Техническая информация
- [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] 'RageMP131' = '%LOCALAPPDATA%\RageMP131\RageMP131.exe'
- <SYSTEM32>\tasks\mpgph131 hr
- <SYSTEM32>\tasks\mpgph131 lg
- <SYSTEM32>\tasks\explorhe.exe
- %APPDATA%\mozilla\firefox\profiles.ini
- %APPDATA%\mozilla\firefox\profiles\m15ucxjx.default\signons.sqlite
- %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\signons.sqlite
- %APPDATA%\thunderbird\profiles.ini
- %APPDATA%\thunderbird\profiles\hmz1jddi.default\signons.sqlite
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %LOCALAPPDATA%\google\chrome\user data\default\web data
- %APPDATA%\thunderbird\profiles\chdgbv82.default-release\signons.sqlite
- %LOCALAPPDATA%\google\chrome\user data\default\cookies
- %TEMP%\f59e91f8
- %TEMP%\joba4uhvhjplwo_krc\1cgxtrutz2u37jouey1h.exe
- %TEMP%\joba4uhvhjplwo_krc\yhji9g0qfiqaa7fy8va_.exe
- %TEMP%\joba4uhvhjplwo_krc\st0nwtgbbeqxul9fwubp.exe
- %TEMP%\d887ceb89d\explorhe.exe
- %TEMP%\joba4uhvhjplwo_krc\8sgiayu5ym2nuuo5k5op.exe
- %TEMP%\joba4uhvhjplwo_krc\dbskk6_mzix0rpyfuiys.exe
- %TEMP%\main\file.bin
- %TEMP%\main\killduplicate.cmd
- %TEMP%\main\main.bat
- %TEMP%\main\7z.dll
- %APPDATA%\006700e5a2ab05\cred64.dll
- %TEMP%\main\extracted\file_1.zip
- %APPDATA%\006700e5a2ab05\clip64.dll
- %TEMP%\main\extracted\file_9.zip
- %TEMP%\main\extracted\antiav.data
- %TEMP%\main\extracted\file_8.zip
- %TEMP%\main\extracted\file_7.zip
- %TEMP%\main\extracted\file_6.zip
- %TEMP%\main\extracted\file_5.zip
- %TEMP%\main\extracted\file_4.zip
- %TEMP%\main\extracted\file_3.zip
- %TEMP%\main\extracted\file_2.zip
- %TEMP%\joba4uhvhjplwo_krc\9qq8cpaulffpzxnun7q4.exe
- %TEMP%\main\7z.exe
- %LOCALAPPDATA%\microsoft\vault\4bf4c442-9b8a-41a0-b380-dd4a704ddb28\policy.vpol
- %TEMP%\joba4uhvhjplwo_krc\kvhrxj77cmugplaces.sqlite
- %LOCALAPPDATA%\ragemp131\ragemp131.exe
- %ALLUSERSPROFILE%\mpgph131\mpgph131.exe
- %TEMP%\rage131mp.tmp
- %TEMP%\joba4uhvhjplwo_krc\d87fzn3r3jfeformhistory.sqlite
- %TEMP%\joba4uhvhjplwo_krc\02zdbxl47cvzplaces.sqlite
- %TEMP%\joba4uhvhjplwo_krc\3b6n2xdh3cywcookies.sqlite
- %TEMP%\joba4uhvhjplwo_krc\5lop_s5wm5erplaces.sqlite
- %TEMP%\joba4uhvhjplwo_krc\ei8dramayu9klogin data
- %TEMP%\joba4uhvhjplwo_krc\d87fzn3r3jfeweb data
- %TEMP%\joba4uhvhjplwo_krc\qdx9itdlycrbformhistory.sqlite
- %TEMP%\joba4uhvhjplwo_krc\02zdbxl47cvzhistory
- %TEMP%\joba3uhvhjplwo_krc\information.txt
- %TEMP%\joba4uhvhjplwo_krc\3b6n2xdh3cywweb data
- %TEMP%\joba4uhvhjplwo_krc\5lop_s5wm5ercookies
- %TEMP%\joba4uhvhjplwo_krc\iwpfiaxutjtshistory
- %TEMP%\joba4uhvhjplwo_krc\qdx9itdlycrbweb data
- %TEMP%\joba4uhvhjplwo_krc\jx0oqi4nztiqcookies.sqlite
- %TEMP%\joba4uhvhjplwo_krc\upg2lopxwc7oplaces.sqlite
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\policy.vpol
