IOC Report
YnsEArPlqx.exe

loading gif

Files

File Path
Type
Category
Malicious
YnsEArPlqx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\YnsEArPlqx.exe
"C:\Users\user\Desktop\YnsEArPlqx.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
unknown
http://77.91.77.81/mine/amadka.exeisepro_bot
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33M
unknown
https://t.me/RiseProSUPPORTv
unknown
http://77.91.77.81/cost/go.exe
unknown
https://t.me/RiseProSUPPORTt
unknown
http://77.91.77.81/mine/amadka.exe.1
unknown
http://77.91.77.81/mine/amadka.exe3377b
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33H
unknown
https://db-ip.com/
unknown
https://db-ip.com/oV
unknown
https://ipinfo.io/widget/demo/8.46.123.33NA
unknown
https://t.me/RiseProSUPPORTf
unknown
http://77.91.77.81/cost/lenin.exe0.1
unknown
https://t.me/risepro
unknown
https://ipinfo.io/widget/demo/8.46.123.33P.tmp
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://ipinfo.io/s
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33f7
unknown
http://77.91.77.81/cost/lenin.e
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33
unknown
http://77.91.77.81/mine/amadka.exeB
unknown
https://db-ip.com/demo/home.php?s=8.46.123.333
unknown
https://t.me/risepro_bot8
unknown
https://db-ip.com/L
unknown
http://77.91.77.81/mine/amadka.exeisepro_botA%
unknown
http://77.91.77.81/cost/go.exeT3EU
unknown
https://t.me/risepro_botrisep
unknown
https://db-ip.com/V
unknown
https://t.me/risepro_botClyf(U3
unknown
https://t.me/risepro_bot~
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://t.me/risepro_botK:
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/risepro_bot3ABbfQUY
unknown
http://77.91.77.81/cost/lenin.exek.com
unknown
https://ipinfo.io/Mozilla/5.0
unknown
http://77.91.77.81/cost/go.exew9u
unknown
http://77.91.77.81/cost/lenin.exe/risepro
unknown
https://db-ip.com/h
unknown
https://t.me/risepro_bot
unknown
https://t.me/risepro_botlater
unknown
https://ipinfo.io/
34.117.186.192
https://t.%9
unknown
http://77.91.77.81/mine/amadka.exe0.1
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://77.91.77.81/cost/go.exeOP
unknown
http://www.winimage.com/zLibDll
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33w
unknown
https://t.h
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33k
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
172.67.75.166
http://77.91.77.81/cost/lenin.exe
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.338
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
C91000
heap
page read and write
EA8000
heap
page read and write
D57000
heap
page read and write
753000
unkown
page execute and read and write
C91000
heap
page read and write
CE8000
heap
page read and write
74F000
unkown
page execute and read and write
D12000
heap
page read and write
D55000
heap
page read and write
76A000
unkown
page execute and read and write
401000
unkown
page execute read
E16000
heap
page read and write
2820000
direct allocation
page read and write
560F000
stack
page read and write
4F2E000
stack
page read and write
C48000
heap
page read and write
74F000
unkown
page execute and read and write
585000
unkown
page read and write
C70000
heap
page read and write
7BB000
unkown
page execute and read and write
D52000
heap
page read and write
4B28000
heap
page read and write
598000
unkown
page execute and read and write
782000
unkown
page execute and read and write
400000
unkown
page readonly
BFA000
heap
page read and write
C61000
heap
page read and write
2740000
direct allocation
page read and write
503E000
stack
page read and write
CDE000
heap
page read and write
C3F000
heap
page read and write
4C7E000
stack
page read and write
401000
unkown
page execute read
759000
unkown
page execute and read and write
CEE000
heap
page read and write
E0B000
heap
page read and write
EC2000
heap
page read and write
2980000
direct allocation
page read and write
5160000
remote allocation
page read and write
CF8000
heap
page read and write
564E000
stack
page read and write
776000
unkown
page execute and read and write
F50000
heap
page read and write
2840000
direct allocation
page read and write
EA0000
heap
page read and write
2740000
direct allocation
page read and write
776000
unkown
page execute and read and write
757000
unkown
page execute and read and write
55D000
unkown
page readonly
76C000
unkown
page execute and read and write
5768000
heap
page read and write
400000
unkown
page readonly
2920000
direct allocation
page read and write
2980000
direct allocation
page read and write
2980000
direct allocation
page read and write
400000
unkown
page readonly
D6D000
heap
page read and write
D68000
heap
page read and write
F59000
heap
page read and write
596000
unkown
page read and write
401000
unkown
page execute read
757000
unkown
page execute and read and write
770000
unkown
page execute and read and write
EE9000
heap
page read and write
506E000
stack
page read and write
74D000
unkown
page execute and read and write
500F000
stack
page read and write
596000
unkown
page read and write
D16000
heap
page read and write
C43000
heap
page read and write
EC8000
heap
page read and write
