File name:

microsoft-office-2016-16-0-18025-20104.exe

Full analysis: https://app.any.run/tasks/f20dcfc0-9e46-4ac8-995e-a5d4fb2dcdea
Verdict: Malicious activity
Analysis date: July 26, 2025, 13:01:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

7EB09CC7BAE83DC8649F67AAF395D46A

SHA1:

A4A849E43CD36397CC52C4EB9959946B153483DF

SHA256:

7C262387D8E0789A2FA3C2B14AB020009F6FDE9E26734AA067481B60A612CAF3

SSDEEP:

98304:WVpkJ/P8TKmq1+N42G+71kXkz4RdL3IfcsWwoT9d9QrOGYREikFCjVoxwi1mPwle:802c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
    • Starts a Microsoft application from unusual location

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
    • Reads security settings of Internet Explorer

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
    • Application launched itself

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • Executable content was dropped or overwritten

      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
    • Searches for installed software

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
    • The process drops C-runtime libraries

      • OfficeClickToRun.exe (PID: 6452)
  • INFO

    • Process checks whether UAC notifications are on

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • Reads the machine GUID from the registry

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7140)
      • OfficeClickToRun.exe (PID: 7032)
    • Process checks computer location settings

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
    • Reads the computer name

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Checks proxy server information

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Reads the software policy settings

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7140)
      • OfficeClickToRun.exe (PID: 7032)
    • Checks supported languages

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Reads Microsoft Office registry keys

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Creates files or folders in the user directory

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7140)
    • Create files in a temporary directory

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7140)
    • Reads Environment values

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • The sample compiled with english language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with german language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with japanese language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with chinese language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with czech language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with bulgarian language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with spanish language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with french language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with Indonesian language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with polish language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with Italian language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with korean language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with portuguese language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with swedish language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with russian language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with slovak language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with turkish language support

      • OfficeClickToRun.exe (PID: 6452)
    • Creates files in the program directory

      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
    • The sample compiled with arabic language support

      • OfficeClickToRun.exe (PID: 6452)
    • Executes as Windows Service

      • OfficeClickToRun.exe (PID: 7032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:24 19:36:57+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.38
CodeSize: 4568576
InitializedDataSize: 2994176
UninitializedDataSize: -
EntryPoint: 0x3e2b85
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 16.0.18025.20104
ProductVersionNumber: 16.0.18025.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft 365 and Office
FileVersion: 16.0.18025.20104
InternalName: Bootstrapper.exe
LegalTrademarks1: Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2: Windows® is a registered trademark of Microsoft Corporation.
OriginalFileName: Bootstrapper.exe
ProductName: Microsoft Office
ProductVersion: 16.0.18025.20104
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start microsoft-office-2016-16-0-18025-20104.exe microsoft-office-2016-16-0-18025-20104.exe officeclicktorun.exe Delivery Optimization User no specs officeclicktorun.exe officeclicktorun.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2380"C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe" C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft 365 and Office
Version:
16.0.18025.20104
Modules
Images
c:\users\admin\appdata\local\temp\microsoft-office-2016-16-0-18025-20104.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3572"C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe" ELEVATED sid=S-1-5-21-1693682860-607145093-2874071422-1001 C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe
microsoft-office-2016-16-0-18025-20104.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft 365 and Office
Version:
16.0.18025.20104
Modules
Images
c:\windows\syswow64\bitsproxy.dll
c:\windows\syswow64\gpapi.dll
c:\windows\syswow64\cryptnet.dll
c:\windows\syswow64\cabinet.dll
c:\windows\syswow64\devrtl.dll
c:\windows\syswow64\msxml6.dll
c:\program files\microsoft office\root\vfs\programfilescommonx86\microsoft shared\office16\msoxmlmf.dll
c:\program files\microsoft office\root\vfs\programfilescommonx86\microsoft shared\office16\vcruntime140.dll
c:\windows\syswow64\virtdisk.dll
c:\windows\syswow64\fltlib.dll
4648C:\WINDOWS\system32\DllHost.exe /Processid:{338B40F9-9D68-4B53-A793-6B9AA0C5F63B}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
6452OfficeClickToRun.exe platform=x64 culture=en-us productstoadd=ProPlusRetail.16_en-us_x-none cdnbaseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 baseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 version=16.0.18925.20184 mediatype=CDN sourcetype=CDN ProPlusRetail.excludedapps=groove updatesenabled=False bitnessmigration=False deliverymechanism=492350f6-3a01-4f97-b9c0-c7c6ddf67d60 flt.useoutlookshareaddon=unknown flt.useofficehelperaddon=unknown flt.UseTeamsOnInstallConsumer=unknown flt.UseTeamsOnUpdateConsumer=unknown uninstallcentennial=True scenario=CLIENTUPDATEC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
microsoft-office-2016-16-0-18025-20104.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office Click-to-Run (SxS)
Exit code:
0
Version:
16.0.16026.20140
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7032"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /serviceC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Office Click-to-Run (SxS)
Version:
16.0.18925.20184
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\program files\common files\microsoft shared\clicktorun\vcruntime140.dll
7140OfficeClickToRun.exe platform=x64 culture=en-us productstoadd=ProPlusRetail.16_en-us_x-none cdnbaseurl.16=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 baseurl.16=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 version.16=16.0.18925.20184 mediatype.16=CDN sourcetype.16=CDN ProPlusRetail.excludedapps.16=groove updatesenabled.16=False bitnessmigration=False deliverymechanism=492350f6-3a01-4f97-b9c0-c7c6ddf67d60 flt.useoutlookshareaddon=unknown flt.useofficehelperaddon=unknown flt.UseTeamsOnInstallConsumer=unknown flt.UseTeamsOnUpdateConsumer=unknown uninstallcentennial=TrueC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
microsoft-office-2016-16-0-18025-20104.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office Click-to-Run (SxS)
Version:
16.0.18925.20184
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
26 577
Read events
26 225
Write events
158
Delete events
194