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\3ccd5499-87a8-4b10-a215-608888dd3b55.vsch
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\2f1a6504-0641-44cf-8bb5-3612d865f2e5.vsch
- %TEMP%\joba3uhvhjplwo_krc\passwords.txt
- %TEMP%\sxhufb0zcmhl5ufofdu2h7p4zeu55rtn.zip
- %TEMP%\main\extracted\xfak7rc2feen35y8o.exe
- %TEMP%\main\killduplicate.cmd
- %TEMP%\main\xfak7rc2feen35y8o.exe
- %TEMP%\joba4uhvhjplwo_krc\d87fzn3r3jfeformhistory.sqlite
- %TEMP%\main\extracted\file_7.zip
- %TEMP%\main\extracted\file_6.zip
- %TEMP%\main\extracted\file_5.zip
- %TEMP%\main\extracted\file_4.zip
- %TEMP%\main\extracted\file_3.zip
- %TEMP%\main\extracted\file_2.zip
- %TEMP%\main\extracted\file_1.zip
- %TEMP%\sxhufb0zcmhl5ufofdu2h7p4zeu55rtn.zip
- %TEMP%\joba4uhvhjplwo_krc\upg2lopxwc7oplaces.sqlite
- %TEMP%\joba4uhvhjplwo_krc\jx0oqi4nztiqcookies.sqlite
- %TEMP%\main\extracted\file_8.zip
- %TEMP%\joba4uhvhjplwo_krc\kvhrxj77cmugplaces.sqlite
- %TEMP%\joba4uhvhjplwo_krc\iwpfiaxutjtshistory
- %TEMP%\joba4uhvhjplwo_krc\5lop_s5wm5ercookies
- %TEMP%\joba4uhvhjplwo_krc\3b6n2xdh3cywweb data
- %TEMP%\joba4uhvhjplwo_krc\02zdbxl47cvzhistory
- %TEMP%\joba4uhvhjplwo_krc\qdx9itdlycrbformhistory.sqlite
- %TEMP%\joba4uhvhjplwo_krc\d87fzn3r3jfeweb data
- %TEMP%\joba4uhvhjplwo_krc\ei8dramayu9klogin data
- %TEMP%\joba4uhvhjplwo_krc\5lop_s5wm5erplaces.sqlite
- %TEMP%\joba4uhvhjplwo_krc\3b6n2xdh3cywcookies.sqlite
- %TEMP%\joba4uhvhjplwo_krc\02zdbxl47cvzplaces.sqlite
- %TEMP%\joba4uhvhjplwo_krc\qdx9itdlycrbweb data
- %TEMP%\main\extracted\file_9.zip
- %TEMP%\main\file.bin в %TEMP%\main\file.zip
- %TEMP%\main\extracted\xfak7rc2feen35y8o.exe в %TEMP%\main\xfak7rc2feen35y8o.exe
- %TEMP%\main\file.bin
- '19#.#33.132.62':50500
- 'ip##fo.io':443
- 'db##p.com':443
- 'ma##ind.com':80
- '10#.#07.182.3':80
- '18#.#15.113.68':80
- http://www.ma##ind.com/geoip/v2.1/city/me
- http://10#.#07.182.3/cost/go.exe
- http://18#.#15.113.68/mine/amer.exe
- http://10#.#07.182.3/cost/nika.exe
- http://10#.#07.182.3/cost/vimu.exe
- http://10#.#07.182.3/cost/networ.exe
- http://10#.#07.182.3/cost/num.exe
- http://18#.#15.113.68/theme/Plugins/cred64.dll
- http://18#.#15.113.68/theme/Plugins/clip64.dll
- http://18#.#15.113.68/theme/index.php
- '19#.#33.132.62':50500
- 'ip##fo.io':443
- 'db##p.com':443
- DNS ASK ip##fo.io
- DNS ASK db##p.com
- DNS ASK ma##ind.com
- '%TEMP%\joba4uhvhjplwo_krc\9qq8cpaulffpzxnun7q4.exe'
- '%TEMP%\main\7z.exe' e extracted/file_9.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_2.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_3.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_4.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_5.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_6.zip -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_7.zip -oextracted
