IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://db-ip.com/demo/home.php?s=191.96.227.219/
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219m
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219(
unknown
https://ipinfo.io/widget/demo/191.96.227.219u
unknown
https://ipinfo.io/widget/demo/191.96.227.219
34.117.186.192
https://db-ip.com/demo/home.php?s=191.96.227.219%
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://www.microsoft.co
unknown
https://db-ip.com/
unknown
https://t.me/RiseProSUPPORTj
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://ipinfo.io/widget/demo/191.96.227.219~r
unknown
https://t.me/RiseProSUPPORT
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219
104.26.4.15
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://db-ip.co
unknown
https://db-ip.com/demo/home.php?s=191.96.227.2197
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219Bh
unknown
https://ipinfo.io:443/widget/demo/191.96.227.219
unknown
https://t.me/RiseProSUPPORTY
unknown
https://ipinfo.io:443/widget/demo/191.96.227.219_
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219O
unknown
https://db-ip.com:443/demo/home.php?s=191.96.227.219P
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219K
unknown
https://ipinfo.io/
unknown
https://db-ip.com/demo/home.php?s=191.96.227.2197g
unknown
http://pki-ocsp.symauth.com0
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://db-ip.com/v
unknown
https://db-ip.com:443/demo/home.php?s=191.96.227.219
unknown
http://www.winimage.com/zLibDll
unknown
https://ipinfo.io/jX
unknown
https://db-ip.com/M
unknown
https://ipinfo.io/widget/demo/191.96.227.219F
unknown
https://t.me/RiseProSUPPORTq7
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
1DC0000
heap
page read and write
800000
unkown
page execute and read and write
14A0000
heap
page read and write
395E000
stack
page read and write
408E000
stack
page read and write
717F000
stack
page read and write
142A000
heap
page read and write
7F6E0000
direct allocation
page execute and read and write
146B000
heap
page read and write
1C23000
heap
page read and write
3DBF000
stack
page read and write
11F0000
remote allocation
page read and write
3B00000
direct allocation
page execute and read and write
7F890000
direct allocation
page execute and read and write
3B2E000
stack
page read and write
646C000
heap
page read and write
612000
unkown
page execute and write copy
E37000
unkown
page execute and write copy
37F0000
heap
page read and write
481000
unkown
page execute and read and write
30C0000
heap
page read and write
1E4B000
heap
page read and write
15E2000
heap
page read and write
C91000
unkown
page execute and write copy
E34000
unkown
page readonly
6A63000
heap
page read and write
61C000
unkown
page readonly
34B4000
direct allocation
page execute and read and write
F81000
unkown
page execute and read and write
3784000
direct allocation
page execute and read and write
16B000
stack
page read and write
800000
unkown
page execute and read and write
13D7000
heap
page read and write
38B0000
heap
page read and write
1407000
heap
page read and write
1280000
heap
page read and write
1560000
heap
page read and write
34A3000
direct allocation
page execute and read and write
1285000
heap
page read and write
7F570000
direct allocation
page execute and read and write
654E000
stack
page read and write
21DE000
stack
page read and write
39FE000
unkown
page read and write
3784000
direct allocation
page execute and read and write
2FA0000
direct allocation
page execute and read and write
13F1000
heap
page read and write
13AA000
heap
page read and write
61C000
unkown
page readonly
35D0000
heap
page read and write
15C3000
heap
page read and write
E22000
unkown
page execute and read and write
34B0000
direct allocation
page execute and read and write
716E000
stack
page read and write
621000
unkown
page readonly
1C9E000
stack
page read and write
3EA4000
direct allocation
page execute and read and write
6D7E000
stack
page read and write
13B8000
heap
page read and write
627000
unkown
page execute and write copy
E22000
unkown
page execute and write copy
B17000
unkown
page execute and read and write
13A0000
heap
page read and write
3484000
direct allocation
page execute and read and write
3170000
direct allocation
page execute and read and write
1D60000
heap
page read and write
1DB8000
heap
page read and write
612000
unkown
page execute and write copy
3498000
direct allocation
page execute and read and write
6DCF000
stack
page read and write
3784000
direct allocation
page execute and read and write
7B7F000
stack
page read and write
3470000
direct allocation
