URL:

https://tinyurl.com/OrcusTool

Full analysis: https://app.any.run/tasks/6b2fb828-0103-4cdc-b681-c9f6f9a8e193
Verdict: Malicious activity
Threats:

Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.

Analysis date: May 25, 2025, 09:49:11
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
rat
orcus
Indicators:
MD5:

23187A133E3FDC430CD1EB0BB5CFBD01

SHA1:

A5708D885A0D5EDA09927317361797B7820B1309

SHA256:

CC5C765B69C7F60D114514A7DB72119AB652AA63EE114B717B27D23D0F1792DB

SSDEEP:

3:N8EzLdIgDMS:2End3D9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Orcus is detected

      • Orcus.Administration.exe (PID: 6564)
      • syhadow.exe (PID: 3140)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7876)
      • Orcus.Administration.exe (PID: 3884)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7876)
      • Orcus.Administration.exe (PID: 3884)
      • Orcus.Administration.exe (PID: 6564)
      • ‮4pm.unnyf.exe (PID: 2284)
      • Notthatguy11.exe (PID: 7896)
      • Crackhead.exe (PID: 2392)
      • syhadow.exe (PID: 3140)
      • Uninstall.exe (PID: 7992)
    • Executable content was dropped or overwritten

      • Orcus.Administration.exe (PID: 3884)
      • Orcus.Administration.exe (PID: 6564)
      • Notthatguy11.exe (PID: 7896)
      • ‮4pm.unnyf.exe (PID: 2284)
      • Crackhead.exe (PID: 2392)
      • syhadow.exe (PID: 3140)
      • Uninstall.exe (PID: 7992)
      • AudioDriver.exe (PID: 3156)
    • Reads the date of Windows installation

      • Orcus.Administration.exe (PID: 3884)
      • ‮4pm.unnyf.exe (PID: 2284)
      • Notthatguy11.exe (PID: 7896)
      • Crackhead.exe (PID: 2392)
    • Starts itself from another location

      • ‮4pm.unnyf.exe (PID: 2284)
      • Notthatguy11.exe (PID: 7896)
      • syhadow.exe (PID: 3140)
      • Uninstall.exe (PID: 7992)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 4436)
    • Reads the computer name

      • Orcus.Administration.exe (PID: 3884)
      • Orcus.Administration.exe (PID: 6564)
      • ‮4pm.unnyf.exe (PID: 2284)
      • Uninstall.exe (PID: 7992)
      • Notthatguy11.exe (PID: 7896)
      • Crackhead.exe (PID: 2392)
      • syhadow.exe (PID: 3140)
    • Checks supported languages

      • Orcus.Administration.exe (PID: 3884)
      • Orcus.Administration.exe (PID: 6564)
      • ‮4pm.unnyf.exe (PID: 2284)
      • Crackhead.exe (PID: 2392)
      • Notthatguy11.exe (PID: 7896)
      • syhadow.exe (PID: 3140)
      • Uninstall.exe (PID: 7992)
      • Uninstall.exe (PID: 5048)
    • Manual execution by a user

      • WinRAR.exe (PID: 7876)
    • Create files in a temporary directory

      • Orcus.Administration.exe (PID: 3884)
      • Orcus.Administration.exe (PID: 6564)
      • ‮4pm.unnyf.exe (PID: 2284)
      • Crackhead.exe (PID: 2392)
      • Notthatguy11.exe (PID: 7896)
      • Uninstall.exe (PID: 7992)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7876)
    • Reads the software policy settings

      • slui.exe (PID: 7920)
      • Orcus.Administration.exe (PID: 6564)
    • Process checks computer location settings

      • Orcus.Administration.exe (PID: 3884)
      • ‮4pm.unnyf.exe (PID: 2284)
      • Notthatguy11.exe (PID: 7896)
      • syhadow.exe (PID: 3140)
      • Uninstall.exe (PID: 7992)
      • Crackhead.exe (PID: 2392)
    • Reads the machine GUID from the registry

      • Orcus.Administration.exe (PID: 6564)
      • syhadow.exe (PID: 3140)
    • Disables trace logs

      • Orcus.Administration.exe (PID: 6564)
    • Checks proxy server information

      • Orcus.Administration.exe (PID: 6564)
    • Creates files or folders in the user directory

