File name:

OffCAT.msi

Full analysis: https://app.any.run/tasks/2e0d5aa3-d615-4638-b796-d826d2c7d09b
Verdict: Malicious activity
Analysis date: September 03, 2024, 08:26:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Installs the Microsoft Office Configuration Analyzer Tool (OffCAT), Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Office Configuration Analyzer Tool 2.1., Template: Intel;1033, Revision Number: {E7EFF1F2-E832-4F3B-8FC8-B2E0F1515BE9}, Create Time/Date: Thu Jan 28 16:45:12 2016, Last Saved Time/Date: Thu Jan 28 16:45:12 2016, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.9.1208.0), Security: 2
MD5:

208D4F5A5839134AEEF2E1F77C6E1604

SHA1:

A8006A822705020FEDF99334F1F31D660A07CCF2

SHA256:

86DFAAF74A70753D160E699AA9B3581EC194C81F0E11C4239CEA01231030B6E7

SSDEEP:

98304:yl0b+A2rMXP620/YypYGuX9TUQAeRKwMQSuqlt2VQ7IRDWV1fxjioy+b+qNHwrna:+N+OZmvNQ6VPysbsCj0GKWr5mYsFa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • msiexec.exe (PID: 3104)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • cscript.exe (PID: 6596)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6304)
      • msiexec.exe (PID: 3104)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6020)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 3104)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 3104)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 1776)
      • rundll32.exe (PID: 2080)
      • rundll32.exe (PID: 5656)
      • rundll32.exe (PID: 6616)
    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 3104)
    • Searches for installed software

      • rundll32.exe (PID: 1776)
    • Creates/Modifies COM task schedule object

      • rundll32.exe (PID: 5656)
    • Reads security settings of Internet Explorer

      • OffCAT.exe (PID: 740)
    • Reads the date of Windows installation

      • OffCAT.exe (PID: 740)
    • Reads Internet Explorer settings

      • OffCAT.exe (PID: 740)
    • Gets full path of the running script (SCRIPT)

      • cscript.exe (PID: 448)
    • The process executes VB scripts

      • OffCAT.exe (PID: 740)
      • cscript.exe (PID: 448)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • cscript.exe (PID: 448)
      • cscript.exe (PID: 5288)
      • cscript.exe (PID: 6596)
    • Writes binary data to a Stream object (SCRIPT)

      • cscript.exe (PID: 448)
    • Application launched itself

      • cscript.exe (PID: 448)
    • Runs shell command (SCRIPT)

      • cscript.exe (PID: 448)
    • Starts CMD.EXE for commands execution

      • OffCAT.exe (PID: 740)
    • Using 'findstr.exe' to search for text patterns in files and output

      • OffCAT.exe (PID: 740)
  • INFO

    • Reads the software policy settings

      • msiexec.exe (PID: 6304)
      • msiexec.exe (PID: 3104)
      • OffCAT.exe (PID: 740)
      • OffCAT_RTS.exe (PID: 6344)
      • dxdiag.exe (PID: 6384)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6304)
      • rundll32.exe (PID: 6616)
      • cscript.exe (PID: 448)
      • cscript.exe (PID: 5288)
      • dxdiag.exe (PID: 6384)
      • cscript.exe (PID: 6596)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 6304)
      • msiexec.exe (PID: 3104)
      • OffCAT_RTS.exe (PID: 6344)
      • OffCAT.exe (PID: 740)
      • dxdiag.exe (PID: 6384)
    • Checks proxy server information

      • msiexec.exe (PID: 6304)
      • OffCAT_RTS.exe (PID: 6344)
      • OffCAT.exe (PID: 740)
    • Create files in a temporary directory

      • msiexec.exe (PID: 6952)
      • msiexec.exe (PID: 1448)
      • rundll32.exe (PID: 1776)
      • rundll32.exe (PID: 5656)
      • rundll32.exe (PID: 2080)
      • rundll32.exe (PID: 6616)
      • OffCAT_RTS.exe (PID: 6344)
      • OffCAT.exe (PID: 740)
      • cscript.exe (PID: 448)
      • dxdiag.exe (PID: 6384)
    • Reads the computer name

      • msiexec.exe (PID: 6952)
      • msiexec.exe (PID: 3104)
      • msiexec.exe (PID: 1448)
      • OffCAT.exe (PID: 740)
      • OffCAT_RTS.exe (PID: 6344)
    • Checks supported languages

      • msiexec.exe (PID: 3104)
      • msiexec.exe (PID: 6952)
      • msiexec.exe (PID: 1448)
      • OffCAT_RTS.exe (PID: 6344)
      • OffCAT.exe (PID: 740)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6304)
      • msiexec.exe (PID: 3104)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 3104)
      • OffCAT.exe (PID: 740)
      • OffCAT_RTS.exe (PID: 6344)
    • Reads Microsoft Office registry keys

