File name:

microsoft-office-2016-16-0-18025-20104.exe

Full analysis: https://app.any.run/tasks/f20dcfc0-9e46-4ac8-995e-a5d4fb2dcdea
Verdict: Malicious activity
Analysis date: July 26, 2025, 13:01:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

7EB09CC7BAE83DC8649F67AAF395D46A

SHA1:

A4A849E43CD36397CC52C4EB9959946B153483DF

SHA256:

7C262387D8E0789A2FA3C2B14AB020009F6FDE9E26734AA067481B60A612CAF3

SSDEEP:

98304:WVpkJ/P8TKmq1+N42G+71kXkz4RdL3IfcsWwoT9d9QrOGYREikFCjVoxwi1mPwle:802c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
    • Reads security settings of Internet Explorer

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • Process drops legitimate windows executable

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
    • Searches for installed software

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
    • Executable content was dropped or overwritten

      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
    • Application launched itself

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • The process drops C-runtime libraries

      • OfficeClickToRun.exe (PID: 6452)
  • INFO

    • Reads the machine GUID from the registry

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Checks proxy server information

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Process checks computer location settings

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • Checks supported languages

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Reads the computer name

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Process checks whether UAC notifications are on

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • Reads the software policy settings

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Reads Microsoft Office registry keys

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 6452)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 7032)
      • OfficeClickToRun.exe (PID: 7140)
    • Reads Environment values

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
    • Create files in a temporary directory

      • OfficeClickToRun.exe (PID: 6452)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 7140)
    • Creates files or folders in the user directory

      • microsoft-office-2016-16-0-18025-20104.exe (PID: 3572)
      • OfficeClickToRun.exe (PID: 6452)
      • microsoft-office-2016-16-0-18025-20104.exe (PID: 2380)
      • OfficeClickToRun.exe (PID: 7140)
    • Creates files in the program directory

      • OfficeClickToRun.exe (PID: 6452)
      • OfficeClickToRun.exe (PID: 7032)
    • The sample compiled with english language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with Indonesian language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with french language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with japanese language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with Italian language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with german language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with arabic language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with czech language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with bulgarian language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with spanish language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with korean language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with polish language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with portuguese language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with slovak language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with swedish language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with turkish language support

      • OfficeClickToRun.exe (PID: 6452)
    • The sample compiled with chinese language support

      • OfficeClickToRun.exe (PID: 6452)
    • Executes as Windows Service

      • OfficeClickToRun.exe (PID: 7032)
    • The sample compiled with russian language support

      • OfficeClickToRun.exe (PID: 6452)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:24 19:36:57+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.38
CodeSize: 4568576
InitializedDataSize: 2994176
UninitializedDataSize: -
EntryPoint: 0x3e2b85
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 16.0.18025.20104
ProductVersionNumber: 16.0.18025.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft 365 and Office
FileVersion: 16.0.18025.20104
InternalName: Bootstrapper.exe
LegalTrademarks1: Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2: Windows® is a registered trademark of Microsoft Corporation.
OriginalFileName: Bootstrapper.exe
ProductName: Microsoft Office
ProductVersion: 16.0.18025.20104
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start microsoft-office-2016-16-0-18025-20104.exe microsoft-office-2016-16-0-18025-20104.exe officeclicktorun.exe Delivery Optimization User no specs officeclicktorun.exe officeclicktorun.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2380"C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe" C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft 365 and Office
Version:
16.0.18025.20104
Modules
Images
c:\users\admin\appdata\local\temp\microsoft-office-2016-16-0-18025-20104.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3572"C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe" ELEVATED sid=S-1-5-21-1693682860-607145093-2874071422-1001 C:\Users\admin\AppData\Local\Temp\microsoft-office-2016-16-0-18025-20104.exe
microsoft-office-2016-16-0-18025-20104.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft 365 and Office
Version:
16.0.18025.20104
Modules
Images
c:\windows\syswow64\bitsproxy.dll
c:\windows\syswow64\gpapi.dll
c:\windows\syswow64\cryptnet.dll
c:\windows\syswow64\cabinet.dll
c:\windows\syswow64\devrtl.dll
c:\windows\syswow64\msxml6.dll
c:\program files\microsoft office\root\vfs\programfilescommonx86\microsoft shared\office16\msoxmlmf.dll
c:\program files\microsoft office\root\vfs\programfilescommonx86\microsoft shared\office16\vcruntime140.dll
c:\windows\syswow64\virtdisk.dll
c:\windows\syswow64\fltlib.dll
4648C:\WINDOWS\system32\DllHost.exe /Processid:{338B40F9-9D68-4B53-A793-6B9AA0C5F63B}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
6452OfficeClickToRun.exe platform=x64 culture=en-us productstoadd=ProPlusRetail.16_en-us_x-none cdnbaseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 baseurl=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 version=16.0.18925.20184 mediatype=CDN sourcetype=CDN ProPlusRetail.excludedapps=groove updatesenabled=False bitnessmigration=False deliverymechanism=492350f6-3a01-4f97-b9c0-c7c6ddf67d60 flt.useoutlookshareaddon=unknown flt.useofficehelperaddon=unknown flt.UseTeamsOnInstallConsumer=unknown flt.UseTeamsOnUpdateConsumer=unknown uninstallcentennial=True scenario=CLIENTUPDATEC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
microsoft-office-2016-16-0-18025-20104.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office Click-to-Run (SxS)
Exit code:
0
Version:
16.0.16026.20140
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7032"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /serviceC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Office Click-to-Run (SxS)
Version:
16.0.18925.20184
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\program files\common files\microsoft shared\clicktorun\vcruntime140.dll
7140OfficeClickToRun.exe platform=x64 culture=en-us productstoadd=ProPlusRetail.16_en-us_x-none cdnbaseurl.16=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 baseurl.16=http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60 version.16=16.0.18925.20184 mediatype.16=CDN sourcetype.16=CDN ProPlusRetail.excludedapps.16=groove updatesenabled.16=False bitnessmigration=False deliverymechanism=492350f6-3a01-4f97-b9c0-c7c6ddf67d60 flt.useoutlookshareaddon=unknown flt.useofficehelperaddon=unknown flt.UseTeamsOnInstallConsumer=unknown flt.UseTeamsOnUpdateConsumer=unknown uninstallcentennial=TrueC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
microsoft-office-2016-16-0-18025-20104.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office Click-to-Run (SxS)
Version:
16.0.18925.20184
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
26 577
Read events
26 225
Write events
158
Delete events
194

