IOC Report
TET8iWY1w4.exe

loading gif

Files

File Path
Type
Category
Malicious
TET8iWY1w4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TET8iWY1w4.exe_baf128c5aa94d11fcb5d518c1b53c94826195_ff764eae_7b82c7fd-01a7-4d29-b0e1-e1815c3e2fbd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3F7.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 14:39:33 2024, 0x1205a4 type
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TET8iWY1w4.exe
"C:\Users\user\Desktop\TET8iWY1w4.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 1528

URLs

Name
IP
Malicious
accountasifkwosov.shop
malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
liabilitynighstjsko.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
alcojoldwograpciw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://accountasifkwosov.shop/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://accountasifkwosov.shop/rspy
unknown
https://accountasifkwosov.shop/X
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://accountasifkwosov.shop/apiyL
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://accountasifkwosov.shop/apis
unknown
https://accountasifkwosov.shop:443/api
unknown
https://accountasifkwosov.shop/u
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://accountasifkwosov.shop/7
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://accountasifkwosov.shop/apir
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://accountasifkwosov.shop/api
172.67.141.11
https://accountasifkwosov.shop/api?
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
accountasifkwosov.shop
172.67.141.11
malicious

IPs

IP
Domain
Country
Malicious
172.67.141.11
accountasifkwosov.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
ProgramId
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
FileId
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
LowerCaseLongPath
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
LongPathHash
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
Name
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
OriginalFileName
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
Publisher
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
Version
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
BinFileVersion
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
BinaryType
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
ProductName
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
ProductVersion
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
LinkDate
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
BinProductVersion
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
AppxPackageFullName
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
AppxPackageRelativeId
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
Size
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
Language
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3670000
direct allocation
page execute and read and write
malicious
1B3E000
heap
page read and write
4262000
trusted library allocation
page read and write
4218000
trusted library allocation
page read and write
371E000
stack
page read and write
1ACE000
heap
page read and write
4267000
trusted library allocation
page read and write
1B23000
heap
page read and write
4225000
trusted library allocation
page read and write
421E000
trusted library allocation
page read and write
1AA5000
heap
page read and write
1A30000
heap
page read and write
421F000
trusted library allocation
page read and write
1B54000
heap
page read and write
421A000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
46AD000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
420C000
trusted library allocation
page read and write
1B9C000
heap
page read and write
4267000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
4256000
trusted library allocation
page read and write
1B3B000
heap
page read and write
455F000
stack
page read and write
42E2000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
1B23000
heap
page read and write
4222000
trusted library allocation
page read and write
1B97000
heap
page read and write
4260000
trusted library allocation
page read and write
4266000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
1B3B000
heap
page read and write
4280000
trusted library allocation
page read and write
424B000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
4280000
trusted library allocation
page read and write
4253000
trusted library allocation
page read and write
9B000
stack
page read and write
1B4F000
heap
page read and write
1B3E000
heap
page read and write
4238000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
428B000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
1B3E000
heap
page read and write
420A000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
4267000
trusted library allocation
page read and write
422F000
trusted library allocation
page read and write
42A0000
trusted library allocation
page read and write
4226000
trusted library allocation
page read and write
1ACA000
heap
page read and write
4262000
trusted library allocation
page read and write
4227000
trusted library allocation
page read and write
4214000
trusted library allocation
page read and write
448000
unkown
page execute and read and write
4260000
trusted library allocation
page read and write
422F000
trusted library allocation
page read and write
1BBB000
heap
page read and write
425C000
trusted library allocation
page read and write
