URL:

https://cdn-cloudprint.cainiao.com/waybill-print/cainiao-x-print/prod/win/cainiao-x-print-win-86.exe

Full analysis: https://app.any.run/tasks/3054a5ba-5297-4232-b7e1-0e79a7ece5dd
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: July 25, 2025, 02:30:51
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
inno
installer
arch-doc
adware
innosetup
golang
Indicators:
MD5:

1D06B2E628597E967AB43D108A15CEAA

SHA1:

A72D2B6FA4D5EDCC115CBBF34D82C703CD9F3B7A

SHA256:

2DB9BCA9971B16B631339258FF4D58B9FBB8E748A76BF4E644B18050B1EC453D

SSDEEP:

3:N8cXEFKFKB2IUgwgoXKOBlLwgoXKdKM4An:2cXqT8IURHXKLHXKpn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • cainiao-x-print-win-86.tmp (PID: 5188)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • cainiao-x-print-win-86.tmp (PID: 7288)
    • Drops 7-zip archiver for unpacking

      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Executable content was dropped or overwritten

      • cainiao-x-print-win-86.exe (PID: 1636)
      • cainiao-x-print-win-86.tmp (PID: 5188)
      • cainiao-x-print-win-86.exe (PID: 7192)
      • 7z.exe (PID: 7704)
      • 7z.exe (PID: 7572)
    • Reads the Windows owner or organization settings

      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 6688)
      • cmd.exe (PID: 7540)
    • Process drops legitimate windows executable

      • 7z.exe (PID: 7704)
    • The process drops C-runtime libraries

      • 7z.exe (PID: 7704)
    • Starts CMD.EXE for commands execution

      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Executing commands from a ".bat" file

      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Adds/modifies Windows certificates

      • certutil.exe (PID: 2212)
    • Checks for Java to be installed

      • javaw.exe (PID: 7248)
  • INFO

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 4012)
    • Create files in a temporary directory

      • cainiao-x-print-win-86.exe (PID: 7192)
      • cainiao-x-print-win-86.exe (PID: 1636)
      • cainiao-x-print-win-86.tmp (PID: 5188)
      • javaw.exe (PID: 7248)
    • Checks supported languages

      • cainiao-x-print-win-86.exe (PID: 7192)
      • cainiao-x-print-win-86.exe (PID: 1636)
      • cainiao-x-print-win-86.tmp (PID: 7288)
      • cainiao-x-print-win-86.tmp (PID: 5188)
      • 7z.exe (PID: 7704)
      • 7z.exe (PID: 7572)
      • 7z.exe (PID: 7108)
      • CNPrintClient.exe (PID: 420)
      • javaw.exe (PID: 7248)
      • AlibabaProtectCon.exe (PID: 3872)
    • Application launched itself

      • chrome.exe (PID: 4012)
    • Reads the computer name

      • cainiao-x-print-win-86.tmp (PID: 7288)
      • cainiao-x-print-win-86.tmp (PID: 5188)
      • javaw.exe (PID: 7248)
    • Process checks computer location settings

      • cainiao-x-print-win-86.tmp (PID: 7288)
    • Compiled with Borland Delphi (YARA)

      • cainiao-x-print-win-86.exe (PID: 7192)
      • cainiao-x-print-win-86.tmp (PID: 7288)
      • cainiao-x-print-win-86.exe (PID: 1636)
      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Detects InnoSetup installer (YARA)

      • cainiao-x-print-win-86.exe (PID: 7192)
      • cainiao-x-print-win-86.tmp (PID: 7288)
      • cainiao-x-print-win-86.exe (PID: 1636)
      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Launching a file from a Registry key

      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Checks proxy server information

      • slui.exe (PID: 7844)
      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Reads the software policy settings

      • slui.exe (PID: 7844)
      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Creates files in the program directory

      • cainiao-x-print-win-86.tmp (PID: 5188)
      • 7z.exe (PID: 7572)
      • 7z.exe (PID: 7704)
      • 7z.exe (PID: 7108)
      • cmd.exe (PID: 6140)
    • The sample compiled with english language support

      • cainiao-x-print-win-86.tmp (PID: 5188)
      • 7z.exe (PID: 7704)
    • Creates a software uninstall entry

      • cainiao-x-print-win-86.tmp (PID: 5188)
    • Creates files or folders in the user directory

      • javaw.exe (PID: 7248)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 7248)
    • Application based on Golang

      • CNPrintClient.exe (PID: 420)
    • Manual execution by a user

      • CNPrintClient.exe (PID: 420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
184
Monitored processes
38
Malicious processes
2
Suspicious processes
4

