File name:

OInstall.exe

Full analysis: https://app.any.run/tasks/0c6e6125-e74b-4471-9daf-1b1899d9f9f7
Verdict: Malicious activity
Analysis date: March 09, 2024, 21:15:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

EBC58647462AD9C76395EF451064D115

SHA1:

14E470812F13B278B2694A4CEC5737A39784E9DD

SHA256:

414155BF11893EC64BA0F4FFB7DE92885090845A0761CF8F6743462AA5991D5E

SSDEEP:

196608:2ZnMGjZsDEsCaYsGEHy61bgUhufRswPU2/V8Gd83/PALDP0PiaQxhwf+9zYul28S:WnjZhsCOU6ZgfPPPuGdnv0fzfoDYtB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • OInstall.exe (PID: 2036)
      • files.dat (PID: 1876)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • OInstall.exe (PID: 2036)
      • files.dat (PID: 1876)
      • expand.exe (PID: 568)
      • expand.exe (PID: 3228)
      • expand.exe (PID: 1584)
    • Drops 7-zip archiver for unpacking

      • OInstall.exe (PID: 2036)
    • Executable content was dropped or overwritten

      • OInstall.exe (PID: 2036)
      • files.dat (PID: 1876)
      • expand.exe (PID: 568)
      • expand.exe (PID: 3228)
      • expand.exe (PID: 1584)
    • Starts CMD.EXE for commands execution

      • OInstall.exe (PID: 2036)
    • Uses REG/REGEDIT.EXE to modify registry

      • OInstall.exe (PID: 2036)
      • cmd.exe (PID: 3520)
      • cmd.exe (PID: 2568)
      • cmd.exe (PID: 2640)
      • cmd.exe (PID: 2936)
      • cmd.exe (PID: 2068)
      • cmd.exe (PID: 2908)
      • cmd.exe (PID: 2300)
      • cmd.exe (PID: 2152)
      • cmd.exe (PID: 2184)
      • cmd.exe (PID: 1928)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2840)
    • The process drops C-runtime libraries

      • files.dat (PID: 1876)
      • expand.exe (PID: 568)
      • expand.exe (PID: 3228)
      • expand.exe (PID: 1584)
    • The executable file from the user directory is run by the CMD process

      • files.dat (PID: 1876)
    • Probably download files using WebClient

      • OInstall.exe (PID: 2036)
    • Unusual connection from system programs

      • powershell.exe (PID: 1900)
      • powershell.exe (PID: 2672)
      • powershell.exe (PID: 2972)
      • powershell.exe (PID: 3112)
      • powershell.exe (PID: 3284)
      • powershell.exe (PID: 2356)
      • powershell.exe (PID: 3836)
      • powershell.exe (PID: 2560)
      • powershell.exe (PID: 1844)
    • Reads the Internet Settings

      • powershell.exe (PID: 2672)
      • powershell.exe (PID: 1900)
      • powershell.exe (PID: 2972)
      • powershell.exe (PID: 3284)
      • powershell.exe (PID: 3112)
      • powershell.exe (PID: 2356)
      • powershell.exe (PID: 1844)
      • powershell.exe (PID: 3836)
      • powershell.exe (PID: 2560)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 2672)
      • powershell.exe (PID: 1900)
      • powershell.exe (PID: 2972)
      • powershell.exe (PID: 3112)
      • powershell.exe (PID: 2356)
      • powershell.exe (PID: 3284)
      • powershell.exe (PID: 1844)
      • powershell.exe (PID: 2560)
      • powershell.exe (PID: 3836)
    • Starts POWERSHELL.EXE for commands execution

      • OInstall.exe (PID: 2036)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 3440)
      • cmd.exe (PID: 1540)
    • Uses TASKKILL.EXE to kill process

      • OInstall.exe (PID: 2036)
  • INFO

    • Reads the computer name

      • OInstall.exe (PID: 2036)
    • Reads Environment values

      • OInstall.exe (PID: 2036)
    • Checks supported languages

      • OInstall.exe (PID: 2036)
      • files.dat (PID: 1876)
    • Create files in a temporary directory

      • OInstall.exe (PID: 2036)
      • files.dat (PID: 1876)
      • expand.exe (PID: 2184)
      • expand.exe (PID: 3456)
      • expand.exe (PID: 3680)
    • Creates files in the program directory

      • expand.exe (PID: 568)
      • OInstall.exe (PID: 2036)
      • expand.exe (PID: 2172)
      • expand.exe (PID: 3228)
      • expand.exe (PID: 2976)
      • expand.exe (PID: 3272)
      • expand.exe (PID: 1584)
    • Reads Microsoft Office registry keys