420A000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
445E000
stack
page read and write
40AF000
stack
page read and write
1A0D000
unkown
page read and write
3900000
heap
page read and write
4266000
trusted library allocation
page read and write
38F0000
remote allocation
page read and write
4286000
trusted library allocation
page read and write
4270000
trusted library allocation
page read and write
4265000
trusted library allocation
page read and write
38F0000
remote allocation
page read and write
1BB2000
heap
page read and write
1B23000
heap
page read and write
422E000
trusted library allocation
page read and write
1B1D000
heap
page read and write
1B3E000
heap
page read and write
420F000
trusted library allocation
page read and write
1BB9000
heap
page read and write
4213000
trusted library allocation
page read and write
425B000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
36C0000
heap
page read and write
1B54000
heap
page read and write
420D000
trusted library allocation
page read and write
422C000
trusted library allocation
page read and write
1D8F000
stack
page read and write
423D000
trusted library allocation
page read and write
423B000
trusted library allocation
page read and write
1B54000
heap
page read and write
421F000
trusted library allocation
page read and write
422F000
trusted library allocation
page read and write
422B000
trusted library allocation
page read and write
1B3B000
heap
page read and write
420F000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
4262000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
1B2D000
heap
page read and write
4328000
trusted library allocation
page read and write
1B01000
heap
page read and write
423B000
trusted library allocation
page read and write
1B9C000
heap
page read and write
401000
unkown
page execute read
1B3B000
heap
page read and write
1B2A000
heap
page read and write
4267000
trusted library allocation
page read and write
1B23000
heap
page read and write
421E000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
430D000
trusted library allocation
page read and write
1B42000
heap
page read and write
42AA000
trusted library allocation
page read and write
36C0000
direct allocation
page read and write
422B000
trusted library allocation
page read and write
4206000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
420A000
trusted library allocation
page read and write
1B23000
heap
page read and write
425B000
trusted library allocation
page read and write
1BBE000
heap
page read and write
422E000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
1A0F000
unkown
page readonly
1AA7000
heap
page read and write
1AC0000
heap
page read and write
1B3B000
heap
page read and write
1B1E000
heap
page read and write
38AD000
stack
page read and write
446000
unkown
page read and write
425C000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
4265000
trusted library allocation
page read and write
400000
unkown
page readonly
4201000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
1A7E000
stack
page read and write
4BA1000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
1B2A000
heap
page read and write
420D000
trusted library allocation
page read and write
1B97000
heap
page read and write
1B1E000
heap
page read and write
42AE000
trusted library allocation
page read and write
1B3E000
heap
page read and write
4232000
trusted library allocation
page read and write
1B50000
heap
page read and write
4206000
trusted library allocation
page read and write
1B2A000
heap
page read and write
1BBB000
heap
page read and write
420C000
trusted library allocation
page read and write
1B54000
heap
page read and write
4240000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
4309000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E8000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
4219000
trusted library allocation
page read and write
1B1F000
heap
page read and write
1BB6000
heap
page read and write
1B2D000
heap
page read and write
1B42000
heap
page read and write
444A000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
4236000
trusted library allocation
page read and write
4265000
trusted library allocation
page read and write
38EE000
stack
page read and write
375D000
stack
page read and write
1B3E000
heap
page read and write
1B97000
heap
page read and write
4223000
trusted library allocation
page read and write
42AE000
trusted library allocation
page read and write
1BBE000
heap
page read and write
4226000
trusted library allocation
page read and write
4270000
trusted library allocation
page read and write
1B1D000
heap
page read and write
41EE000
stack
page read and write
424D000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
4235000
trusted library allocation
page read and write
4300000
heap
page read and write
4219000
trusted library allocation
page read and write
1B42000
heap
page read and write
1BB8000
heap
page read and write
40EE000
stack
page read and write
43B5000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
4235000
trusted library allocation
page read and write
1B4F000
heap
page read and write
1B9A000
heap
page read and write
4270000
trusted library allocation
page read and write
1B2A000
heap
page read and write
1B3B000
heap
page read and write
4240000
trusted library allocation
page read and write
4282000
trusted library allocation
page read and write
1BBE000
heap
page read and write
4245000
trusted library allocation
page read and write
1B9C000
heap
page read and write
4201000
