Analysis
-
max time kernel
370s -
max time network
370s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17-07-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
WaveInstaller Official.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
WaveInstaller Official.exe
Resource
win10v2004-20240709-en
General
-
Target
WaveInstaller Official.exe
-
Size
1.5MB
-
MD5
c822ab5332b11c9185765b157d0b6e17
-
SHA1
7fe909d73a24ddd87171896079cceb8b03663ad4
-
SHA256
344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a
-
SHA512
a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d
-
SSDEEP
24576:9viinbT3ipyqwPx4x3RyFoBkkAd04wJAAh/jV1gJcPNZI6fntX3HOt2pbs81ind2:EinbT3ipTD0anywJAaD/3U2pb7indT
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Bloxstrap.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation Bloxstrap.exe -
Executes dropped EXE 7 IoCs
Processes:
WaveBootstrapper.exeWaveWindows.exenode.exeBloxstrap.exewindowsdesktop-runtime-6.0.32-win-x64.exewindowsdesktop-runtime-6.0.32-win-x64.exewindowsdesktop-runtime-6.0.32-win-x64.exepid process 4596 WaveBootstrapper.exe 1924 WaveWindows.exe 3052 node.exe 1016 Bloxstrap.exe 3220 windowsdesktop-runtime-6.0.32-win-x64.exe 1464 windowsdesktop-runtime-6.0.32-win-x64.exe 4104 windowsdesktop-runtime-6.0.32-win-x64.exe -
Loads dropped DLL 9 IoCs
Processes:
windowsdesktop-runtime-6.0.32-win-x64.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exepid process 1464 windowsdesktop-runtime-6.0.32-win-x64.exe 2076 MsiExec.exe 2076 MsiExec.exe 3708 MsiExec.exe 3708 MsiExec.exe 3464 MsiExec.exe 3464 MsiExec.exe 2436 MsiExec.exe 2436 MsiExec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
windowsdesktop-runtime-6.0.32-win-x64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{1bb295e8-8251-4404-96f1-c437da87fce0} = "\"C:\\ProgramData\\Package Cache\\{1bb295e8-8251-4404-96f1-c437da87fce0}\\windowsdesktop-runtime-6.0.32-win-x64.exe\" /burn.runonce" windowsdesktop-runtime-6.0.32-win-x64.exe -
Checks for any installed AV software in registry 1 TTPs 7 IoCs
Processes:
WaveWindows.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\KasperskyLab WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\KasperskyLab\LastUsername = "nspe" WaveWindows.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\KasperskyLab\Session = "Bearer cf8d6fa6-d449-4515-9f42-bf954f6ef85a" WaveWindows.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\KasperskyLab WaveWindows.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\KasperskyLab WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\KasperskyLab\LastUsername WaveWindows.exe Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\KasperskyLab\Session WaveWindows.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeWaveWindows.exedescription ioc process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: WaveWindows.exe File opened (read-only) \??\Y: WaveWindows.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: WaveWindows.exe File opened (read-only) \??\W: WaveWindows.exe File opened (read-only) \??\L: WaveWindows.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: WaveWindows.exe File opened (read-only) \??\J: WaveWindows.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: WaveWindows.exe File opened (read-only) \??\K: WaveWindows.exe File opened (read-only) \??\P: WaveWindows.exe File opened (read-only) \??\U: WaveWindows.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: WaveWindows.exe File opened (read-only) \??\H: WaveWindows.exe File opened (read-only) \??\M: WaveWindows.exe File opened (read-only) \??\Q: WaveWindows.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: WaveWindows.exe File opened (read-only) \??\Z: WaveWindows.exe File opened (read-only) \??\T: WaveWindows.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: WaveWindows.exe File opened (read-only) \??\S: WaveWindows.exe File opened (read-only) \??\V: WaveWindows.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: WaveWindows.exe File opened (read-only) \??\E: WaveWindows.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 20 raw.githubusercontent.com 21 raw.githubusercontent.com 37 raw.githubusercontent.com 38 raw.githubusercontent.com 39 raw.githubusercontent.com 40 raw.githubusercontent.com -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\es\System.Windows.Controls.Ribbon.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\PresentationFramework-SystemCore.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\ko\PresentationFramework.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Xml.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\ko\Microsoft.VisualBasic.Forms.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\tr\System.Windows.Forms.Design.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Resources.Writer.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\PresentationFramework-SystemDrawing.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\PresentationFramework.Aero2.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\ru\Microsoft.VisualBasic.Forms.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\fr\System.Windows.Forms.Design.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\de\WindowsFormsIntegration.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Net.Ping.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\Accessibility.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\zh-Hant\UIAutomationClient.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\zh-Hant\WindowsFormsIntegration.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.IO.FileSystem.DriveInfo.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Runtime.Serialization.Primitives.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Reflection.TypeExtensions.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\pl\System.Windows.Controls.Ribbon.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.ValueTuple.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\pt-BR\WindowsBase.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Reflection.Emit.Lightweight.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Text.Encodings.Web.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\api-ms-win-crt-process-l1-1-0.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Globalization.Calendars.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\api-ms-win-crt-stdio-l1-1-0.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\de\System.Windows.Input.Manipulations.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\PresentationFramework-SystemXmlLinq.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\tr\UIAutomationClientSideProviders.