IOC Report
aQ7ys7Vd23

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\aQ7ys7Vd23.exe
"C:\Users\user\Desktop\aQ7ys7Vd23.exe"
malicious

URLs

Name
IP
Malicious
http://defaultcontainer/Wave%20Browser;component/Img/close-32.png
unknown
http://foo/Img/background2a.png
unknown
http://defaultcontainer/Wave%20Browser;component/Img/background2a.png
unknown
https://wavebrowser.co/termsp
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://defaultcontainer/Wave%20Browser;component/Img/LogoAndName.png
unknown
http://foo/bar/page2a.baml
unknown
http://foo/Img/LogoAndName.png
unknown
http://ocsp.sectigo.com0
unknown
https://wavebrowser.co/terms
unknown
http://foo/Page2a.xaml
unknown
https://myinternetbrowser.com/installing/step2.html?iid=
unknown
http://www.gimp.org/xmp/
unknown
http://foo/Img/close-32.png
unknown
https://wavebrowser.co/about
unknown
http://defaultcontainer/Wave%20Browser;component/Page2a.xaml
unknown
http://foo/bar/img/logoandname.png
unknown
https://wavebrowser.co/uninstall
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://api.wavebrowserbase.com/inst/0/status/chr_stub_started?id=&v=1.5.18.3
52.6.252.145
https://wavebrowser.co/changelog
unknown
https://wavebrowser.co/privacy
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://myinternetbrowser.com/installing/step1.html?iid=
unknown
https://api.wavebrowserbase.com
unknown
https://wavebrowser.co/terms=https://wavebrowser.co/privacyAhttps://wavebrowser.co/changelog9https:/
unknown
http://foo/bar/img/background2a.png
unknown
https://wavebrowser.co/terms?
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://wavebrowser.co/changelog?
unknown
http://foo/bar/img/close-32.png
unknown
https://wavebrowser.co/privacy?
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.wavebrowserbase.com
52.6.252.145