      • msiexec.exe (PID: 3104)
      • rundll32.exe (PID: 2080)
      • OffCAT.exe (PID: 740)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3104)
    • Process checks computer location settings

      • OffCAT.exe (PID: 740)
    • Creates files in the program directory

      • OffCAT.exe (PID: 740)
    • Reads Windows Product ID

      • OffCAT.exe (PID: 740)
    • Reads Environment values

      • OffCAT_RTS.exe (PID: 6344)
      • OffCAT.exe (PID: 740)
    • Disables trace logs

      • OffCAT_RTS.exe (PID: 6344)
      • OffCAT.exe (PID: 740)
    • The process uses the downloaded file

      • rundll32.exe (PID: 6616)
      • OffCAT.exe (PID: 740)
      • cscript.exe (PID: 448)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (93.3)
.pps/ppt | Microsoft PowerPoint document (5.2)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Installs the Microsoft Office Configuration Analyzer Tool (OffCAT)
Author: Microsoft Corporation
Keywords: Installer
Comments: This installer database contains the logic and data required to install Microsoft Office Configuration Analyzer Tool 2.1.
Template: Intel;1033
RevisionNumber: {E7EFF1F2-E832-4F3B-8FC8-B2E0F1515BE9}
CreateDate: 2016:01:28 16:45:12
ModifyDate: 2016:01:28 16:45:12
Pages: 200
Words: 10
Software: Windows Installer XML Toolset (3.9.1208.0)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
157
Monitored processes
30
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs rundll32.exe rundll32.exe rundll32.exe rundll32.exe offcat.exe offcat_rts.exe cscript.exe no specs conhost.exe no specs cscript.exe no specs conhost.exe no specs cmdkey.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs findstr.exe no specs conhost.exe no specs findstr.exe no specs conhost.exe no specs dxdiag.exe no specs cscript.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
448C:\WINDOWS\system32\cscript.exe "C:\Users\admin\AppData\Local\Temp\offcatscript_6c5ea79518df48cf8ae5576ba2f5eabe.vbs" //E:VBS //Nologo C:\Windows\System32\cscript.exeOffCAT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
740"C:\Users\admin\AppData\Local\Microsoft\OffCAT\Offcat.exe" C:\Users\admin\AppData\Local\Microsoft\OffCAT\OffCAT.exe
rundll32.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Microsoft Office Configuration Analyzer
Exit code:
0
Version:
2.1.6002.0128
Modules
Images
c:\users\admin\appdata\local\microsoft\offcat\offcat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1224cmd.exe /c echo %USERPROFILE%\DesktopC:\Windows\System32\cmd.exeOffCAT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exefindstr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1448C:\Windows\syswow64\MsiExec.exe -Embedding 6EE15385DC736AA62255B75D154B08F3C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1492C:\WINDOWS\system32\findstr.exe /r /i /c:"^[^\#]*autodiscover\.outlook\.com" C:\WINDOWS\system32\drivers\etc\hostsC:\Windows\System32\findstr.exeOffCAT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1776rundll32.exe "C:\WINDOWS\Installer\MSI1BAB.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1252281 14 WixInstaller!WixInstaller.CustomActions.UninstallOffCAT12C:\Windows\SysWOW64\rundll32.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2080rundll32.exe "C:\WINDOWS\Installer\MSI27B4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1255359 22 WixInstaller!WixInstaller.CustomActions.SetResiliencyKeysC:\Windows\SysWOW64\rundll32.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3104C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3208\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
46 369
Read events
45 724
Write events
604
Delete events
41

Modification events

(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000FC09F100DBFDDA01200C000014180000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000FC09F100DBFDDA01200C000014180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000446C3101DBFDDA01200C000014180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000446C3101DBFDDA01200C000014180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
480000000000000013D03301DBFDDA01200C000014180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
480000000000000061973801DBFDDA01200C000014180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000C2D0AF01DBFDDA01200C000014180000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3104) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000009E33B201DBFDDA01200C000008080000E80300000100000000000000000000001DDBD0744E77744090B836D17F60433E00000000000000000000000000000000
(PID) Process:(6020) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000004A14BE01DBFDDA0184170000340A0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
46
Suspicious files
29
Text files
74
Unknown types
2