Modification events

(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ru-ru
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:tr-tr
Value:
2
Executable files
409
Suspicious files
78
Text files
76
Unknown types
0

Dropped files

PID
Process
Filename
Type
2380microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\E21A61C1-7DC0-46A3-9524-8A213F801AD3xml
MD5:CCD9BCAE6F4C2804C508198F8AAE0CBE
SHA256:A21AD299B18C057D578AA0CA37A638CAC602BC5B9CC650A7E2450203BC9D1DDE
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59C76228DF8A2918214D353D01EDF08binary
MD5:B192C0FC9F21AE88431C84B6C68DCC72
SHA256:13D78E005F09DE632F71548CDB196FB21DEA33E57C11C926A98006388D78E9AA
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F59C76228DF8A2918214D353D01EDF08binary
MD5:E468B4C4A219F9B49766E6090E9D667F
SHA256:79328A32320DB64F79448E33EC16692E080C18ACD4765D638837A5E676E50478
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Temp\OfficeC2R5AF85645-FAFE-4B14-9E41-FF6F50756096OfficeC2R4DE6DDA7-1A1B-4932-92B2-0AD48DB82EE5\VersionDescriptor.xmlxml
MD5:A387D045F9C26B4688F1CD4E3B685DB6
SHA256:3C6C5877212A2C32AA37C277FFA3992753025035A2680A3FA164C5FCA4850512
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Temp\OfficeC2R5AF85645-FAFE-4B14-9E41-FF6F50756096\VersionDescriptor.xmlxml
MD5:A387D045F9C26B4688F1CD4E3B685DB6
SHA256:3C6C5877212A2C32AA37C277FFA3992753025035A2680A3FA164C5FCA4850512
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Temp\OfficeC2R5AF85645-FAFE-4B14-9E41-FF6F50756096OfficeC2R4DE6DDA7-1A1B-4932-92B2-0AD48DB82EE5\v64.hashtext
MD5:DE0A0A7817DF8C8433DA133ADB9DC9DE
SHA256:B6002F73E7D3526F35E047F6E0E3BC26634F2526ABB7A47F5BDE57795F9CE625
2380microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Microsoft\Office\OTele\microsoft-office-2016-16-0-18025-20104.exe.db-walbinary
MD5:3AB9A03D11F9CF07BEDEBA78F5AE1AA5
SHA256:FF3A68A78440330B759DB5E2A37D22F0B5F8557ABAEC453451BCFA00925EEA4D
6452OfficeClickToRun.exeC:\Users\admin\AppData\Local\Temp\DESKTOP-JGLLJLD-20250726-1301a.logtext
MD5:58540DD38816F5B387559888F3541EAB
SHA256:61D33CF38BFEA323B417F8B6235C61AD5AF07CAC69F86866028A4E57E1D7D828
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Microsoft\Office\OTele\microsoft-office-2016-16-0-18025-20104.exe.db-journalbinary
MD5:81507A023AC7E9A35B910445D12F6041
SHA256:4F7D33D213C5950AFA2FDDAD161B9B1E047DF128C05350D7761C0C1D98C630E8
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A583E2A51BFBDC1E492A57B7C8325850binary
MD5:78CBE0F3407A8333174B06EE427B671C
SHA256:ED913B877F183C970106E8EB8ACC8221422D162B287D018A344C4100717F19A3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
81
TCP/UDP connections
69
DNS requests
48
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5236
svchost.exe
GET
206
128.251.172.15:80
http://128.251.172.15/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/16.0.18925.20184/i640.cab?cacheHostOrigin=f.c2r.ts.cdn.office.net
unknown
unknown
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.16026.20146.cab
unknown
whitelisted
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
768
svchost.exe
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
768
svchost.exe
GET
206
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
768
svchost.exe
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
768
svchost.exe
GET
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
3572
microsoft-office-2016-16-0-18025-20104.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1740
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2380
microsoft-office-2016-16-0-18025-20104.exe
52.109.32.97:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
239.255.255.250:1900
whitelisted
2380
microsoft-office-2016-16-0-18025-20104.exe
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
52.110.17.25:443
mrodevicemgr.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.184.206
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
ecs.office.com
  • 52.123.128.14
  • 52.123.129.14
whitelisted
mrodevicemgr.officeapps.live.com
  • 52.110.17.25
  • 52.110.17.67
  • 52.110.17.75
  • 52.110.17.40
  • 52.110.17.60
  • 52.110.17.62
  • 52.110.17.54
  • 52.110.17.3
whitelisted
login.live.com
  • 20.190.159.131
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.130
  • 20.190.159.71
  • 40.126.31.129
  • 20.190.159.129
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
f.c2r.ts.cdn.office.net
  • 23.50.131.73
  • 23.50.131.95
  • 199.232.210.172
  • 199.232.214.172
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.30
  • 23.216.77.28
  • 23.216.77.22
  • 23.216.77.8
  • 23.216.77.6
  • 23.216.77.19
  • 23.216.77.25
  • 23.216.77.36
  • 23.216.77.20
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info