Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 07:18
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000023475-180.dat acprotect behavioral1/memory/2000-182-0x0000000073C00000-0x0000000073C09000-memory.dmp acprotect behavioral1/memory/2000-208-0x0000000073C00000-0x0000000073C09000-memory.dmp acprotect behavioral1/memory/2000-205-0x0000000073C00000-0x0000000073C09000-memory.dmp acprotect behavioral1/memory/2000-266-0x0000000073730000-0x0000000073739000-memory.dmp acprotect behavioral1/memory/2000-264-0x0000000073730000-0x0000000073739000-memory.dmp acprotect behavioral1/memory/2000-299-0x0000000073140000-0x0000000073149000-memory.dmp acprotect -
Checks computer location settings 2 TTPs 29 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation SWUpdater.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation SWUpdater.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation wavebrowser.exe -
Executes dropped EXE 64 IoCs
pid Process 2000 Wave Browser.exe 3592 SWUpdaterSetup.exe 2324 SWUpdater.exe 4004 SWUpdater.exe 2472 SWUpdaterComRegisterShell64.exe 1576 SWUpdaterComRegisterShell64.exe 3724 SWUpdaterComRegisterShell64.exe 4424 SWUpdater.exe 528 SWUpdater.exe 4940 SWUpdater.exe 2736 WaveInstaller-v1.3.16.1.exe 5000 setup.exe 4048 setup.exe 2152 setup.exe 2072 setup.exe 1548 wavebrowser.exe 908 wavebrowser.exe 1296 wavebrowser.exe 3720 wavebrowser.exe 544 wavebrowser.exe 5168 wavebrowser.exe 5180 wavebrowser.exe 5156 wavebrowser.exe 5852 SWUpdater.exe 6008 wavebrowser.exe 5320 wavebrowser.exe 5428 wavebrowser.exe 5448 wavebrowser.exe 5464 wavebrowser.exe 4612 wavebrowser.exe 5544 wavebrowser.exe 5488 wavebrowser.exe 5532 wavebrowser.exe 5504 wavebrowser.exe 5800 wavebrowser.exe 5816 wavebrowser.exe 2992 wavebrowser.exe 6108 wavebrowser.exe 5832 wavebrowser.exe 4296 wavebrowser.exe 1344 wavebrowser.exe 5680 wavebrowser.exe 5720 wavebrowser.exe 6088 wavebrowser.exe 5316 wavebrowser.exe 5944 wavebrowser.exe 5508 wavebrowser.exe 5916 wavebrowser.exe 880 wavebrowser.exe 5812 wavebrowser.exe 6096 wavebrowser.exe 5352 wavebrowser.exe 5496 wavebrowser.exe 5920 wavebrowser.exe 6056 wavebrowser.exe 4972 wavebrowser.exe 6180 wavebrowser.exe 6196 wavebrowser.exe 6460 wavebrowser.exe 6472 wavebrowser.exe 6712 wavebrowser.exe 6852 wavebrowser.exe 6908 wavebrowser.exe 6396 wavebrowser.exe -
Loads dropped DLL 64 IoCs
pid Process 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2000 Wave Browser.exe 2324 SWUpdater.exe 4004 SWUpdater.exe 2472 SWUpdaterComRegisterShell64.exe 4004 SWUpdater.exe 1576 SWUpdaterComRegisterShell64.exe 4004 SWUpdater.exe 3724 SWUpdaterComRegisterShell64.exe 4004 SWUpdater.exe 4424 SWUpdater.exe 528 SWUpdater.exe 4940 SWUpdater.exe 4940 SWUpdater.exe 528 SWUpdater.exe 1548 wavebrowser.exe 908 wavebrowser.exe 1548 wavebrowser.exe 1296 wavebrowser.exe 3720 wavebrowser.exe 1296 wavebrowser.exe 3720 wavebrowser.exe 1296 wavebrowser.exe 1296 wavebrowser.exe 1296 wavebrowser.exe 1296 wavebrowser.exe 544 wavebrowser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 55 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32 SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ThreadingModel = "Both" SWUpdater.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{3C41B0C4-B5B6-4293-BED4-C927CCFDB909}\LocalServer32\ = "\"C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\SWUpdaterOnDemand.exe\"" SWUpdater.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32 SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ThreadingModel = "Both" SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32 SWUpdater.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{D12748C8-5013-45E2-9A24-2FB7C2EEFB7C}\LocalServer32\ = "\"C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\SWUpdaterOnDemand.exe\"" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{9CD78CBC-FD21-4FFF-B452-9D792A58B7C4}\LocalServer32 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ThreadingModel = "Both" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser.dll" SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{30FB944E-9455-49DD-81C6-7542E47AA3E7}\LocalServer32\ = "\"C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\SWUpdaterOnDemand.exe\"" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser.dll" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{9E0CE9B5-C498-40A8-B7F2-B89AF1C56FFF}\LocalServer32\ = "\"C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\SWUpdater.exe\"" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser.dll" SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32 SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{9E0CE9B5-C498-40A8-B7F2-B89AF1C56FFF}\LocalServer32 SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{1BE9D40C-2307-4213-830E-7E3CE9EDF0C2}\LocalServer32\ = "\"C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\SWUpdaterOnDemand.exe\"" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32 SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{1BE9D40C-2307-4213-830E-7E3CE9EDF0C2}\LocalServer32 SWUpdater.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32 SWUpdaterComRegisterShell64.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{D12748C8-5013-45E2-9A24-2FB7C2EEFB7C}\LocalServer32 SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{9CD78CBC-FD21-4FFF-B452-9D792A58B7C4}\LocalServer32\ = "\"C:\\Users\\Admin\\Wavesor Software\\WaveBrowser\\1.3.16.1\\notification_helper.exe\"" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{9CD78CBC-FD21-4FFF-B452-9D792A58B7C4}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\Wavesor Software\\WaveBrowser\\1.3.16.1\\notification_helper.exe" setup.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{30FB944E-9455-49DD-81C6-7542E47AA3E7}\LocalServer32 SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A}\InprocServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{3C41B0C4-B5B6-4293-BED4-C927CCFDB909}\LocalServer32 SWUpdater.exe -
