Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    139s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07/07/2024, 16:08

General

  • Target

    https://waveexecutor.com/get

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://waveexecutor.com/get
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff834993cb8,0x7ff834993cc8,0x7ff834993cd8
      2⤵
        PID:2816
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:2
        2⤵
          PID:660
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4000
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:8
          2⤵
            PID:5084
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:4248
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
              2⤵
                PID:2840
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:872
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:1
                2⤵
                  PID:1744
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5268 /prefetch:8
                  2⤵
                    PID:3204
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2320
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:8
                    2⤵
                    • NTFS ADS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2188
                  • C:\Users\Admin\Downloads\WaveInstaller.exe
                    "C:\Users\Admin\Downloads\WaveInstaller.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:776
                    • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe
                      "C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1940
                      • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe
                        "C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"
                        4⤵
                          PID:3824
                          • C:\Users\Admin\AppData\Local\Luau Language Server\node.exe
                            "C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=3824
                            5⤵
                              PID:3804
                            • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe
                              "C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"
                              5⤵
                                PID:4364
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                          2⤵
                            PID:2140
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1
                            2⤵
                              PID:1260
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                              2⤵
                                PID:1180
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:1
                                2⤵
                                  PID:3188
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,15364465504538747558,14793243103178860317,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2940 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1436
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3460
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2868

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.dll

                                    Filesize

                                    4.3MB

                                    MD5

                                    6546ceb273f079342df5e828a60f551b

                                    SHA1

                                    ede41c27df51c39cd731797c340fcb8feda51ea3

                                    SHA256

                                    e440da74de73212d80da3f27661fcb9436d03d9e8dbbb44c9c148aaf38071ca5

                                    SHA512

                                    f0ea83bf836e93ff7b58582329a05ba183a25c92705fab36f576ec0c20cf687ce16a68e483698bda4215d441dec5916ffbdfa1763fb357e14ab5e0f1ffcaf824

                                  • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe

                                    Filesize

                                    249KB

                                    MD5

                                    772c9fecbd0397f6cfb3d866cf3a5d7d

                                    SHA1

                                    6de3355d866d0627a756d0d4e29318e67650dacf

                                    SHA256

                                    2f88ea7e1183d320fb2b7483de2e860da13dc0c0caaf58f41a888528d78c809f

                                    SHA512

                                    82048bd6e50d38a863379a623b8cfda2d1553d8141923acf13f990c7245c833082523633eaa830362a12bfff300da61b3d8b3cccbe038ce2375fdfbd20dbca31

                                  • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.runtimeconfig.json

                                    Filesize

                                    372B

                                    MD5

                                    d94cf983fba9ab1bb8a6cb3ad4a48f50

                                    SHA1

                                    04855d8b7a76b7ec74633043ef9986d4500ca63c

                                    SHA256

                                    1eca0f0c70070aa83bb609e4b749b26dcb4409784326032726394722224a098a

                                    SHA512

                                    09a9667d4f4622817116c8bc27d3d481d5d160380a2e19b8944bdd1271a83f718415ce5e6d66e82e36819e575ec1b55f19c45213e0013b877b8d61e6feb9d998

                                  • C:\Users\Admin\AppData\Local\Luau Language Server\server\index.js

                                    Filesize

                                    6.1MB

                                    MD5

                                    6b1cad741d0b6374435f7e1faa93b5e7

                                    SHA1

                                    7b1957e63c10f4422421245e4dc64074455fd62a

                                    SHA256

                                    6f17add2a8c8c2d9f592adb65d88e08558e25c15cedd82e3f013c8146b5d840f

                                    SHA512

                                    a662fc83536eff797b8d59e2fb4a2fb7cd903be8fc4137de8470b341312534326383bb3af58991628f15f93e3bdd57621622d9d9b634fb5e6e03d4aa06977253

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    4af3ab7cb0460a8ca1bc42c663f441ea

                                    SHA1

                                    47603056b2829b869fbab04884da29544077fc3e

                                    SHA256

                                    e4c2390de67f4be3f7a84f4ef879a25c15c68c62a226ab9c9007c03597184369

                                    SHA512

                                    9c4cb6eee3f90f4cf46c0544d371cbe3b93a092f0057963e54bdbc6c6e584564aa4e3e8cc0085360ac7661a18c929c37cdabaa35035d925fc23446dba609323a

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    4f9e5616c068d89c288975cccf486ba9

                                    SHA1

                                    049ff88576a2a7c47740819b750a2f8edfa0d0b7

                                    SHA256

                                    680a4ebe591a39c80dc406530a6e51aa0bdee8ab91b8d326f90616435b595e26

                                    SHA512

                                    98147f31a4d6372e73970295464c8943709632e78b15f581436f30d63f9cbdcbaaf9c80e2cce366f95709f52c7bb2283770de686dac7d1c0b7e2cb704b7a0383

