Technical Information
- [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] 'RageMP131' = '%LOCALAPPDATA%\RageMP131\RageMP131.exe'
- <SYSTEM32>\tasks\mpgph131 hr
- <SYSTEM32>\tasks\mpgph131 lg
- <SYSTEM32>\tasks\explorhe.exe
- Windows Update
- Windows Defender
- %APPDATA%\mozilla\firefox\profiles.ini
- %APPDATA%\mozilla\firefox\profiles\m15ucxjx.default\signons.sqlite
- %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\signons.sqlite
- %APPDATA%\thunderbird\profiles.ini
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %APPDATA%\thunderbird\profiles\hmz1jddi.default\signons.sqlite
- %LOCALAPPDATA%\google\chrome\user data\default\web data
- %APPDATA%\thunderbird\profiles\chdgbv82.default-release\signons.sqlite
- %LOCALAPPDATA%\google\chrome\user data\default\cookies
- %TEMP%\f59e91f8
- %TEMP%\joba428fnyw9mcivqh\bprdjh5wviljftubbxlw.exe
- %TEMP%\joba428fnyw9mcivqh\xmfh9vi2cv0p9zo2c5_5.exe
- %TEMP%\joba428fnyw9mcivqh\lmcs0igvuffzgtg2issv.exe
- %TEMP%\joba428fnyw9mcivqh\mvjrdg9pp7thd00nrxjr.exe
- %TEMP%\d887ceb89d\explorhe.exe
- %TEMP%\joba428fnyw9mcivqh\gyomi0t3vpexabxodti2.exe
- %TEMP%\main\file.bin
- %TEMP%\main\killduplicate.cmd
- %TEMP%\main\main.bat
- %TEMP%\main\7z.dll
- %TEMP%\main\extracted\file_9.zip
- %APPDATA%\006700e5a2ab05\cred64.dll
- %TEMP%\main\extracted\antiav.data
- %TEMP%\main\extracted\file_8.zip
- %TEMP%\main\extracted\file_7.zip
- %TEMP%\main\extracted\file_6.zip
- %TEMP%\main\extracted\file_5.zip
- %TEMP%\main\extracted\file_4.zip
- %TEMP%\main\extracted\file_3.zip
- %TEMP%\main\extracted\file_2.zip
- %TEMP%\main\extracted\file_1.zip
- %TEMP%\main\extracted\xfak7rc2feen35y8o.exe
- %TEMP%\joba428fnyw9mcivqh\4e3exwrcbnll1gaim88t.exe
- %TEMP%\main\7z.exe
- %TEMP%\ztskhb_lvlldyf4bldqx2byiq3dsg1g7.zip
- %TEMP%\joba428fnyw9mcivqh\3b6n2xdh3cywweb data
- %LOCALAPPDATA%\ragemp131\ragemp131.exe
- %ALLUSERSPROFILE%\mpgph131\mpgph131.exe
- %TEMP%\rage131mp.tmp
- %TEMP%\joba428fnyw9mcivqh\d87fzn3r3jfeformhistory.sqlite
- %TEMP%\joba428fnyw9mcivqh\02zdbxl47cvzplaces.sqlite
- %TEMP%\joba428fnyw9mcivqh\3b6n2xdh3cywcookies.sqlite
- %TEMP%\joba428fnyw9mcivqh\5lop_s5wm5erplaces.sqlite
- %TEMP%\joba428fnyw9mcivqh\ei8dramayu9klogin data
- %TEMP%\joba428fnyw9mcivqh\d87fzn3r3jfeweb data
- %TEMP%\joba428fnyw9mcivqh\02zdbxl47cvzhistory
- %TEMP%\joba428fnyw9mcivqh\qdx9itdlycrbformhistory.sqlite
- %TEMP%\joba328fnyw9mcivqh\passwords.txt
- %TEMP%\joba428fnyw9mcivqh\5lop_s5wm5ercookies
- %TEMP%\joba428fnyw9mcivqh\kvhrxj77cmugplaces.sqlite
- %TEMP%\joba428fnyw9mcivqh\iwpfiaxutjtshistory
- %TEMP%\joba428fnyw9mcivqh\qdx9itdlycrbweb data
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\policy.vpol
- %TEMP%\joba428fnyw9mcivqh\jx0oqi4nztiqcookies.sqlite
- %TEMP%\joba428fnyw9mcivqh\upg2lopxwc7oplaces.sqlite
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\3ccd5499-87a8-4b10-a215-608888dd3b55.vsch
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\2f1a6504-0641-44cf-8bb5-3612d865f2e5.vsch
- %LOCALAPPDATA%\microsoft\vault\4bf4c442-9b8a-41a0-b380-dd4a704ddb28\policy.vpol
- %TEMP%\joba328fnyw9mcivqh\information.txt
- %APPDATA%\006700e5a2ab05\clip64.dll
- %TEMP%\main\killduplicate.cmd
- %TEMP%\main\xfak7rc2feen35y8o.exe
- %TEMP%\joba428fnyw9mcivqh\d87fzn3r3jfeformhistory.sqlite
- %TEMP%\main\extracted\file_7.zip
- %TEMP%\main\extracted\file_6.zip
- %TEMP%\main\extracted\file_5.zip
- %TEMP%\main\extracted\file_4.zip
- %TEMP%\main\extracted\file_3.zip
- %TEMP%\main\extracted\file_2.zip
- %TEMP%\main\extracted\file_1.zip
- %TEMP%\ztskhb_lvlldyf4bldqx2byiq3dsg1g7.zip
- %TEMP%\joba428fnyw9mcivqh\upg2lopxwc7oplaces.sqlite
- %TEMP%\joba428fnyw9mcivqh\jx0oqi4nztiqcookies.sqlite
