analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa082UXpHN1RuZTQ4b0hqUWM5dm5ldDVRajBnZ3xBQ3Jtc0ttQ2djczVuYzJoTFJWV29EOFE5clNzY29DdTg2bnZ4SERaLXJMNUl1NjB3QkY1ODlKOFMwbGxqcXZIdlplRnk4cHRVSUpQQjNfdTV0NF90am9tR01NdklDZE9EQU9XSmRPb21RR3FEa3RGcXBCR0JWVQ&q=https%3A%2F%2Fdrive.google.com%2Ffile%2Fd%2F15sb9GHgXbJfCSDXYzeuI8MWfFDhVkhNG%2Fview%3Fusp%3Dsharing&v=4X77gAlJcfg

Full analysis: https://app.any.run/tasks/af91cafe-51f3-467e-85b8-c92719b5a9a1
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: May 21, 2022, 01:32:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
ramnit
Indicators:
MD5:

B80FD5B42E31A0DE38BC8EF976C26114

SHA1:

2B06194C343974AB3D68DE7AABFEF6A4C58A545C

SHA256:

0F12ADBA412A92F92928FDBE075B3858717BEACFBA4E9A1D64D9B1F00DE181D2

SSDEEP:

6:2OLUxGKmKLqZG7GmLkG5WZ2urUq6gUVeprxeaww13zieLQ3izaeQKme:2jGRfGfLkGcPAEUVe1kaw8ueKizanK7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes settings of System certificates

      • svchost.exe (PID: 1088)
    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 556)
      • New Super Mario Forever 2012.exe (PID: 1920)
      • uninstall.exe (PID: 280)
      • iexplore.exe (PID: 1128)
    • Application was dropped or rewritten from another process

      • New Super Mario Forever 2012.exe (PID: 1920)
      • uninstall.exe (PID: 280)
      • uninstall.exe (PID: 3236)
      • uninstallmgr.exe (PID: 1620)
    • Loads dropped or rewritten executable

      • Explorer.EXE (PID: 1464)
      • SearchProtocolHost.exe (PID: 2284)
      • New Super Mario Forever 2012.exe (PID: 1920)
      • uninstall.exe (PID: 280)
    • Writes to a start menu file

      • iexplore.exe (PID: 1128)
    • Application was injected by another process

      • taskeng.exe (PID: 288)
      • wininit.exe (PID: 376)
      • svchost.exe (PID: 860)
      • Dwm.exe (PID: 936)
      • spoolsv.exe (PID: 1236)
      • IMEDICTUPDATE.EXE (PID: 1424)
      • svchost.exe (PID: 824)
      • svchost.exe (PID: 1264)
      • csrss.exe (PID: 340)
      • smss.exe (PID: 260)
      • svchost.exe (PID: 1936)
      • services.exe (PID: 468)
      • lsass.exe (PID: 484)
      • svchost.exe (PID: 760)
      • lsm.exe (PID: 492)
      • svchost.exe (PID: 1352)
      • SearchIndexer.exe (PID: 2544)
      • svchost.exe (PID: 796)
      • winlogon.exe (PID: 432)
      • svchost.exe (PID: 672)
      • svchost.exe (PID: 1088)
      • svchost.exe (PID: 592)
      • svchost.exe (PID: 968)
      • csrss.exe (PID: 384)
      • DllHost.exe (PID: 2872)
      • ctfmon.exe (PID: 1396)
      • DllHost.exe (PID: 3544)
      • DllHost.exe (PID: 984)
      • SearchFilterHost.exe (PID: 2356)
      • DllHost.exe (PID: 2928)
      • DllHost.exe (PID: 2952)
      • DllHost.exe (PID: 4080)
      • SearchProtocolHost.exe (PID: 580)
      • DllHost.exe (PID: 3360)
      • SearchFilterHost.exe (PID: 3688)
      • LogonUI.exe (PID: 3972)
      • DllHost.exe (PID: 1328)
    • Runs injected code in another process

      • iexplore.exe (PID: 3604)
    • Connects to CnC server

      • iexplore.exe (PID: 1128)
    • RAMNIT was detected

      • iexplore.exe (PID: 1128)
  • SUSPICIOUS

    • Starts Internet Explorer

      • Explorer.EXE (PID: 1464)
      • uninstallmgr.exe (PID: 1620)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2152)
      • iexplore.exe (PID: 2584)
      • mmc.exe (PID: 752)
    • Removes files from Windows directory

      • svchost.exe (PID: 1088)
    • Creates files in the Windows directory

      • svchost.exe (PID: 1088)
      • svchost.exe (PID: 824)
    • Reads the computer name

