IOC Report
uCEeVGAWIB.exe

loading gif

Files

File Path
Type
Category
Malicious
uCEeVGAWIB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_uCEeVGAWIB.exe_35b561223452744f6df6ca551f76be2830b1ae6_c44eca09_705ac8a5-a6bd-4c1f-9397-243e575a8137\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FA7.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 17:22:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5277.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER52C6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uCEeVGAWIB.exe
"C:\Users\user\Desktop\uCEeVGAWIB.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1052

URLs

Name
IP
Malicious
http://94.141.122.159
unknown
malicious
http://94.141.122.159/
94.141.122.159
malicious
http://94.141.122.159/baf27292fb61e144.php
94.141.122.159
malicious
http://94.141.122.159/baf27292fb61e144.php?F
unknown
http://94.141.122.159/Y
unknown
http://94.141.122.159/U
unknown
http://94.141.122.159/baf27292fb61e144.phpOG
unknown
http://upx.sf.net
unknown
http://94.141.122.159/baf27292fb61e144.phpS
unknown
http://94.141.122.159/baf27292fb61e144.phpR
unknown
http://94.141.122.159/baf27292fb61e144.php3F
unknown
http://94.141.122.159/ws
unknown
http://94.141.122.159/baf27292fb61e144.phpG
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
94.141.122.159
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
ProgramId
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
FileId
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
LowerCaseLongPath
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
LongPathHash
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
Name
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
OriginalFileName
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
Publisher
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
Version
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
BinFileVersion
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
BinaryType
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
ProductName
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
ProductVersion
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
LinkDate
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
BinProductVersion
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
AppxPackageFullName
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
AppxPackageRelativeId
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
Size
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
Language
\REGISTRY\A\{6c2f5394-9ac5-1dc3-6bd8-12e2a25dfad8}\Root\InventoryApplicationFile\uceevgawib.exe|153dd73e1dfcc121
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B80000
direct allocation
page read and write
malicious
8C4000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
810000
direct allocation
page execute and read and write
malicious
8FA000
heap
page read and write
64A000
unkown
page execute and read and write
918000
heap
page read and write
1F0000
heap
page read and write
1A89F000
stack
page read and write
6B0000
heap
page read and write
CB3000
heap
page read and write
1AC5F000
stack
page read and write
1AA1E000
stack
page read and write
195000
stack
page read and write
43C000
unkown
page readonly
1A65F000
stack
page read and write
4BD000
unkown
page execute and read and write
80E000
stack
page read and write
1AB1D000
stack
page read and write
43F000
unkown
page write copy
1A8DE000
stack
page read and write
19C000
stack
page read and write
6B5000
heap
page read and write
BEE000
stack
page read and write
4B1000
unkown
page execute and read and write
CB0000
heap
page read and write
B7F000
stack
page read and write
40E000
unkown
page execute read
C60000
heap
page read and write
9C000
stack
page read and write
1A55F000
stack
page read and write
88A000
heap
page read and write
51F000
unkown
page readonly
400000
unkown
page readonly
7CE000
stack
page read and write
C2E000
stack
page read and write
4E2000
unkown
page execute and read and write
401000
unkown
page execute read
CAE000
stack
page read and write
CE0000
heap
page read and write
65C000
unkown
page execute and read and write
89A000
heap
page execute and read and write
670000
heap
page read and write
1A75F000
stack
page read and write
88E000
heap
page read and write
B90000
heap
page read and write
1A79E000
stack
page read and write
A7F000
stack
page read and write
1A9DE000
stack
page read and write
1AB5E000
stack
page read and write
880000
heap
page read and write
There are 41 hidden memdumps, click here to show them.