File name:

CheraxLoader.exe

Full analysis: https://app.any.run/tasks/89cfc346-4257-4b7b-8fae-29c567d309ca
Verdict: Malicious activity
Analysis date: June 22, 2025, 02:41:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 9 sections
MD5:

1FC9C12C797276A2DC7CE7ADCB0D15A5

SHA1:

F20AE20E61DBC947CCA32DAF2B57FD84A4BACB58

SHA256:

B8E6348BE5899627251A955C60010050E60A71341810C5A08BC4326A3E0EC0E5

SSDEEP:

98304:alku/J4yn6eIfWES8VlpCKHwFvEbbS0+/EH9UTI9iZdSIBu40xQ0Bbvfd4hesSvm:aN/J+LBIBG9Y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • VC_redist.x64.exe (PID: 4012)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CheraxLoader.exe (PID: 4968)
      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • Process drops legitimate windows executable

      • CheraxLoader.exe (PID: 4968)
      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 1480)
    • Starts a Microsoft application from unusual location

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
    • Starts itself from another location

      • vc_redist.x64.exe (PID: 4680)
    • Searches for installed software

      • dllhost.exe (PID: 1472)
      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6812)
    • Reads security settings of Internet Explorer

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 7060)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 1560)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 1560)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 1560)
    • Creates a software uninstall entry

      • VC_redist.x64.exe (PID: 4012)
    • Application launched itself

      • VC_redist.x64.exe (PID: 6228)
      • VC_redist.x64.exe (PID: 7060)
  • INFO

    • Checks supported languages

      • CheraxLoader.exe (PID: 4968)
      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 6228)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • The sample compiled with english language support

      • CheraxLoader.exe (PID: 4968)
      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 4012)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • Reads the computer name

      • CheraxLoader.exe (PID: 4968)
      • vc_redist.x64.exe (PID: 4808)
      • VC_redist.x64.exe (PID: 4012)
      • vc_redist.x64.exe (PID: 4680)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • Create files in a temporary directory

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
      • VC_redist.x64.exe (PID: 7060)
    • Process checks computer location settings

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 7060)
    • Launching a file from a Registry key

      • VC_redist.x64.exe (PID: 4012)
    • Reads the software policy settings

      • msiexec.exe (PID: 1560)
    • Reads the machine GUID from the registry

      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1560)
    • Creates files in the program directory

      • VC_redist.x64.exe (PID: 4012)
    • Manages system restore points

      • SrTasks.exe (PID: 5768)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 1560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:06 12:40:55+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 2911744
InitializedDataSize: 1962496
UninitializedDataSize: -
EntryPoint: 0x428ffa
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.3518
ProductVersionNumber: 1.0.0.3518
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Cherax
FileDescription: Cherax Loader
FileVersion: 1.0.0.3518
InternalName: Cherax.exe
LegalCopyright: Copyright (C) 2019 - 2023
OriginalFileName: Cherax.exe
ProductName: Cherax Loader
ProductVersion: 1.0.0.3518
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
14
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cheraxloader.exe vc_redist.x64.exe vc_redist.x64.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe slui.exe no specs cheraxloader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1472C:\WINDOWS\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
1480"C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{EA5A8170-485A-4FE3-969C-43A7BFEC0A7C} {055573F0-24F6-458E-83B1-098433B5C27E} 7060C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
VC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1560C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4012"C:\WINDOWS\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{9BD22104-A7CD-4577-8107-685831946DFE} {67A3320C-A198-4D3C-AF28-262555EB1EA1} 4680C:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.be\VC_redist.x64.exe
vc_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.44.35208
Version:
14.44.35208.0
Modules
Images
c:\windows\temp\{b47c0e9b-55a5-4494-9557-458eb1477096}\.be\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4680"C:\WINDOWS\Temp\{BD5B3435-BEBE-42DB-A395-DA6A3E4B1C57}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\admin\Documents\Cherax\Cache\Downloads\vc_redist.x64.exe" -burn.filehandle.attached=572 -burn.filehandle.self=568 C:\Windows\Temp\{BD5B3435-BEBE-42DB-A395-DA6A3E4B1C57}\.cr\vc_redist.x64.exe
vc_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.44.35208
Version:
14.44.35208.0
Modules
Images
c:\windows\temp\{bd5b3435-bebe-42db-a395-da6a3e4b1c57}\.cr\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4808"C:\Users\admin\Documents\Cherax\Cache\Downloads\vc_redist.x64.exe"C:\Users\admin\Documents\Cherax\Cache\Downloads\vc_redist.x64.exe
CheraxLoader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.44.35208
Version:
14.44.35208.0
Modules
Images
c:\users\admin\documents\cherax\cache\downloads\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4968"C:\Users\admin\AppData\Local\Temp\CheraxLoader.exe" C:\Users\admin\AppData\Local\Temp\CheraxLoader.exe
explorer.exe
User:
admin
Company:
Cherax
Integrity Level:
HIGH
Description:
Cherax Loader
Exit code:
1337
Version:
1.0.0.3518
Modules
Images
c:\users\admin\appdata\local\temp\cheraxloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5080\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5768C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exedllhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5960C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
13 078
Read events
12 084
Write events
616
Delete events
378