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\ru\ReachFramework.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\mscordbi.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\coreclr.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Runtime.Handles.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\api-ms-win-crt-convert-l1-1-0.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Security.Principal.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\api-ms-win-core-libraryloader-l1-1-0.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Reflection.Emit.ILGeneration.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\UIAutomationClient.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Windows.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\zh-Hant\PresentationFramework.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\ja\UIAutomationClient.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\zh-Hant\PresentationCore.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\zh-Hans\UIAutomationClientSideProviders.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Security.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\ru\System.Windows.Forms.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\zh-Hant\System.Xaml.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.IO.Compression.Brotli.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Private.CoreLib.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Runtime.CompilerServices.Unsafe.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Diagnostics.FileVersionInfo.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\System.Security.Cryptography.Xml.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\System.Security.Cryptography.Pkcs.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\Microsoft.WindowsDesktop.App.runtimeconfig.json msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\it\UIAutomationClientSideProviders.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Linq.Queryable.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\tr\Microsoft.VisualBasic.Forms.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\cs\UIAutomationClient.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\pl\UIAutomationClientSideProviders.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\zh-Hans\PresentationFramework.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\pt-BR\PresentationUI.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\api-ms-win-core-file-l2-1-0.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.32\de\System.Windows.Forms.Design.resources.dll msiexec.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.32\System.Threading.Tasks.dll msiexec.exe -
Drops file in Windows directory 35 IoCs
Processes:
MicrosoftEdgeCP.exemsiexec.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\e5c815d.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e5c8161.msi msiexec.exe File created C:\Windows\Installer\e5c8162.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI90D9.tmp msiexec.exe File created C:\Windows\Installer\e5c816b.msi msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{3FDCF0A2-7C1F-41C7-9749-0D91EC216AED} msiexec.exe File opened for modification C:\Windows\Installer\MSI8BD1.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{667CB653-70E1-4E2B-9C8E-6A02A6CF88B9} msiexec.exe File created C:\Windows\Installer\e5c815d.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\e5c8162.msi msiexec.exe File created C:\Windows\Installer\e5c8170.msi msiexec.exe File created C:\Windows\Installer\e5c8166.msi msiexec.exe File opened for modification C:\Windows\Installer\e5c8167.msi msiexec.exe File created C:\Windows\Installer\SourceHash{A09F8381-88C3-44C4-9DAB-AC44F4F4DB4B} msiexec.exe File opened for modification C:\Windows\Installer\e5c816c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9E5E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8630.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8EB0.tmp msiexec.exe File created C:\Windows\Installer\e5c8167.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8F3E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI906A.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI8FDD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI938C.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{885F1CFB-4EAC-4C60-97B8-394BD65ED91E} msiexec.exe File opened for modification C:\Windows\Installer\MSI95C0.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI8489.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9214.tmp msiexec.exe File created C:\Windows\Installer\e5c816c.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2916 1924 WerFault.exe WaveWindows.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 9 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1D msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1B msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1c msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1C msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1d msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1A\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a msiexec.exe -
Modifies registry class 64 IoCs
Processes:
windowsdesktop-runtime-6.0.32-win-x64.exebrowser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{1bb295e8-8251-4404-96f1-c437da87fce0}\Version = "6.0.32.33814" windowsdesktop-runtime-6.0.32-win-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\dotnet_runtime_48.128.16743_x64\Dependents windowsdesktop-runtime-6.0.32-win-x64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{F1C52F92-322D-4203-A8B7-B20B8B8222 = "8320" browser_broker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{F1C52F92-322D-4203-A8B7-B20B8B8222 = 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 browser_broker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\ MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\NextUpdateDate = "428074098" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2A0FCDF3F1C77C147994D019CE12A6DE\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2A0FCDF3F1C77C147994D019CE12A6DE\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1838F90A3C884C44D9BACA444F4FBDB4\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Dotnet_CLI_HostFxr_48.128.16743_x64\DisplayName = "Microsoft .NET Host FX Resolver - 6.0.32 (x64)" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Dotnet_CLI_SharedHost_48.3.31210_x64 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Dotnet_CLI_HostFxr_48.128.16743_x64 windowsdesktop-runtime-6.0.32-win-x64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2A0FCDF3F1C77C147994D019CE12A6DE\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\356BC7661E07B2E4C9E8A6206AFC889B\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\BFC1F588CAE406C4798B93B46DE59DE1\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BFC1F588CAE406C4798B93B46DE59DE1\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 7907b23e51d8da01 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\356BC7661E07B2E4C9E8A6206AFC889B\MainFeature msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2A0FCDF3F1C77C147994D019CE12A6DE msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\dotnet.microsoft.