wngplog.exe is digitally signed by GeoCube.
wngplog.exe is usually located in the 'c:\downloads\' folder.
Some of the anti-virus scanners at VirusTotal detected wngplog.exe.
If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.
wngplog.exe has a valid digital signature.
Property | Value |
---|---|
Signer name | GeoCube |
Certificate issuer name | thawte SHA256 Code Signing CA |
Certificate serial number | 4a2bc91199910d1a3895f3bd81c0e006 |
40 of the 66 anti-virus programs at VirusTotal detected the wngplog.exe file. That's a 61% detection rate.
Scanner | Detection Name |
---|---|
Ad-Aware | Trojan.GenericKD.30908742 |
AhnLab-V3 | PUP/Win32.Helper.C2444482 |
Alibaba | AdWare:Win32/Kraddare.f55d5467 |
Antiy-AVL | Trojan/Win32.TSGeneric |
Arcabit | Trojan.Generic.D1D7A146 |
Avast | Win32:Adware-gen [Adw] |
AVG | Win32:Adware-gen [Adw] |
Avira | HEUR/AGEN.1012454 |
BitDefender | Trojan.GenericKD.30908742 |
CAT-QuickHeal | Trojan.Graftor |
Comodo | ApplicUnwnt@#19tjuvq3enbfo |
CrowdStrike | win/malicious_confidence_60% (D) |
Cybereason | malicious.41315c |
Cyren | W32/Trojan.KLDE-8385 |
DrWeb | Trojan.Adkor.710 |
Emsisoft | Application.Generic (A) |
Endgame | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Adware.Kraddare.MS |
F-Secure | Heuristic.HEUR/AGEN.1012454 |
FireEye | Generic.mg.adb9ea941315cca7 |
Fortinet | Riskware/Kraddare |
GData | Trojan.GenericKD.30908742 |
Ikarus | PUA.Kraddare |
Invincea | heuristic |
MAX | malware (ai score=99) |
McAfee | PUP-XDY-DH |
McAfee-GW-Edition | PUP-XDY-DH |
MicroWorld-eScan | Trojan.GenericKD.30908742 |
Panda | Trj/CI.A |
Qihoo-360 | Win32/Virus.Adware.dfd |
Rising | Malware.Undefined!8.C (CLOUD) |
SentinelOne | DFI - Suspicious PE |
Sophos | Generic PUA JI (PUA) |
SUPERAntiSpyware | Adware.Kraddare/Variant |
Tencent | Win32.Trojan.Graftor.Lqov |
TrendMicro-HouseCall | TROJ_GEN.R002C0PAF19 |
VBA32 | suspected of Trojan.Downloader.gen.h |
ViRobot | Trojan.Win32.Agent.166632 |
Yandex | PUA.Kraddare! |
Zillya | Adware.Kraddare.Win32.7156 |
The following information was gathered by executing the file inside Cuckoo Sandbox.
Successfully executed process in sandbox.
{ "file_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\FD44.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7E6C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\6DB3.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\AE47.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\571C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DE22.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DFD.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\CD69.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\3DD8.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\9D8E.tmp" ], "regkey_written": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableConsoleTracing", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecisionReason", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecision", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadNetworkName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableFileTracing", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\\DefaultConnectionSettings", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileTracingMask", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecisionTime", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\WpadLastNetwork", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileDirectory" ], "dll_loaded": [ "API-MS-Win-Security-SDDL-L1-1-0.dll", "C:\\Windows\\system32\\pnrpnsp.dll", "RASMAN.DLL", "rtutils.dll", "API-MS-WIN-Service-Management-L1-1-0.dll", "IPHLPAPI.DLL", "C:\\Windows\\SysWOW64\\oleaut32.dll", "wininet.dll", "C:\\Windows\\System32\\winrnr.dll", "DHCPCSVC.DLL", "OLEAUT32.dll", "API-MS-WIN-Service-winsvc-L1-1-0.dll", "WS2_32.dll", "ADVAPI32.dll", "ole32.dll", "C:\\Windows\\system32\\napinsp.dll" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\TreatAs", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\DnsCache\\Parameters", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\DnsClient", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{2A1C9EB2-DF62-4154-B800-63278FCB8037}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList", "HKEY_CURRENT_USER\\Interface\\{BCD1DE7E-2DB1-418B-B047-4A74E101F8C1}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{26656EAA-54EB-4E6F-8F85-4F0EF901A406}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASMANCS", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\Progid", "HKEY_CURRENT_USER\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\OleAut", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocHandler32", "HKEY_CURRENT_USER\\Software\\Microsoft\\windows\\CurrentVersion\\Internet Settings\\Connections", "HKEY_CURRENT_USER\\Interface\\{2A1C9EB2-DF62-4154-B800-63278FCB8037}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList\\S-1-5-21-699399860-4089948139-3198924279-1001", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\Progid", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{8A40A45D-055C-4B62-ABD7-6D613E2CEAEC}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocHandler", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters", "HKEY_CURRENT_USER\\Software\\Microsoft\\windows\\CurrentVersion\\Internet Settings\\Wpad", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{55272A00-42CB-11CE-8135-00AA004BB851}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing", "HKEY_CURRENT_USER\\Interface\\{26656EAA-54EB-4E6F-8F85-4F0EF901A406}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{BCD1DE7E-2DB1-418B-B047-4A74E101F8C1}\\ProxyStubClsid32", "HKEY_CURRENT_USER\\Interface\\{8A40A45D-055C-4B62-ABD7-6D613E2CEAEC}", "HKEY_CURRENT_USER\\Interface\\{55272A00-42CB-11CE-8135-00AA004BB851}" ], "resolves_host": [ "wpad", "cuckpc" ], "file_deleted": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\FD44.