resource yara_rule behavioral1/files/0x0007000000023475-180.dat upx behavioral1/memory/2000-182-0x0000000073C00000-0x0000000073C09000-memory.dmp upx behavioral1/memory/2000-208-0x0000000073C00000-0x0000000073C09000-memory.dmp upx behavioral1/memory/2000-205-0x0000000073C00000-0x0000000073C09000-memory.dmp upx behavioral1/memory/2000-266-0x0000000073730000-0x0000000073739000-memory.dmp upx behavioral1/memory/2000-264-0x0000000073730000-0x0000000073739000-memory.dmp upx behavioral1/memory/2000-299-0x0000000073140000-0x0000000073149000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wavesor SWUpdater = "\"C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\SWUpdaterCore.exe\"" SWUpdater.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SWUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SWUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SWUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SWUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SWUpdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SWUpdater.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer wavebrowser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName wavebrowser.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\psuser_64.dll SWUpdaterSetup.exe File opened for modification C:\Program Files (x86)\Wavesor\Temp\GUTE15.tmp SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdaterCore.exe SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\swupdaterres_en.dll SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdaterBroker.exe SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\swupdater.dll SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdaterOnDemand.exe SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\psmachine_64.dll SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\psuser.dll SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdater.exe SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\psmachine.dll SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdaterSetup.exe SWUpdaterSetup.exe File opened for modification C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdaterSetup.exe SWUpdaterSetup.exe File created C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdaterComRegisterShell64.exe SWUpdaterSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023467-136.dat nsis_installer_1 behavioral1/files/0x0007000000023467-136.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS wavebrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName wavebrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer wavebrowser.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133597127589477103" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry wavebrowser.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{617E37E1-AC79-4162-BACC-C797A1D31D3E} SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{0D311A22-BD24-4C7A-8FC1-117F8D62A781}\NumMethods SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.webp setup.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{2C53B9D4-A718-4972-B28E-2E7AF1055602} SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WaveBrwsHTM.GIV6OS7XMQB66P4LDNVCNOOI7A\Application setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{DDF98EF0-2728-4A8D-8B0F-32627DC56437}\NumMethods\ = "24" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{7DFF302B-EA41-49F8-97B1-9413CEF98C68} SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{D3C865DD-E36B-432E-9E47-554925B86737}\NumMethods\ = "4" SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{9E0CE9B5-C498-40A8-B7F2-B89AF1C56FFF}\ProgID SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{2B2AD342-8BBC-40AD-AF1B-6887EAB9D3D0}\InprocHandler32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{CFDE680E-8700-4808-BAAF-8B1F50F2CC87} SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{92333BDA-3022-4A7F-8858-081260EA85DE}\ProxyStubClsid32 SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{E4E4854F-9D7B-4120-A207-CF52C875F08E}\NumMethods SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{2C53B9D4-A718-4972-B28E-2E7AF1055602}\NumMethods SWUpdaterComRegisterShell64.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{2B2AD342-8BBC-40AD-AF1B-6887EAB9D3D0} SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WavesorSWUpdater.CredentialDialogUser.1.0\ = "SWUpdater CredentialDialog" SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{D12748C8-5013-45E2-9A24-2FB7C2EEFB7C} SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{E4E4854F-9D7B-4120-A207-CF52C875F08E}\ProxyStubClsid32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{D12748C8-5013-45E2-9A24-2FB7C2EEFB7C}\ProgID SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{62A51DF2-CCB8-4DD9-9069-34B8461617FC}\NumMethods\ = "10" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{E44DDEE0-3097-499E-9DD5-7D5D5DCC401D} SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE}\InprocServer32\ThreadingModel = "Both" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A} SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{C5E89508-3927-4EF5-A3B3-C479F0D4E36F}\NumMethods\ = "11" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{DDF98EF0-2728-4A8D-8B0F-32627DC56437}\NumMethods\ = "24" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{E44B162B-4287-40B0-8E7A-6E251D80B3DF}\ProxyStubClsid32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{DDF98EF0-2728-4A8D-8B0F-32627DC56437}\ProxyStubClsid32\ = "{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{2C53B9D4-A718-4972-B28E-2E7AF1055602}\ = "IAppVersion" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{6130C56B-9B2C-4D5D-8160-C7A583B5DC3B} SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{30FB944E-9455-49DD-81C6-7542E47AA3E7} SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{3C41B0C4-B5B6-4293-BED4-C927CCFDB909}\ = "SWUpdater Policy Status Class" SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.shtml\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{E053F7BD-D525-49F4-9ADE-5D7E6FCEE775}\NumMethods\ = "4" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{2B2AD342-8BBC-40AD-AF1B-6887EAB9D3D0} SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{2C53B9D4-A718-4972-B28E-2E7AF1055602}\ProxyStubClsid32\ = "{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{894ADE70-1E5F-4520-A281-CE3BF0309CE6}\NumMethods\ = "11" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{CEF9DF20-AE5B-4A54-B479-9C2AFC1C2683} SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{068FAC78-4F23-4F74-99A0-F7C4797D5ECA}\ = "IApp" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{30FB944E-9455-49DD-81C6-7542E47AA3E7}\LocalServer32\ = "\"C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\SWUpdaterOnDemand.exe\"" SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{44367D77-92C0-45E8-840D-0C098E650CE8} SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{0D311A22-BD24-4C7A-8FC1-117F8D62A781}\ = "IProgressWndEvents" SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{3BE77C6E-0029-4F24-B677-32C9E15CD8F1}\ = "IGoogleUpdate3WebSecurity" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{92333BDA-3022-4A7F-8858-081260EA85DE}\ProxyStubClsid32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{730EBDF4-7AD2-4516-BF1A-6C6F28C60CF9}\ = "IProcessLauncher" SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{97518FC7-7CA2-4921-BC40-F4A07E221C1C}\ProxyStubClsid32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{8129608C-48BD-42A6-9EBC-7B0933A5CFA3}\ProxyStubClsid32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{0D311A22-BD24-4C7A-8FC1-117F8D62A781}\NumMethods SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{64A19E70-BCFF-4808-A320-774FD11571E5}\ProxyStubClsid32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{E44DDEE0-3097-499E-9DD5-7D5D5DCC401D}\ProxyStubClsid32 SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE} SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{92333BDA-3022-4A7F-8858-081260EA85DE} SWUpdaterComRegisterShell64.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\CLSID\{F6994161-37C3-47C9-BE83-C84C33A1CF2A} SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{DDF98EF0-2728-4A8D-8B0F-32627DC56437}\ProxyStubClsid32 SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{730EBDF4-7AD2-4516-BF1A-6C6F28C60CF9}\ProxyStubClsid32 SWUpdater.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{F87D77DF-DEF2-4294-9F4B-A92E5A6725DE} SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WOW6432Node\Interface\{894ADE70-1E5F-4520-A281-CE3BF0309CE6} SWUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\WaveBrwsHTM.GIV6OS7XMQB66P4LDNVCNOOI7A\AppUserModelId = "WaveBrowser.GIV6OS7XMQB66P4LDNVCNOOI7A" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{B2083DCC-1D29-45E6-8386-BEE1488D11AA}\ = "IAppBundleWeb" SWUpdaterComRegisterShell64.exe Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{2B2AD342-8BBC-40AD-AF1B-6887EAB9D3D0}\InprocHandler32 SWUpdaterComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{CEF9DF20-AE5B-4A54-B479-9C2AFC1C2683}\ProxyStubClsid32 SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{DDF98EF0-2728-4A8D-8B0F-32627DC56437}\ProxyStubClsid32\ = "{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{D7EC6DDA-90E9-44BA-863B-6C3500BB5BDF}\InProcServer32\ = "C:\\Users\\Admin\\Wavesor Software\\SWUpdater\\1.3.133.0\\psuser_64.dll" SWUpdaterComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Interface\{C5E89508-3927-4EF5-A3B3-C479F0D4E36F}\ = "IAppCommand" SWUpdaterComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 2324 SWUpdater.exe 2324 SWUpdater.exe 5000 setup.exe 5000 setup.exe 5000 setup.exe 5000 setup.exe 5000 setup.exe 5000 setup.exe 5000 setup.exe 5000 setup.exe 2324 SWUpdater.exe 2324 SWUpdater.exe 2324 SWUpdater.exe 2324 SWUpdater.exe 6644 chrome.exe 6644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe Token: SeShutdownPrivilege 3136 chrome.exe Token: SeCreatePagefilePrivilege 3136 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 2152 setup.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe -
Suspicious use of SendNotifyMessage 51 IoCs
