download:

/web/20180603082928/http://cdnrep.reimageplus.com/rqc/ny/ReimageRepair.exe

Full analysis: https://app.any.run/tasks/ef2589fe-cce9-4748-80f0-060d56877522
Verdict: Malicious activity
Analysis date: May 13, 2025, 18:39:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

20C7E0396DE12D823E8B1660650AD999

SHA1:

A6D7AF8CE2AE317D2FE637D0ACA5FD971315CB7B

SHA256:

315609F7D22AA3CA237AFA9B33AAC5F3BC7C44A07C5A6022F06FE653794F577F

SSDEEP:

12288:nER9hWUGXEcfpxILsSwD31renxA2s8NJ0X4O:na9oE6pxUuhexrsmQ4O

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • ReimageRepair.exe (PID: 7332)
      • ReimageRepair.exe (PID: 5380)
      • ReimageRepair.exe (PID: 4008)
    • Registers / Runs the DLL via REGSVR32.EXE

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • The process creates files with name similar to system file names

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • Starts CMD.EXE for commands execution

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • Executable content was dropped or overwritten

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • Reads security settings of Internet Explorer

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • The executable file from the user directory is run by the CMD process

      • sqlite3.exe (PID: 7568)
      • sqlite3.exe (PID: 7664)
      • sqlite3.exe (PID: 7748)
      • sqlite3.exe (PID: 7280)
      • sqlite3.exe (PID: 4488)
      • sqlite3.exe (PID: 2244)
    • Executing commands from a ".bat" file

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • Get information on the list of running processes

      • ReimageRepair.exe (PID: 7448)
      • cmd.exe (PID: 7772)
      • cmd.exe (PID: 8060)
      • ReimageRepair.exe (PID: 5380)
      • cmd.exe (PID: 5680)
      • cmd.exe (PID: 7240)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 7576)
      • regsvr32.exe (PID: 2288)
    • Connects to unusual port

      • ReimageRepair.exe (PID: 7448)
      • slui.exe (PID: 1348)
      • ReimageRepair.exe (PID: 5380)
      • SystemSettings.exe (PID: 7396)
    • There is functionality for taking screenshot (YARA)

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • Uses NSLOOKUP.EXE to check DNS info

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
  • INFO

    • Checks supported languages

      • ReimageRepair.exe (PID: 7448)
      • sqlite3.exe (PID: 7568)
      • sqlite3.exe (PID: 7664)
      • sqlite3.exe (PID: 7748)
      • sqlite3.exe (PID: 4488)
      • ReimageRepair.exe (PID: 5380)
      • sqlite3.exe (PID: 2244)
      • sqlite3.exe (PID: 7280)
    • Reads the computer name

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • Create files in a temporary directory

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
    • Checks proxy server information

      • ReimageRepair.exe (PID: 7448)
      • ReimageRepair.exe (PID: 5380)
      • slui.exe (PID: 1348)
    • Reads the software policy settings

      • slui.exe (PID: 7912)
    • Manual execution by a user

      • ReimageRepair.exe (PID: 4008)
      • ReimageRepair.exe (PID: 5380)
      • firefox.exe (PID: 7652)
    • Application launched itself

      • firefox.exe (PID: 7652)
      • firefox.exe (PID: 7636)
    • Connects to unusual port

      • firefox.exe (PID: 7636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:19:59+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 28672
InitializedDataSize: 446976
UninitializedDataSize: 16896
EntryPoint: 0x39e3
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.5.4.2
ProductVersionNumber: 1.5.4.2
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Reimage
FileDescription: Reimage Downloader
FileVersion: 1.542
InternalName: Reimage Downloader
LegalCopyright: © Reimage 2017
LegalTrademarks: Reimage
ProductName: Reimage Repair
ProductVersion: 1.542
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
203
Monitored processes
67
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start reimagerepair.exe cmd.exe no specs conhost.exe no specs sqlite3.exe no specs cmd.exe no specs conhost.exe no specs sqlite3.exe no specs cmd.exe no specs conhost.exe no specs sqlite3.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs sppextcomobj.exe no specs slui.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs regsvr32.exe no specs slui.exe ping.exe no specs conhost.exe no specs nslookup.exe conhost.exe no specs tasklist.exe no specs conhost.exe no specs reimagerepair.exe no specs reimagerepair.exe cmd.exe no specs conhost.exe no specs sqlite3.exe no specs cmd.exe no specs conhost.exe no specs sqlite3.exe no specs cmd.exe no specs conhost.exe no specs sqlite3.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs regsvr32.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs ping.exe no specs conhost.exe no specs firefox.exe no specs nslookup.exe conhost.exe no specs tasklist.exe no specs conhost.exe no specs systemsettings.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs reimagerepair.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2252 -childID 2 -isForBrowser -prefsHandle 3576 -prefMapHandle 3624 -prefsLen 36588 -prefMapSize 244583 -jsInitHandle 1444 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5db53c2b-2d2e-45e3-aba0-0f880aa925b7} 7636 "\\.\pipe\gecko-crash-server-pipe.7636" 182b7c6e690 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\bcrypt.dll
1020\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1180\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1180nslookup.exe cdnrep.reimage.comC:\Windows\SysWOW64\nslookup.exe
ReimageRepair.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
nslookup
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\nslookup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1348C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2092"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2612 -childID 1 -isForBrowser -prefsHandle 2792 -prefMapHandle 2780 -prefsLen 31447 -prefMapSize 244583 -jsInitHandle 1444 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afdd7bbc-e082-4d78-8f8a-a0b7395eb62f} 7636 "\\.\pipe\gecko-crash-server-pipe.7636" 182b603ef50 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1.dll
2244"C:\Users\admin\AppData\Local\Temp\sqlite3.exe" "C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cookies.sqlite" "select value, expiry from moz_cookies where baseDomain like 'reimageplus.com' and name='_campaign';"C:\Users\admin\AppData\Local\Temp\sqlite3.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\sqlite3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2288regsvr32 /s "C:\WINDOWS\system32\jscript.dll"C:\Windows\System32\regsvr32.exeReimageRepair.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2456"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4444 -childID 7 -isForBrowser -prefsHandle 4068 -prefMapHandle 5668 -prefsLen 31248 -prefMapSize 244583 -jsInitHandle 1444 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f85b7cf6-779f-45da-8540-4af61764d394} 7636 "\\.\pipe\gecko-crash-server-pipe.7636" 182b4e754d0 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1.dll
c:\windows\system32\vcruntime140.dll
2772"tasklist.exe"C:\Windows\SysWOW64\tasklist.exeReimageRepair.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
22 115
Read events
21 952
Write events
14
Delete events
149