      • WinRAR.exe (PID: 556)
      • New Super Mario Forever 2012.exe (PID: 1920)
      • uninstallmgr.exe (PID: 1620)
      • csrss.exe (PID: 384)
      • uninstall.exe (PID: 280)
    • Checks supported languages

      • WinRAR.exe (PID: 556)
      • New Super Mario Forever 2012.exe (PID: 1920)
      • uninstall.exe (PID: 280)
      • uninstallmgr.exe (PID: 1620)
      • svchost.exe (PID: 592)
      • svchost.exe (PID: 796)
      • SearchIndexer.exe (PID: 2544)
    • Creates files in the program directory

      • SearchIndexer.exe (PID: 2544)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 556)
      • New Super Mario Forever 2012.exe (PID: 1920)
      • uninstall.exe (PID: 280)
      • iexplore.exe (PID: 1128)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 556)
      • New Super Mario Forever 2012.exe (PID: 1920)
      • uninstall.exe (PID: 280)
      • iexplore.exe (PID: 1128)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 1464)
    • Searches for installed software

      • svchost.exe (PID: 796)
    • Executed via COM

      • DllHost.exe (PID: 3184)
    • Creates files in the user directory

      • Explorer.EXE (PID: 1464)
    • Reads internet explorer settings

      • mmc.exe (PID: 752)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2152)
      • iexplore.exe (PID: 2832)
      • SearchFilterHost.exe (PID: 2356)
      • SearchProtocolHost.exe (PID: 2284)
      • DllHost.exe (PID: 2872)
      • DllHost.exe (PID: 984)
      • iexplore.exe (PID: 1128)
      • iexplore.exe (PID: 3604)
      • DllHost.exe (PID: 2952)
      • DllHost.exe (PID: 2928)
      • DllHost.exe (PID: 3184)
      • DllHost.exe (PID: 3544)
      • DllHost.exe (PID: 4080)
      • iexplore.exe (PID: 2584)
      • SearchProtocolHost.exe (PID: 580)
      • SearchFilterHost.exe (PID: 3688)
      • taskmgr.exe (PID: 2964)
      • DllHost.exe (PID: 3360)
      • DllHost.exe (PID: 1328)
      • mmc.exe (PID: 752)
      • LogonUI.exe (PID: 3972)
    • Checks supported languages

      • iexplore.exe (PID: 2832)
      • iexplore.exe (PID: 2152)
      • csrss.exe (PID: 384)
      • SearchFilterHost.exe (PID: 2356)
      • SearchProtocolHost.exe (PID: 2284)
      • DllHost.exe (PID: 984)
      • DllHost.exe (PID: 2872)
      • iexplore.exe (PID: 1128)
      • iexplore.exe (PID: 3604)
      • DllHost.exe (PID: 3184)
      • DllHost.exe (PID: 3544)
      • DllHost.exe (PID: 2928)
      • DllHost.exe (PID: 2952)
      • DllHost.exe (PID: 4080)
      • SearchProtocolHost.exe (PID: 580)
      • iexplore.exe (PID: 2584)
      • taskmgr.exe (PID: 2964)
      • DllHost.exe (PID: 1328)
      • SearchFilterHost.exe (PID: 3688)
      • DllHost.exe (PID: 3360)
      • mmc.exe (PID: 752)
      • LogonUI.exe (PID: 3972)
    • Reads settings of System Certificates

      • lsass.exe (PID: 484)
      • iexplore.exe (PID: 2152)
      • svchost.exe (PID: 1088)
      • iexplore.exe (PID: 2832)
      • iexplore.exe (PID: 2584)
    • Changes internet zones settings

      • iexplore.exe (PID: 2832)
    • Application launched itself

      • iexplore.exe (PID: 2832)
    • Creates files in the user directory

      • iexplore.exe (PID: 2152)
      • iexplore.exe (PID: 2832)
      • iexplore.exe (PID: 1128)
      • iexplore.exe (PID: 2584)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2832)
      • iexplore.exe (PID: 2152)
      • iexplore.exe (PID: 2584)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2152)
      • iexplore.exe (PID: 2584)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2832)
      • iexplore.exe (PID: 2584)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2832)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2832)
      • iexplore.exe (PID: 2584)
    • Manual execution by user

      • New Super Mario Forever 2012.exe (PID: 1920)
    • Creates files in the program directory