page execute and read and write
777F000
stack
page read and write
41B0000
heap
page read and write
2F4E000
stack
page read and write
14C2000
heap
page read and write
13BC000
heap
page read and write
E22000
unkown
page execute and read and write
141B000
heap
page read and write
5F4000
unkown
page readonly
DBC000
unkown
page execute and read and write
1DC2000
heap
page read and write
480000
unkown
page readonly
627000
unkown
page execute and read and write
14C1000
heap
page read and write
306E000
stack
page read and write
3474000
direct allocation
page execute and read and write
15CC000
unkown
page execute and read and write
3DF0000
heap
page read and write
5E2000
unkown
page execute and read and write
612000
unkown
page execute and read and write
34C0000
direct allocation
page execute and read and write
33E0000
heap
page read and write
602000
unkown
page execute and read and write
11F0000
remote allocation
page read and write
6F6F000
stack
page read and write
480000
unkown
page readonly
3ACE000
stack
page read and write
35C0000
heap
page read and write
6F6E000
stack
page read and write
3380000
heap
page read and write
1B90000
remote allocation
page read and write
11F0000
remote allocation
page read and write
602000
unkown
page execute and write copy
1D1A000
heap
page read and write
1D0F000
heap
page read and write
3BB0000
heap
page read and write
14B7000
heap
page read and write
156E000
heap
page read and write
39B0000
heap
page read and write
143C000
stack
page read and write
DB9000
unkown
page execute and write copy
2FEE000
stack
page read and write
33B0000
heap
page read and write
610D000
stack
page read and write
3A7E000
stack
page read and write
3784000
direct allocation
page execute and read and write
DB9000
unkown
page execute and write copy
C91000
unkown
page execute and read and write
2F60000
heap
page read and write
AE7000
unkown
page execute and read and write
757000
unkown
page execute and read and write
658E000
stack
page read and write
757000
unkown
page execute and read and write
607F000
heap
page read and write
6B6F000
stack
page read and write
7EE50000
direct allocation
page execute and read and write
1DAF000
heap
page read and write
1CFE000
stack
page read and write
33C0000
heap
page read and write
6979000
heap
page read and write
6F7F000
stack
page read and write
627000
unkown
page execute and read and write
13C3000
heap
page read and write
156A000
heap
page read and write
3484000
direct allocation
page execute and read and write
602000
unkown
page execute and read and write
1DF1000
heap
page read and write
6A71000
heap
page read and write
1AB000
stack
page read and write
15BC000
heap
page read and write
E37000
unkown
page execute and write copy
451000
unkown
page execute and write copy
39AE000
stack
page read and write
1443000
heap
page read and write
3CCF000
stack
page read and write
3F74000
direct allocation
page execute and read and write
3798000
direct allocation
page execute and read and write
460000
remote allocation
page read and write
3BC0000
direct allocation
page execute and read and write
771000
unkown
page execute and read and write
1490000
heap
page read and write
1B20000
heap
page read and write
3C00000
direct allocation
page execute and read and write
3EA4000
direct allocation
page execute and read and write
5D2000
unkown
page execute and read and write
437F000
stack
page read and write
34B4000
direct allocation
page execute and read and write
13B2000
heap
page read and write
3700000
heap
page read and write
736E000
stack
page read and write
1D6A000
heap
page read and write
E2C000
unkown
page readonly
15CC000
unkown
page execute and write copy
221E000
stack
page read and write
34B4000
direct allocation
page execute and read and write
1C60000
remote allocation
page read and write
3D8D000
stack
page read and write
621000
unkown
page readonly
3B6E000
stack
page read and write
5DA000
unkown
page execute and write copy
621000
unkown
page readonly
1D01000
heap
page read and write
123B000
stack
page read and write
1D35000
heap
page read and write
35B0000
heap
page read and write
13DD000
heap
page read and write
34A4000
direct allocation
page execute and read and write
1D38000
heap
page read and write
3400000
heap
page read and write
3EA4000
direct allocation
page execute and read and write
3EB0000
direct allocation
page execute and read and write
15CC000
unkown
page execute and read and write
1C3E000
stack
page read and write
DEA000
unkown
page execute and write copy
C90000
unkown
page readonly
1CB0000
heap
page read and write
145A000
heap
page read and write
6FAE000
stack
page read and write
