IOC Report
nRGKqzVQRt.exe

loading gif

Files

File Path
Type
Category
Malicious
nRGKqzVQRt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_96cca49e4bf4c34aa7c2fc23543654f721481d5_34ddec4d_08310f16-b122-4177-906b-6fa498f8123b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_a79f8132bcca3db4bb8567b6b2e85625dcb38718_34ddec4d_bbfd8e7e-5e70-4d31-a4e6-19ea7dc199a6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_b852f8d9db928673607680cdcdacfddad4b1959_34ddec4d_05259ca6-5fda-47fb-ab1d-47161bf9fb00\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_b852f8d9db928673607680cdcdacfddad4b1959_34ddec4d_8abba573-3b10-4949-bccc-6f9c0a241678\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_b852f8d9db928673607680cdcdacfddad4b1959_34ddec4d_c90bd162-8e24-4dab-882c-185572e12616\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_b852f8d9db928673607680cdcdacfddad4b1959_34ddec4d_c90fdb66-40d1-4f87-8995-8ec3b1052dc7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_b852f8d9db928673607680cdcdacfddad4b1959_34ddec4d_d5e694f9-d00b-44c6-955c-c0802dc13cf9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nRGKqzVQRt.exe_b852f8d9db928673607680cdcdacfddad4b1959_34ddec4d_edc95a15-6c1f-41e1-bf28-6f154e4f01fb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\soft[1]
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\dll[1]
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DV9E5wt3wGZ3\Bunifu_UI_v1.5.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DV9E5wt3wGZ3\Y-Cleaner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER206B.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2137.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2167.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER233A.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER23F6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2416.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER25D9.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2638.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2658.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29A2.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A20.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A50.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DC9.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E47.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E67.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3069.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER30F6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3193.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADC6.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAEE1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF10.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB9AD.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA2B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA5B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\key[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\name[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\add[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\Desktop\Cleaner.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Tue Oct 8 01:24:39 2024, mtime=Tue Oct 8 01:24:39 2024, atime=Tue Oct 8 01:24:39 2024, length=1502720, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nRGKqzVQRt.exe
"C:\Users\user\Desktop\nRGKqzVQRt.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 732
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 772
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 772
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 792
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 528
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 1016
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 1468
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 1292

