File name:

CheraxLoader.exe

Full analysis: https://app.any.run/tasks/89cfc346-4257-4b7b-8fae-29c567d309ca
Verdict: Malicious activity
Analysis date: June 22, 2025, 02:41:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 9 sections
MD5:

1FC9C12C797276A2DC7CE7ADCB0D15A5

SHA1:

F20AE20E61DBC947CCA32DAF2B57FD84A4BACB58

SHA256:

B8E6348BE5899627251A955C60010050E60A71341810C5A08BC4326A3E0EC0E5

SSDEEP:

98304:alku/J4yn6eIfWES8VlpCKHwFvEbbS0+/EH9UTI9iZdSIBu40xQ0Bbvfd4hesSvm:aN/J+LBIBG9Y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • VC_redist.x64.exe (PID: 4012)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • CheraxLoader.exe (PID: 4968)
      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 1480)
    • Executable content was dropped or overwritten

      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • CheraxLoader.exe (PID: 4968)
      • VC_redist.x64.exe (PID: 4012)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • Starts a Microsoft application from unusual location

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
    • Starts itself from another location

      • vc_redist.x64.exe (PID: 4680)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6812)
    • Reads security settings of Internet Explorer

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 7060)
    • Searches for installed software

      • vc_redist.x64.exe (PID: 4680)
      • dllhost.exe (PID: 1472)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • Creates a software uninstall entry

      • VC_redist.x64.exe (PID: 4012)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 1560)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 1560)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 1560)
    • Application launched itself

      • VC_redist.x64.exe (PID: 6228)
      • VC_redist.x64.exe (PID: 7060)
  • INFO

    • Checks supported languages

      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • CheraxLoader.exe (PID: 4968)
      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
      • VC_redist.x64.exe (PID: 6228)
    • Reads the computer name

      • vc_redist.x64.exe (PID: 4808)
      • CheraxLoader.exe (PID: 4968)
      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • The sample compiled with english language support

      • vc_redist.x64.exe (PID: 4808)
      • vc_redist.x64.exe (PID: 4680)
      • CheraxLoader.exe (PID: 4968)
      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
      • VC_redist.x64.exe (PID: 7060)
      • VC_redist.x64.exe (PID: 1480)
    • Create files in a temporary directory

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 4012)
      • VC_redist.x64.exe (PID: 7060)
    • Process checks computer location settings

      • vc_redist.x64.exe (PID: 4680)
      • VC_redist.x64.exe (PID: 7060)
    • Manages system restore points

      • SrTasks.exe (PID: 5768)
    • Creates files in the program directory

      • VC_redist.x64.exe (PID: 4012)
    • Reads the machine GUID from the registry

      • VC_redist.x64.exe (PID: 4012)
      • msiexec.exe (PID: 1560)
    • Launching a file from a Registry key

      • VC_redist.x64.exe (PID: 4012)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1560)
    • Reads the software policy settings

      • msiexec.exe (PID: 1560)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 1560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:06 12:40:55+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 2911744
InitializedDataSize: 1962496
UninitializedDataSize: -
EntryPoint: 0x428ffa
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.3518
ProductVersionNumber: 1.0.0.3518
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Cherax
FileDescription: Cherax Loader
FileVersion: 1.0.0.3518
InternalName: Cherax.exe
LegalCopyright: Copyright (C) 2019 - 2023
OriginalFileName: Cherax.exe
ProductName: Cherax Loader
ProductVersion: 1.0.0.3518
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
14
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cheraxloader.exe vc_redist.x64.exe vc_redist.x64.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe slui.exe no specs cheraxloader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1472C:\WINDOWS\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
1480"C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{EA5A8170-485A-4FE3-969C-43A7BFEC0A7C} {055573F0-24F6-458E-83B1-098433B5C27E} 7060C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
VC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1560C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4012"C:\WINDOWS\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{9BD22104-A7CD-4577-8107-685831946DFE} {67A3320C-A198-4D3C-AF28-262555EB1EA1} 4680C:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.be\VC_redist.x64.exe
vc_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.44.35208
Version:
14.44.35208.0
Modules
Images
c:\windows\temp\{b47c0e9b-55a5-4494-9557-458eb1477096}\.be\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4680"C:\WINDOWS\Temp\{BD5B3435-BEBE-42DB-A395-DA6A3E4B1C57}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\admin\Documents\Cherax\Cache\Downloads\vc_redist.x64.exe" -burn.filehandle.attached=572 -burn.filehandle.self=568 C:\Windows\Temp\{BD5B3435-BEBE-42DB-A395-DA6A3E4B1C57}\.cr\vc_redist.x64.exe
vc_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.44.35208
Version:
14.44.35208.0
Modules
Images
c:\windows\temp\{bd5b3435-bebe-42db-a395-da6a3e4b1c57}\.cr\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4808"C:\Users\admin\Documents\Cherax\Cache\Downloads\vc_redist.x64.exe"C:\Users\admin\Documents\Cherax\Cache\Downloads\vc_redist.x64.exe
CheraxLoader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.44.35208
Version:
14.44.35208.0
Modules
Images
c:\users\admin\documents\cherax\cache\downloads\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4968"C:\Users\admin\AppData\Local\Temp\CheraxLoader.exe" C:\Users\admin\AppData\Local\Temp\CheraxLoader.exe
explorer.exe
User:
admin
Company:
Cherax
Integrity Level:
HIGH
Description:
Cherax Loader
Exit code:
1337
Version:
1.0.0.3518
Modules
Images
c:\users\admin\appdata\local\temp\cheraxloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5080\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5768C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exedllhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5960C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
13 078
Read events
12 084
Write events
616
Delete events
378