      • reg.exe (PID: 1796)
      • reg.exe (PID: 2396)
      • reg.exe (PID: 3504)
      • reg.exe (PID: 3312)
      • reg.exe (PID: 948)
      • reg.exe (PID: 2408)
      • reg.exe (PID: 2072)
      • OInstall.exe (PID: 2036)
      • reg.exe (PID: 3516)
      • reg.exe (PID: 1496)
      • reg.exe (PID: 1352)
    • Drops the executable file immediately after the start

      • expand.exe (PID: 3228)
      • expand.exe (PID: 568)
      • expand.exe (PID: 1584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (76)
.exe | Win32 Executable (generic) (12.6)
.exe | Generic Win/DOS Executable (5.6)
.exe | DOS Executable Generic (5.6)

EXIF

EXE

FileDescription: Office 2013-2021 C2R Install
ProductName: Office 2013-2021 C2R Install
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Unknown
FileOS: Unknown (0)
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 7.3.3.0
FileVersionNumber: 7.3.3.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x1585eb0
UninitializedDataSize: 11218944
InitializedDataSize: 90112
CodeSize: 11350016
LinkerVersion: 2.5
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2021:09:08 08:23:35+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
61
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start oinstall.exe no specs oinstall.exe cmd.exe no specs files.dat reg.exe no specs powershell.exe expand.exe no specs powershell.exe no specs powershell.exe expand.exe powershell.exe expand.exe no specs officeclicktorun.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs powershell.exe expand.exe no specs powershell.exe no specs cmd.exe no specs sc.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs powershell.exe expand.exe powershell.exe expand.exe no specs officeclicktorun.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs powershell.exe expand.exe no specs powershell.exe no specs cmd.exe no specs sc.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs powershell.exe expand.exe powershell.exe expand.exe no specs officeclicktorun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2472"C:\Users\admin\AppData\Local\Temp\OInstall.exe" C:\Users\admin\AppData\Local\Temp\OInstall.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Office 2013-2021 C2R Install
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\oinstall.exe
c:\windows\system32\ntdll.dll
2036"C:\Users\admin\AppData\Local\Temp\OInstall.exe" C:\Users\admin\AppData\Local\Temp\OInstall.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Office 2013-2021 C2R Install
Modules
Images
c:\users\admin\appdata\local\temp\oinstall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
2840"C:\Windows\System32\cmd.exe" /D /c files.dat -y -pkmsautoC:\Windows\System32\cmd.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1876files.dat -y -pkmsautoC:\Users\admin\AppData\Local\Temp\files\files.dat
cmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7z Console SFX
Exit code:
0
Version:
9.20
Modules
Images
c:\users\admin\appdata\local\temp\files\files.dat
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2292"C:\Windows\System32\reg.exe" add HKLM\Software\Policies\Microsoft\Office\16.0\Common\OfficeUpdate /v UpdateBranch /d PerpetualVL2021 /fC:\Windows\System32\reg.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2672"powershell" -command "& { (New-Object Net.WebClient).DownloadFile('http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab', 'C:\Users\admin\AppData\Local\Temp\over947638\v32.cab') }"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
OInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2184"expand" v32.cab -F:VersionDescriptor.xml C:\Users\admin\AppData\Local\Temp\over947638C:\Windows\System32\expand.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
LZ Expansion Utility
Exit code:
0
Version:
6.1.7601.24535 (win7sp1_ldr_escrow.191105-1059)
Modules
Images
c:\windows\system32\expand.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\cabinet.dll
1992"powershell" -command "& { Get-Content C:\Users\admin\AppData\Local\Temp\over947638\VersionDescriptor.xml | Set-Content -Encoding ASCII v32.txt }C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1900"powershell" -command "& { (New-Object Net.WebClient).DownloadFile('http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20637/i320.cab', 'C:\Users\admin\AppData\Local\Temp\over947638\i320.cab') }"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
OInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
568"expand" i320.cab -F:* "C:\Program Files\Common Files\microsoft Shared\ClickToRun"C:\Windows\System32\expand.exe
OInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
LZ Expansion Utility
Exit code:
0
Version:
6.1.7601.24535 (win7sp1_ldr_escrow.191105-1059)
Modules
Images
c:\windows\system32\expand.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\cabinet.dll
Total events
25 539
Read events
25 524
Write events
15
Delete events
0