C90000
unkown
page readonly
5F7000
unkown
page execute and write copy
5F4000
unkown
page readonly
3F74000
direct allocation
page execute and read and write
419D000
stack
page read and write
5F8A000
heap
page read and write
E31000
unkown
page readonly
1D13000
heap
page read and write
1250000
heap
page read and write
13E4000
heap
page read and write
756F000
stack
page read and write
D89000
unkown
page execute and write copy
1DDC000
heap
page read and write
164E000
heap
page read and write
1BF5000
heap
page read and write
1DC8000
heap
page read and write
13C8000
heap
page read and write
302E000
stack
page read and write
5FCD000
heap
page read and write
2F70000
heap
page read and write
69CE000
stack
page read and write
E2C000
unkown
page readonly
366E000
stack
page read and write
6FBF000
stack
page read and write
6A36000
heap
page read and write
215D000
stack
page read and write
3EB8000
direct allocation
page execute and read and write
11CC000
stack
page read and write
1423000
heap
page read and write
1285000
heap
page read and write
3784000
direct allocation
page execute and read and write
5F7000
unkown
page execute and read and write
142E000
heap
page read and write
3484000
direct allocation
page execute and read and write
3473000
direct allocation
page execute and read and write
C91000
unkown
page execute and read and write
DBC000
unkown
page execute and read and write
15CC000
unkown
page execute and write copy
737D000
stack
page read and write
1CC0000
heap
page read and write
3F74000
direct allocation
page execute and read and write
3E6E000
stack
page read and write
DBC000
unkown
page execute and write copy
1A40000
heap
page read and write
C90000
unkown
page readonly
3FBF000
stack
page read and write
1B90000
remote allocation
page read and write
5E2000
unkown
page execute and write copy
1CC7000
heap
page read and write
3460000
heap
page read and write
1C20000
heap
page read and write
451000
unkown
page execute and read and write
612000
unkown
page execute and read and write
E22000
unkown
page execute and write copy
771000
unkown
page execute and read and write
143D000
heap
page read and write
5D2000
unkown
page execute and write copy
3CC0000
direct allocation
page execute and read and write
496F000
stack
page read and write
1280000
heap
page read and write
3E0D000
stack
page read and write
1B6D000
stack
page read and write
34C8000
direct allocation
page execute and read and write
1210000
heap
page read and write
2F63000
heap
page read and write
481000
unkown
page execute and write copy
1C60000
remote allocation
page read and write
417F000
stack
page read and write
1450000
heap
page read and write
797F000
stack
page read and write
624000
unkown
page readonly
696F000
stack
page read and write
757000
unkown
page execute and read and write
BA0000
heap
page read and write
1C30000
direct allocation
page execute and read and write
1D33000
heap
page read and write
624000
unkown
page readonly
E34000
unkown
page readonly
13AF000
heap
page read and write
1220000
heap
page read and write
3ABE000
stack
page read and write
377E000
stack
page read and write
14BF000
heap
page read and write
159C000
heap
page read and write
3DD0000
heap
page read and write
1360000
heap
page read and write
1BF0000
heap
page read and write
1649000
heap
page read and write
3A3E000
stack
page read and write
727000
unkown
page execute and read and write
5FC5000
heap
page read and write
1D0000
heap
page read and write
C80000
heap
page read and write
3740000
direct allocation
page execute and read and write
3EA0000
direct allocation
page execute and read and write
E12000
unkown
page execute and read and write
E34000
unkown
page readonly
1D3D000
heap
page read and write
36FD000
stack
page read and write
60B7000
heap
page read and write
480000
unkown
page readonly
3A80000
remote allocation
page read and write
624000
unkown
page readonly
15C0000
heap
page read and write
3F80000
direct allocation
page execute and read and write
6A28000
heap
page read and write
1D6D000
heap
page read and write
F67000
unkown
page execute and read and write
796F000
stack
page read and write
E31000
unkown
page readonly
3EC0000
heap
page read and write
776F000
stack
page read and write
741000
unkown
page execute and read and write
34B4000
direct allocation
page execute and read and write
15C8000
heap
page read and write
1250000
heap
page read and write
602000
unkown
page execute and write copy
141F000
heap
page read and write
7D0000
unkown
page execute and read and write
61C000
unkown
page readonly
3E10000
heap
page read and write
1010000
unkown
page execute and read and write
3F88000