Modification events

(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000E855953F1FE3DB01C0050000580E0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
48000000000000001644C03F1FE3DB01C0050000580E0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000006EF7C43F1FE3DB01C0050000580E0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1472) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000A30003401FE3DB01C0050000580E0000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A0000C0110000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A0000880B0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A0000B8190000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000003F1216401FE3DB019C1A000000030000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(6812) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
Executable files
68
Suspicious files
59
Text files
67
Unknown types
0

Dropped files

PID
Process
Filename
Type
4968CheraxLoader.exeC:\Users\admin\Documents\Cherax\Cache\Downloads\vc_redist.x64.exeexecutable
MD5:DE118D5E2AB7AAA7E1A08A0ECF84E8C9
SHA256:D62841375B90782B1829483AC75695CCEF680A8F13E7DE569B992EF33C6CD14A
4968CheraxLoader.exeC:\Users\admin\Documents\Cherax\Loader.logtext
MD5:3BAAAB2D0396715B7B058922D8D7839E
SHA256:33F360AE38D4C47C58C08415B4FFBB8549AB9F86F8DE80C25788334B579238DB
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\wixstdba.dllexecutable
MD5:F68F43F809840328F4E993A54B0D5E62
SHA256:E921F69B9FB4B5AD4691809D06896C5F1D655AB75E0CE94A372319C243C56D4E
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\thm.xmlxml
MD5:F62729C6D2540015E072514226C121C7
SHA256:F13BAE0EC08C91B4A315BB2D86EE48FADE597E7A5440DCE6F751F98A3A4D6916
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\thm.wxlxml
MD5:FBFCBC4DACC566A3C426F43CE10907B6
SHA256:70400F181D00E1769774FF36BCD8B1AB5FBC431418067D31B876D18CC04EF4CE
4808vc_redist.x64.exeC:\Windows\Temp\{BD5B3435-BEBE-42DB-A395-DA6A3E4B1C57}\.cr\vc_redist.x64.exeexecutable
MD5:DB2FEF85F5046E85EC2FC24089FE500A
SHA256:3814F726440521E12762A4F1D83DFDCF4C62B2CF71873987D87ECD54330095B5
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\license.rtftext
MD5:04B33F0A9081C10E85D0E495A1294F83
SHA256:8099DC3CF9502C335DA829E5C755948A12E3E6DE490EB492A99DEB673D883D8B
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1029\thm.wxlxml
MD5:16343005D29EC431891B02F048C7F581
SHA256:07FB3EC174F25DFBE532D9D739234D9DFDA8E9D34F01FE660C5B4D56989FA779
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\logo.pngimage
MD5:D6BD210F227442B3362493D046CEA233
SHA256:335A256D4779EC5DCF283D007FB56FD8211BBCAF47DCD70FE60DED6A112744EF
4680vc_redist.x64.exeC:\Windows\Temp\{B47C0E9B-55A5-4494-9557-458EB1477096}\.ba\1028\license.rtftext
MD5:2B063D92663595DFE4781AE687A03D86
SHA256:44C76290F7A2E45940E8338912FEB49BCF4E071CFA85D2D34762857743ACBC8D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
37
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1560
msiexec.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
856
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
764
lsass.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
856
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1560
msiexec.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
764
lsass.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
2596
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2140
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4968
CheraxLoader.exe
2.18.69.150:443
aka.ms
AKAMAI-AS
AT
whitelisted
764
lsass.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4968
CheraxLoader.exe
199.232.210.172:443
download.visualstudio.microsoft.com
FASTLY
US
whitelisted
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2596
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
aka.ms
  • 2.18.69.150
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
download.visualstudio.microsoft.com
  • 199.232.210.172
  • 199.232.214.172
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.129
  • 20.190.159.75
  • 40.126.31.71
  • 40.126.31.131
  • 40.126.31.73
  • 40.126.31.69
whitelisted
crl.microsoft.com
  • 23.55.104.172
  • 23.55.104.190
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted

Threats

No threats detected
Process
Message
msiexec.exe
Failed to release Service