File name:

e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin

Full analysis: https://app.any.run/tasks/f509fbaf-cd89-4306-8413-30f8fbeb5866
Verdict: Malicious activity
Threats:

Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.

Analysis date: February 04, 2025, 10:09:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ramnit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

118962EA993C489F14C068235B1A8397

SHA1:

0F6E1C3388F65C6F483B15E6A35B8ACDF0A93DE6

SHA256:

E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF

SSDEEP:

3072:GtSqS6SbEjAr+Y1/5G6yC2Yb6CyH6wap4EWHUW1g:GtRmbEjAr+K/5mC2dH6wpL0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RAMNIT has been detected (SURICATA)

      • svchost.exe (PID: 6504)
    • Connects to the CnC server

      • svchost.exe (PID: 6504)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 6504)
      • qytemwsg.exe (PID: 3816)
    • Create files in the Startup directory

      • svchost.exe (PID: 6504)
    • Changes firewall settings

      • qytemwsg.exe (PID: 3816)
    • Changes Security Center notification settings

      • qytemwsg.exe (PID: 3816)
    • Creates or modifies Windows services

      • qytemwsg.exe (PID: 3816)
    • UAC/LUA settings modification

      • qytemwsg.exe (PID: 3816)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • jsmlocel.exe (PID: 6480)
      • ShellExperienceHost.exe (PID: 3128)
    • Executable content was dropped or overwritten

      • jsmlocel.exe (PID: 6480)
      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 6456)
      • svchost.exe (PID: 6504)
    • Creates a software uninstall entry

      • sdbinst.exe (PID: 6800)
    • Starts itself from another location

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 6456)
    • The executable file from the user directory is run by the CMD process

      • qytemwsg.exe (PID: 3816)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 6504)
    • Starts CMD.EXE for commands execution

      • jsmlocel.exe (PID: 6480)
    • There is functionality for taking screenshot (YARA)

      • svchost.exe (PID: 6516)
  • INFO

    • Checks supported languages

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 6456)
      • jsmlocel.exe (PID: 6480)
      • ShellExperienceHost.exe (PID: 3128)
      • qytemwsg.exe (PID: 3816)
    • Process checks computer location settings

      • jsmlocel.exe (PID: 6480)
    • Create files in a temporary directory

      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 6456)
    • Reads the computer name

      • jsmlocel.exe (PID: 6480)
      • e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe (PID: 6456)
      • ShellExperienceHost.exe (PID: 3128)
      • qytemwsg.exe (PID: 3816)
    • Creates files in the program directory

      • svchost.exe (PID: 6504)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:11:11 17:56:40+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 5.12
CodeSize: 183808
InitializedDataSize: 41472
UninitializedDataSize: -
EntryPoint: 0x297b5
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
17
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe jsmlocel.exe #RAMNIT svchost.exe svchost.exe no specs sdbinst.exe no specs sdbinst.exe conhost.exe no specs iscsicli.exe no specs iscsicli.exe conhost.exe no specs sdbinst.exe no specs sdbinst.exe conhost.exe no specs cmd.exe conhost.exe no specs qytemwsg.exe shellexperiencehost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1596"C:\WINDOWS\SysWOW64\sdbinst.exe" /q /u "C:\Users\admin\AppData\Local\Temp\\..\..\LocalLow\com.admin.sdb"C:\Windows\SysWOW64\sdbinst.exe
jsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Application Compatibility Database Installer
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sdbinst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3128"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
3816"C:\Users\admin\AppData\Local\Temp\qytemwsg.exe"C:\Users\admin\AppData\Local\Temp\qytemwsg.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\qytemwsg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesdbinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5592\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5992"C:\WINDOWS\SysWOW64\cmd.exe" /C ""C:\Users\admin\AppData\Local\Temp\qytemwsg.exe""C:\Windows\SysWOW64\cmd.exe
jsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6456"C:\Users\admin\AppData\Local\Temp\e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe" C:\Users\admin\AppData\Local\Temp\e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6480C:\Users\admin\AppData\Local\Temp\jsmlocel.exeC:\Users\admin\AppData\Local\Temp\jsmlocel.exe
e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\jsmlocel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6504C:\WINDOWS\system32\svchost.exeC:\Windows\SysWOW64\svchost.exe
jsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\sechost.dll
6516C:\WINDOWS\system32\svchost.exeC:\Windows\SysWOW64\svchost.exejsmlocel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\sechost.dll
Total events
2 445
Read events
2 355
Write events
87
Delete events
3