Modification events

(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ru-ru
Value:
2
(PID) Process:(2380) microsoft-office-2016-16-0-18025-20104.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:tr-tr
Value:
2
Executable files
409
Suspicious files
78
Text files
76
Unknown types
0

Dropped files

PID
Process
Filename
Type
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A583E2A51BFBDC1E492A57B7C8325850binary
MD5:144D698C7F3CCD662F9460D8F443A2BB
SHA256:C5714AC85358D727F4EA913F814CCADCD7F6E063D95B54B886CCF6BFC31612C1
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0B8A20E1F3F4D73D52A19929F922C892binary
MD5:A511DAB56DC44A64A1114B7814E4F8C6
SHA256:08FA57906B20E454242889F05F1609C276B91A06561121E9012A88A50FF23F9F
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\36AC0BE60E1243344AE145F746D881FEbinary
MD5:CA300F6F209448C4B503F97E31F549F0
SHA256:9860F6B32B029B004545E3A26E8A827902439F4ECAB252BD4B0E2754385AC489
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A583E2A51BFBDC1E492A57B7C8325850binary
MD5:78CBE0F3407A8333174B06EE427B671C
SHA256:ED913B877F183C970106E8EB8ACC8221422D162B287D018A344C4100717F19A3
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0B8A20E1F3F4D73D52A19929F922C892binary
MD5:CA90C741407C38020967CC14F5E5B3D0
SHA256:409E042FD3D4B9F8E36D7EAB5B6D4ED9CEC4C0A237A731D89E206D337E709B54
2380microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\E21A61C1-7DC0-46A3-9524-8A213F801AD3xml
MD5:CCD9BCAE6F4C2804C508198F8AAE0CBE
SHA256:A21AD299B18C057D578AA0CA37A638CAC602BC5B9CC650A7E2450203BC9D1DDE
2380microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Microsoft\Office\OTele\microsoft-office-2016-16-0-18025-20104.exe.dbbinary
MD5:D0DE7DB24F7B0C0FE636B34E253F1562
SHA256:B6DC74E4A39FFA38ED8C93D58AADEB7E7A0674DAC1152AF413E9DA7313ADE6ED
6452OfficeClickToRun.exeC:\Users\admin\AppData\Local\Temp\DESKTOP-JGLLJLD-20250726-1301.logtext
MD5:7B2E0B4A809975B0BABB68520E568F2D
SHA256:449633973786D00E4CC7528D86CFD79469874FB53EDC7DCB0A1077E9CEC234E9
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:BA653D404F6109D601C13B9F157DB9DC
SHA256:A8C2AE12A361D399D7A3620C09D261F88064ACED3199939BDCD3B28DA1C4032C
3572microsoft-office-2016-16-0-18025-20104.exeC:\Users\admin\AppData\Local\Temp\OfficeC2R5AF85645-FAFE-4B14-9E41-FF6F50756096\VersionDescriptor.xmlxml
MD5:A387D045F9C26B4688F1CD4E3B685DB6
SHA256:3C6C5877212A2C32AA37C277FFA3992753025035A2680A3FA164C5FCA4850512
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
81
TCP/UDP connections
69
DNS requests
48
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.16026.20146.cab
unknown
whitelisted
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
768
svchost.exe
GET
206
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
768
svchost.exe
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
768
svchost.exe
HEAD
200
23.50.131.73:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.18925.20184.cab
unknown
whitelisted
3572
microsoft-office-2016-16-0-18025-20104.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
unknown
whitelisted
3572
microsoft-office-2016-16-0-18025-20104.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Windows%20Code%20Signing%20PCA%202024.crl
unknown
whitelisted
3572
microsoft-office-2016-16-0-18025-20104.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_2010-07-06.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1740
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2380
microsoft-office-2016-16-0-18025-20104.exe
52.109.32.97:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
239.255.255.250:1900
whitelisted
2380
microsoft-office-2016-16-0-18025-20104.exe
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
52.110.17.25:443
mrodevicemgr.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.184.206
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
ecs.office.com
  • 52.123.128.14
  • 52.123.129.14
whitelisted
mrodevicemgr.officeapps.live.com
  • 52.110.17.25
  • 52.110.17.67
  • 52.110.17.75
  • 52.110.17.40
  • 52.110.17.60
  • 52.110.17.62
  • 52.110.17.54
  • 52.110.17.3
whitelisted
login.live.com
  • 20.190.159.131
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.130
  • 20.190.159.71
  • 40.126.31.129
  • 20.190.159.129
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
f.c2r.ts.cdn.office.net
  • 23.50.131.73
  • 23.50.131.95
  • 199.232.210.172
  • 199.232.214.172
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.30
  • 23.216.77.28
  • 23.216.77.22
  • 23.216.77.8
  • 23.216.77.6
  • 23.216.77.19
  • 23.216.77.25
  • 23.216.77.36
  • 23.216.77.20
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info