Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\aQ7ys7Vd23.exe
|
"C:\Users\user\Desktop\aQ7ys7Vd23.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://defaultcontainer/Wave%20Browser;component/Img/close-32.png
|
unknown
|
||
http://foo/Img/background2a.png
|
unknown
|
||
http://defaultcontainer/Wave%20Browser;component/Img/background2a.png
|
unknown
|
||
https://wavebrowser.co/termsp
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
|
unknown
|
||
http://defaultcontainer/Wave%20Browser;component/Img/LogoAndName.png
|
unknown
|
||
http://foo/bar/page2a.baml
|
unknown
|
||
http://foo/Img/LogoAndName.png
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://wavebrowser.co/terms
|
unknown
|
||
http://foo/Page2a.xaml
|
unknown
|
||
https://myinternetbrowser.com/installing/step2.html?iid=
|
unknown
|
||
http://www.gimp.org/xmp/
|
unknown
|
||
http://foo/Img/close-32.png
|
unknown
|
||
https://wavebrowser.co/about
|
unknown
|
||
http://defaultcontainer/Wave%20Browser;component/Page2a.xaml
|
unknown
|
||
http://foo/bar/img/logoandname.png
|
unknown
|
||
https://wavebrowser.co/uninstall
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
|
unknown
|
||
https://api.wavebrowserbase.com/inst/0/status/chr_stub_started?id=&v=1.5.18.3
|
52.6.252.145
|
||
https://wavebrowser.co/changelog
|
unknown
|
||
https://wavebrowser.co/privacy
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
https://myinternetbrowser.com/installing/step1.html?iid=
|
unknown
|
||
https://api.wavebrowserbase.com
|
unknown
|
||
https://wavebrowser.co/terms=https://wavebrowser.co/privacyAhttps://wavebrowser.co/changelog9https:/
|
unknown
|
||
http://foo/bar/img/background2a.png
|
unknown
|
||
https://wavebrowser.co/terms?
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://wavebrowser.co/changelog?
|
unknown
|
||
http://foo/bar/img/close-32.png
|
unknown
|
||
https://wavebrowser.co/privacy?
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.wavebrowserbase.com
|
52.6.252.145
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
52.6.252.145
|
api.wavebrowserbase.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1CA84000
|
heap
|
page read and write
|
||
1C6D2000
|
heap
|
page read and write
|
||
1C6E8000
|
heap
|
page read and write
|
||
30E2000
|
trusted library allocation
|
page read and write
|
||
1EF1E000
|
heap
|
page read and write
|
||
1CAAA000
|
heap
|
page read and write
|
||
7FF420FC0000
|
trusted library allocation
|
page readonly
|
||
1BAD0000
|
heap
|
page read and write
|
||
1BAD5000
|
heap
|
page read and write
|
||
1EFE6000
|
heap
|
page read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
1CA57000
|
heap
|
page read and write
|
||
20C20000
|
trusted library allocation
|
page read and write
|
||
1C959000
|
heap
|
page read and write
|
||
7FF420FEB000
|
trusted library allocation
|
page execute read
|
||
1C8C4000
|
heap
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
1C8F4000
|
heap
|
page read and write
|
||
213E0000
|
trusted library allocation
|
page read and write
|
||
1EE77000
|
heap
|
page read and write
|
||
7FF420FEC000
|
trusted library allocation
|
page readonly
|
||
CC2000
|
unkown
|
page readonly
|
||
1EE6B000
|
heap
|
page read and write
|
||
20C40000
|
trusted library allocation
|
page read and write
|
||
1C95F000
|
heap
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
2129D000
|
stack
|
page read and write
|
||
213C0000
|
trusted library allocation
|
page read and write
|
||
1C738000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
1B0A0000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
1EC40000
|
trusted library allocation
|
page read and write
|
||
7FF420FD7000
|
trusted library allocation
|
page execute read
|
||
1C976000
|
heap
|
page read and write
|
||
20A50000
|
trusted library allocation
|
page read and write
|
||
1F01B000
|
heap
|
page read and write
|
||
7FF420FC3000
|
trusted library allocation
|
page execute read
|
||
7FF420FC4000
|
trusted library allocation
|
page readonly
|
||
7FF420FE2000
|
trusted library allocation
|
page readonly
|
||
DD0000
|
unkown
|
page readonly
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
30FA000
|
trusted library allocation
|
page read and write
|
||
1BC74000
|
heap
|
page execute and read and write
|
||
30AD000
|
trusted library allocation
|
page read and write
|
||
213D0000
|
trusted library allocation
|
page read and write
|
||
7FF420FD0000
|
trusted library allocation
|
page readonly
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
2F60000
|
heap
|
page execute and read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
11F4000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FF420FEF000
|
trusted library allocation
|
page execute read
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
1CA88000
|
heap
|
page read and write
|
||
1EE99000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1BFBB000
|
stack
|
page read and write
|
||
7FF420FE6000
|
trusted library allocation
|
page readonly
|
||
1C8E1000
|
heap
|
page read and write
|
||
11AA000
|
heap
|
page read and write
|
||
7FF420FE1000
|
trusted library allocation
|
page execute read
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1EC20000
|
trusted library allocation
|
page read and write
|
||
1EEE5000
|
heap
|
page read and write
|
||
1ED80000
|
heap
|
page read and write
|
||
1C8E6000
|
heap
|
page read and write
|
||
30EC000
|
trusted library allocation
|
page read and write
|
||
1CA1B000
|
heap
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page read and write
|
||
1ED7B000
|
stack
|
page read and write
|
||
7FF420FEE000
|
trusted library allocation