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7E6C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\6DB3.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\AE47.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\571C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DE22.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DFD.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\CD69.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\3DD8.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\9D8E.tmp" ], "file_exists": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\FD44.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7E6C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\6DB3.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\AE47.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\571C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DE22.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DFD.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\CD69.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\3DD8.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\9D8E.tmp" ], "mutex": [ "IESQMMUTEX_0_208", "wngplog" ], "fetches_url": [ "https:\/\/newgoplus.com\/a.php" ], "guid": [ "{a47979d2-c419-11d9-a5b4-001185ad2b89}", "{dcb00c01-570f-4a9b-8d69-199fdba5723b}", "{dcb00000-570f-4a9b-8d69-199fdba5723b}", "{d0074ffd-570f-4a9b-8d69-199fdba5723b}" ], "regkey_read": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{26656EAA-54EB-4E6F-8F85-4F0EF901A406}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32\\ThreadingModel", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32\\(Default)", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\\AppData", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32\\InprocServer32", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList\\S-1-5-21-699399860-4089948139-3198924279-1001\\ProfileImagePath", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{55272A00-42CB-11CE-8135-00AA004BB851}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{BCD1DE7E-2DB1-418B-B047-4A74E101F8C1}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\AutoProxyDetectType", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{2A1C9EB2-DF62-4154-B800-63278FCB8037}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{8A40A45D-055C-4B62-ABD7-6D613E2CEAEC}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList\\ProgramData", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileTracingMask", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Hostname", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileDirectory", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\\DefaultConnectionSettings", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\MaxFileSize", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\WpadLastNetwork", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\(Default)" ], "directory_enumerated": [ "C:\\Users\\cuck\\AppData\\Roaming\\Microsoft\\Network\\Connections\\Pbk\\rasphone.pbk", "C:\\ProgramData\\Microsoft\\Network\\Connections\\Pbk\\rasphone.pbk", "C:\\Windows\\System32\\ras\\*.pbk", "C:\\ProgramData\\Microsoft\\Network\\Connections\\Pbk\\*.pbk", "C:\\Users\\cuck\\AppData\\Roaming\\Microsoft\\Network\\Connections\\Pbk\\*.pbk" ] }
[ { "yara": [], "sha1": "da39a3ee5e6b4b0d3255bfef95601890afd80709", "name": "e3b0c44298fc1c14_571C.tmp", "type": "empty", "sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "urls": [], "crc32": "00000000", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/4335\/files\/e3b0c44298fc1c14_571C.tmp", "ssdeep": null, "size": 0, "sha512": "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e", "md5": "d41d8cd98f00b204e9800998ecf8427e" } ]