      • syhadow.exe (PID: 3140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
165
Monitored processes
33
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs rundll32.exe no specs winrar.exe orcus.administration.exe #ORCUS orcus.administration.exe slui.exe no specs chrome.exe no specs svchost.exe chrome.exe no specs ‮4pm.unnyf.exe notthatguy11.exe crackhead.exe uninstall.exe no specs uninstall.exe uninstall.exe no specs #ORCUS syhadow.exe audiodriver.exe chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
472C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2284"C:\Users\admin\AppData\Local\Temp\RarSFX0\‮4pm.unnyf.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\‮4pm.unnyf.exe
Orcus.Administration.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\‮4pm.unnyf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_91a79472cc852ba0\gdiplus.dll
2392"C:\Users\admin\AppData\Local\Temp\RarSFX2\Crackhead.exe" C:\Users\admin\AppData\Local\Temp\RarSFX2\Crackhead.exe
Notthatguy11.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx2\crackhead.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_91a79472cc852ba0\gdiplus.dll
3140"C:\Users\admin\AppData\Local\Temp\RarSFX3\syhadow.exe" C:\Users\admin\AppData\Local\Temp\RarSFX3\syhadow.exe
Crackhead.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx3\syhadow.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3156"C:\Users\admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe" C:\Users\admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe
syhadow.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\speech\audiodriver.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3884"C:\Users\admin\AppData\Local\Temp\Rar$EXa7876.43314\Orcus\Orcus.Administration.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7876.43314\Orcus\Orcus.Administration.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7876.43314\orcus\orcus.administration.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.3996_none_91a79472cc852ba0\gdiplus.dll
4068"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4708 --field-trial-handle=1880,i,12782142265943628214,14951835569197414521,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4436"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints "https://tinyurl.com/OrcusTool"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5048"C:\Users\admin\AppData\Local\Temp\Uninstall.exe" endC:\Users\admin\AppData\Local\Temp\Uninstall.exeUninstall.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\uninstall.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
13 070
Read events
13 019
Write events
45
Delete events
6

Modification events

(PID) Process:(4436) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4436) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4436) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4436) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4436) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(8176) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
01000000000000006E6AE2645ACDDB01
(PID) Process:(7876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7876) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
128
Suspicious files
240
Text files
490
Unknown types
0

Dropped files

PID
Process
Filename
Type
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10e011.TMP
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF10e011.TMP
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF10e011.TMP
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10e021.TMP
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF10e011.TMP
MD5:
SHA256:
4436chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF10e040.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
184
DNS requests
119
Threats
100

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2284
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2284
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1388
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/mu3drl5l7dxjtwqd2bv72hybhi_2025.5.23.1/jflhchccmppkfebkiaminageehmchikm_2025.05.23.01_all_ac7lhpo4vvfmv4pn37jw6qxv2xma.crx3
unknown
whitelisted
1388
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/mu3drl5l7dxjtwqd2bv72hybhi_2025.5.23.1/jflhchccmppkfebkiaminageehmchikm_2025.05.23.01_all_ac7lhpo4vvfmv4pn37jw6qxv2xma.crx3
unknown
whitelisted
1388
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/mu3drl5l7dxjtwqd2bv72hybhi_2025.5.23.1/jflhchccmppkfebkiaminageehmchikm_2025.05.23.01_all_ac7lhpo4vvfmv4pn37jw6qxv2xma.crx3
unknown
whitelisted
1388
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/mu3drl5l7dxjtwqd2bv72hybhi_2025.5.23.1/jflhchccmppkfebkiaminageehmchikm_2025.05.23.01_all_ac7lhpo4vvfmv4pn37jw6qxv2xma.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4436
chrome.exe
239.255.255.250:1900
whitelisted
7328
chrome.exe
104.18.111.161:443
tinyurl.com
CLOUDFLARENET
whitelisted
7328
chrome.exe
108.177.15.84:443
accounts.google.com
GOOGLE
US
whitelisted
7328
chrome.exe
31.216.144.5:443
mega.nz
Datacenter Luxembourg S.A.
LU
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 23.32.238.112
  • 23.32.238.107
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
tinyurl.com
  • 104.18.111.161
  • 104.17.112.233
whitelisted
accounts.google.com
  • 108.177.15.84
whitelisted
mega.nz
  • 31.216.144.5
  • 31.216.145.5
whitelisted
content-autofill.googleapis.com
  • 142.250.185.234
  • 142.250.184.202
  • 142.250.185.202
  • 142.250.185.106
  • 172.217.18.10
  • 142.250.185.138
  • 142.250.186.106
  • 142.250.186.138
  • 142.250.185.74
  • 142.250.181.234
  • 172.217.23.106
  • 142.250.186.170
  • 142.250.185.170
  • 216.58.206.74
  • 216.58.212.138
  • 142.250.184.234
whitelisted
na.static.mega.co.nz
  • 185.206.25.71
  • 162.208.16.210
unknown

Threats

PID
Process
Class
Message
7328
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] URL Shortener TinyURL (tinyurl .com)
7328
chrome.exe
Misc activity
INFO [ANY.RUN] Possible short link service (tinyurl .com)
7328
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] URL Shortener TinyURL (tinyurl .com)
7328
chrome.exe
Misc activity
INFO [ANY.RUN] Possible short link service (tinyurl .com)
7328
chrome.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (mega .nz)
7328
chrome.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (mega .nz)
7328
chrome.exe
Misc activity
ET FILE_SHARING File Sharing Domain Observed in TLS SNI (mega .nz)
7328
chrome.exe
Misc activity
ET FILE_SHARING Observed DNS Query to Filesharing Service (mega .co .nz)
7328
chrome.exe
Misc activity
ET FILE_SHARING Observed DNS Query to Filesharing Service (mega .co .nz)
7328
chrome.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (mega .nz)
No debug info