File name:

SecuKitNXS.exe

Full analysis: https://app.any.run/tasks/c65f874f-791b-4e04-80c5-b875a93c590c
Verdict: Malicious activity
Analysis date: November 18, 2024, 05:21:59
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

A25E2A5DA175218841FBEED5F3C77324

SHA1:

0431A669D682C2AF76732F2C0D24EBB49766AD86

SHA256:

64878AB75CD6548D7DFB7F824D9B926C7FF0E30318C6C8AF0BCAFE9A159B358F

SSDEEP:

98304:B5I84Se958bPOOzaQN/Z9/W1I6stgJI65a+gI00eKAierEzZzDBSKpgiV6uqpQw6:B53QHvrTjn9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SecuKitNXS.exe (PID: 6220)
    • The process drops C-runtime libraries

      • SecuKitNXS.exe (PID: 6220)
    • Starts CMD.EXE for commands execution

      • SecuKitNXS.exe (PID: 6220)
    • The process creates files with name similar to system file names

      • SecuKitNXS.exe (PID: 6220)
    • Executing commands from ".cmd" file

      • SecuKitNXS.exe (PID: 6220)
    • The executable file from the user directory is run by the CMD process

      • certutil.exe (PID: 5592)
      • certutil.exe (PID: 4144)
      • certutil.exe (PID: 6024)
      • certutil.exe (PID: 1732)
      • certutil.exe (PID: 4072)
      • certutil.exe (PID: 1068)
      • certutil.exe (PID: 5584)
      • certutil.exe (PID: 5952)
      • certutil.exe (PID: 6564)
      • certutil.exe (PID: 2620)
    • Process drops legitimate windows executable

      • SecuKitNXS.exe (PID: 6220)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 3156)
    • Executes as Windows Service

      • kpmsvc.exe (PID: 1884)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • SecuKitNXS.exe (PID: 6220)
  • INFO

    • Checks supported languages

      • SecuKitNXS.exe (PID: 6220)
    • Create files in a temporary directory

      • SecuKitNXS.exe (PID: 6220)
    • Manual execution by a user

      • OneDrive.exe (PID: 6336)
    • Reads the computer name

      • SecuKitNXS.exe (PID: 6220)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:02 03:20:05+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 23552
InitializedDataSize: 120320
UninitializedDataSize: 1024
EntryPoint: 0x30fb
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.7.2
ProductVersionNumber: 1.0.7.2
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Korean
CharacterSet: Windows, Korea (Shift - KSC 5601)
FileDescription: SecuKit NXS Setup
FileVersion: 1.0.7.2
LegalCopyright: -
LegalTrademarks: -
ProductName: SecuKit NXS
ProductVersion: 1.0.7.2
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
20
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start secukitnxs.exe cmd.exe no specs conhost.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs findstr.exe no specs kpmsvc.exe no specs kpmcnt.exe no specs kpmcnt.exe no specs rundll32.exe no specs onedrive.exe secukitnxs.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1068"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.exe" -A -n "AddedByUser RootCA" -i "C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\cacert\RootCA.pem" -t "cTC,cTC,cTC", -d "dbm:C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\i17fj4h8.default"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\nssutil3.dll
1204\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1732"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.exe" -A -n "AddedByUser RootCA" -i "C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\cacert\RootCA.pem" -t "cTC,cTC,cTC", -d "sql:C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\nssutil3.dll
1884"C:\Program Files (x86)\KICA\Common\kpmsvc\kpmsvc.exe"C:\Program Files (x86)\KICA\Common\kpmsvc\kpmsvc.exeservices.exe
User:
SYSTEM
Company:
KICA Inc.
Integrity Level:
SYSTEM
Description:
KICA Prosess Manager Service 1.1.5.0
Version:
1.1.5.2
Modules
Images
c:\program files (x86)\kica\common\kpmsvc\kpmsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2620"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.exe" -L -d "C:\Program Files (x86)\Mozilla Firefox\browser\defaults\Profile" C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\nssutil3.dll
3156C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\add-certs.cmd""C:\Windows\SysWOW64\cmd.exeSecuKitNXS.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4072"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.exe" -A -n "AddedByUser RootCA" -i "C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\cacert\RootCA.pem" -t "cTC,cTC,cTC", -d "sql:C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\nssutil3.dll
4144"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.exe" -A -n "AddedByUser RootCA" -i "C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\cacert\RootCA.pem" -t "cTC,cTC,cTC", -d "C:\Program Files (x86)\Mozilla Firefox\browser\defaults\Profile"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\plc4.dll
5356"C:\Program Files (x86)\KICA\Common\kpmsvc\kpmcnt.exe"C:\Program Files (x86)\KICA\Common\kpmsvc\kpmcnt.exekpmsvc.exe
User:
admin
Company:
KICA Inc.
Integrity Level:
HIGH
Description:
KICA Process Manager Service
Version:
1.1.5.8
Modules
Images
c:\program files (x86)\kica\common\kpmsvc\kpmcnt.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5584"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.exe" -A -n "AddedByUser RootCA" -i "C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\cacert\RootCA.pem" -t "cTC,cTC,cTC", -d "sql:C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\i17fj4h8.default"C:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\nszba12.tmp\kica\firefox-add-certs\bin\nssutil3.dll
Total events
5 034
Read events
4 865
Write events
161
Delete events
8

