Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nGmqbXROga.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nGmqbXROga.exe_7bec4784852ff8e33de54b2d030dac7124b5ad0_0086474c_fbe0f371-9d71-4567-973d-86a43581d9e3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE02D.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 27 12:07:05 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0E9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE119.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\nGmqbXROga.exe
|
"C:\Users\user\Desktop\nGmqbXROga.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 1060
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://194.15.46.65
|
unknown
|
||
http://194.15.46.65/7f031eb0d257b290.php
|
194.15.46.65
|
||
http://194.15.46.65/
|
194.15.46.65
|
||
http://194.15.46.65/7f031eb0d257b290.phpo
|
unknown
|
||
http://194.15.46.65/7f031eb0d257b290.php2
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://194.15.46.65Da
|
unknown
|
||
http://194.15.46.65/7f031eb0d257b290.php:=
|
unknown
|
||
http://194.15.46.65/7f031eb0d257b290.phpj=
|
unknown
|
||
http://194.15.46.65/6XFZ
|
unknown
|
||
http://194.15.46.65/7f031eb0d257b290.phpv=
|
unknown
|
||
http://194.15.46.65/75
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.15.46.65
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
ProgramId
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
FileId
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
LowerCaseLongPath
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
LongPathHash
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
Name
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
OriginalFileName
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
Publisher
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
Version
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
BinFileVersion
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
BinaryType
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
ProductName
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
ProductVersion
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
LinkDate
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
BinProductVersion
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
AppxPackageFullName
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
Size
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
Language
|
||
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2BE3000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
47E0000
|
direct allocation
|
page execute and read and write
|
||
4830000
|
direct allocation
|
page read and write
|
||
1CD6F000
|
stack
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
2BAE000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
2BAA000
|
heap
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
2C44000
|
heap
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
2B45000
|
unkown
|
page readonly
|
||
2C39000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page write copy
|
||
43C000
|
unkown
|
page readonly
|
||
2EEE000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
1CF0E000
|
stack
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
2C1B000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
1CA6F000
|
stack
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
1D00E000
|
stack
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
1CB6F000
|
stack
|
page read and write
|
||
2B45000
|
unkown
|
page readonly
|
||
1F5000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page execute read
|
||
19C000
|
stack
|
page read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
1CDBE000
|
stack
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
303F000
|
stack
|
page read and write
|
||
1CEBE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1CC6F000
|
stack
|
page read and write
|
||
4993000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
65C000
|
unkown
|
page execute and read and write
|
||
489E000
|
stack
|
page read and write
|
||
2BB9000
|
heap
|
page execute and read and write
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
1D16D000
|
stack
|
page read and write
|
||
1D06E000
|
stack
|
page read and write
|
There are 43 hidden memdumps, click here to show them.