Modification events

(PID) Process:(2036) OInstall.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MediaResources\DirectSound\Speaker Configuration
Operation:writeName:Speaker Configuration
Value:
4
(PID) Process:(2292) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Office\16.0\Common\OfficeUpdate
Operation:writeName:UpdateBranch
Value:
PerpetualVL2021
(PID) Process:(1796) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration
Operation:writeName:AudienceId
Value:
5030841d-c919-4594-8d2d-84ae4f96e58e
(PID) Process:(2396) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration
Operation:writeName:CDNBaseUrl
Value:
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e
(PID) Process:(3504) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration
Operation:writeName:UpdateChannel
Value:
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e
(PID) Process:(948) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration
Operation:writeName:UpdateChannelChanged
Value:
True
(PID) Process:(3312) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration
Operation:writeName:UpdateUrl
Value:
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e
(PID) Process:(3132) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Office\16.0\Common\OfficeUpdate
Operation:writeName:UpdateBranch
Value:
PerpetualVL2021
(PID) Process:(2408) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration
Operation:writeName:AudienceId
Value:
5030841d-c919-4594-8d2d-84ae4f96e58e
(PID) Process:(1496) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\Configuration
Operation:writeName:CDNBaseUrl
Value:
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e
Executable files
642
Suspicious files
36
Text files
80
Unknown types
8

Dropped files

PID
Process
Filename
Type
1876files.datC:\Users\admin\AppData\Local\Temp\files\x86\cleanospp.exeexecutable
MD5:5FD363D52D04AC200CD24F3BCC903200
SHA256:3FDEFE2AD092A9A7FE0EDF0AC4DC2DE7E5B9CE6A0804F6511C06564194966CF9
1900powershell.exeC:\Users\admin\AppData\Local\Temp\over947638\i320.cab
MD5:
SHA256:
2672powershell.exeC:\Users\admin\AppData\Local\Temp\zvktkcxz.ogw.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2672powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
2036OInstall.exeC:\Users\admin\AppData\Local\Temp\files\Configure.xmltext
MD5:AC6BE84084E31DBB0E08D188B6C86EC8
SHA256:1879F7DE537C2AA70292C61EBEF9C6477D36E25B2E6A639E318B159E0A22B0FC
2036OInstall.exeC:\Users\admin\AppData\Local\Temp\files\files.datexecutable
MD5:55D21B2C272A5D6B9F54FA9ED82BF9EB
SHA256:7A1C82E264258470D14CA345EA1A9B6FC34FA19B393A92077A01BE5F1AD08F47
1876files.datC:\Users\admin\AppData\Local\Temp\files\x86\msvcr100.dllexecutable
MD5:BF38660A9125935658CFA3E53FDC7D65
SHA256:60C06E0FA4449314DA3A0A87C1A9D9577DF99226F943637E06F61188E5862EFA
1876files.datC:\Users\admin\AppData\Local\Temp\files\x64\msvcr100.dllexecutable
MD5:DF3CA8D16BDED6A54977B30E66864D33
SHA256:1D1A1AE540BA132F998D60D3622F0297B6E86AE399332C3B47462D7C0F560A36
1992powershell.exeC:\Users\admin\AppData\Local\Temp\bsikrotb.5o2.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
1992powershell.exeC:\Users\admin\AppData\Local\Temp\otnuvwq5.fkr.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
13
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2672
powershell.exe
GET
200
178.79.242.181:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab
unknown
compressed
10.8 Kb
3112
powershell.exe
GET
200
41.63.96.130:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab
unknown
compressed
10.8 Kb
2560
powershell.exe
GET
200
178.79.242.16:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20637/i321033.cab
unknown
compressed
9.84 Kb
1900
powershell.exe
GET
200
178.79.242.181:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20637/i320.cab
unknown
compressed
23.5 Mb
3836
powershell.exe
GET
200
178.79.242.16:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20637/i320.cab
unknown
compressed
23.5 Mb
1844
powershell.exe
GET
200
178.79.242.16:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab
unknown
compressed
10.8 Kb
2972
powershell.exe
GET
200
178.79.242.181:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20637/i321033.cab
unknown
compressed
9.84 Kb
3284
powershell.exe
GET
200
41.63.96.130:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20637/i320.cab
unknown
compressed
23.5 Mb
2356
powershell.exe
GET
200
41.63.96.130:80
http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/16.0.14332.20637/i321033.cab
unknown
compressed
9.84 Kb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2672
powershell.exe
178.79.242.181:80
officecdn.microsoft.com
LLNW
DE
unknown
1900
powershell.exe
178.79.242.181:80
officecdn.microsoft.com
LLNW
DE
unknown
2972
powershell.exe
178.79.242.181:80
officecdn.microsoft.com
LLNW
DE
unknown
3112
powershell.exe
41.63.96.130:80
officecdn.microsoft.com
LLNW
ZA
unknown
3284
powershell.exe
41.63.96.130:80
officecdn.microsoft.com
LLNW
ZA
unknown
2356
powershell.exe
41.63.96.130:80
officecdn.microsoft.com
LLNW
ZA
unknown
1844
powershell.exe
178.79.242.16:80
officecdn.microsoft.com
LLNW
DE
unknown

DNS requests

Domain
IP
Reputation
officecdn.microsoft.com
  • 178.79.242.181
  • 41.63.96.130
  • 178.79.242.16
unknown

Threats

No threats detected
No debug info