|
page readonly
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
1EEE3000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
20C50000
|
trusted library allocation
|
page read and write
|
||
1C741000
|
heap
|
page read and write
|
||
1BB52000
|
heap
|
page read and write
|
||
1BBCA000
|
heap
|
page read and write
|
||
1C5BE000
|
stack
|
page read and write
|
||
1BBAA000
|
heap
|
page read and write
|
||
1C952000
|
heap
|
page read and write
|
||
1C935000
|
heap
|
page read and write
|
||
1C9F0000
|
heap
|
page read and write
|
||
13091000
|
trusted library allocation
|
page read and write
|
||
1BAC0000
|
heap
|
page read and write
|
||
1BADD000
|
heap
|
page read and write
|
||
1EDC7000
|
heap
|
page read and write
|
||
30FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1CA60000
|
heap
|
page read and write
|
||
213B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1CAA6000
|
heap
|
page read and write
|
||
7FF420FE3000
|
trusted library allocation
|
page execute read
|
||
7FF420FE5000
|
trusted library allocation
|
page execute read
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1B070000
|
trusted library allocation
|
page read and write
|
||
7FF420FC1000
|
trusted library allocation
|
page execute read
|
||
1CA71000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
1EFAB000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
20C90000
|
trusted library allocation
|
page read and write
|
||
1EEE9000
|
heap
|
page read and write
|
||
7FF420FE7000
|
trusted library allocation
|
page execute read
|
||
11C0000
|
heap
|
page read and write
|
||
1C8FC000
|
heap
|
page read and write
|
||
20AE0000
|
trusted library allocation
|
page read and write
|
||
20A60000
|
trusted library allocation
|
page read and write
|
||
1C900000
|
heap
|
page read and write
|
||
1EF65000
|
heap
|
page read and write
|
||
1C1BD000
|
stack
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
118C000
|
heap
|
page read and write
|
||
1BBB7000
|
heap
|
page read and write
|
||
1CAB6000
|
heap
|
page read and write
|
||
1EE0D000
|
heap
|
page read and write
|
||
1C965000
|
heap
|
page read and write
|
||
1C919000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1BBC1000
|
heap
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
7FF420FC5000
|
trusted library allocation
|
page execute read
|
||
1BB26000
|
heap
|
page read and write
|
||
1CABE000
|
heap
|
page read and write
|
||
7FF420FC2000
|
trusted library allocation
|
page readonly
|
||
1BBB3000
|
heap
|
page read and write
|
||
13073000
|
trusted library allocation
|
page read and write
|
||
7FF420FED000
|
trusted library allocation
|
page execute read
|
||
214D0000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
1BC10000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
7FF420FD1000
|
trusted library allocation
|
page execute read
|
||
CC0000
|
unkown
|
page readonly
|
||
1CAB9000
|
heap
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page read and write
|
||
7FF420FE4000
|
trusted library allocation
|
page readonly
|
||
1180000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
1B3F8000
|
heap
|
page read and write
|
||
20C60000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
20C70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF420FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1C906000
|
heap
|
page read and write
|
||
1C942000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1BC30000
|
trusted library allocation
|
page read and write
|
||
20DC2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
3676000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1EE09000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1C71E000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
1C3BE000
|
stack
|
page read and write
|
||
1C93B000
|
heap
|
page read and write
|
||
1EEF1000
|
heap
|
page read and write
|
||
20AF0000
|
heap
|
page execute and read and write
|
||
1C71B000
|
heap
|
page read and write
|
||
7FF420FEA000
|
trusted library allocation
|
page readonly
|
||
1EEA1000
|
heap
|
page read and write
|
||
1EFB1000
|
heap
|
page read and write
|
||
20C80000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1EE75000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
1CA7A000
|
heap
|
page read and write
|
||
1BC70000
|
heap
|
page execute and read and write
|
||
1EEA4000
|
heap
|
page read and write
|
||
20C30000
|
trusted library allocation
|
page read and write
|
||
1C0BB000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
20CA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF420FD6000
|
trusted library allocation
|
page readonly
|
||
15A0000
|
heap
|
page read and write
|
||
1BAC3000
|
heap
|
page read and write
|
||
1C8B4000
|
stack
|
page read and write
|
||
DCD000
|
unkown
|
page readonly
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1EE13000
|
heap
|
page read and write
|
||
1BB90000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
1BBA6000
|
heap
|
page read and write
|
||
1132000
|
stack
|
page read and write
|
||
1C4BE000
|
stack
|
page read and write
|
||
1C6BE000
|
stack
|
page read and write
|
||
1C6D6000
|
heap
|
page read and write
|
||
1EE60000
|
heap
|
page read and write
|
||
1EE48000
|
heap
|
page read and write
|
||
1EEDC000
|
heap
|
page read and write
|
||
1EFA7000
|
heap
|
page read and write
|
||
1186000
|
heap
|
page read and write
|
||
1B5FC000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1C9BE000
|
heap
|
page read and write
|
||
1C6C0000
|
heap
|
page read and write
|
||
1EE6E000
|
heap
|
page read and write
|
There are 203 hidden memdumps, click here to show them.