File name:

e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin

Full analysis: https://app.any.run/tasks/82d7bc20-0a34-41cf-8395-87dd29510915
Verdict: Malicious activity
Threats:

Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.

Analysis date: July 14, 2025, 13:56:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ramnit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

118962EA993C489F14C068235B1A8397

SHA1:

0F6E1C3388F65C6F483B15E6A35B8ACDF0A93DE6

SHA256:

E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF

SSDEEP:

3072:GtSqS6SbEjAr+Y1/5G6yC2Yb6CyH6wap4EWHUW1g:GtRmbEjAr+K/5mC2dH6wpL0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • svchost.exe (PID: 5168)
    • RAMNIT has been detected (SURICATA)

      • svchost.exe (PID: 5168)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 5168)
      • qytemwsg.exe (PID: 1568)
    • Connects to the CnC server

      • svchost.exe (PID: 5168)
    • Changes firewall settings

      • qytemwsg.exe (PID: 1568)
    • Creates or modifies Windows services

      • qytemwsg.exe (PID: 1568)
    • UAC/LUA settings modification

      • qytemwsg.exe (PID: 1568)
    • Disables Windows firewall

      • qytemwsg.exe (PID: 1568)
    • Changes Security Center notification settings

      • qytemwsg.exe (PID: 1568)
    • Changes the login/logoff helper path in the registry

      • qytemwsg.exe (PID: 1568)
  • SUSPICIOUS

    • Starts itself from another location

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 7032)
    • Executable content was dropped or overwritten

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 7032)
      • jsmlocel.exe (PID: 6612)
      • svchost.exe (PID: 5168)
    • Creates a software uninstall entry

      • sdbinst.exe (PID: 5172)
    • Reads security settings of Internet Explorer

      • jsmlocel.exe (PID: 6612)
      • ShellExperienceHost.exe (PID: 640)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 5168)
    • Starts CMD.EXE for commands execution

      • jsmlocel.exe (PID: 6612)
    • The executable file from the user directory is run by the CMD process

      • qytemwsg.exe (PID: 1568)
    • There is functionality for taking screenshot (YARA)

      • svchost.exe (PID: 5168)
      • svchost.exe (PID: 3504)
  • INFO

    • Checks supported languages

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 7032)
      • jsmlocel.exe (PID: 6612)
      • qytemwsg.exe (PID: 1568)
      • ShellExperienceHost.exe (PID: 640)
    • Reads the computer name

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 7032)
      • jsmlocel.exe (PID: 6612)
      • qytemwsg.exe (PID: 1568)
      • ShellExperienceHost.exe (PID: 640)
    • Create files in a temporary directory

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 7032)
      • jsmlocel.exe (PID: 6612)
    • Creates files or folders in the user directory

      • jsmlocel.exe (PID: 6612)
    • Launching a file from the Startup directory

      • svchost.exe (PID: 5168)
    • Creates files in the program directory

      • svchost.exe (PID: 5168)
    • Launching a file from a Registry key

      • svchost.exe (PID: 5168)
      • qytemwsg.exe (PID: 1568)
    • Process checks computer location settings

      • jsmlocel.exe (PID: 6612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:11:11 17:56:40+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 5.12
CodeSize: 183808
InitializedDataSize: 41472
UninitializedDataSize: -
EntryPoint: 0x297b5
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
19
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe jsmlocel.exe #RAMNIT svchost.exe svchost.exe no specs sdbinst.exe no specs sdbinst.exe conhost.exe no specs iscsicli.exe no specs iscsicli.exe conhost.exe no specs sdbinst.exe no specs sdbinst.exe conhost.exe no specs cmd.exe conhost.exe no specs qytemwsg.exe shellexperiencehost.exe no specs slui.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
1080\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesdbinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1096"C:\WINDOWS\system32\sdbinst.exe" /q "C:\Users\admin\AppData\Local\Temp\\..\..\LocalLow\com.admin.sdb"C:\Windows\SysWOW64\sdbinst.exejsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Application Compatibility Database Installer
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sdbinst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1568"C:\Users\admin\AppData\Local\Temp\qytemwsg.exe"C:\Users\admin\AppData\Local\Temp\qytemwsg.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\qytemwsg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3504C:\WINDOWS\system32\svchost.exeC:\Windows\SysWOW64\svchost.exejsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\sechost.dll
3720"C:\WINDOWS\syswow64\iscsicli.exe" C:\Windows\SysWOW64\iscsicli.exe
jsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
iSCSI Discovery tool
Exit code:
4026466366
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\iscsicli.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
4116\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesdbinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4836"C:\WINDOWS\SysWOW64\sdbinst.exe" /q /u "C:\Users\admin\AppData\Local\Temp\\..\..\LocalLow\com.admin.sdb"C:\Windows\SysWOW64\sdbinst.exe
jsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Application Compatibility Database Installer
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sdbinst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4860C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 656
Read events
2 566
Write events
87
Delete events
3

