 -burn.filehandle.self=756C:\Users\admin\AppData\Local\Temp\{DA4CDB0B-6735-40C9-9217-CDDEF98F9CC3}\.cr\y.exe
y.exe
User:
admin
Company:
Neckline
Integrity Level:
MEDIUM
Description:
Greenbottle
Exit code:
3221225477
Version:
8.3.6.0
Modules
Images
c:\users\admin\appdata\local\temp\{da4cdb0b-6735-40c9-9217-cddef98f9cc3}\.cr\y.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1040C:\WINDOWS\SysWOW64\WerFault.exe -u -p 720 -s 780C:\Windows\SysWOW64\WerFault.exey.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1512C:\WINDOWS\SysWOW64\WerFault.exe -u -p 720 -s 684C:\Windows\SysWOW64\WerFault.exey.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2136C:\Users\admin\AppData\Roaming\Nodectrl_beta\vcpkgsrv.exeC:\Users\admin\AppData\Roaming\Nodectrl_beta\vcpkgsrv.exe
vcpkgsrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) Visual C++ Package Server
Exit code:
1
Version:
17.0.34202.158 built by: D17.7
Modules
Images
c:\users\admin\appdata\roaming\nodectrl_beta\vcpkgsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
2384C:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\vcpkgsrv.exeC:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\vcpkgsrv.exe
y.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) Visual C++ Package Server
Exit code:
0
Version:
17.0.34202.158 built by: D17.7
Modules
Images
c:\users\admin\appdata\local\temp\{44f14ecb-5131-4b27-9302-b3325fbf52e7}\.ba\vcpkgsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
4040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4200C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5988C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
vcpkgsrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\users\admin\appdata\local\temp\myxowfgxmjusd
c:\windows\syswow64\msi.dll
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
6032"C:\Users\admin\AppData\Local\Temp\y.exe" C:\Users\admin\AppData\Local\Temp\y.exe
explorer.exe
User:
admin
Company:
Neckline
Integrity Level:
MEDIUM
Description:
Greenbottle
Exit code:
3221225477
Version:
8.3.6.0
Modules
Images
c:\users\admin\appdata\local\temp\y.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6640"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 903
Read events
4 889
Write events
14
Delete events
0

Modification events

(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5988) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
14
Suspicious files
13
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
720y.exeC:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\Lancejack.dllexecutable
MD5:3E9E67AE80D1A43F62F5E91C8F968B32
SHA256:E9534B6926E16F599FF3F34E52F001829A5E0BBAF035EF1B81082372C0BF3B94
720y.exeC:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\smaragd.datbinary
MD5:96A94319614EF5D6F973EA2A3199476B
SHA256:169381848670AB5DB79A6576814C7AD031807E473A94141E768B157BD492DDE7
2136vcpkgsrv.exeC:\Users\admin\AppData\Local\Temp\myxowfgxmjusd
MD5:
SHA256:
6032y.exeC:\Users\admin\AppData\Local\Temp\{DA4CDB0B-6735-40C9-9217-CDDEF98F9CC3}\.cr\y.exeexecutable
MD5:1607B1FDB66920DCFCFBFA2AEE989E07
SHA256:AE24AA7F073A5E53D4AF1F2AEAF08EF5E516DACB797C63E88702B3AC14E0EE31
720y.exeC:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\vcruntime140_1.dllexecutable
MD5:CF0A1C4776FFE23ADA5E570FC36E39FE
SHA256:6FD366A691ED68430BCD0A3DE3D8D19A0CB2102952BFC140BBEF4354ED082C47
2384vcpkgsrv.exeC:\Users\admin\AppData\Roaming\Nodectrl_beta\vcpkgsrv.exeexecutable
MD5:00FC4EEAA353DA05C9E0B51D6E6A052A
SHA256:5D4E58C4D6F889988DB3B756570241E5A5CC5A52DCC6385FA1E0EB3372AA9DE8
1040WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_y.exe_12ba98f6c3d31cabff4201187fe3459e2a0301d_28d9a5aa_aa0ca0fc-5a7a-4f3e-a515-6d443b70302b\Report.wer
MD5:
SHA256:
2384vcpkgsrv.exeC:\Users\admin\AppData\Roaming\Nodectrl_beta\cpfe.dllexecutable
MD5:53A4020F708F82C4C81376B2DA0CBC7C
SHA256:4ADC0E535657EFE06ECEBFC2E6F999C20289FBE0132890C989B8F4BF6DDBB451
2384vcpkgsrv.exeC:\Users\admin\AppData\Roaming\Nodectrl_beta\vcruntime140_1.dllexecutable
MD5:CF0A1C4776FFE23ADA5E570FC36E39FE
SHA256:6FD366A691ED68430BCD0A3DE3D8D19A0CB2102952BFC140BBEF4354ED082C47
2384vcpkgsrv.exeC:\Users\admin\AppData\Roaming\Nodectrl_beta\smaragd.datbinary
MD5:96A94319614EF5D6F973EA2A3199476B
SHA256:169381848670AB5DB79A6576814C7AD031807E473A94141E768B157BD492DDE7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
12
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.81:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5988
MSBuild.exe
GET
200
45.9.190.157:9000
http://45.9.190.157:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8
unknown
unknown
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4696
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4696
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.164.81:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
20.10.31.115:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5988
MSBuild.exe
45.9.190.157:443
Hostinger International Limited
NL
unknown
4696
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.81
  • 2.16.164.72
  • 2.16.164.27
  • 2.16.164.34
  • 2.16.164.90
  • 2.16.164.96
  • 2.16.164.9
  • 2.16.164.80
  • 2.16.164.17
whitelisted
google.com
  • 142.250.74.206
whitelisted
client.wns.windows.com
  • 20.10.31.115
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.129
  • 20.190.159.68
  • 40.126.31.2
  • 20.190.159.64
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 23.209.214.100
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
5988
MSBuild.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)
5988
MSBuild.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M3 (GET)
No debug info