IOC Report
nGmqbXROga.exe

loading gif

Files

File Path
Type
Category
Malicious
nGmqbXROga.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nGmqbXROga.exe_7bec4784852ff8e33de54b2d030dac7124b5ad0_0086474c_fbe0f371-9d71-4567-973d-86a43581d9e3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE02D.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 27 12:07:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0E9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE119.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nGmqbXROga.exe
"C:\Users\user\Desktop\nGmqbXROga.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 1060

URLs

Name
IP
Malicious
http://194.15.46.65
unknown
malicious
http://194.15.46.65/7f031eb0d257b290.php
194.15.46.65
malicious
http://194.15.46.65/
194.15.46.65
malicious
http://194.15.46.65/7f031eb0d257b290.phpo
unknown
http://194.15.46.65/7f031eb0d257b290.php2
unknown
http://upx.sf.net
unknown
http://194.15.46.65Da
unknown
http://194.15.46.65/7f031eb0d257b290.php:=
unknown
http://194.15.46.65/7f031eb0d257b290.phpj=
unknown
http://194.15.46.65/6XFZ
unknown
http://194.15.46.65/7f031eb0d257b290.phpv=
unknown
http://194.15.46.65/75
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
194.15.46.65
unknown
unknown
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
ProgramId
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
FileId
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
LowerCaseLongPath
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
LongPathHash
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
Name
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
OriginalFileName
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
Publisher
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
Version
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
BinFileVersion
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
BinaryType
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
ProductName
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
ProductVersion
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
LinkDate
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
BinProductVersion
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
AppxPackageFullName
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
AppxPackageRelativeId
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
Size
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
Language
\REGISTRY\A\{15c0a6b4-0911-c1b9-00d1-49a44afddb5c}\Root\InventoryApplicationFile\ngmqbxroga.exe|ef5b0df7ddb4bff1
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2BE3000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
47E0000
direct allocation
page execute and read and write
malicious
4830000
direct allocation
page read and write
malicious
1CD6F000
stack
page read and write
195000
stack
page read and write
2BAE000
heap
page read and write
2B70000
heap
page read and write
2BAA000
heap
page read and write
64A000
unkown
page execute and read and write
2C44000
heap
page read and write
498E000
stack
page read and write
48DE000
stack
page read and write
2B45000
unkown
page readonly
2C39000
heap
page read and write
43F000
unkown
page write copy
43C000
unkown
page readonly
2EEE000
stack
page read and write
9C000
stack
page read and write
1CF0E000
stack
page read and write
48F0000
heap
page read and write
2DAE000
stack
page read and write
2C1B000
heap
page read and write
4B1000
unkown
page execute and read and write
1CA6F000
stack
page read and write
2EAF000
stack
page read and write
1D00E000
stack
page read and write
4990000
heap
page read and write
493E000
stack
page read and write
2F30000
heap
page read and write
1CB6F000
stack
page read and write
2B45000
unkown
page readonly
1F5000
heap
page read and write
40E000
unkown
page execute read
19C000
stack
page read and write
4E2000
unkown
page execute and read and write
1CDBE000
stack
page read and write
2B80000
heap
page read and write
401000
unkown
page execute read
303F000
stack
page read and write
1CEBE000
stack
page read and write
400000
unkown
page readonly
1CC6F000
stack
page read and write
4993000
heap
page read and write
1F0000
heap
page read and write
4840000
heap
page read and write
65C000
unkown
page execute and read and write
489E000
stack
page read and write
2BB9000
heap
page execute and read and write
4BD000
unkown
page execute and read and write
2BA0000
heap
page read and write
1D16D000
stack
page read and write
1D06E000
stack
page read and write
There are 43 hidden memdumps, click here to show them.