Modification events

(PID) Process:(5168) svchost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:AwxGhpxi
Value:
C:\Users\admin\AppData\Local\rqgtwpor\awxghpxi.exe
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe
Operation:writeName:{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
Value:
70095414C7F4DB01
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
Operation:writeName:DisplayName
Value:
iscsicli
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
Operation:writeName:UninstallString
Value:
%windir%\system32\sdbinst.exe -u "C:\WINDOWS\AppPatch\CustomSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb"
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabasePath
Value:
C:\WINDOWS\AppPatch\CustomSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseType
Value:
65536
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseRuntimePlatform
Value:
4
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseDescription
Value:
iscsicli
(PID) Process:(5172) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseInstallTimeStamp
Value:
70095414C7F4DB01
(PID) Process:(6612) jsmlocel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe
Operation:delete keyName:(default)
Value:
Executable files
4
Suspicious files
1
Text files
2
Unknown types
2

Dropped files

PID
Process
Filename
Type
7032e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exeC:\Users\admin\AppData\Local\Temp\jsmlocel.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
6612jsmlocel.exeC:\Users\admin\AppData\Local\Temp\qytemwsg.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
5168svchost.exeC:\Users\admin\AppData\Local\ttdjftbk.logbinary
MD5:925829BAB3176FF88BA02A7D01EAC0DA
SHA256:7F06BDD0A7D0B735FEDEC9706543A87A77D3E2D503D4504C11A7EB5A242E940F
5172sdbinst.exeC:\Windows\apppatch\CustomSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdbsdb
MD5:6E0BDB9E821A27BF740C98D6A60594BC
SHA256:04176B2414414FCB81100FAC2DD5D42BD8C50038F414A61714838D9387D8C1F1
6612jsmlocel.exeC:\Users\admin\AppData\LocalLow\com.admin.sdbsdb
MD5:6E0BDB9E821A27BF740C98D6A60594BC
SHA256:04176B2414414FCB81100FAC2DD5D42BD8C50038F414A61714838D9387D8C1F1
5168svchost.exeC:\ProgramData\hxlhdlil.logtext
MD5:B5BA7BF2D2B14FE45B91E11D5D987B94
SHA256:5358259F09AD7F0D05BDAE58EF46B5823742BA5D000ABA6B0ED6CD2B787AEC48
5168svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\awxghpxi.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
6612jsmlocel.exeC:\Users\admin\AppData\LocalLow\cmd.admin.battext
MD5:A93BA8112D1B524DBDD8E50AB38C60B1
SHA256:E202C0A3C2968B23688EB2C9E6EDA8192BA8A4317C4275017590247F5BD46306
5168svchost.exeC:\Users\admin\AppData\Local\rqgtwpor\awxghpxi.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
25
DNS requests
67
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7072
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7164
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7164
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5116
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5168
svchost.exe
142.250.185.110:80
google.com
GOOGLE
US
whitelisted
5168
svchost.exe
46.165.254.208:443
wliyfyudchpoipilob.com
Leaseweb Deutschland GmbH
DE
malicious
5168
svchost.exe
195.201.179.207:443
plnbhxkmbeilgtxeg.com
Hetzner Online GmbH
DE
malicious
5168
svchost.exe
34.253.60.188:443
vhjgrdivlr.com
AMAZON-02
IE
malicious
7072
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.110
whitelisted
iue62876tgbdteu.com
unknown
javtqaxboyqyxubai.com
unknown
wliyfyudchpoipilob.com
  • 46.165.254.208
unknown
plnbhxkmbeilgtxeg.com
  • 195.201.179.207
unknown
qrnfpksn.com
unknown
likdvhtygomtplylmiw.com
unknown
wwnkrbstpjx.com
unknown
tpvobebthdtwkqx.com
unknown

Threats

PID
Process
Class
Message
5168
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
5168
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
5168
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
5168
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
Process
Message
qytemwsg.exe
CheckBypassed ok