- %TEMP%\main\extracted\file_8.zip
- %TEMP%\joba428fnyw9mcivqh\kvhrxj77cmugplaces.sqlite
- %TEMP%\joba428fnyw9mcivqh\iwpfiaxutjtshistory
- %TEMP%\joba428fnyw9mcivqh\qdx9itdlycrbformhistory.sqlite
- %TEMP%\joba428fnyw9mcivqh\5lop_s5wm5ercookies
- %TEMP%\joba428fnyw9mcivqh\3b6n2xdh3cywweb data
- %TEMP%\joba428fnyw9mcivqh\02zdbxl47cvzhistory
- %TEMP%\joba428fnyw9mcivqh\d87fzn3r3jfeweb data
- %TEMP%\joba428fnyw9mcivqh\ei8dramayu9klogin data
- %TEMP%\joba428fnyw9mcivqh\5lop_s5wm5erplaces.sqlite
- %TEMP%\joba428fnyw9mcivqh\3b6n2xdh3cywcookies.sqlite
- %TEMP%\joba428fnyw9mcivqh\02zdbxl47cvzplaces.sqlite
- %TEMP%\joba428fnyw9mcivqh\qdx9itdlycrbweb data
- %TEMP%\main\extracted\file_9.zip
- from %TEMP%\main\file.bin to %TEMP%\main\file.zip
- from %TEMP%\main\extracted\xfak7rc2feen35y8o.exe to %TEMP%\main\xfak7rc2feen35y8o.exe
- %TEMP%\main\file.bin
- '19#.#33.132.62':50500
- 'ip##fo.io':443
- 'db##p.com':443
- 'ma##ind.com':80
- '10#.#07.182.3':80
- '18#.#15.113.68':80
- http://www.ma##ind.com/geoip/v2.1/city/me
- http://10#.#07.182.3/cost/go.exe
- http://18#.#15.113.68/mine/amer.exe
- http://10#.#07.182.3/cost/nika.exe
- http://10#.#07.182.3/cost/vimu.exe
- http://10#.#07.182.3/cost/networ.exe
- http://10#.#07.182.3/cost/num.exe
- http://18#.#15.113.68/theme/Plugins/cred64.dll
- http://18#.#15.113.68/theme/Plugins/clip64.dll
- http://18#.#15.113.68/theme/index.php
- '19#.#33.132.62':50500
- 'ip##fo.io':443
- 'db##p.com':443
- DNS ASK ip##fo.io
- DNS ASK db##p.com
- DNS ASK ma##ind.com
- '%TEMP%\joba428fnyw9mcivqh\4e3exwrcbnll1gaim88t.exe'
- '%TEMP%\main\7z.exe' e extracted/file_8.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_1.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_2.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_3.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_4.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_5.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_6.zip -oextracted
- '%TEMP%\main\7z.exe' e file.zip -p4632370330209207692137030328 -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_7.zip -oextracted
- '%TEMP%\d887ceb89d\explorhe.exe'
- '%TEMP%\joba428fnyw9mcivqh\gyomi0t3vpexabxodti2.exe'
- '%TEMP%\joba428fnyw9mcivqh\mvjrdg9pp7thd00nrxjr.exe'
- '%TEMP%\joba428fnyw9mcivqh\lmcs0igvuffzgtg2issv.exe'
- '%TEMP%\joba428fnyw9mcivqh\xmfh9vi2cv0p9zo2c5_5.exe'
- '%TEMP%\joba428fnyw9mcivqh\bprdjh5wviljftubbxlw.exe'
- '%TEMP%\main\xfak7rc2feen35y8o.exe'
- '%TEMP%\main\7z.exe' e extracted/file_9.zip -oextracted
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "%TEMP%\d887ceb89d\explorhe.exe" /F' (with hidden window)
- '%TEMP%\d887ceb89d\explorhe.exe' ' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\main\main.bat" /S"' (with hidden window)
- '%WINDIR%\syswow64\rundll32.exe' %APPDATA%\006700e5a2ab05\clip64.dll, Main' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /create /f /RU "user" /tr "%ALLUSERSPROFILE%\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.9.1782889819\903940464" --lang=en-US --enable-proprietary-media-types-playback --ignored=" --type=renderer " /prefetch:-645351001
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.8.1912796124\311028724" --lang=en-US --enable-proprietary-media-types-playback --ignored=" --type=renderer " /prefetch:-645351001
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.7.1913065355\707362036" --lang=en-US --enable-proprietary-media-types-playback --ignored=" --type=renderer " /prefetch:-645351001
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.6.1291588597\585831177" --lang=en-US --enable-proprietary-media-types-playback --ignored=" --type=renderer " /prefetch:-645351001