Dropped files

PID
Process
Filename
Type
3104msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3104msiexec.exeC:\Windows\Installer\1318bb.msi
MD5:
SHA256:
6952msiexec.exeC:\Users\admin\AppData\Local\Temp\CFGA64A.tmpxml
MD5:84F2F872035A2B2007494208AC3B98C4
SHA256:F5BA88B4A9928B710C9DBF757F0C4DEE5BC6B6A56985D5BFEBA8620C8AE65B6C
6304msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:FB64A9EBEDF48D3895381D5B7D80743D
SHA256:EA21D495930AD76F267A33A0F593DBF0C7EA75E457FCAE49A29DAAD8BD920F42
3104msiexec.exeC:\Windows\Installer\MSI1F27.tmpbinary
MD5:C7C2BE201A9748D820D26F3EABEADAD9
SHA256:8F0F0896EECDCD1D04D2546C4033F24E782045B16EC54EEE237E5AB934BCB7FF
3104msiexec.exeC:\Windows\Installer\MSI1BAB.tmpexecutable
MD5:BF28767C06A163F22E2A2954580268D0
SHA256:93439BB1740255E6C0FB50A45E0D4253B453181C5636910FB51D4500297886D5
3104msiexec.exeC:\Windows\Installer\MSI19D4.tmpexecutable
MD5:DD2FED15306CBB7F32245077364A8FE1
SHA256:1274CCA896F0FD797B330E5EA4605A080DA505B7E14FFBBF4181B61AC998C649
6304msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0018BB1B5834735BFA60CD063B31956der
MD5:732CFEB76B91C4D13978A00B8C666ED7
SHA256:9FAB9FC0A1DA813E6DDB93904C1FCFA6546CFBE70747FF8468DDD14D2552DBD2
1776rundll32.exeC:\Users\admin\AppData\Local\Temp\MSI1BAB.tmp-\WixInstaller.pdbbinary
MD5:4F8DE85994AD026E781F1BC34797CBB8
SHA256:F0DBB4D579C2D660577908DBDED3303CEAF7AD7D2880064293E63ABC7ED2ED94
3104msiexec.exeC:\Windows\Installer\MSI1ACF.tmpexecutable
MD5:DD2FED15306CBB7F32245077364A8FE1
SHA256:1274CCA896F0FD797B330E5EA4605A080DA505B7E14FFBBF4181B61AC998C649
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
50
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6304
msiexec.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
6108
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7088
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6344
OffCAT_RTS.exe
GET
301
23.52.120.96:80
http://www.microsoft.com/office/offcat/2.5/en/offcat.config.xml
unknown
whitelisted
7088
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6344
OffCAT_RTS.exe
GET
301
23.52.120.96:80
http://www.microsoft.com/office/offcat/2.5/en/offcat.config.xml
unknown
whitelisted
6344
OffCAT_RTS.exe
GET
301
23.52.120.96:80
http://www.microsoft.com/office/offcat/2.5/en/offcat.config.xml
unknown
whitelisted
6344
OffCAT_RTS.exe
GET
301
23.52.120.96:80
http://www.microsoft.com/office/offcat/2.5/en/offcat.config.xml
unknown
whitelisted
6344
OffCAT_RTS.exe
GET
301
23.52.120.96:80
http://www.microsoft.com/office/offcat/2.5/en/offcat.config.xml
unknown
whitelisted
6344
OffCAT_RTS.exe
GET
301
23.52.120.96:80
http://www.microsoft.com/office/offcat/2.5/en/offcat.config.xml
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4316
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6304
msiexec.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6108
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6108
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
7088
SIHClient.exe
40.68.123.157:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7088
SIHClient.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.238
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.64
  • 20.190.159.75
  • 20.190.159.4
  • 20.190.159.23
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
support.microsoft.com
  • 23.52.121.66
whitelisted

Threats

No threats detected
Process
Message
OffCAT.exe
RTSUtility: RTSMode = 0
OffCAT_RTS.exe
RTSUtility: RTSMode = 0
OffCAT_RTS.exe
/////////////////////////////////////////////////////////////
OffCAT_RTS.exe
/////////////////////////////////////////////////////////////
OffCAT_RTS.exe
RTS Process (6344) Started at 9/3/2024 8:27:02 AM
OffCAT_RTS.exe
CrashDetectionService: Starting EventLogWatcher with *[System[(EventID = 1000) and (Provider/@Name = 'Application Error')]]
OffCAT.exe
Writing telemetry values for path = UserAction/OptionChanged DataDirectory = ********
OffCAT_RTS.exe
Writing telemetry values for path = RtsDownloadFile url = http://www.microsoft.com/office/offcat/2.5/en/offcat.config.xml
OffCAT_RTS.exe
Writing telemetry values for path = UserAction/Startup/RTS
OffCAT.exe
Writing telemetry values for path = UserAction/Startup/OffCAT