- '%TEMP%\main\7z.exe' e file.zip -p4632370330209207692137030328 -oextracted
- '%TEMP%\main\7z.exe' e extracted/file_8.zip -oextracted
- '%TEMP%\joba4uhvhjplwo_krc\dbskk6_mzix0rpyfuiys.exe'
- '%TEMP%\joba4uhvhjplwo_krc\8sgiayu5ym2nuuo5k5op.exe'
- '%TEMP%\d887ceb89d\explorhe.exe'
- '%TEMP%\joba4uhvhjplwo_krc\st0nwtgbbeqxul9fwubp.exe'
- '%TEMP%\joba4uhvhjplwo_krc\yhji9g0qfiqaa7fy8va_.exe'
- '%TEMP%\joba4uhvhjplwo_krc\1cgxtrutz2u37jouey1h.exe'
- '%TEMP%\main\xfak7rc2feen35y8o.exe'
- '%TEMP%\main\7z.exe' e extracted/file_1.zip -oextracted
- '%WINDIR%\syswow64\rundll32.exe' %APPDATA%\006700e5a2ab05\clip64.dll, Main' (со скрытым окном)
- '%TEMP%\d887ceb89d\explorhe.exe' ' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "%TEMP%\d887ceb89d\explorhe.exe" /F' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\main\main.bat" /S"' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /create /f /RU "user" /tr "%ALLUSERSPROFILE%\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera_crashreporter.exe' -noautoupdate --ran-launcher -- https://www.facebook.com/login /crash-reporter-parent-id=2768
- '<SYSTEM32>\taskeng.exe' {007BE5C5-C11C-43F2-9139-0F2D6452130E} S-1-5-21-3150914307-1777937420-491476919-1000:awhqidd\user:Interactive:[1]
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' -noautoupdate --ran-launcher -- https://www.youtube.com/
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' -noautoupdate --ran-launcher -- https://www.facebook.com/login
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera.exe' -noautoupdate --ran-launcher -- https://accounts.google.com/
- '<SYSTEM32>\attrib.exe' +H "xfAk7rC2FeEN35Y8o.exe"
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera_crashreporter.exe' -noautoupdate --ran-launcher -- https://accounts.google.com/ /crash-reporter-parent-id=680
- '%WINDIR%\syswow64\rundll32.exe' %APPDATA%\006700e5a2ab05\clip64.dll, Main
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\main\main.bat" /S"
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "%TEMP%\d887ceb89d\explorhe.exe" /F
- '%ProgramFiles(x86)%\opera\launcher.exe' -noautoupdate -- "https://accounts.google.com/"
- '%ProgramFiles(x86)%\opera\launcher.exe' -noautoupdate -- "https://www.facebook.com/login"
- '%ProgramFiles(x86)%\opera\launcher.exe' -noautoupdate -- "https://www.youtube.com/"
- '%WINDIR%\syswow64\schtasks.exe' /create /f /RU "user" /tr "%ALLUSERSPROFILE%\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
- '<SYSTEM32>\mode.com' 65,10
- '%ProgramFiles(x86)%\opera\29.0.1795.47\opera_crashreporter.exe' -noautoupdate --ran-launcher -- https://www.youtube.com/ /crash-reporter-parent-id=2796