[ { "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\2824ccc43d6a9c62b2dde99c91ddc7f7e3a4f5e69bffa91dafbd64a59808c38f.bin", "process_name": "2824ccc43d6a9c62b2dde99c91ddc7f7e3a4f5e69bffa91dafbd64a59808c38f.bin", "pid": 2816, "summary": { "file_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\FD44.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7E6C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\6DB3.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\AE47.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\571C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DE22.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DFD.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\CD69.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\3DD8.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\9D8E.tmp" ], "regkey_written": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableConsoleTracing", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecisionReason", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecision", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadNetworkName", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableFileTracing", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\\DefaultConnectionSettings", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileTracingMask", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecisionTime", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\WpadLastNetwork", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileDirectory" ], "dll_loaded": [ "API-MS-Win-Security-SDDL-L1-1-0.dll", "C:\\Windows\\system32\\pnrpnsp.dll", "RASMAN.DLL", "rtutils.dll", "API-MS-WIN-Service-Management-L1-1-0.dll", "IPHLPAPI.DLL", "C:\\Windows\\SysWOW64\\oleaut32.dll", "wininet.dll", "C:\\Windows\\System32\\winrnr.dll", "DHCPCSVC.DLL", "OLEAUT32.dll", "API-MS-WIN-Service-winsvc-L1-1-0.dll", "WS2_32.dll", "ADVAPI32.dll", "ole32.dll", "C:\\Windows\\system32\\napinsp.dll" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\TreatAs", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\DnsCache\\Parameters", "HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows NT\\DnsClient", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{2A1C9EB2-DF62-4154-B800-63278FCB8037}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList", "HKEY_CURRENT_USER\\Interface\\{BCD1DE7E-2DB1-418B-B047-4A74E101F8C1}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{26656EAA-54EB-4E6F-8F85-4F0EF901A406}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RASMANCS", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\Progid", "HKEY_CURRENT_USER\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\OleAut", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocHandler32", "HKEY_CURRENT_USER\\Software\\Microsoft\\windows\\CurrentVersion\\Internet Settings\\Connections", "HKEY_CURRENT_USER\\Interface\\{2A1C9EB2-DF62-4154-B800-63278FCB8037}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList\\S-1-5-21-699399860-4089948139-3198924279-1001", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\Progid", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{8A40A45D-055C-4B62-ABD7-6D613E2CEAEC}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocHandler", "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters", "HKEY_CURRENT_USER\\Software\\Microsoft\\windows\\CurrentVersion\\Internet Settings\\Wpad", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{55272A00-42CB-11CE-8135-00AA004BB851}\\ProxyStubClsid32", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing", "HKEY_CURRENT_USER\\Interface\\{26656EAA-54EB-4E6F-8F85-4F0EF901A406}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{BCD1DE7E-2DB1-418B-B047-4A74E101F8C1}\\ProxyStubClsid32", "HKEY_CURRENT_USER\\Interface\\{8A40A45D-055C-4B62-ABD7-6D613E2CEAEC}", "HKEY_CURRENT_USER\\Interface\\{55272A00-42CB-11CE-8135-00AA004BB851}" ], "resolves_host": [ "wpad", "cuckpc" ], "file_deleted": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\FD44.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7E6C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\6DB3.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\AE47.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\571C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DE22.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DFD.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\CD69.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\3DD8.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\9D8E.tmp" ], "file_exists": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\FD44.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7E6C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\6DB3.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\AE47.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\571C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DE22.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\DFD.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\CD69.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\3DD8.