pid Process 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 3136 chrome.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe 1548 wavebrowser.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 3252 3136 chrome.exe 82 PID 3136 wrote to memory of 3252 3136 chrome.exe 82 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4072 3136 chrome.exe 84 PID 3136 wrote to memory of 4240 3136 chrome.exe 85 PID 3136 wrote to memory of 4240 3136 chrome.exe 85 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 PID 3136 wrote to memory of 628 3136 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wavebrowser.co/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84b33ab58,0x7ff84b33ab68,0x7ff84b33ab782⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:22⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4432 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4844 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4556 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5140 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4916 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:82⤵PID:4612
-
-
C:\Users\Admin\Downloads\Wave Browser.exe"C:\Users\Admin\Downloads\Wave Browser.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\nsq95A9.tmp\SWUpdaterSetup.exe"C:\Users\Admin\AppData\Local\Temp\nsq95A9.tmp\SWUpdaterSetup.exe" /install "bundlename=WaveBrowser&appguid={EB149AD2-CE4E-4F51-B7FC-A149FAA4CCAF}&appname=WaveBrowser&needsadmin=False&lang=en&usagestats=1&installdataindex=1"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3592 -
C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdater.exe"C:\Program Files (x86)\Wavesor\Temp\GUME14.tmp\SWUpdater.exe" /install "bundlename=WaveBrowser&appguid={EB149AD2-CE4E-4F51-B7FC-A149FAA4CCAF}&appname=WaveBrowser&needsadmin=False&lang=en&usagestats=1&installdataindex=1"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe"C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Checks whether UAC is enabled
- Modifies registry class
PID:4004 -
C:\Users\Admin\Wavesor Software\SWUpdater\1.3.133.0\SWUpdaterComRegisterShell64.exe"C:\Users\Admin\Wavesor Software\SWUpdater\1.3.133.0\SWUpdaterComRegisterShell64.exe" /user6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2472
-
-
C:\Users\Admin\Wavesor Software\SWUpdater\1.3.133.0\SWUpdaterComRegisterShell64.exe"C:\Users\Admin\Wavesor Software\SWUpdater\1.3.133.0\SWUpdaterComRegisterShell64.exe" /user6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1576
-
-
C:\Users\Admin\Wavesor Software\SWUpdater\1.3.133.0\SWUpdaterComRegisterShell64.exe"C:\Users\Admin\Wavesor Software\SWUpdater\1.3.133.0\SWUpdaterComRegisterShell64.exe" /user6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3724
-
-
-
C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe"C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe" /ping 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-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4424
-
-
C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe"C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe" /handoff "bundlename=WaveBrowser&appguid={EB149AD2-CE4E-4F51-B7FC-A149FAA4CCAF}&appname=WaveBrowser&needsadmin=False&lang=en&usagestats=1&installdataindex=1" /installsource otherinstallcmd /sessionid "{7BB88BC2-9C77-4CAF-938E-FBCB8C1AF467}"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:528
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 --field-trial-handle=1892,i,7883451753967247404,122625580344786803,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6644
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1000
-
C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe"C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe" -Embedding1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4940 -
C:\Users\Admin\Wavesor Software\SWUpdater\Install\{830FC47E-D197-413A-8FF2-DA9DE039648F}\WaveInstaller-v1.3.16.1.exe"C:\Users\Admin\Wavesor Software\SWUpdater\Install\{830FC47E-D197-413A-8FF2-DA9DE039648F}\WaveInstaller-v1.3.16.1.exe" /installerdata="C:\Users\Admin\AppData\Local\Temp\gui4CF2.tmp"2⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\wavebrowser.packed.7z" --wid=i7k50077 --make-chrome-default --installerdata="C:\Users\Admin\AppData\Local\Temp\gui4CF2.tmp"3⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Crashpad" --annotation=channel= --annotation=plat=Win64 --annotation=prod=WaveBrowser --annotation=ver=1.3.16.1 --initial-client-data=0x274,0x278,0x27c,0x244,0x280,0x7ff6ea42da10,0x7ff6ea42da20,0x7ff6ea42da304⤵
- Executes dropped EXE
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exe" --verbose-logging --installerdata="C:\Users\Admin\AppData\Local\Temp\gui4CF2.tmp" --create-shortcuts=0 --install-level=04⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\nsu4FA3.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Crashpad" --annotation=channel= --annotation=plat=Win64 --annotation=prod=WaveBrowser --annotation=ver=1.3.16.1 --initial-client-data=0x274,0x278,0x27c,0x244,0x280,0x7ff6ea42da10,0x7ff6ea42da20,0x7ff6ea42da305⤵
- Executes dropped EXE
PID:2072
-
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --prevdefbrowser=6 --install-type=1 --from-installer4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1548 -
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\WaveBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\WaveBrowser\User Data" --annotation=channel= --annotation=plat=Win64 --annotation=prod=WaveBrowser --annotation=ver=1.3.16.1 --initial-client-data=0xd4,0xfc,0x108,0xec,0x10c,0x7ff8390548b0,0x7ff8390548c0,0x7ff8390548d05⤵
- Executes dropped EXE
- Loads dropped DLL
PID:908
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=gpu-process --start-stack-profiler --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2024 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --start-stack-profiler --mojo-platform-channel-handle=2072 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3720