IPs

IP
Domain
Country
Malicious
52.6.252.145
api.wavebrowserbase.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aQ7ys7Vd23_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9B794000
trusted library allocation
page read and write
1CA84000
heap
page read and write
1C6D2000
heap
page read and write
1C6E8000
heap
page read and write
30E2000
trusted library allocation
page read and write
1EF1E000
heap
page read and write
1CAAA000
heap
page read and write
7FF420FC0000
trusted library allocation
page readonly
1BAD0000
heap
page read and write
1BAD5000
heap
page read and write
1EFE6000
heap
page read and write
13071000
trusted library allocation
page read and write
1CA57000
heap
page read and write
20C20000
trusted library allocation
page read and write
1C959000
heap
page read and write
7FF420FEB000
trusted library allocation
page execute read
1C8C4000
heap
page read and write
1207000
heap
page read and write
1C8F4000
heap
page read and write
213E0000
trusted library allocation
page read and write
1EE77000
heap
page read and write
7FF420FEC000
trusted library allocation
page readonly
CC2000
unkown
page readonly
1EE6B000
heap
page read and write
20C40000
trusted library allocation
page read and write
1C95F000
heap
page read and write
1BEBE000
stack
page read and write
2129D000
stack
page read and write
213C0000
trusted library allocation
page read and write
1C738000
heap
page read and write
306E000
stack
page read and write
1B0A0000
trusted library allocation
page read and write
1480000
heap
page read and write
11EE000
heap
page read and write
2ED0000
trusted library allocation
page read and write
1EC40000
trusted library allocation
page read and write
7FF420FD7000
trusted library allocation
page execute read
1C976000
heap
page read and write
20A50000
trusted library allocation
page read and write
1F01B000
heap
page read and write
7FF420FC3000
trusted library allocation
page execute read
7FF420FC4000
trusted library allocation
page readonly
7FF420FE2000
trusted library allocation
page readonly
DD0000
unkown
page readonly
7FFD9B890000
trusted library allocation
page execute and read and write
30FA000
trusted library allocation
page read and write
1BC74000
heap
page execute and read and write
30AD000
trusted library allocation
page read and write
213D0000
trusted library allocation
page read and write
7FF420FD0000
trusted library allocation
page readonly
7FFD9B773000
trusted library allocation
page execute and read and write
2F60000
heap
page execute and read and write
CC0000
unkown
page readonly
11F4000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FF420FEF000
trusted library allocation
page execute read
7FFD9B958000
trusted library allocation
page read and write
1CA88000
heap
page read and write
1EE99000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1BFBB000
stack
page read and write
7FF420FE6000
trusted library allocation
page readonly
1C8E1000
heap
page read and write
11AA000
heap
page read and write
7FF420FE1000
trusted library allocation
page execute read
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
1EC20000
trusted library allocation
page read and write
1EEE5000
heap
page read and write
1ED80000
heap
page read and write
1C8E6000
heap
page read and write
30EC000
trusted library allocation
page read and write
1CA1B000
heap
page read and write
2ED3000
trusted library allocation
page read and write
1ED7B000
stack
page read and write
7FF420FEE000
trusted library allocation
page readonly
7FFD9B826000
trusted library allocation
page read and write
1EEE3000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
20C50000
trusted library allocation
page read and write
1C741000
heap
page read and write
1BB52000
heap
page read and write
1BBCA000
heap
page read and write
1C5BE000
stack
page read and write
1BBAA000
heap
page read and write
1C952000
heap
page read and write
1C935000
heap
page read and write
1C9F0000
heap
page read and write
13091000
trusted library allocation
page read and write
1BAC0000
heap
page read and write
1BADD000
heap
page read and write
1EDC7000
heap
page read and write
30FE000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1CA60000
heap
page read and write
213B0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
1CAA6000
heap
page read and write
7FF420FE3000
trusted library allocation
page execute read
7FF420FE5000
trusted library allocation
page execute read
7FFD9B930000
trusted library allocation
page execute and read and write
1B070000
trusted library allocation
page read and write
7FF420FC1000
trusted library allocation
page execute read
1CA71000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
1EFAB000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
20C90000
trusted library allocation
page read and write
1EEE9000
heap
page read and write
7FF420FE7000
trusted library allocation
page execute read
11C0000
heap
page read and write
1C8FC000
heap
page read and write
20AE0000
trusted library allocation
page read and write
20A60000
trusted library allocation
page read and write
1C900000
heap
page read and write
1EF65000
heap
page read and write
1C1BD000
stack
page read and write
16F5000
heap
page read and write
118C000
heap
page read and write
1BBB7000
heap
page read and write
1CAB6000
heap
page read and write
1EE0D000
heap
page read and write
1C965000
heap
page read and write
1C919000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1BBC1000
heap
page read and write
315B000
trusted library allocation
page read and write
7FF420FC5000
trusted library allocation
page execute read
1BB26000
heap
page read and write
1CABE000
heap
page read and write
7FF420FC2000
trusted library allocation
page readonly
1BBB3000
heap
page read and write
13073000
trusted library allocation
page read and write
7FF420FED000
trusted library allocation
page execute read
214D0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
1BC10000
heap
page read and write
1170000
heap
page read and write
7FF420FD1000
trusted library allocation
page execute read
CC0000
unkown
page readonly
1CAB9000
heap
page read and write
7FFD9B91D000
trusted library allocation
page read and write
7FF420FE4000
trusted library allocation
page readonly
1180000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
11C3000
heap
page read and write
1B3F8000
heap
page read and write
20C60000
trusted library allocation
page read and write
16F0000
heap
page read and write
20C70000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FF420FF0000
trusted library allocation
page execute and read and write
1C906000
heap
page read and write
1C942000
heap
page read and write
2EE0000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1BC30000
trusted library allocation
page read and write
20DC2000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
3676000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1EE09000
heap
page read and write
11F0000
heap
page read and write
1C71E000
heap
page read and write
1350000
heap
page read and write
1C3BE000
stack
page read and write
1C93B000
heap
page read and write
1EEF1000
heap
page read and write
20AF0000
heap
page execute and read and write
1C71B000
heap
page read and write
7FF420FEA000
trusted library allocation
page readonly
1EEA1000
heap
page read and write
1EFB1000
heap
page read and write
20C80000
trusted library allocation
page read and write
1360000
heap
page read and write
1EE75000
heap
page read and write
1355000
heap
page read and write
1CA7A000
heap
page read and write
1BC70000
heap
page execute and read and write
1EEA4000
heap
page read and write
20C30000
trusted library allocation
page read and write
1C0BB000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FF420FD6000
trusted library allocation
page readonly
15A0000
heap
page read and write
1BAC3000
heap
page read and write
1C8B4000
stack
page read and write
DCD000
unkown
page readonly
7FFD9B82C000
trusted library allocation
page execute and read and write
1EE13000
heap
page read and write
1BB90000
heap
page read and write
3071000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1BBA6000
heap
page read and write
1132000
stack
page read and write
1C4BE000
stack
page read and write
1C6BE000
stack
page read and write
1C6D6000
heap
page read and write
1EE60000
heap
page read and write
1EE48000
heap
page read and write
1EEDC000
heap
page read and write
1EFA7000
heap
page read and write
1186000
heap
page read and write
1B5FC000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1C9BE000
heap
page read and write
1C6C0000
heap
page read and write
1EE6E000
heap
page read and write
There are 203 hidden memdumps, click here to show them.