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\987a8173-6507-4e82-b379-67e4a2e1488f.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    23f7bc36ece950101d2282c9ee04c961

                                    SHA1

                                    4e76cbc821664a37d9e5e00499a300ffbd1b4762

                                    SHA256

                                    d46b76603f4fc6be2badbaf97d3598982fc6b5f57a53bc002f3d788e29ed9e14

                                    SHA512

                                    1ce036f06b57adbedbe4d7673e1469a76694433433b850deaae1a2c24c226e884a2d7ad574b8b07103d3199d56f6466388527367120aff1be28c3d55c7f6b0d4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    256B

                                    MD5

                                    a0fe432983ea89e6b0d5b960d7c7eaf8

                                    SHA1

                                    3bbece3c0d0fcb6ac6226c9ca3b77878cef71054

                                    SHA256

                                    5902b92d7d78bfcf9aced8cab8facbbc800707f57a6f456ecf0d99b1421d9694

                                    SHA512

                                    dac7e3f882c799f0317fa9d3687a799d7171d7ba4d9e2aeffa0d61b2654c6d9528502e60cb6c615bc74ec144887c8de5dd1d0eaeda66fd7665808246e4a94c63

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    427f2b8c48d6a9cf06d53c3492b4ef18

                                    SHA1

                                    1b581acfc99ef65847b064576777acfba8951f7d

                                    SHA256

                                    c9b6bd964f28596ac741b6a26083f3e2f6b71eff8419722b2ad26f803807a875

                                    SHA512

                                    de579171ad65d0431af59d2bbcaec4a9cc016bb2d6e161e4880548c332e5251678030bb1c96c4d3d3c3a53960ab90b795836331853fef9cb4957460cc8e5a9ab

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    2fe85a6ec6384c6593b37e98dd2a5594

                                    SHA1

                                    2eebf17cd180160e02f5c3127d0ffa328956d7ad

                                    SHA256

                                    824cbf75f959715faf3deb3f4d7889eef057c5f9c76cf3c518708ee101f3820e

                                    SHA512

                                    90c53d188c83d42ca1d32a05c8d1e93f612b72735fe43b9e13f4279a468063207f79e318e1f5bd2a632546daab56cc0e368792bdac99a881c8e2d3ed74fbcdbb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    2fac27496953c91e916b5a84e3c17fbb

                                    SHA1

                                    d9d1b2ea6836f811122b41a1fa29add9bddeddca

                                    SHA256

                                    6785322b662dc9676ce069f70f8f80e42f29400ff0c8f7bdcd98f1bf6a4c3456

                                    SHA512

                                    e05213aff24242b24b054eb216728369ef3488bea0958ad735cdf50127c41c8c8d6c294f507e134a72f92ff929d0e64fe83af3193c33c1816a3ebfe48c1a054c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    2a259a030f8b05c077e3251a61681284

                                    SHA1

                                    8ed1707839f027310047098301c3937c41a186fb

                                    SHA256

                                    6aaa9b6940cdd331fb1c21bdb8e51b55465e339724f6df71a77c8cc21c78db73

                                    SHA512

                                    779ee9df250257fae97bddf9609fe6dd835544abddf5d9c0288499b3558901036eff12de43792fd01e54e82910010ae35146fb1c944564eef637a8b5c78e8408

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    dcd100fd697c7b179f1ba25a1d9ead0c

                                    SHA1

                                    51c7291e598f6e1e43d271c16786144d35900503

                                    SHA256

                                    a765fa64db76bf7c8e8bc9d6d14d4fd8998d3c799364cafa52d386a496e17d63

                                    SHA512

                                    0420d6b9677b462bb4105b3ecb83abed2204e93ff8c007190ce8bafb015baf2b1dc284b7e002b582f2bdae59598e2c25e0a2b51cdb9b6e4803874e508f6b3b49

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    82450c68edbc957c2f3527ca518c2e79

                                    SHA1

                                    c602a893f7f9a1bf3ebe2a92d742dd48354f98f6

                                    SHA256

                                    162299fab0934164e5395951dc4f0a63525a72d6ac61f33f63f57ec11f311d81

                                    SHA512

                                    9885e1b6cd1c15c5305b5617c705758c2c077ba60c065734a78b9f327bdf43446648d1d7942d0b64745a1081d5154a15cc9d14b6ae43b40f2cc01f9a7e1fe50d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    12KB

                                    MD5

                                    1a82833283184363e56f1b32d1f02319

                                    SHA1

                                    300abb396b353cc8cfdb66e35a9b0b164f30b68f

                                    SHA256

                                    f88aedaea11d1b81e8e05e91f5e49bf9d56bfcedb53b8114cdada68c55687403

                                    SHA512

                                    b318ec8e21100e0873ce299fec02a28194ac674e84b384ab34942fa7f16e0bcf8432b4fe3b7a761df53d11a7f790a75f6285c49cdaae2b920e0fe5bb81a29eb5