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1668 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:544
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3276 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3432 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5168
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3500 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5180
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4420 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6008
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4512 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5320
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4536 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5504
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4748 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5428
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4872 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5448
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --start-stack-profiler --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4988 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5464
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5104 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:4612
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5204 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5544
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --start-stack-profiler --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5336 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5488
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --instant-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5456 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5532
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6152 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5800
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6288 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5816
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=6520 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:2992
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=6652 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:6108
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5832
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6300 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:4296
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7196 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:1344
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7164 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5680
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7468 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5720
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7616 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6088
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7456 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5944
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7968 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5316
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7960 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5508
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=8032 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5916
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7720 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:880
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7864 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5812
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7508 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6096
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7524 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5352
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8100 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5496
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7996 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:5920
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6980 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6056
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6268 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:4972
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8276 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6180
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8416 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6196
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8552 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6460
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8692 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6472
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8840 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6712
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7224 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6852
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=9116 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6908
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=9100 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵
- Executes dropped EXE
PID:6396
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=9388 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:6424
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=9540 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:6768
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=9680 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:6676
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=9816 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:6220
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=9948 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:6208
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=10088 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:6660
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=10228 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:5036
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3684 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:7064
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --mojo-platform-channel-handle=10500 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:7120
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --mojo-platform-channel-handle=10644 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6344
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --mojo-platform-channel-handle=6508 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6280
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --start-stack-profiler --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --mojo-platform-channel-handle=11160 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6500
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --mojo-platform-channel-handle=11136 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6616
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --mojo-platform-channel-handle=10964 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6808
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --mojo-platform-channel-handle=11100 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6840
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=11684 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:7024
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --mojo-platform-channel-handle=11832 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:7100
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --mojo-platform-channel-handle=11968 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:1712
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --mojo-platform-channel-handle=12248 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6640
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5436 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:85⤵PID:4432
-
-
C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe"C:\Users\Admin\Wavesor Software\WaveBrowser\wavebrowser.exe" --type=renderer --start-stack-profiler --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --mojo-platform-channel-handle=11924 --field-trial-handle=2028,i,11870086659046989626,4219578227136472153,262144 /prefetch:15⤵
- Checks computer location settings
PID:6944
-
-
-
-
-
C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe"C:\Users\Admin\Wavesor Software\SWUpdater\SWUpdater.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHBzOi8vY2RuLnN3dXBkYXRlci5jb20vYnVpbGQvV2F2ZUJyb3dzZXIvc3RhYmxlL3dpbi8xMTEyMzk3NTc4MjQxLzY0L1dhdmVJbnN0YWxsZXItdjEuMy4xNi4xLmV4ZSIgZG93bmxvYWRlZD0iOTg1MTEyODgiIHRvdGFsPSI5ODUxMTI4OCIgZG93bmxvYWRfdGltZV9tcz0iODIzOCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc291cmNlX3VybF9pbmRleD0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjYyMyIgZG93bmxvYWRfdGltZV9tcz0iOTAwNiIgZG93bmxvYWRlZD0iOTg1MTEyODgiIHRvdGFsPSI5ODUxMTI4OCIgaW5zdGFsbF90aW1lX21zPSIxMDc2NiIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD557428456c6e6c2ea328c864681db5df3
SHA12dc7329e0b346c435b6ea5cf44a3d0a076f8d398
SHA256ee87747102eba8844939352740d0bb6c4a67f10c2656961cb2722cd42ba99f40
SHA51240fb34fce07f094fdaf78c499a21c3f534f0c8ae1246b6cf382ea7e63fa08b4de56e6c81eb8fadce8a2e508ae5d03831590a06ffda3d46026fb894e4997f31b0
-
Filesize
190KB
MD510b82dc9d9a29bc4af224981f0e1c6fe
SHA1bc33b2eeac62916eb9ee93a3f1ed6a0eb7611187
SHA25600cd644354032257a39ff710ddd03e9fb98348f5323dec31ca670c903d68274c
SHA512a3c67a858ce7889506572e2448b5d1e936c6d6ada2a04736b1f6cfe12b9ae46e9ee8c925778cda273db54000854f1ec4a544bcf2255770b978c7c6e9e24a1664
-
Filesize
208KB
MD5d40bd627bfb2ba39c5452a71a450eabd
SHA1a0441dc20102fa71225f4f61675537d0549d5353
SHA2568af504dda28da0896cb0e17273878d285d8cc1f912d304b21a49940fb577a0a5
SHA512434a8f5154a509bda70ef7af58e0029ba3ad9da0e3803f9975609cae65a1fdc0449d3a8d110a6928e9e621c7ea203ca98d96618c1dde3dee3a8110e806c05499
-
Filesize
259KB
MD571dd0abc865c9d8873e93478707a16d8
SHA16cc5c855b93e455c92fc15853a7ac219f62a3b3e
SHA256a0439f5455ef696b70a230ab76c15f4bc3d7571ad4fbc32fda95247789aa5822
SHA5129c5cdf72684a6fbf9fc4194f26208a7e5b877be8eaf1f5a334b3691f7cc281c7f134421592a920f4f3a3f45c1287d04a95631411bf2bbb189e137d1d1d143a22
-
Filesize
1.0MB
MD5d388d67a1861f9d0cc4f6edfa97861b4
SHA1ca82fdb6ff39fe0b157100d1c8eec48b73c34791
SHA256b21f99f14b4ccc78c5e01c269a8eba83ae0c5912b46d8c1554f329a1076a7617
SHA51271879d3dd7b1b0b169e3c80fd88ff6f656778af85462363202c4f28ae57b547ee569e5b43f55d0446cfbed736c32fa249ba91a5c34e8d9363295be86b1d5a3d3
-
Filesize
42KB
MD535fd9f0a8fd4a41ebecab887715a3ffd
SHA103ce4a819fb75e4c5e756fbe73f8a63b885b0624
SHA256a535ef96bcbe7f6953fb6d7194540716df495bd7cf25e902dddb6756561189bc
SHA512e6db60d25de13f5f452fd249ac2f6cddd0958a2830404a2144154ee0e1023cf5cbff3e58831383b14c9950dcf7c4b4b784d15e972b44808f8d02870a44d62d14
-
Filesize
312B
MD5dc0a4420c10079493b6a18deb4280a9b
SHA1048d27776f9791d2000940b8dadeb3a151471809
SHA256f8710fc7de7eb1fde58252e0456b0e32200f75897879b4c2ed2c343ad42c1568