      • iexplore.exe (PID: 1128)
    • Reads CPU info

      • iexplore.exe (PID: 2584)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 2832)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
66
Monitored processes
53
Malicious processes
10
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start inject inject inject inject inject iexplore.exe iexplore.exe winrar.exe new super mario forever 2012.exe searchprotocolhost.exe no specs explorer.exe no specs uninstall.exe no specs uninstall.exe uninstallmgr.exe no specs #RAMNIT iexplore.exe iexplore.exe no specs csrss.exe winlogon.exe taskeng.exe dwm.exe ctfmon.exe PSIProfileNotify PSIProfileNotify Thumbnail Cache Class Factory for Out of Proc Server Thumbnail Cache Class Factory for Out of Proc Server PhotoViewer.dll no specs Thumbnail Cache Class Factory for Out of Proc Server iexplore.exe Thumbnail Cache Class Factory for Out of Proc Server searchprotocolhost.exe searchfilterhost.exe taskmgr.exe no specs mmc.exe no specs mmc.exe PSIProfileNotify Profile Notification Host smss.exe csrss.exe wininit.exe services.exe lsass.exe lsm.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe spoolsv.exe svchost.exe svchost.exe imedictupdate.exe svchost.exe searchindexer.exe searchfilterhost.exe logonui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2832"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa082UXpHN1RuZTQ4b0hqUWM5dm5ldDVRajBnZ3xBQ3Jtc0ttQ2djczVuYzJoTFJWV29EOFE5clNzY29DdTg2bnZ4SERaLXJMNUl1NjB3QkY1ODlKOFMwbGxqcXZIdlplRnk4cHRVSUpQQjNfdTV0NF90am9tR01NdklDZE9EQU9XSmRPb21RR3FEa3RGcXBCR0JWVQ&q=https%3A%2F%2Fdrive.google.com%2Ffile%2Fd%2F15sb9GHgXbJfCSDXYzeuI8MWfFDhVkhNG%2Fview%3Fusp%3Dsharing&v=4X77gAlJcfg"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2152"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2832 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
556"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\New super mario forever.zip"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1920"C:\Users\admin\Desktop\New super mario forever\New Super Mario Forever 2012.exe" C:\Users\admin\Desktop\New super mario forever\New Super Mario Forever 2012.exe
Explorer.EXE
User:
admin
Company:
Game created by Michal Gdaniec, for Softendo Freeware Games,
Integrity Level:
MEDIUM
Description:
This is a fangame created for fans! Have a nice playing time wit
Exit code:
0
Version:
1.1.1.1
Modules
Images
c:\users\admin\desktop\new super mario forever\new super mario forever 2012.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\advapi32.dll
2284"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
1464C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3236"C:\Users\admin\Desktop\New super mario forever\uninstall.exe" C:\Users\admin\Desktop\New super mario forever\uninstall.exeExplorer.EXE
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
MEDIUM
Description:
Setup Application
Exit code:
3221226540
Version:
9.0.4.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\new super mario forever\uninstall.exe
280"C:\Users\admin\Desktop\New super mario forever\uninstall.exe" C:\Users\admin\Desktop\New super mario forever\uninstall.exe
Explorer.EXE
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
HIGH
Description:
Setup Application
Exit code:
12
Version:
9.0.4.0
Modules
Images
c:\users\admin\desktop\new super mario forever\uninstall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
1620"C:\Users\admin\Desktop\New super mario forever\uninstallmgr.exe"C:\Users\admin\Desktop\New super mario forever\uninstallmgr.exeuninstall.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\new super mario forever\uninstallmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
1128"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe
uninstallmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
Total events
58 512
Read events
57 479
Write events
0
Delete events
0

Modification events

No data
Executable files
19
Suspicious files
438
Text files
270
Unknown types
426