                                  • C:\Users\Admin\AppData\Local\Wave\D3DCOMPILER_47.dll

                                    Filesize

                                    3.9MB

                                    MD5

                                    3b4647bcb9feb591c2c05d1a606ed988

                                    SHA1

                                    b42c59f96fb069fd49009dfd94550a7764e6c97c

                                    SHA256

                                    35773c397036b368c1e75d4e0d62c36d98139ebe74e42c1ff7be71c6b5a19fd7

                                    SHA512

                                    00cd443b36f53985212ac43b44f56c18bf70e25119bbf9c59d05e2358ff45254b957f1ec63fc70fb57b1726fd8f76ccfad8103c67454b817a4f183f9122e3f50

                                  • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe

                                    Filesize

                                    949KB

                                    MD5

                                    8fb51b92d496c6765f7ba44e6d4a8990

                                    SHA1

                                    d3e5a8465622cd5adae05babeb7e34b2b5c777d7

                                    SHA256

                                    ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394

                                    SHA512

                                    20de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6

                                  • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe

                                    Filesize

                                    8.0MB

                                    MD5

                                    c0563fdf381a1f1274c8b2729254f19c

                                    SHA1

                                    f053b238515f9b8cc4f763f8bc6bf321f160a499

                                    SHA256

                                    b625a539e7d439938f6864564cbcf00a610e9f29415cde7b1ebac45318cdc371

                                    SHA512

                                    c8abf1aabd44aff41472d2bb595c5a6c5e0c4b5dd9f2809d9ad625431fc6d12b8122bbf394e0cf0e4a71998136791942142d4a461c477981601e3c0dfd513bb5

                                  • C:\Users\Admin\Downloads\Unconfirmed 397277.crdownload

                                    Filesize

                                    2.3MB

                                    MD5

                                    8ad8b6593c91d7960dad476d6d4af34f

                                    SHA1

                                    0a95f110c8264cde7768a3fd76db5687fda830ea

                                    SHA256

                                    43e6ae7e38488e95741b1cad60843e7ce49419889285433eb4e697c175a153ab

                                    SHA512

                                    09b522da0958f8b173e97b31b6c7141cb67de5d30db9ff71bc6e61ca9a97c09bff6b17d6eaa03c840500996aad25b3419391af64de1c59e98ff6a8eac636b686

                                  • C:\Users\Admin\Downloads\WaveInstaller.exe:Zone.Identifier

                                    Filesize

                                    26B

                                    MD5

                                    fbccf14d504b7b2dbcb5a5bda75bd93b

                                    SHA1

                                    d59fc84cdd5217c6cf74785703655f78da6b582b

                                    SHA256

                                    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                    SHA512

                                    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                  • memory/776-67-0x0000000005740000-0x00000000057C2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/776-82-0x000000000A180000-0x000000000A1B8000-memory.dmp

                                    Filesize

                                    224KB

                                  • memory/776-166-0x0000000009D80000-0x0000000009D8A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/776-167-0x000000000AC00000-0x000000000AC0A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/776-162-0x0000000009D50000-0x0000000009D76000-memory.dmp

                                    Filesize

                                    152KB

                                  • memory/776-65-0x0000000000880000-0x0000000000ACA000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/776-165-0x000000000C220000-0x000000000C292000-memory.dmp

                                    Filesize

                                    456KB

                                  • memory/776-66-0x0000000005690000-0x0000000005742000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/776-68-0x00000000054C0000-0x00000000054C8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/776-69-0x00000000054E0000-0x00000000054E8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/776-163-0x0000000001580000-0x0000000001588000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/776-161-0x000000000BF30000-0x000000000BFC6000-memory.dmp

                                    Filesize

                                    600KB

                                  • memory/776-83-0x000000000A150000-0x000000000A15E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/1940-385-0x00000000089C0000-0x0000000008AC4000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/1940-388-0x00000000097C0000-0x00000000097DE000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/1940-387-0x0000000009720000-0x000000000972A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1940-386-0x00000000096E0000-0x00000000096F6000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/1940-383-0x0000000000910000-0x0000000000A02000-memory.dmp

                                    Filesize

                                    968KB

                                  • memory/3824-444-0x0000000000160000-0x0000000000962000-memory.dmp

                                    Filesize

                                    8.0MB

                                  • memory/3824-483-0x0000000005390000-0x0000000005442000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/3824-484-0x0000000005450000-0x00000000054F0000-memory.dmp

                                    Filesize

                                    640KB

                                  • memory/3824-491-0x0000000009400000-0x00000000094B2000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/3824-497-0x000000000A9E0000-0x000000000AA02000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3824-498-0x000000000AE20000-0x000000000B177000-memory.dmp

                                    Filesize

                                    3.3MB