Modification events

(PID) Process:(7448) ReimageRepair.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Reimage\Reimage Repair
Operation:writeName:Installer Language
Value:
1033
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\ProgID
Operation:delete keyName:(default)
Value:
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\OLEScript
Operation:delete keyName:(default)
Value:
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories
Operation:delete keyName:(default)
Value:
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32
Operation:delete keyName:(default)
Value:
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}
Operation:delete keyName:(default)
Value:
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories\{0AEE2A92-BCBB-11D0-8C72-00C04FC2B085}
Operation:delete keyName:(default)
Value:
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\JScript Author\CLSID
Operation:delete keyName:(default)
Value:
(PID) Process:(7576) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\JScript Author\OLEScript
Operation:delete keyName:(default)
Value:
Executable files
22
Suspicious files
100
Text files
41
Unknown types
1

Dropped files

PID
Process
Filename
Type
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\FF.battext
MD5:B8E635EB01CAB0F0B09DF3F903DFCD8F
SHA256:389C3CCE5E24354CB2CCD139CE2C58352A45B61D6D3F4133C9A7C1E279EFC8D4
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\nsuC1FC.tmp\UserInfo.dllexecutable
MD5:C7CE0E47C83525983FD2C4C9566B4AAD
SHA256:6293408A5FA6D0F55F0A4D01528EB5B807EE9447A75A28B5986267475EBCD3AE
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\sqlite3.exeexecutable
MD5:91CDCEA4BE94624E198D3012F5442584
SHA256:CA4C0F1EC0CCBC9988EA3F43FF73FE84228FFB4D76BADDC386051DFFE7DDD8C2
7448ReimageRepair.exeC:\Windows\Reimage.initext
MD5:B880452B210C5DA32A477B42B7F8B692
SHA256:66F36F5BC02D7215BEADD5948900B7EF3C1A956227269D22DD614E72C5945A79
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\nsuC1FC.tmp\Banner.dllexecutable
MD5:E264D0F91103758BC5B088E8547E0EC1
SHA256:501B5935FE8E17516B324E3C1DA89773E689359C12263E9782F95836DBAB8B63
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\nsuC1FC.tmp\installer-164x314.bmpimage
MD5:AB38FAC59E7EA098A764EB3B9329186F
SHA256:8C657F3CC1070F6EB662E9E36CD736D2FF0CE7CAB647906D10FB8476AF6AAF3C
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\nsuC1FC.tmp\System.dllexecutable
MD5:BF712F32249029466FA86756F5546950
SHA256:7851CB12FA4131F1FEE5DE390D650EF65CAC561279F1CFE70AD16CC9780210AF
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\nsiCA2C.tmptext
MD5:209D79BDF3A5E4BD312677972AFC8046
SHA256:36387E803D3035DC4F3A4411640B4CD13DDC8BD966C41C373D4B734D70B4D83E
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\nsfC374.tmptext
MD5:B8E635EB01CAB0F0B09DF3F903DFCD8F
SHA256:389C3CCE5E24354CB2CCD139CE2C58352A45B61D6D3F4133C9A7C1E279EFC8D4
7448ReimageRepair.exeC:\Users\admin\AppData\Local\Temp\nsuC1FC.tmp\nsExec.dllexecutable
MD5:132E6153717A7F9710DCEA4536F364CD
SHA256:D29AFCE2588D8DD7BB94C00CA91CAC0E85B80FFA6B221F5FFCB83A2497228EB2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
427
TCP/UDP connections
1 279
DNS requests
61
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2924
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2924
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7400
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7400
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.60:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7636
firefox.exe
CONNECT
159.203.14.9:2010
http://firefox.settings.services.mozilla.com:443
unknown
whitelisted
4156
SystemSettings.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7636
firefox.exe
CONNECT
159.203.14.9:2010
http://firefox.settings.services.mozilla.com:443
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1616
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.60:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7448
ReimageRepair.exe
161.47.7.14:80
www.reimageplus.com
RACKSPACE
US
suspicious
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.60
  • 23.48.23.14
  • 23.48.23.66
  • 23.48.23.11
  • 23.48.23.67
  • 23.48.23.6
  • 23.48.23.7
  • 23.48.23.18
  • 23.48.23.61
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 23.219.150.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
www.reimageplus.com
  • 161.47.7.14
unknown
login.live.com
  • 20.190.160.4
  • 40.126.32.74
  • 40.126.32.138
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.140
  • 20.190.160.67
  • 20.190.160.64
  • 40.126.31.73
  • 20.190.159.0
  • 20.190.159.4
  • 40.126.31.128
  • 20.190.159.129
  • 40.126.31.71
  • 20.190.159.23
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info