Modification events

(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000E855953F1FE3DB01C0050000580E0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
48000000000000001644C03F1FE3DB01C0050000580E0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000006EF7C43F1FE3DB01C0050000580E0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000A30003401FE3DB01C0050000580E0000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A0000C0110000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A0000880B0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A0000B8190000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A000000030000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
Executable files
68
Suspicious files
59
Text files
67
Unknown types
0

Dropped files

PID
Process
Filename
Type
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1036\license.rtftext
MD5:A6E352E5804313CCDE3E4D5DDDDE122D
SHA256:5C13A65870D770D1642A4259EECB436257CA39016A0500F747BE9C79BE0C7009
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1029\thm.wxlxml
MD5:16343005D29EC431891B02F048C7F581
SHA256:07FB3EC174F25DFBE532D9D739234D9DFDA8E9D34F01FE660C5B4D56989FA779
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1029\license.rtftext
MD5:E7DC9CA9474A13FA4529D91BCD2AB8CC
SHA256:503C433DCDE2F3A9E7D388A5FF2B0612E7D8F90F5188D5B2B60228DB33044FDE
4808vc_redist.x64.exeC:\Windows\Temp\{BD5B3435-BEBE-42DB-A395-DA6A3E4B1C57}\.cr\vc_redist.x64.exeexecutable
MD5:DB2FEF85F5046E85EC2FC24089FE500A
SHA256:3814F726440521E12762A4F1D83DFDCF4C62B2CF71873987D87ECD54330095B5
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\thm.wxlxml
MD5:FBFCBC4DACC566A3C426F43CE10907B6
SHA256:70400F181D00E1769774FF36BCD8B1AB5FBC431418067D31B876D18CC04EF4CE
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1031\license.rtftext
MD5:2DDCA2866D76C850F68ACDFDB696D6DE
SHA256:28F63BAD9C2960395106011761993049546607F8A850D344D6A54042176BF03F
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\wixstdba.dllexecutable
MD5:F68F43F809840328F4E993A54B0D5E62
SHA256:E921F69B9FB4B5AD4691809D06896C5F1D655AB75E0CE94A372319C243C56D4E
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\thm.xmlxml
MD5:F62729C6D2540015E072514226C121C7
SHA256:F13BAE0EC08C91B4A315BB2D86EE48FADE597E7A5440DCE6F751F98A3A4D6916
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1028\thm.wxlxml
MD5:472ABBEDCBAD24DBA5B5F5E8D02C340F
SHA256:8E2E660DFB66CB453E17F1B6991799678B1C8B350A55F9EBE2BA0028018A15AD
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1041\license.rtftext
MD5:47C315C54B6F2078875119FA7A718499
SHA256:C3061A334BFD5F02B7085F8F454D5D3D97D477AF14BAB497BF31A7887BC90C5B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
37
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
764
lsass.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
1560
msiexec.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
764
lsass.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2596
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
856
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
856
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1560
msiexec.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2140
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4968
CheraxLoader.exe
2.18.69.150:443
aka.ms
AKAMAI-AS
AT
whitelisted
764
lsass.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4968
CheraxLoader.exe
199.232.210.172:443
download.visualstudio.microsoft.com
FASTLY
US
whitelisted
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2596
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
aka.ms
  • 2.18.69.150
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
download.visualstudio.microsoft.com
  • 199.232.210.172
  • 199.232.214.172
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.129
  • 20.190.159.75
  • 40.126.31.71
  • 40.126.31.131
  • 40.126.31.73
  • 40.126.31.69
whitelisted
crl.microsoft.com
  • 23.55.104.172
  • 23.55.104.190
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted

Threats

No threats detected
Process
Message
msiexec.exe
Failed to release Service