585000
unkown
page write copy
2840000
direct allocation
page read and write
58A000
unkown
page readonly
2B10000
heap
page read and write
759000
unkown
page execute and read and write
EBD000
heap
page read and write
1060000
heap
page read and write
4952000
heap
page read and write
E2B000
heap
page read and write
4EED000
stack
page read and write
560F000
stack
page read and write
5160000
remote allocation
page read and write
78A000
unkown
page execute and read and write
7BB000
unkown
page execute and read and write
7BB000
unkown
page execute and read and write
9B000
stack
page read and write
EFA000
heap
page read and write
DCD000
heap
page read and write
560F000
stack
page read and write
774000
unkown
page execute and read and write
C6E000
heap
page read and write
D2C000
heap
page read and write
4B3E000
stack
page read and write
782000
unkown
page execute and read and write
CAF000
heap
page read and write
E9A000
heap
page read and write
585000
unkown
page read and write
577E000
heap
page read and write
E45000
heap
page read and write
D20000
heap
page read and write
EB4000
heap
page read and write
C7D000
heap
page read and write
58A000
unkown
page readonly
C8D000
heap
page read and write
55D000
unkown
page readonly
774000
unkown
page execute and read and write
7BB000
unkown
page execute and read and write
19C000
stack
page read and write
5170000
remote allocation
page read and write
5762000
heap
page read and write
772000
unkown
page execute and read and write
2A52000
heap
page read and write
4EBE000
stack
page read and write
768000
unkown
page execute and read and write
EAA000
heap
page read and write
575F000
stack
page read and write
759000
unkown
page execute and read and write
401000
unkown
page execute read
7AE000
unkown
page execute and read and write
52B0000
remote allocation
page read and write
5765000
heap
page read and write
19C000
stack
page read and write
E1A000
heap
page read and write
4A63000
heap
page read and write
776000
unkown
page execute and read and write
DF6000
heap
page read and write
5160000
remote allocation
page read and write
401000
unkown
page execute read
598000
unkown
page execute and read and write
766000
unkown
page execute and read and write
9B000
stack
page read and write
772000
unkown
page execute and read and write
1D0000
heap
page read and write
CE0000
heap
page read and write
E5B000
heap
page read and write
BF0000
heap
page read and write
774000
unkown
page execute and read and write
C76000
heap
page read and write
55D000
unkown
page readonly
5160000
remote allocation
page read and write
76C000
unkown
page execute and read and write
E31000
heap
page read and write
CEB000
heap
page read and write
585000
unkown
page read and write
2A50000
heap
page read and write
766000
unkown
page execute and read and write
74F000
unkown
page execute and read and write
29DE000
stack
page read and write
EC0000
heap
page read and write
CBA000
heap
page read and write
4EFE000
stack
page read and write
565E000
stack
page read and write
2950000
direct allocation
page read and write
C5B000
heap
page read and write
585000
unkown
page write copy
C35000
heap
page read and write
2840000
direct allocation
page read and write
505E000
stack
page read and write
58A000
unkown
page readonly
19C000
stack
page read and write
F4C000
heap
page read and write
770000
unkown
page execute and read and write
28D0000
direct allocation
page read and write
2940000
heap
page read and write
29E0000
heap
page read and write
DCA000
heap
page read and write
78A000
unkown
page execute and read and write
550E000
stack
page read and write
C55000
heap
page read and write
D80000
direct allocation
page read and write
C41000
heap
page read and write
760000
unkown
page execute and read and write
2820000
heap
page read and write
CBF000
heap
page read and write
75E000
unkown
page execute and read and write
5760000
heap
page read and write
F20000
heap
page read and write
2840000
direct allocation
page read and write
55D000
unkown
page readonly
DA0000
direct allocation
page read and write
502F000
stack
page read and write
759000
unkown
page execute and read and write
CDF000
heap
page read and write
7B3000
unkown
page execute and read and write
EAB000
heap
page read and write
503E000
stack
page read and write
5160000
remote allocation
page read and write
980000
unkown
page execute read
589E000
stack
page read and write
E67000
heap
page read and write
CA6000
heap
page read and write
5160000
remote allocation
page read and write
751000
unkown
page execute and read and write
58A000
unkown
page readonly
782000
unkown
page execute and read and write
7B3000
unkown
page execute and read and write
D22000
heap
page read and write
EF5000
heap
page read and write
757000
unkown
page execute and read and write
5769000
heap
page read and write
4914000
heap
page read and write
2820000
heap
page read and write
564E000
stack
page read and write
759000
unkown
page execute and read and write
980000
unkown
page execute read
774000
unkown
page execute and read and write
C68000
heap
page read and write
4F1D000
stack
page read and write
751000
unkown