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs slui.exe chrome.exe no specs chrome.exe no specs cainiao-x-print-win-86.exe cainiao-x-print-win-86.tmp no specs cainiao-x-print-win-86.exe cainiao-x-print-win-86.tmp chrome.exe no specs chrome.exe no specs 7z.exe conhost.exe no specs 7z.exe conhost.exe no specs 7z.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs alibabaprotectcon.exe no specs cmd.exe no specs conhost.exe no specs certutil.exe no specs chrome.exe no specs cnprintclient.exe no specs javaw.exe chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
420"C:\Program Files (x86)\CNPrintTool\CNPrintClient.exe" C:\Program Files (x86)\CNPrintTool\CNPrintClient.exeexplorer.exe
User:
admin
Company:
cainiao.com
Integrity Level:
MEDIUM
Description:
cainiao-x-print
Version:
1.5.3
Modules
Images
c:\program files (x86)\cnprinttool\cnprintclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1236"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3524,i,6204267991602903707,14146912482869639687,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=3624 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1388"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --field-trial-handle=2276,i,6204267991602903707,14146912482869639687,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=5792 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1636"C:\Users\admin\Downloads\cainiao-x-print-win-86.exe" /SPAWNWND=$90346 /NOTIFYWND=$100326 C:\Users\admin\Downloads\cainiao-x-print-win-86.exe
cainiao-x-print-win-86.tmp
User:
admin
Company:
cainiao.com
Integrity Level:
HIGH
Description:
CAINIAO打印组件 Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\downloads\cainiao-x-print-win-86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
1808\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe7z.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2040"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --field-trial-handle=5436,i,6204267991602903707,14146912482869639687,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=5424 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2212certutil.exe -addstore root ca.crt C:\Windows\SysWOW64\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CertUtil.exe
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2504"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3044,i,6204267991602903707,14146912482869639687,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=3092 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2604"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,6204267991602903707,14146912482869639687,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=3052 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2976"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgABAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1968,i,6204267991602903707,14146912482869639687,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=1952 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
11 494
Read events
11 438
Write events
49
Delete events
7

Modification events

(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4012) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1I
Value:
1
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C2I
Value:
1
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C7I
Value:
1
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1S
Value:
1
(PID) Process:(4012) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C7S
Value:
1
Executable files
254
Suspicious files
106
Text files
97
Unknown types
33

Dropped files

PID
Process
Filename
Type
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\ClientCertificates\LOG.old~RF18d8b7.TMP
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\ClientCertificates\LOG.old
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF18d8c7.TMP
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB\LOG.old~RF18d8e6.TMP
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB\LOG.old
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF18d8e6.TMP
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF18d8e6.TMP
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4012chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
60
DNS requests
45
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.55.110.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6392
chrome.exe
GET
200
172.217.16.206:80
http://clients2.google.com/time/1/current?cup2key=8:4UEDF1cIYfVKmsNUxzmXK1Rd89buh3LB3wB-ZOkxkJ0&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3944
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7736
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7736
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7916
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acpeapixpwuzscfa5h5j5m7c4xaa_2025.6.16.0/niikhdgajlphfehepabhhblakbdgeefj_2025.06.16.00_all_acgsomx5qtwgffxcrxwhoksfom7q.crx3
unknown
whitelisted
7916
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acpeapixpwuzscfa5h5j5m7c4xaa_2025.6.16.0/niikhdgajlphfehepabhhblakbdgeefj_2025.06.16.00_all_acgsomx5qtwgffxcrxwhoksfom7q.crx3
unknown
whitelisted
7916
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acpeapixpwuzscfa5h5j5m7c4xaa_2025.6.16.0/niikhdgajlphfehepabhhblakbdgeefj_2025.06.16.00_all_acgsomx5qtwgffxcrxwhoksfom7q.crx3
unknown
whitelisted
7916
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acpeapixpwuzscfa5h5j5m7c4xaa_2025.6.16.0/niikhdgajlphfehepabhhblakbdgeefj_2025.06.16.00_all_acgsomx5qtwgffxcrxwhoksfom7q.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2348
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6392
chrome.exe
172.217.16.206:80
clients2.google.com
GOOGLE
US
whitelisted
6392
chrome.exe
142.250.185.138:443
safebrowsingohttpgateway.googleapis.com
GOOGLE
US
whitelisted
6392
chrome.exe
142.251.168.84:443
accounts.google.com
GOOGLE
US
whitelisted
6392
chrome.exe
47.246.23.183:443
cdn-cloudprint.cainiao.com
Zhejiang Taobao Network Co.,Ltd
US
whitelisted
4012
chrome.exe
224.0.0.251:5353
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 216.58.206.78
whitelisted
safebrowsingohttpgateway.googleapis.com
  • 142.250.185.138
  • 142.250.186.42
  • 142.250.181.234
  • 142.250.186.106
  • 142.250.185.202
  • 142.250.185.170
  • 172.217.16.202
  • 216.58.206.42
  • 142.250.185.234
  • 142.250.185.74
  • 172.217.18.10
  • 142.250.185.106
  • 142.250.186.74
  • 142.250.186.138
  • 142.250.184.202
  • 142.250.186.170
whitelisted
clients2.google.com
  • 172.217.16.206
whitelisted
cdn-cloudprint.cainiao.com
  • 47.246.23.183
  • 47.246.23.180
  • 47.246.23.184
  • 47.246.23.178
  • 47.246.23.177
  • 47.246.23.181
  • 47.246.23.182
  • 47.246.23.179
  • 163.181.92.201
  • 163.181.92.202
  • 163.181.92.203
  • 163.181.92.204
  • 163.181.92.205
  • 163.181.92.206
  • 163.181.92.207
  • 163.181.92.208
whitelisted
accounts.google.com
  • 142.251.168.84
whitelisted
www.google.com
  • 142.250.184.228
whitelisted
crl.microsoft.com
  • 23.55.110.193
  • 23.55.110.211
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.140
  • 20.190.160.64
  • 40.126.32.74
  • 20.190.160.128
  • 20.190.160.66
  • 20.190.160.2
  • 20.190.160.65
  • 20.190.159.0
  • 20.190.159.75
  • 20.190.159.128
  • 20.190.159.4
  • 40.126.31.69
  • 20.190.159.68
  • 40.126.31.129
  • 40.126.31.1
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
No debug info