Dropped files

PID
Process
Filename
Type
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAder
MD5:5A11C6099B9E5808DFB08C5C9570C92F
SHA256:91291A5EDC4E10A225D3C23265D236ECC74473D9893BE5BD07E202D95B3FB172
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\646C991C2A28825F3CC56E0A1D1E3FA9binary
MD5:F63E99B4D58A884AC944B122862DE07F
SHA256:9D1581FF3E6C281C4895F61F6D4C8A19C26E19E34CD9CFD03FE95A6F2FD73FE0
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\646C991C2A28825F3CC56E0A1D1E3FA9der
MD5:3523BFA7B3ACACA361AC9814166709AD
SHA256:CE82F93FDB091E30497236D7F04BB67F7008E8E4133D2A8445B531C16D13AA67
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:876BB087B3EB935A4DA2E5E7B74DC034
SHA256:0B332FABB7D73FBA30142FB2A062431AC432BD49FBF7BD71416B00A368770E64
2832iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8Fder
MD5:5C1113B7526A7723B64400D44129FA78
SHA256:9ECC27C740862AB2712DA2C4FF31592E2C0A8643576E64551EE344A73FBE2494
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAbinary
MD5:7F5611330456732CCB355A36DB859026
SHA256:91486301F787B233B43CA825BCE4C6E44BDB1EF2FC2FC273037341FBADA353E8
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_7172467AE25B54F1B9D87A9343356E9Bbinary
MD5:06E7BD42F62F42F3AF0B0CF2B424151F
SHA256:106609AA92BB1AFB3B1CA681A332E8AB0235F34443F8E7A1323CA7345FC5D6AC
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:DD058783337E8E4D35F745C6B35001BB
SHA256:93A2FF3C9BBAECE21F3A5F8833032416C9B44F6ABD9F13E6F7E10E78D735179D
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
2152iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_7172467AE25B54F1B9D87A9343356E9Bder
MD5:F7A987233EC6C363F5225C5654BAD626
SHA256:5DF2AF937E6007C6BFCEF4AC91AD9F85AF357C8EE0BDEBE97DABD121BEC16E42
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
181
TCP/UDP connections
176
DNS requests
74
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2832
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.78 Kb
whitelisted
2584
iexplore.exe
GET
217.160.0.45:80
http://original.theplayingbay.com/img/1-_thumb_100x100Christmas-2011-Hidden-Objects.jpg
DE
malicious
2584
iexplore.exe
GET
217.160.0.45:80
http://original.theplayingbay.com/img/1-moos2012_thumb_200x200.jpg
DE
malicious
2584
iexplore.exe
GET
217.160.0.45:80
http://original.theplayingbay.com/img/1-nightofvampire_thumb_200x200.png
DE
malicious
2152
iexplore.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEG3aTvFLTYzNCmxS2fUJutw%3D
US
der
471 b
whitelisted
2584
iexplore.exe
GET
200
217.160.0.45:80
http://www.theplayingbay.com/
DE
html
149 b
malicious
2832
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAqvpsXKY8RRQeo74ffHUxc%3D
US
der
471 b
whitelisted
2152
iexplore.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQD7XjkT15Hv%2FxJBhWf5Zhia
US
der
472 b
whitelisted
2832
iexplore.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEFsL8ccV6MRJElibH7RYju4%3D
US
der
471 b
whitelisted
2152
iexplore.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCdUrA%2FwvrytArhIvu6cF3d
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2832
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2152
iexplore.exe
142.250.185.234:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2152
iexplore.exe
23.216.77.80:80
ctldl.windowsupdate.com
NTT DOCOMO, INC.
US
suspicious
2152
iexplore.exe
142.250.185.174:443
www.youtube.com
Google Inc.
US
whitelisted
2832
iexplore.exe
142.250.185.174:443
www.youtube.com
Google Inc.
US
whitelisted
2832
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2152
iexplore.exe
142.250.185.142:443
drive.google.com
Google Inc.
US
whitelisted
2152
iexplore.exe
172.217.18.99:443
www.gstatic.com
Google Inc.
US
whitelisted
2152
iexplore.exe
142.250.185.67:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2152
iexplore.exe
142.250.185.227:80
ocsp.pki.goog
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.youtube.com
  • 142.250.185.174
  • 142.250.185.206
  • 142.250.185.238
  • 142.250.186.174
  • 142.250.181.238
  • 142.250.184.238
  • 172.217.16.142
  • 142.250.184.206
  • 142.250.74.206
  • 142.250.186.46
  • 142.250.186.78
  • 142.250.186.110
  • 172.217.18.110
  • 142.250.186.142
  • 142.250.185.78
  • 142.250.185.110
whitelisted
ctldl.windowsupdate.com
  • 23.216.77.80
  • 23.216.77.69
whitelisted
ocsp.pki.goog
  • 142.250.185.227
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
crl.pki.goog
  • 142.250.185.227
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
www.gstatic.com
  • 172.217.18.99
whitelisted
drive.google.com
  • 142.250.185.142
shared

Threats

PID
Process
Class
Message
2584
iexplore.exe
Potential Corporate Privacy Violation
ET INFO Observed Interesting Content-Type Inbound (application/x-sh)
1128
iexplore.exe
A Network Trojan was detected
ET TROJAN Win32/Ramnit Checkin
1128
iexplore.exe
A Network Trojan was detected
ET TROJAN Win32/Ramnit Checkin
1128
iexplore.exe
A Network Trojan was detected
ET TROJAN Win32/Ramnit Checkin
No debug info