page execute and read and write
768000
unkown
page execute and read and write
D70000
heap
page read and write
515F000
stack
page read and write
980000
unkown
page execute read
74D000
unkown
page execute and read and write
52B0000
remote allocation
page read and write
58A000
unkown
page readonly
776000
unkown
page execute and read and write
574E000
stack
page read and write
565E000
stack
page read and write
596000
unkown
page write copy
C6D000
heap
page read and write
596000
unkown
page read and write
5160000
remote allocation
page read and write
DFB000
heap
page read and write
EBE000
heap
page read and write
EB4000
heap
page read and write
75E000
unkown
page execute and read and write
980000
unkown
page execute read
9B000
stack
page read and write
EAD000
heap
page read and write
C80000
heap
page read and write
74F000
unkown
page execute and read and write
760000
unkown
page execute and read and write
980000
unkown
page execute read
C60000
heap
page read and write
513F000
stack
page read and write
CD8000
heap
page read and write
770000
unkown
page execute and read and write
7AE000
unkown
page execute and read and write
4EBD000
stack
page read and write
4DBE000
stack
page read and write
4FFF000
stack
page read and write
E29000
heap
page read and write
76C000
unkown
page execute and read and write
D6E000
heap
page read and write
751000
unkown
page execute and read and write
C32000
heap
page read and write
7BB000
unkown
page execute and read and write
575F000
stack
page read and write
75E000
unkown
page execute and read and write
2840000
direct allocation
page read and write
400000
unkown
page readonly
E92000
heap
page read and write
19C000
stack
page read and write
BFE000
heap
page read and write
55D000
unkown
page readonly
C7E000
heap
page read and write
401000
unkown
page execute read
585000
unkown
page write copy
585000
unkown
page write copy
DC5000
heap
page read and write
751000
unkown
page execute and read and write
DC0000
heap
page read and write
776000
unkown
page execute and read and write
516F000
stack
page read and write
78A000
unkown
page execute and read and write
C8D000
heap
page read and write
295E000
stack
page read and write
400000
unkown
page readonly
4C3E000
stack
page read and write
4DBE000
stack
page read and write
DA0000
direct allocation
page read and write
7AE000
unkown
page execute and read and write
5160000
remote allocation
page read and write
1D5000
heap
page read and write
76A000
unkown
page execute and read and write
770000
unkown
page execute and read and write
513F000
stack
page read and write
52B0000
remote allocation
page read and write
585000
unkown
page read and write
4DEE000
stack
page read and write
760000
unkown
page execute and read and write
2740000
direct allocation
page read and write
EFF000
heap
page read and write
585000
unkown
page write copy
D44000
heap
page read and write
596000
unkown
page write copy
596000
unkown
page write copy
D27000
heap
page read and write
BF0000
heap
page read and write
4C3E000
stack
page read and write
768000
unkown
page execute and read and write
2840000
direct allocation
page read and write
CE2000
heap
page read and write
E60000
heap
page read and write
2B0E000
stack
page read and write
9B000
stack
page read and write
4ECD000
stack
page read and write
2840000
direct allocation
page read and write
2A59000
heap
page read and write
55D000
unkown
page readonly
401000
unkown
page execute read
E01000
heap
page read and write
598000
unkown
page execute and read and write
C95000
heap
page read and write
782000
unkown
page execute and read and write
564E000
stack
page read and write
4D7E000
stack
page read and write
76C000
unkown
page execute and read and write
58A000
unkown
page readonly
76A000
unkown
page execute and read and write
519E000
stack
page read and write
BF0000
heap
page read and write
574F000
stack
page read and write
CE3000
heap
page read and write
768000
unkown
page execute and read and write
D1C000
heap
page read and write
596000
unkown
page write copy
5170000
remote allocation
page read and write
766000
unkown
page execute and read and write
574F000
stack
page read and write
753000
unkown
page execute and read and write
E0F000
heap
page read and write
EC0000
heap
page read and write
58A000
unkown
page readonly
293E000
stack
page read and write
7B3000
unkown
page execute and read and write
D80000
heap
page read and write
576E000
heap
page read and write
78A000
unkown
page execute and read and write
598000
unkown
page execute and read and write
599F000
stack
page read and write
19C000
stack
page read and write
EF3000
heap
page read and write
D4C000
heap
page read and write
CDA000
heap
page read and write
C60000
direct allocation
page read and write
D60000
heap
page read and write
5160000
remote allocation
page read and write
28F0000
heap
page read and write
55D000
unkown
page readonly
772000
unkown
page execute and read and write
EA4000
heap
page read and write
753000
unkown
page execute and read and write
4CEE000
stack
page read and write
2820000
direct allocation
page read and write
CD2000
heap
page read and write
980000
unkown
page execute read
7AE000