URLs

Name
IP
Malicious
http://80.66.75.114/dll/key
80.66.75.114
http://80.66.75.114/dll/downloadG
unknown
http://80.66.75.114/files/download
80.66.75.114
http://80.66.75.114/dll/download
80.66.75.114
https://g-cleanit.hk
unknown
http://upx.sf.net
unknown
http://80.66.75.114/dll/downloadC
unknown
http://80.66.75.114/soft/download
80.66.75.114
http://80.66.75.114/dll/key%S
unknown
http://80.66.75.114/name
80.66.75.114
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
unknown
http://80.66.75.114/add?substr=mixnine&s=three&sub=NOSUB
80.66.75.114
https://iplogger.org/1Pz8p7
unknown
http://80.66.75.114/name5o1
unknown
http://80.66.75.114/soft/download?
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
80.66.75.114
unknown
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
ProgramId
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
FileId
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
LowerCaseLongPath
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
LongPathHash
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
Name
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
OriginalFileName
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
Publisher
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
Version
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
BinFileVersion
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
BinaryType
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
ProductName
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
ProductVersion
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
LinkDate
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
BinProductVersion
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
AppxPackageFullName
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
AppxPackageRelativeId
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
Size
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
Language
\REGISTRY\A\{67f238ab-d385-5d3f-b17c-6a2f799d8416}\Root\InventoryApplicationFile\nrgkqzvqrt.exe|2c1472ec3cd3c32c
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C11000
heap
page read and write
33E1000
heap
page read and write
354A000
heap
page read and write
2F1B000
heap
page read and write
620000
heap
page read and write
2F1B000
heap
page read and write
380E000
heap
page read and write
2C63000
heap
page read and write
2C45000
heap
page read and write
36AB000
heap
page read and write
22EE000
stack
page read and write
2E89000
heap
page read and write
838000
heap
page read and write
2C31000
heap
page read and write
710000
heap
page read and write
3491000
heap
page read and write
2C4B000
heap
page read and write
34B8000
heap
page read and write
2A6D000
stack
page read and write
3804000
heap
page read and write
2C45000
heap
page read and write
660000
direct allocation
page execute and read and write
33E8000
heap
page read and write
400000
unkown
page readonly
36AD000
heap
page read and write
2F1E000
heap
page read and write
2F5D000
heap
page read and write
2E5A000
heap
page read and write
2C35000
heap
page read and write
309B000
heap
page read and write
28EE000
stack
page read and write
5EE000
stack
page read and write
10000000
direct allocation
page read and write
2C45000
heap
page read and write
309C000
heap
page read and write
2C63000
heap
page read and write
655000
heap
page read and write
2A2E000
stack
page read and write
2C63000
heap
page read and write
2C63000
heap
page read and write
33E8000
heap
page read and write
454000
unkown
page write copy
454000
unkown
page read and write
2FE0000
heap
page read and write
2C31000
heap
page read and write
3602000
heap
page read and write
2F1B000
heap
page read and write
2C4B000
heap
page read and write
2C63000
heap
page read and write
2C63000
heap
page read and write
750000
heap
page read and write
36BB000
heap
page read and write
6B0000
heap
page read and write
2C4B000
heap
page read and write
35DE000
heap
page read and write
34D2000
heap
page read and write
2C45000
heap
page read and write
A4F000
stack
page read and write
2C63000
heap
page read and write
560000
heap
page read and write
34F0000
heap
page read and write
81D000
heap
page read and write
2360000
heap
page read and write
5AE000
stack
page read and write
2F1B000
heap
page read and write
43E000
unkown
page execute read
2C45000
heap
page read and write
2C45000
heap
page read and write
3440000
heap
page read and write
9B000
stack
page read and write
2EDE000
heap
page read and write
33E3000
heap
page read and write
2C45000
heap
page read and write
2F1B000
heap
page read and write
2F1E000
heap
page read and write
2E89000
heap
page read and write
2EA2000
heap
page read and write
2C45000
heap
page read and write
2CAD000
stack
page read and write
81A000
heap
page read and write
2DAE000
stack
page read and write
410000
unkown
page execute read
46A000
unkown
page readonly
75A000
heap
page read and write
353C000
heap
page read and write
10001000
direct allocation
page execute read
2B95000
heap
page read and write
2C63000
heap
page read and write
2C45000
heap
page read and write
2F1E000
heap
page read and write
10018000
direct allocation
page read and write
2F1B000
heap
page read and write
2F1E000
heap
page read and write
198000
stack
page read and write
33E4000
heap
page read and write
2F5C000
heap
page read and write
27AE000
stack
page read and write
2B6B000
stack
page read and write
292D000
stack
page read and write
46A000
unkown
page readonly
353E000
heap
page read and write
2B83000
heap
page read and write
33E1000
heap
page read and write
2C31000
heap
page read and write
36B2000
heap
page read and write
2F1B000
heap
page read and write
232D000
stack
page read and write
2C63000
heap
page read and write
2C63000
heap
page read and write
33EA000
heap
page read and write
33E2000
heap
page read and write
45A000
unkown
page read and write
2F1E000
heap
page read and write
2C63000
heap
page read and write
1F0000
heap
page read and write
400000
unkown
page execute and read and write
2C38000
heap
page read and write
3631000
heap
page read and write
352D000
heap
page read and write
2C18000
heap
page read and write
2C63000
heap
page read and write
2C31000
heap
page read and write
36A3000
heap
page read and write
2FE1000
heap
page read and write
35A5000
heap
page read and write
2F1B000
heap
page read and write
3676000
heap
page read and write
2C45000
heap
page read and write
6A0000
direct allocation
page read and write
3551000
heap
page read and write
3534000
heap
page read and write
2C45000
heap
page read and write
2B70000
heap
page read and write
354C000
heap
page read and write
70D000
stack
page read and write
2F19000
heap
page read and write
2C45000
heap
page read and write
2FE1000
heap
page read and write
3430000
heap
page read and write
2F1B000
heap
page read and write
380C000
heap
page read and write
347A000
heap
page read and write
2EDE000
heap
page read and write
79B000
heap
page read and write
10011000
direct allocation
page readonly
33E9000
heap
page read and write
2C63000
heap
page read and write
94F000
stack
page read and write
849000
heap
page read and write
354D000
heap
page read and write
2C18000
heap
page read and write
33EF000
heap
page read and write
43A000
unkown
page execute and read and write
358D000
heap
page read and write
2EA2000
heap
page read and write
2E89000
heap
page read and write
33E2000
heap
page read and write
2C63000
heap
page read and write
650000
heap
page read and write
2C34000
heap
page read and write
369F000
heap
page read and write
2C11000
heap
page read and write
401000
unkown
page execute read
350C000
heap
page read and write
75E000
heap
page read and write
33E9000
heap
page read and write
351C000
heap
page read and write
2F1B000
heap
page read and write
1001A000
direct allocation
page read and write
2E5A000
heap
page read and write
303A000
heap
page read and write
27ED000
stack
page read and write
76F000
heap
page execute and read and write
34C2000
heap
page read and write
2E5A000
heap
page read and write
3492000
heap
page read and write
There are 166 hidden memdumps, click here to show them.