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\9D8E.tmp" ], "mutex": [ "IESQMMUTEX_0_208", "wngplog" ], "fetches_url": [ "https:\/\/newgoplus.com\/a.php" ], "guid": [ "{a47979d2-c419-11d9-a5b4-001185ad2b89}", "{dcb00c01-570f-4a9b-8d69-199fdba5723b}", "{dcb00000-570f-4a9b-8d69-199fdba5723b}", "{d0074ffd-570f-4a9b-8d69-199fdba5723b}" ], "regkey_read": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{26656EAA-54EB-4E6F-8F85-4F0EF901A406}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32\\ThreadingModel", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\EnableConsoleTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32\\(Default)", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\\AppData", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\InprocServer32\\InprocServer32", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList\\S-1-5-21-699399860-4089948139-3198924279-1001\\ProfileImagePath", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{55272A00-42CB-11CE-8135-00AA004BB851}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{BCD1DE7E-2DB1-418B-B047-4A74E101F8C1}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileDirectory", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\FileTracingMask", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\AutoProxyDetectType", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{2A1C9EB2-DF62-4154-B800-63278FCB8037}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\Interface\\{8A40A45D-055C-4B62-ABD7-6D613E2CEAEC}\\ProxyStubClsid32\\(Default)", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\MaxFileSize", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList\\ProgramData", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileTracingMask", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Tcpip\\Parameters\\Hostname", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\FileDirectory", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\\DefaultConnectionSettings", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\EnableFileTracing", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASMANCS\\MaxFileSize", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\WpadLastNetwork", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RASAPI32\\ConsoleTracingMask", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Wow6432Node\\CLSID\\{B196B286-BAB4-101A-B69C-00AA00341D07}\\(Default)" ], "directory_enumerated": [ "C:\\Users\\cuck\\AppData\\Roaming\\Microsoft\\Network\\Connections\\Pbk\\rasphone.pbk", "C:\\ProgramData\\Microsoft\\Network\\Connections\\Pbk\\rasphone.pbk", "C:\\Windows\\System32\\ras\\*.pbk", "C:\\ProgramData\\Microsoft\\Network\\Connections\\Pbk\\*.pbk", "C:\\Users\\cuck\\AppData\\Roaming\\Microsoft\\Network\\Connections\\Pbk\\*.pbk" ] }, "first_seen": 1576579985.671875, "ppid": 2016 }, { "process_path": "C:\\Windows\\System32\\lsass.exe", "process_name": "lsass.exe", "pid": 476, "summary": {}, "first_seen": 1576579985.328125, "ppid": 376 } ]
[ { "markcount": 1, "families": [], "description": "The executable uses a known packer", "severity": 1, "marks": [ { "category": "packer", "ioc": "Armadillo v1.71", "type": "ioc", "description": null } ], "references": [], "name": "peid_packer" }, { "markcount": 1, "families": [], "description": "A process attempted to delay the analysis task.", "severity": 2, "marks": [ { "type": "generic", "description": "2824ccc43d6a9c62b2dde99c91ddc7f7e3a4f5e69bffa91dafbd64a59808c38f.bin tried to sleep 150 seconds, actually delayed analysis time by 150 seconds" } ], "references": [], "name": "antisandbox_sleep" }, { "markcount": 20, "families": [], "description": "Foreign language identified in PE resource", "severity": 2, "marks": [ { "name": "RT_CURSOR", "language": "LANG_KOREAN", "offset": "0x000295b8", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x000000b4" }, { "name": "RT_CURSOR", "language": "LANG_KOREAN", "offset": "0x000295b8", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x000000b4" }, { "name": "RT_BITMAP", "language": "LANG_KOREAN", "offset": "0x00029f90", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000144" }, { "name": "RT_BITMAP", "language": "LANG_KOREAN", "offset": "0x00029f90", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000144" }, { "name": "RT_BITMAP", "language": "LANG_KOREAN", "offset": "0x00029f90", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000144" }, { "name": "RT_BITMAP", "language": "LANG_KOREAN", "offset": "0x00029f90", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000144" }, { "name": "RT_DIALOG", "language": "LANG_KOREAN", "offset": "0x00029c80", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x000000e8" }, { "name": "RT_DIALOG", "language": "LANG_KOREAN", "offset": "0x00029c80", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x000000e8" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_STRING", "language": "LANG_KOREAN", "offset": "0x0002ad00", "filetype": "data", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000024" }, { "name": "RT_GROUP_CURSOR", "language": "LANG_KOREAN", "offset": "0x00029670", "filetype": "MS Windows cursor resource - 2 icons, 32x256, hotspot @1x1", "sublanguage": "SUBLANG_KOREAN", "type": "generic", "size": "0x00000022" } ], "references": [], "name": "origin_langid" }, { "markcount": 1, "families": [], "description": "Checks adapter addresses which can be used to detect virtual network interfaces", "severity": 2, "marks": [ { "call": { "category": "network", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741772, "api": "GetAdaptersAddresses", "return_value": 111, "arguments": { "flags": 0, "family": 0 }, "time": 1576579985.859875, "tid": 1516, "flags": {} }, "pid": 2816, "type": "call", "cid": 370 } ], "references": [], "name": "antivm_network_adapters" }, { "markcount": 5, "families": [], "description": "Sets or