unkown
page execute and read and write
C3C000
heap
page read and write
980000
unkown
page execute read
58A000
unkown
page readonly
2ACE000
stack
page read and write
EB5000
heap
page read and write
C2D000
heap
page read and write
980000
unkown
page execute read
5764000
heap
page read and write
7B3000
unkown
page execute and read and write
551E000
stack
page read and write
74D000
unkown
page execute and read and write
5170000
remote allocation
page read and write
768000
unkown
page execute and read and write
598000
unkown
page execute and read and write
760000
unkown
page execute and read and write
E7C000
heap
page read and write
D62000
heap
page read and write
596000
unkown
page write copy
5765000
heap
page read and write
55D000
unkown
page readonly
760000
unkown
page execute and read and write
9B000
stack
page read and write
D6B000
heap
page read and write
400000
unkown
page readonly
757000
unkown
page execute and read and write
D58000
heap
page read and write
299E000
stack
page read and write
529F000
stack
page read and write
550E000
stack
page read and write
CDE000
heap
page read and write
D79000
heap
page read and write
D62000
heap
page read and write
774000
unkown
page execute and read and write
753000
unkown
page execute and read and write
78A000
unkown
page execute and read and write
75E000
unkown
page execute and read and write
401000
unkown
page execute read
76A000
unkown
page execute and read and write
75E000
unkown
page execute and read and write
766000
unkown
page execute and read and write
DC0000
heap
page read and write
400000
unkown
page readonly
28B0000
heap
page read and write
D3E000
heap
page read and write
766000
unkown
page execute and read and write
C4B000
heap
page read and write
DA0000
direct allocation
page read and write
596000
unkown
page read and write
55D000
unkown
page readonly
BF0000
heap
page read and write
C59000
heap
page read and write
401000
unkown
page execute read
2980000
direct allocation
page read and write
CB6000
heap
page read and write
596000
unkown
page read and write
28C0000
heap
page read and write
D00000
heap
page read and write
4D8D000
stack
page read and write
C00000
heap
page read and write
74F000
unkown
page execute and read and write
D39000
heap
page read and write
2A40000
heap
page read and write
4DCE000
stack
page read and write
76A000
unkown
page execute and read and write
E14000
heap
page read and write
EDC000
heap
page read and write
DA0000
heap
page read and write
782000
unkown
page execute and read and write
400000
unkown
page readonly
772000
unkown
page execute and read and write
757000
unkown
page execute and read and write
D50000
heap
page read and write
58A000
unkown
page readonly
DA0000
direct allocation
page read and write
2A8E000
stack
page read and write
D61000
heap
page read and write
C77000
heap
page read and write
E97000
heap
page read and write
49F7000
heap
page read and write
401000
unkown
page execute read
2900000
direct allocation
page read and write
585000
unkown
page read and write
980000
unkown
page execute read
74D000
unkown
page execute and read and write
C40000
heap
page read and write
C76000
heap
page read and write
CB8000
heap
page read and write
76C000
unkown
page execute and read and write
772000
unkown
page execute and read and write
CD0000
heap
page read and write
561F000
stack
page read and write
4F0E000
stack
page read and write
CDE000
heap
page read and write
DEE000
heap
page read and write
2840000
direct allocation
page read and write
D29000
heap
page read and write
5760000
heap
page read and write
C95000
heap
page read and write
514F000
stack
page read and write
751000
unkown
page execute and read and write
4D7D000
stack
page read and write
C46000
heap
page read and write
55D000
unkown
page readonly
C50000
heap
page read and write
28D0000
heap
page read and write
EC5000
heap
page read and write
7B3000
unkown
page execute and read and write
2980000
direct allocation
page read and write
74D000
unkown
page execute and read and write
293E000
stack
page read and write
C85000
heap
page read and write
2860000
direct allocation
page read and write
550E000
stack
page read and write
4E1E000
stack
page read and write
400000
unkown
page readonly
F4E000
heap
page read and write
980000
unkown
page execute read
2810000
heap
page read and write
58A000
unkown
page readonly
EB1000
heap
page read and write
C00000
heap
page read and write
4FFF000
stack
page read and write
7AE000
unkown
page execute and read and write
CA1000
heap
page read and write
400000
unkown
page readonly
C87000
heap
page read and write
D0E000
heap
page read and write
CD0000
heap
page read and write
CF0000
heap
page read and write
504E000
stack
page read and write
753000
unkown
page execute and read and write
501E000
stack
page read and write
E37000
heap
page read and write
770000
unkown
page execute and read and write
C87000
heap
page read and write
4C7E000
stack
page read and write
4EFE000
stack
page read and write
4C8E000
stack
page read and write
2740000
direct allocation
page read and write
2A3E000
stack
page read and write
There are 480 hidden memdumps, click here to show them.