direct allocation
page execute and read and write
634E000
stack
page read and write
3E93000
direct allocation
page execute and read and write
1D1F000
heap
page read and write
153D000
stack
page read and write
1D20000
heap
page read and write
B17000
unkown
page execute and read and write
3EA4000
direct allocation
page execute and read and write
3270000
heap
page read and write
69BD000
stack
page read and write
1DD4000
heap
page read and write
621000
unkown
page readonly
481000
unkown
page execute and write copy
65BF000
stack
page read and write
627000
unkown
page execute and write copy
1C60000
remote allocation
page read and write
41A0000
heap
page read and write
450000
unkown
page readonly
420000
heap
page read and write
3913000
heap
page read and write
F67000
unkown
page execute and read and write
1C2E000
stack
page read and write
757000
unkown
page execute and read and write
1DAA000
heap
page read and write
15DD000
heap
page read and write
136E000
heap
page read and write
C91000
unkown
page execute and write copy
1D10000
heap
page read and write
E12000
unkown
page execute and write copy
3790000
direct allocation
page execute and read and write
1448000
heap
page read and write
1459000
heap
page read and write
1D53000
heap
page read and write
6434000
heap
page read and write
20BD000
stack
page read and write
627000
unkown
page execute and read and write
3EA4000
direct allocation
page execute and read and write
678F000
stack
page read and write
3F70000
direct allocation
page execute and read and write
6D6F000
stack
page read and write
3EA4000
direct allocation
page execute and read and write
1431000
heap
page read and write
1411000
heap
page read and write
6D6E000
stack
page read and write
1213000
heap
page read and write
33F0000
heap
page read and write
B75000
heap
page read and write
1DCB000
heap
page read and write
3798000
direct allocation
page execute and read and write
13D7000
heap
page read and write
800000
unkown
page execute and read and write
3774000
direct allocation
page execute and read and write
15E7000
heap
page read and write
800000
unkown
page execute and read and write
175D000
stack
page read and write
477F000
stack
page read and write
E34000
unkown
page readonly
3498000
direct allocation
page execute and read and write
3784000
direct allocation
page execute and read and write
1D49000
heap
page read and write
34B4000
direct allocation
page execute and read and write
3EA0000
heap
page read and write
1428000
heap
page read and write
139E000
stack
page read and write
140A000
heap
page read and write
415E000
stack
page read and write
6987000
heap
page read and write
3470000
direct allocation
page execute and read and write
3484000
direct allocation
page execute and read and write
1BFB000
stack
page read and write
369E000
stack
page read and write
14ED000
stack
page read and write
3F74000
direct allocation
page execute and read and write
E2C000
unkown
page readonly
139C000
heap
page read and write
3EB0000
heap
page read and write
627000
unkown
page execute and read and write
3400000
heap
page read and write
1DD6000
heap
page read and write
460000
remote allocation
page read and write
E37000
unkown
page execute and read and write
314E000
stack
page read and write
F81000
unkown
page execute and read and write
3F63000
direct allocation
page execute and read and write
17CD000
stack
page read and write
396E000
stack
page read and write
C8B000
stack
page read and write
B70000
heap
page read and write
3280000
direct allocation
page execute and read and write
5AA000
unkown
page execute and write copy
1C10000
heap
page read and write
1DA3000
heap
page read and write
14F0000
heap
page read and write
481000
unkown
page execute and read and write
5DA000
unkown
page execute and write copy
3410000
direct allocation
page execute and read and write
46E000
stack
page read and write
6A39000
heap
page read and write
3A2A000
heap
page read and write
32D0000
direct allocation
page execute and read and write
497F000
stack
page read and write
13D5000
heap
page read and write
3F74000
direct allocation
page execute and read and write
5F8D000
heap
page read and write
6BCF000
unkown
page read and write
3DE0000
heap
page read and write
3A21000
heap
page read and write
1D06000
heap
page read and write
15C9000
unkown
page execute and write copy
771000
unkown
page execute and read and write
5EDB000
heap
page read and write
3E60000
direct allocation
page execute and read and write
5EC000
unkown
page readonly
1645000
heap
page read and write
1327000
unkown
page execute and read and write
1327000
unkown
page execute and read and write
15AA000
heap