modifies WPAD proxy autoconfiguration file for traffic interception", "severity": 3, "marks": [ { "call": { "category": "registry", "status": 1, "stacktrace": [], "api": "RegSetValueExA", "return_value": 0, "arguments": { "key_handle": "0x000003e8", "value": 1, "regkey_r": "WpadDecisionReason", "reg_type": 4, "regkey": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecisionReason" }, "time": 1576579986.187875, "tid": 1516, "flags": { "reg_type": "REG_DWORD" } }, "pid": 2816, "type": "call", "cid": 383 }, { "call": { "category": "registry", "status": 1, "stacktrace": [], "api": "RegSetValueExA", "return_value": 0, "arguments": { "key_handle": "0x000003e8", "value": "\u00b0\u0015\u0001\u0003\u000e\u00b5\u00d5\u0001", "regkey_r": "WpadDecisionTime", "reg_type": 3, "regkey": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecisionTime" }, "time": 1576579986.187875, "tid": 1516, "flags": { "reg_type": "REG_BINARY" } }, "pid": 2816, "type": "call", "cid": 384 }, { "call": { "category": "registry", "status": 1, "stacktrace": [], "api": "RegSetValueExA", "return_value": 0, "arguments": { "key_handle": "0x000003e8", "value": 3, "regkey_r": "WpadDecision", "reg_type": 4, "regkey": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadDecision" }, "time": 1576579986.187875, "tid": 1516, "flags": { "reg_type": "REG_DWORD" } }, "pid": 2816, "type": "call", "cid": 385 }, { "call": { "category": "registry", "status": 1, "stacktrace": [], "api": "RegSetValueExW", "return_value": 0, "arguments": { "key_handle": "0x000003e8", "value": "Unidentified network", "regkey_r": "WpadNetworkName", "reg_type": 1, "regkey": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}\\WpadNetworkName" }, "time": 1576579986.187875, "tid": 1516, "flags": { "reg_type": "REG_SZ" } }, "pid": 2816, "type": "call", "cid": 386 }, { "call": { "category": "registry", "status": 1, "stacktrace": [], "api": "RegSetValueExW", "return_value": 0, "arguments": { "key_handle": "0x000003e4", "value": "{E34DF837-3A38-4E8C-83F4-ABF8AB3FB4A6}", "regkey_r": "WpadLastNetwork", "reg_type": 1, "regkey": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Wpad\\WpadLastNetwork" }, "time": 1576579986.187875, "tid": 1516, "flags": { "reg_type": "REG_SZ" } }, "pid": 2816, "type": "call", "cid": 454 } ], "references": [], "name": "modifies_proxy_wpad" } ]
The Yara rules did not detect anything in the file.
{ "tls": [], "udp": [ { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 546, "time": 3.0777149200439453, "dport": 137, "sport": 137 }, { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 11058, "time": 9.079051971435547, "dport": 138, "sport": 138 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 12902, "time": 2.048407793045044, "dport": 5355, "sport": 51001 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 13222, "time": 1.0337138175964355, "dport": 5355, "sport": 53595 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 13550, "time": 3.016407012939453, "dport": 5355, "sport": 53848 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 13878, "time": 1.5330510139465332, "dport": 5355, "sport": 54255 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 14206, "time": -0.10016703605651855, "dport": 5355, "sport": 55314 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 14534, "time": 3.025840997695923, "dport": 5355, "sport": 55880 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 14862, "time": 1.546623945236206, "dport": 1900, "sport": 1900 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 34272, "time": 1.066490888595581, "dport": 3702, "sport": 49152 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 42656, "time": 3.1250908374786377, "dport": 1900, "sport": 53598 } ], "dns_servers": [], "http": [], "icmp": [], "smtp": [], "tcp": [], "smtp_ex": [], "mitm": [], "hosts": [], "pcap_sha256": "b7ef0f89b203610c6ae2139709dca94c2759aa2b835dba01d90b28594e90b854", "dns": [], "http_ex": [], "domains": [], "dead_hosts": [], "sorted_pcap_sha256": "a89fc8ed005d7b011397f64a633a9609a35a3c10186cf9cfbec0d4ca32c0a100", "irc": [], "https_ex": [] }
The instructions below shows how to remove wngplog.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the wngplog.exe file for removal, restart your computer and scan it again to verify that wngplog.exe has been successfully removed. Here are the removal instructions in more detail:
Property | Value |
---|---|
MD5 | adb9ea941315cca7e38680150539f186 |
SHA256 | 2824ccc43d6a9c62b2dde99c91ddc7f7e3a4f5e69bffa91dafbd64a59808c38f |
These are some of the error messages that can appear related to wngplog.exe:
wngplog.exe has encountered a problem and needs to close. We are sorry for the inconvenience.
wngplog.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.
wngplog.exe has stopped working.
End Program - wngplog.exe. This program is not responding.
wngplog.exe is not a valid Win32 application.
wngplog.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.
To help other users, please let us know what you will do with wngplog.exe:
Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.
I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.
No comments posted yet.