Modification events

(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates
Operation:delete valueName:68C232D21D4B44F3403B0A5F8C92ED88E32804D3
Value:
(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\68C232D21D4B44F3403B0A5F8C92ED88E32804D3
Operation:writeName:Blob
Value:
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
(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SecuKit NXS
Operation:writeName:DisplayName
Value:
SecuKit NXS
(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SecuKit NXS
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\KICA\SecuKitNXS\NXUnInst.exe
(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SecuKit NXS
Operation:writeName:DisplayVersion
Value:
1.0.7.2
(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SecuKit NXS
Operation:writeName:URLInfoAbout
Value:
https://www.signgate.com
(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SecuKit NXS
Operation:writeName:Publisher
Value:
Çѱ¹Á¤º¸ÀÎÁõ(ÁÖ)
(PID) Process:(6220) SecuKitNXS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:kpmcnt.exe
Value:
C:\Program Files (x86)\KICA\Common\kpmsvc\kpmcnt.exe
(PID) Process:(6336) OneDrive.exeKey:HKEY_CLASSES_ROOT\AppID\OneDrive.EXE
Operation:writeName:AppID
Value:
{EEABD3A3-784D-4334-AAFC-BB13234F17CF}
(PID) Process:(6336) OneDrive.exeKey:HKEY_CLASSES_ROOT\FileSyncClient.AutoPlayHandler\shell\import\DropTarget
Operation:writeName:CLSID
Value:
{5999E1EE-711E-48D2-9884-851A709F543D}
Executable files
33
Suspicious files
45
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\modern-wizard.bmpimage
MD5:A24AE230ACF3965DD4A191C8E2E49B7D
SHA256:B21EEADCAECE07CBC25CC17C5C9F915245771A3A79F5D5F6C627C5C290FCBDBF
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\nsDialogs.dllexecutable
MD5:F832E4279C8FF9029B94027803E10E1B
SHA256:4CD17F660560934A001FC8E6FDCEA50383B78CA129FB236623A9666FCBD13061
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\LICENSEtext
MD5:17C0970E8C7B6A6BD33E0C66FE6DC514
SHA256:112F7B1A5C192DD892F2D2092DF46109185AD9F5EB729EAC9770F48C352887DF
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\nssdbm3.dllexecutable
MD5:8CC6A31974A175A65D6C090FEED39F42
SHA256:F64111FAA9966D7B7859C6467BEDBD64559284B049F55FFADC54DFC50A3A4264
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\nssckbi.dllexecutable
MD5:40483977B63FF6382BA0E4FB03198C8B
SHA256:BFA1DE077F19AFC7B21FEB41891B4200A40B4DDA114F483D4EB92FF7A375926D
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\nssutil3.dllexecutable
MD5:C19416E9CF9E571068CA14276C6E0620
SHA256:BA9341807B42E90BB0380D51A83D3D6A0DE7D57B6820A8B0CBE5E36E978860FA
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\smime3.dllexecutable
MD5:94624BBAB23A92E0A5F90CCE9A5A340D
SHA256:B0104EA7AAA257B111982BD0763C1C47FFF76BD70249F84DCAD834D50444DF1A
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\plds4.dllexecutable
MD5:B7ED50495D311CF6E7AD247968DD2079
SHA256:20166E281B31AE60672B9D87CB69FCBA0C38CC5E18A8BA081C5601CCFAB7589F
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\plc4.dllexecutable
MD5:88B4DF8D7D536A195F866B70C48ED534
SHA256:09F01488A002915B8472A4E82ADB7A3E8CB43BD77DB347B0178EAE614F846A0A
6220SecuKitNXS.exeC:\Users\admin\AppData\Local\Temp\nszBA12.tmp\KICA\firefox-add-certs\bin\ssl3.dllexecutable
MD5:55FC1EB1359AFDA427CF8CF7FC840CF2
SHA256:77E642601D600B8DDA1FC64E4CC8D556FC53217DF933122C487EC43C1F60E2DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
39
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
944
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6676
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6676
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6844
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6336
OneDrive.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6336
OneDrive.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2464
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
104.126.37.139:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
944
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
944
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4360
SearchApp.exe
104.126.37.131:443
th.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.46
whitelisted
www.bing.com
  • 104.126.37.139
  • 104.126.37.155
  • 104.126.37.152
  • 104.126.37.162
  • 104.126.37.160
  • 104.126.37.171
  • 104.126.37.153
  • 104.126.37.179
  • 104.126.37.186
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.140
  • 20.190.160.14
  • 40.126.32.136
  • 40.126.32.74
  • 40.126.32.138
  • 40.126.32.134
  • 40.126.32.133
whitelisted
th.bing.com
  • 104.126.37.131
  • 104.126.37.137
  • 104.126.37.168
  • 104.126.37.155
  • 104.126.37.163
  • 104.126.37.130
  • 104.126.37.153
  • 104.126.37.161
  • 104.126.37.170
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.36
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
No debug info