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera_crashreporter.exe' --type=utility --channel="2188.4.1926697266\1203070398" --lang=en-US --no-sandbox --enable-proprietary-media-types-playback /prefetch:-645351001 /crash-reporter-parent-id=1564
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.5.165011848\972237431" --lang=en-US --enable-proprietary-media-types-playback --ignored=" --type=renderer " /prefetch:-645351001
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.4.1926697266\1203070398" --lang=en-US --no-sandbox --enable-proprietary-media-types-playback /prefetch:-645351001
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=renderer --alt-high-dpi-setting=96 --disable-direct-npapi-requests --enable-deferred-image-decoding --lang=en-US --enable-proprietary-media-types-playback --extension-process --enable-we...
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=renderer --alt-high-dpi-setting=96 --disable-direct-npapi-requests --enable-deferred-image-decoding --lang=en-US --enable-proprietary-media-types-playback --disable-client-side-phishing-...
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=gpu-process --channel="2188.0.641734828\1387760002" --enable-proprietary-media-types-playback --supports-dual-gpus=false --gpu-driver-bug-workarounds=1,19,42 --gpu-vendor-id=0x0000 --gpu...
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=gpu-process --channel="2236.0.1664696147\811902432" --enable-proprietary-media-types-playback --supports-dual-gpus=false --gpu-driver-bug-workarounds=1,19,42 --gpu-vendor-id=0x0000 --gpu...
- '<SYSTEM32>\taskeng.exe' {A3933ACE-3653-4CB4-A172-3F8F96AE6126} S-1-5-21-3150914307-1777937420-491476919-1000:oinhuni\user:Interactive:[1]
- '%WINDIR%\syswow64\rundll32.exe' %APPDATA%\006700e5a2ab05\clip64.dll, Main
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera_crashreporter.exe' -noautoupdate --ran-launcher -- https://accounts.google.com/ /crash-reporter-parent-id=2188
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera_crashreporter.exe' -noautoupdate --ran-launcher -- https://www.youtube.com/ /crash-reporter-parent-id=2648
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera_crashreporter.exe' -noautoupdate --ran-launcher -- https://www.facebook.com/login /crash-reporter-parent-id=2236
- '<SYSTEM32>\attrib.exe' +H "xfAk7rC2FeEN35Y8o.exe"
- '<SYSTEM32>\mode.com' 65,10
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' -noautoupdate --ran-launcher -- https://www.youtube.com/
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' -noautoupdate --ran-launcher -- https://www.facebook.com/login
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' -noautoupdate --ran-launcher -- https://accounts.google.com/
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\main\main.bat" /S"
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "%TEMP%\d887ceb89d\explorhe.exe" /F
- '%ProgramFiles(x86)%\opera\launcher.exe' -noautoupdate -- "https://accounts.google.com/"
- '%ProgramFiles(x86)%\opera\launcher.exe' -noautoupdate -- "https://www.facebook.com/login"
- '%ProgramFiles(x86)%\opera\launcher.exe' -noautoupdate -- "https://www.youtube.com/"
- '%WINDIR%\syswow64\schtasks.exe' /create /f /RU "user" /tr "%ALLUSERSPROFILE%\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.10.1425516117\88830983" --lang=en-US --enable-proprietary-media-types-playback --ignored=" --type=renderer " /prefetch:-645351001
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' --type=utility --channel="2188.11.1006910115\434066926" --lang=en-US --enable-proprietary-media-types-playback --ignored=" --type=renderer " /prefetch:-645351001