SHA5121a9b5bf0769e716941445e79aae4fccaf11bd516ae67658b008ac647076901d828fa8a1b64c8f1258d19f7c008f3c3933bc6932fa071ca35c15792a3064d41d0
-
Filesize
3KB
MD57aa12cf6ae55570bb1e3fef0f3d0068f
SHA1c4f4f0ebaac6c83988eceeb495c12c3c2b674550
SHA2566f1e4e4a72564c970fae24f3bd7d138939c4556f77cea66a64aafd0835ee737a
SHA5127b2bac1c1850af89ccfe0daadb2549ca324603872548b53b60755bc96549b72302e5b82193c3751a87e349cabe4267e6117d79b860f714f5f37e465c6bd82da7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1023B
MD556b4589efa98e4ea3134f945ef59616b
SHA1eeb8210434b2d8997ae990bfa34239588cae1842
SHA256d88c3d915368c56f576155ac7fcdcf00ee5a27384c9cef05f616128b0adf84d0
SHA512e3933d8e510ed37f46ea2ed5662588786718225424496b9920b6ce75a3a5451e8cd637a3e321ec204d86fde6ee3076788406381e08afa6037b18d979f5f2774f
-
Filesize
1023B
MD53d72c214ce225ff7a3966377b869ebf6
SHA111f188888a59c6378eb87324d5ab40781e9ad21c
SHA256ac844e021f35c973d3595e671ee1660eb7588edddc89860d06886997860b4cf7
SHA512fe43a3bf64ac3c11c225573f3e16e6f1ff1020fa08734d28abc2586b9bb3a3d953d42e0cf8caf0f7c3b828ee2529814ca3e473907e126f1959863be982ac4f64
-
Filesize
7KB
MD5219e6f2de4412eeb39e0eac7faf4a5de
SHA1ad82d7f5bc392b6abf40972b76dff80d1663912c
SHA25662e7c48a3f4857d2d52e45af887da21b620f76d4c214443e97f479ff45c7db00
SHA512cdef37423dbd2d8b7308324467886131af9066fb2cec5562621ef28fbb974633a432e56116d768305483ec583cb609701fad448a37c29fe47d1aba3a2dfee8b4
-
Filesize
7KB
MD52445edc820ba79f7dfa8ac00f4264309
SHA13cbccc95ebabeb58825a8fd004ae46dda2e6d1dc
SHA256fe8160f0edb43f692e1620c0fb92723486a1302975a42f45635697f51489f028
SHA5126a68ae3508b32050257c61298f9e2c6b56219a33e8f66f4796e29ed9ee92bc7b48fd3a9ee44b9d6ebe2c0162d0296631a16d9a312dec1c9dfda25e5ab0f04901
-
Filesize
130KB
MD59e39674ab14128df9ba848d6b2172283
SHA132752bfe09eebb371cda78fee79380ad71f3e893
SHA256ec4f2be822b63179c663414523622a1bd41aef2f7bc49abbbbae318f5e5cbfc0
SHA512e7746a4cc042c238d1ece7b15967142b82d4abcb1f95c98a427ba70810a9eb14561f37d866a7434a3a0cf1eaaa980641a682c1165c5c20784af05b32a6113c06
-
Filesize
88KB
MD5227a66b14074dd598e6b5e88ec585b0a
SHA1c6be663aac83e0d808b2d6fda5d5d30bad4f4cf9
SHA256686419cfc2429d4f6b476ca353ab91ddbd1b98d3f2651617e36f2c5daa7da067
SHA512c98ac7fbfb3789f46392dc6cf7a44474947ad3f99bf667055f9ae917328506aa895dbbd551eb81b2e6e40165f17460edab6bf9c8eb0f5b195f3dcfe35d773142
-
Filesize
101KB
MD5a0e68f80e062427d9d1016e3e8410757
SHA18f55ccddc1ce4da992983d1d3554f062306912de
SHA2569a4b875450a2bf761393e78cbfe5458b14b9ab6caa8725c4060cdf452b19d6f7
SHA5128702f6598b7e8ad3f51728093b2709a3d2aaeadddbfe2bfee54a73de4dce46b317ef1dc2404a7fe2d51f747da78d088b9e4af97682b376d762b1cc86007af102
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
796KB
MD518693249f3a283e83b8179e692ffbba9
SHA1546c0d89f8c8096d22c6f6be7e843cf5ce08e220
SHA2563d828bcccc628e7096856337b178da5608a6c3db99383374e6c49d50a1895e64
SHA5121ab246fea99daf75831f26930d458a05ff0efd5f9c71c9c4396681a065fcf9f5c04af774df34ad55e140b71d41e42254ee2d9dabbb18009800bdfc62170a8c39
-
Filesize
20KB
MD5345b6faa62a50ba996a4fc52a17031c7
SHA17ee131c8c4f836e9c88764197da34a5a9dbe7d97
SHA256e994184f10c979ec8d3e0ba11d3c95322b0f846fe45d0a56afc2afb35cf92d9a
SHA5125eadf9edf82b83c2c051c6072b7d31a711bac17513dfb452c25f98cfec00fc54fef0e54c29e60d5de8813284bde440b4f7843c5cb07d2bd9014b0610e98a9347
-
Filesize
44KB
MD501e912f4dcc1962e4caf95cf06824bd6
SHA1ca38906b61417a495ab4a99f87fefd1fcea27b68
SHA2567de65937b8b6dcebe11e373630b32979dd51dd642f5024c398e235fc603683da
SHA512156b3efc5656164c06e60a7657829216ce17c607a3ac82858c82ba8c886919b3e36d54df101b5387e5eca967672d30aa0bd081ba9ed322f407e7df45cfa6511b
-
Filesize
21KB
MD5261025b9c39810caebf7cdf301c62517
SHA159a757bdd007daffea95ffb2d2eef80b1e1f13e5
SHA25644480d48dfe139cb4125ac05df462fda4d6980d6558151c3a862578fbf790370
SHA51210db13d86f2a75f3857b35f0b9025714ae53f3be21cd7f93fbd22909e294f4fc81b2fde50f5b378251594aa6158d139432b98b5f90c06779fbdae4ce1be2d982
-
Filesize
18KB
MD5d3e82a3a0a0f6b3376aefbe411909ead
SHA17a819fb67e3f2847c667490d65723125850881c0
SHA2563383fc788e3e7c0bd856c225b1007bb334039cca9d1f6f193a1cb01e3b87629c
SHA512d933cc2bd25726cd99463e2b6c4fa4f84680f5051463231982fd1871d702a0d3e14a99593810260000861ae446ce3a623847f70953655e017cb03daedda0af7c
-
Filesize
13KB
MD5826b388ae77158fb430eef40d09e20a4
SHA18e121819c77c950cb13767a0eeb76cf19e48eccb
SHA2560a2387d1acb456406dd83fba1f69cb48532f96a7aedf2e9e128229c66dbaa075
SHA5125c44c30861b8f2045d0ad3bef298f84a9404ce6b3fbaef8139cf603bff9cdc878b0f87d6184d52bcef7ce7d162148fd77d213c1f8fabefa49d5eed0d88222027
-
Filesize
162B
MD5bf28ef9468e4e1cbc5f3e055adfa69e5
SHA1d5cff2ec3851f3fff649d688919f9f4f8511420e
SHA2560e86dc475bac19122a3134a18cf8af26b83831df3346bcf5093739ca2891b4b3
SHA5127b37e27f56b8ef1aeec6f25bbe7336ad0bec837af4390e47932adc67c9ed873c6b7cb5d643b39d0b6f383d79c7ee0ab8aa39e70f894ce8f2b90a884d1325c3f5
-
Filesize
321B
MD50075a61149f220898fac05d7dba9a487
SHA104b573ff26fe314e6995dbf1210463db28f0db57
SHA2568400e1ab10636fbf44e154b08560c7d9e3d119b607a14f28ecd3743119218917
SHA512339dc12ffdd17edc93987cb6eec165db660ac73fc00e2de799e2a9ba5728e045d6a7de7833bb0e7ab6d4cb292dc6035bc999d6fba80c3ee9a018ca756921f42e
-
Filesize
40B
MD5383e2fe98c447332bde36e5f151bc8c2
SHA17cbe3240cc691b22c9f23ebf54beaf218477f769
SHA2567ca153b2b865da01f851d179699903d1a6cbeb9a36f8fc43333e825e0e267a7f
SHA512ff4512865af44f0f7226f56efd8a1f82e72ab7c1eaaddbb2ead59efa53a29f5995e3b39535073b73196a69e0646ab05f8ee9cdf2a27b8b2b8a0ac316ca69f4d8
-
Filesize
1KB
MD57a3d5e95f7fc65264e6050217a138ca5
SHA1da0c3aa7ae94a87ff5a5250eff557ab30e3afc6a
SHA2561b20b12bfda558fafec913e3125d310770126b2706cfba7aef2bccfe50c5c502