trusted library allocation
page read and write
1BB7000
heap
page read and write
4269000
trusted library allocation
page read and write
4206000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
420C000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
1B54000
heap
page read and write
425A000
trusted library allocation
page read and write
1B9C000
heap
page read and write
1B9A000
heap
page read and write
4478000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
4265000
trusted library allocation
page read and write
1B2D000
heap
page read and write
424B000
trusted library allocation
page read and write
1B2D000
heap
page read and write
1BBB000
heap
page read and write
425C000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
4262000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
4301000
heap
page read and write
3C0F000
stack
page read and write
423A000
trusted library allocation
page read and write
411000
unkown
page readonly
4247000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
1B54000
heap
page read and write
1B2A000
heap
page read and write
420F000
trusted library allocation
page read and write
420C000
trusted library allocation
page read and write
430F000
trusted library allocation
page read and write
422B000
trusted library allocation
page read and write
3FAE000
stack
page read and write
1B9C000
heap
page read and write
4245000
trusted library allocation
page read and write
4209000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
366F000
stack
page read and write
1B2A000
heap
page read and write
426F000
trusted library allocation
page read and write
4256000
trusted library allocation
page read and write
425F000
trusted library allocation
page read and write
4214000
trusted library allocation
page read and write
4236000
trusted library allocation
page read and write
4271000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
4269000
trusted library allocation
page read and write
42E2000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
4596000
trusted library allocation
page read and write
1B50000
heap
page read and write
1BBD000
heap
page read and write
4262000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
3B0F000
stack
page read and write
1F0000
heap
page read and write
1B2A000
heap
page read and write
420E000
trusted library allocation
page read and write
4215000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
356E000
stack
page read and write
423E000
trusted library allocation
page read and write
1B3E000
heap
page read and write
424A000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
422B000
trusted library allocation
page read and write
4226000
trusted library allocation
page read and write
1A0F000
unkown
page readonly
379E000
stack
page read and write
1BBE000
heap
page read and write
1B12000
heap
page read and write
421E000
trusted library allocation
page read and write
4235000
trusted library allocation
page read and write
1BB6000
heap
page read and write
1B54000
heap
page read and write
4690000
heap
page read and write
4229000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
197000
stack
page read and write
1B9C000
heap
page read and write
38F0000
remote allocation
page read and write
423E000
trusted library allocation
page read and write
37A0000
heap
page read and write
42DB000
trusted library allocation
page read and write
425F000
trusted library allocation
page read and write
1B23000
heap
page read and write
4229000
trusted library allocation
page read and write
423B000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
421E000
trusted library allocation
page read and write
4212000
trusted library allocation
page read and write
1B3B000
heap
page read and write
4265000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
4235000
trusted library allocation
page read and write
1BBE000
heap
page read and write
4212000
trusted library allocation
page read and write
4270000
trusted library allocation
page read and write
1B23000
heap
page read and write
4213000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
1AD5000
heap
page execute and read and write
4240000
trusted library allocation
page read and write
1B54000
heap
page read and write
1B4F000
heap
page read and write
4597000
trusted library allocation
page read and write
1B23000
heap
page read and write
4238000
trusted library allocation
page read and write
4262000
trusted library allocation
page read and write
428B000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
4340000
trusted library allocation
page read and write
1B3E000
heap
page read and write
1B3B000
heap
page read and write
4249000
trusted library allocation
page read and write
1B2A000
heap
page read and write
4255000
trusted library allocation
page read and write
1B1E000
heap
page read and write
4256000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
4235000
trusted library allocation
page read and write
425B000
trusted library allocation
page read and write
4206000
trusted library allocation
page read and write
419000
unkown
page write copy
3A0E000
stack
page read and write
423A000
trusted library allocation
page read and write
1B1F000
heap
page read and write
50BA000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
4223000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
420C000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
1AA0000
heap
page read and write
43D8000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
There are 345 hidden memdumps, click here to show them.