Modification events

(PID) Process:(6504) svchost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:AwxGhpxi
Value:
C:\Users\admin\AppData\Local\rqgtwpor\awxghpxi.exe
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe
Operation:writeName:{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
Value:
9AF3BCEAEC76DB01
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
Operation:writeName:DisplayName
Value:
iscsicli
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
Operation:writeName:UninstallString
Value:
%windir%\system32\sdbinst.exe -u "C:\WINDOWS\AppPatch\CustomSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb"
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabasePath
Value:
C:\WINDOWS\AppPatch\CustomSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseType
Value:
65536
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseRuntimePlatform
Value:
4
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseDescription
Value:
iscsicli
(PID) Process:(6800) sdbinst.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}
Operation:writeName:DatabaseInstallTimeStamp
Value:
9AF3BCEAEC76DB01
(PID) Process:(6480) jsmlocel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe
Operation:delete keyName:(default)
Value:
Executable files
4
Suspicious files
3
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6456e142a1e51ce0e8d28fd852683b65688dcc97a6b705e8adc799d5af0bdefefecf.bin.exeC:\Users\admin\AppData\Local\Temp\jsmlocel.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
6504svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\awxghpxi.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
6480jsmlocel.exeC:\Users\admin\AppData\LocalLow\com.admin.sdbbinary
MD5:6E0BDB9E821A27BF740C98D6A60594BC
SHA256:04176B2414414FCB81100FAC2DD5D42BD8C50038F414A61714838D9387D8C1F1
6504svchost.exeC:\Users\admin\AppData\Local\ttdjftbk.logbinary
MD5:D4FC162AC8F0F4B4996392E91E2520B8
SHA256:37E97A48853976EB5EFF24AA49C2484F14A66B224C23D0FAE96692A4BD50016B
6504svchost.exeC:\ProgramData\hxlhdlil.logtext
MD5:B5BA7BF2D2B14FE45B91E11D5D987B94
SHA256:5358259F09AD7F0D05BDAE58EF46B5823742BA5D000ABA6B0ED6CD2B787AEC48
6800sdbinst.exeC:\Windows\apppatch\CustomSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdbbinary
MD5:6E0BDB9E821A27BF740C98D6A60594BC
SHA256:04176B2414414FCB81100FAC2DD5D42BD8C50038F414A61714838D9387D8C1F1
6504svchost.exeC:\Users\admin\AppData\Local\rqgtwpor\awxghpxi.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
6480jsmlocel.exeC:\Users\admin\AppData\LocalLow\cmd.admin.battext
MD5:A93BA8112D1B524DBDD8E50AB38C60B1
SHA256:E202C0A3C2968B23688EB2C9E6EDA8192BA8A4317C4275017590247F5BD46306
6480jsmlocel.exeC:\Users\admin\AppData\Local\Temp\qytemwsg.exeexecutable
MD5:118962EA993C489F14C068235B1A8397
SHA256:E142A1E51CE0E8D28FD852683B65688DCC97A6B705E8ADC799D5AF0BDEFEFECF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
43
DNS requests
67
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6412
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6412
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1224
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
92.123.104.58:443
www.bing.com
Akamai International B.V.
DE
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1176
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 95.101.78.32
  • 95.101.78.42
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 142.250.184.238
whitelisted
www.bing.com
  • 92.123.104.58
  • 92.123.104.44
  • 92.123.104.62
  • 92.123.104.47
  • 92.123.104.59
  • 92.123.104.56
  • 92.123.104.52
  • 92.123.104.54
  • 92.123.104.63
whitelisted
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.73
  • 40.126.31.69
  • 20.190.159.75
  • 20.190.159.131
  • 40.126.31.71
  • 40.126.31.3
  • 40.126.31.131
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
iue62876tgbdteu.com
unknown
qrnfpksn.com
unknown
wliyfyudchpoipilob.com
  • 46.165.254.208
unknown

Threats

PID
Process
Class
Message
6504
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
6504
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
6504
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
6504
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
6504
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
6504
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
Process
Message
qytemwsg.exe
CheckBypassed ok