SHA51260e6db80278a3d8a158194e2abbe02f296fd94eb2b300f7543144868cf831c0ca313219ccc079f86e89f34ee536748c2dc7eae0a4885ea60840a3c07172043e0
-
C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58df8d.TMP
Filesize48B
MD54c9038ad2370a499491391476a38c0f9
SHA15402710850aed7a3a8cce93b739bd25aec825de2
SHA256fe1aee5b6a8c5b508478c1730b7b11e63cc2a34a2131cfe88f77e1535bf64ccf
SHA5127ae7962b1bc638a86123e44cde4183f0f84f69cf57493bbd212d9dafeb4d3b3cad89cd3a9713cf79c0e8ee43f4f820ce84cb509730dcfb1cdff75a2d34f8abb3
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Default\Extensions\hbgjioklmpbdmemlmbkfckopochbgjpl\1.0.0_0\preferences_schema.json
Filesize7KB
MD5a192304f63ef26c80086f835cc4b7ada
SHA16963e90e752209132b728a938844c4c64dc94d43
SHA2564f72309f9378f04b3f1cb8f46b031ff513ac63e5056d96272f2bdc6d39dcddf9
SHA512be619909cd0c3465966a4018847310c1493bfdecad6f07bb28293f3dcea73dc377f5d52cca040d626368e17828eae28384fe51d20c4a71925c5f31eea8e18561
-
C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Default\IndexedDB\chrome-extension_gbohaofhodnpniflcnancekmknlomeck_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD57385bd15b2db456ce1e4bcd3e6c70790
SHA19c76b1b428bf9a725273cdc7495f4310d489d703
SHA2563fee02dd3ad318692c4e6b79c05d2e854ee43157302e55187bd1437bdeb8e1c0
SHA5128bf2eac7b78245d45ce5d3296804626d856e67c7a63fea0ca1e2cb4714346453ef07aec4a3ec6e4124689eb16fc307e4db0e3b2ca037afcc36e987a3032a02ff
-
Filesize
1KB
MD5c5ae0a8fcf741de4e302ce2594cd2379
SHA1b85c343614303e2e572376e2b899ffa58b9480fb
SHA256076f5bbe40b997126bfab616e6020ae767cbc762d16a8941a20b6a7f327303ab
SHA5125a65242b1ff8a39e9be327ea913db0a0c4e3c41677af8cf7ca65affad3a3e9bacd2b1cd0122b3c127649556199a66e6fcd41b75ab447988b45f24b22bbfe5cec
-
Filesize
1KB
MD525480a5fadddea5ea26ca4fa19c5be24
SHA1e400ecf907eec1b5e108385e77b47a075fece945
SHA256454004b00d645f56278c5531bc2a8ad95edd3772aa56c544a1b8bc90309e1a57
SHA512e6d4ef614a02e302b098b561b3bd419a7050269555c1b968042a15cc26ed17a8a51209655af94556e1b7888718da6924e49f176cfabfd21012af69b65d3b110b
-
Filesize
12KB
MD5348b2c34968505f1b1ff680708fa5fb3
SHA1bbab2dc10a8d512e67d0ff27cbb3874fbc943e56
SHA25686778588e3029adf21c502aec209e88aa144daf5d3e6eb9f0da0b6326a6af19a
SHA5126e217769148a64e620f8415b0c9b9d1e21c78963b16c60640e013b171ce4851efa9ef209f0f3f0ef0de954c2ccccbbcfc91425b9a9b528c2a656ad28bd8417a9
-
Filesize
13KB
MD55aa9651f476f1b7e8101363e2b845d34
SHA10fd4f04a16027ad44c45bf5044147ee127d4e56e
SHA256878d3fca62a07e0adffb507a962bb103c3f8e83d823994b24701171e8e102fcf
SHA51253408ebce63a59664e1be9302a1469345b7583bd62756c9e7b2d2f07639f34276bfbd6eb11fa38f85fb05cf10e2277db441cb84230d554f6a866f38aa53e0d7d
-
Filesize
6KB
MD5a378132cebb9db13d2875d189c3e3df0
SHA172d1c32eae62c3eb60e82b447b2e2ecd6ae8a796
SHA256cf1231a055201a5671e9adeec3bc6e6509cbe244ace7041a186393331fd39782
SHA5125741eca82cd0e92a04e3c2c51c4397060be8ec51c9957b803024f1d9d3a19381341fa867b6d380e4412ce1cdc412c6125c45a4dab66bc418aa8cfcae15fd8f03
-
C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize120B
MD5a91af9eb2c506efcd489094604cd2f4c
SHA1dfba3f624302deb51ea0cf6b899ed411ace5f563
SHA2567d4708dbfb57a3f620226253b02fe3453940c1a73e03d4edf570ebc7669c5782
SHA51243dacea64eb7e9468fa458f502b16b5ebf231bb90f2df10a2ca7bd02a79d080ff1243da95ae1f29d539caa1a76626902b34bd97e10595ad9ad5e5da416dc3085
-
C:\Users\Admin\AppData\Local\WaveBrowser\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58e068.TMP
Filesize48B
MD5b27e96342bbd03f4818236b624266c4e
SHA1f9fd168fd09631f5d058a1f6439cec9f642e056d
SHA256b6adea8eac33c3a50f986608b0143437cd6b90884d8c9456cbd707acc11b7776
SHA5128018dc4e98db263fa942aba8acfec897a9db1229bb4555c53795a616033b551cca99c8667d8f1c68fc1e95fe129856166b19fc96cc2ea1feccae1a14b3f8d8ee
-
Filesize
173KB
MD5dbb809c9ed271936f6842f22d0647bd0
SHA10276c592bacba0d2a3aacce241b3340c46a13f80
SHA256b40ed97fedcf048b92224e3c6cac62dd8286732e7a945cdddefc49d8cf5bd398
SHA5120e7edfcc08cb0969aac0e07461736a85e175ba8652c564924140f70d251dc0a7ab0da26a6d1411ce7070d45d6c7a95d0fa9f93165483cd6d3cd33d5d20d85f22
-
Filesize
6KB
MD557135a51399f5fe3ea8d0b9a3beb178c
SHA167adeb21bf8a86a9fcb9b3f5dede2023621097c8
SHA25641661184ca7b98445fd57f9e191887e0e122c588e6e3a46cc1e7ed6fa10609ab
SHA5121c5fc39839e4e23138be7ccbfb5568e18f5a1abedb061b6093b5a2db86ebef3a897485ebe1f821835657801ec284165107e8131f21ce7f68ac81b09f85f6be72
-
Filesize
4KB
MD510a12104981aafe446d5168c7498e49d
SHA1d613f26bca824a88bede4754fa392a7968624d37
SHA2567efbb55d41dc03979e5c73b1ef0dcad24a60afa255e9d8101c981cd6548945d8
SHA51226c4a98629f03fb507d680a8015b09229a5eb13c43bc13b83761da6c514641ef5481d7a73708e0b20026e5e801e1fdeb92c8a1fb4aebfcd7a796b5c04337ecd1
-
Filesize
2KB
MD5f5dae9144939f00164e5cddc0b487b50
SHA12e2ff123ae7094915ff920f271ab6e3db0b06b0c
SHA256ec5e010e270d4336918af3cb20ad0ae3145fc3cac071003e8dbd5c763579edf4
SHA5126d524c85d0ae7a13bdd94b28e6c35d25fa13ddf7b2eaa789900136f3a87b07ef9d496e6fe74cd1761f91c2ffdc47fa2ff2ca264c0da6e7136935f4256c2b16c6
-
Filesize
1010KB
MD5a69d796ab71f88742ebc5317ff46015a
SHA1e0161537372941371751cfc3defe9041b03251c1
SHA256204259fc2caf158eb9bfae76aa4204dde93a18643f5cbb578d8f93260f11593d
SHA512c948df9b292b6e4340e1329bdc467fb8ba9d4d8d08256d761efcd451d50c9432dc08ad4fa030f6a65d4abb7ab7ecf266b93421e16e14c655391a13e6c88745d4
-
Filesize
4.1MB
MD5f778f0a771a724ba314848dc4f2982d4
SHA152d824661be78eabc778e858cb193d916b31987a
SHA2568d6ec00e4b1c57960140c1e55ab2f10f316080fac036fa7079f8ac74215b06b6
SHA512a35a20a238ffd9e2b27a6cfe4d140285bb780b99e295eb60e03f92a5dae16b3f89aa5f73186051e8f028bbcde0d56a23c97117526f164a794b51553560d36657