page read and write
40DD000
stack
page read and write
3F64000
direct allocation
page execute and read and write
5F1000
unkown
page readonly
71BF000
stack
page read and write
6DBE000
stack
page read and write
3BAE000
stack
page read and write
5F1000
unkown
page readonly
3484000
direct allocation
page execute and read and write
6431000
heap
page read and write
13FD000
heap
page read and write
3EB8000
direct allocation
page execute and read and write
460000
remote allocation
page read and write
897000
unkown
page execute and read and write
143B000
heap
page read and write
3F30000
direct allocation
page execute and read and write
3860000
direct allocation
page execute and read and write
3ECF000
stack
page read and write
480000
unkown
page readonly
3F88000
direct allocation
page execute and read and write
1A2C000
stack
page read and write
DBC000
unkown
page execute and write copy
6BBF000
unkown
page read and write
3910000
heap
page read and write
3640000
direct allocation
page execute and read and write
2F90000
heap
page read and write
E2C000
unkown
page readonly
14F5000
heap
page read and write
757F000
stack
page read and write
1471000
heap
page read and write
3440000
heap
page read and write
3A80000
remote allocation
page read and write
3784000
direct allocation
page execute and read and write
624000
unkown
page readonly
607C000
heap
page read and write
6382000
heap
page read and write
1D15000
heap
page read and write
D8C000
unkown
page execute and read and write
E31000
unkown
page readonly
3F74000
direct allocation
page execute and read and write
3DCE000
stack
page read and write
1B90000
remote allocation
page read and write
E37000
unkown
page execute and read and write
61C000
unkown
page readonly
1416000
heap
page read and write
1260000
direct allocation
page execute and read and write
3484000
direct allocation
page execute and read and write
38FE000
stack
page read and write
E12000
unkown
page execute and read and write
15DF000
heap
page read and write
2FAE000
unkown
page read and write
37BD000
stack
page read and write
630E000
stack
page read and write
15BE000
heap
page read and write
136A000
heap
page read and write
3590000
heap
page read and write
67BF000
stack
page read and write
140E000
heap
page read and write
476F000
stack
page read and write
1DB2000
heap
page read and write
3EA4000
direct allocation
page execute and read and write
33D0000
heap
page read and write
B2B000
stack
page read and write
1DE3000
heap
page read and write
3F74000
direct allocation
page execute and read and write
3440000
direct allocation
page execute and read and write
67CE000
stack
page read and write
1230000
direct allocation
page execute and read and write
5EC000
unkown
page readonly
3A5D000
stack
page read and write
3484000
direct allocation
page execute and read and write
15F0000
heap
page read and write
15C9000
unkown
page execute and write copy
1D35000
heap
page read and write
71AF000
stack
page read and write
219E000
unkown
page read and write
D8C000
unkown
page execute and write copy
E31000
unkown
page readonly
1010000
unkown
page execute and read and write
771000
unkown
page execute and read and write
1E0000
heap
page read and write
3490000
direct allocation
page execute and read and write
3780000
direct allocation
page execute and read and write
3A03000
heap
page read and write
11CC000
stack
page read and write
13D0000
heap
page read and write
373E000
stack
page read and write
3E94000
direct allocation
page execute and read and write
19DC000
stack
page read and write
43D000
stack
page read and write
3A00000
heap
page read and write
15AF000
heap
page read and write
34C8000
direct allocation
page execute and read and write
15B8000
heap
page read and write
410000
heap
page read and write
15C5000
heap
page read and write
1CB0000
heap
page read and write
1632000
heap
page read and write
3773000
direct allocation
page execute and read and write
E12000
unkown
page execute and write copy
676E000
stack
page read and write
63BE000
stack
page read and write
C90000
unkown
page readonly
13BE000
heap
page read and write
1E47000
heap
page read and write
34B4000
direct allocation
page execute and read and write
7F1E0000
direct allocation
page execute and read and write
450000
unkown
page readonly
DEA000
unkown
page execute and write copy
1CF6000
heap
page read and write
3A80000
remote allocation
page read and write
6A2B000
heap
page read and write
34B4000
direct allocation
page execute and read and write
3480000
direct allocation
page execute and read and write
310E000
unkown
page read and write
There are 532 hidden memdumps, click here to show them.