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\microsoft.com\Total = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = 70c114a483d8da01 MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\dotnet_runtime_48.128.16743_x64\DisplayName = "Microsoft .NET Runtime - 6.0.32 (x64)" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\356BC7661E07B2E4C9E8A6206AFC889B msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\windowsdesktop_runtime_48.128.16742_x64\Version = "48.128.16742" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\dotnet_runtime_48.128.16743_x64\ = "{3FDCF0A2-7C1F-41C7-9749-0D91EC216AED}" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPublisher\Certificates MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$http://www.typepad.com/ MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\FileVersion = "2016061511" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\microsoft.com\ = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\microsoft.com\NumberOfSubdom = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000dac28ea2343eca4c3cf8ec8c5746b533bae7ba5e885fbe4029e4e6ed4f928437e2d355471f2b137262d1b7423d97872a12aa48e5a6859a3cc347 MicrosoftEdge.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\dotnet_runtime_48.128.16743_x64 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2A0FCDF3F1C77C147994D019CE12A6DE\PackageCode = "266B6A180BA3CD24EA22478E30F608AF" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\D2460E97D085DEF565876C42251F3BF0 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\windowsdesktop_runtime_48.128.16742_x64\ = "{885F1CFB-4EAC-4C60-97B8-394BD65ED91E}" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\NextPromptBuild = "15063" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{F1C52F92-322D-4203-A8B7-B20B8B8222 browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2A0FCDF3F1C77C147994D019CE12A6DE\ProductName = "Microsoft .NET Runtime - 6.0.32 (x64)" msiexec.exe -
NTFS ADS 1 IoCs
Processes:
browser_broker.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\windowsdesktop-runtime-6.0.32-win-x64.exe.ro49xrp.partial:Zone.Identifier browser_broker.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
WaveWindows.exemsiexec.exepid process 1924 WaveWindows.exe 1924 WaveWindows.exe 3624 msiexec.exe 3624 msiexec.exe 3624 msiexec.exe 3624 msiexec.exe 3624 msiexec.exe 3624 msiexec.exe 3624 msiexec.exe 3624 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4124 MicrosoftEdgeCP.exe 4124 MicrosoftEdgeCP.exe 4124 MicrosoftEdgeCP.exe 4124 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WaveInstaller Official.exeWaveBootstrapper.exeWaveWindows.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exewindowsdesktop-runtime-6.0.32-win-x64.exemsiexec.exedescription pid process Token: SeDebugPrivilege 4360 WaveInstaller Official.exe Token: SeDebugPrivilege 4596 WaveBootstrapper.exe Token: SeDebugPrivilege 1924 WaveWindows.exe Token: SeDebugPrivilege 4160 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4160 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4160 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4160 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2404 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2404 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3156 MicrosoftEdge.exe Token: SeDebugPrivilege 3156 MicrosoftEdge.exe Token: SeShutdownPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeIncreaseQuotaPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeSecurityPrivilege 3624 msiexec.exe Token: SeCreateTokenPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeAssignPrimaryTokenPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeLockMemoryPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeIncreaseQuotaPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeMachineAccountPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeTcbPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeSecurityPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeTakeOwnershipPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeLoadDriverPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeSystemProfilePrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeSystemtimePrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeProfSingleProcessPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeIncBasePriorityPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeCreatePagefilePrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeCreatePermanentPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeBackupPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeRestorePrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeShutdownPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeDebugPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeAuditPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeSystemEnvironmentPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeChangeNotifyPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeRemoteShutdownPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeUndockPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeSyncAgentPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeEnableDelegationPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeManageVolumePrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeImpersonatePrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeCreateGlobalPrivilege 4104 windowsdesktop-runtime-6.0.32-win-x64.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe Token: SeTakeOwnershipPrivilege 3624 msiexec.exe Token: SeRestorePrivilege 3624 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
windowsdesktop-runtime-6.0.32-win-x64.exepid process 1464 windowsdesktop-runtime-6.0.32-win-x64.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 3156 MicrosoftEdge.exe 4124 MicrosoftEdgeCP.exe 4160 MicrosoftEdgeCP.exe 4124 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
WaveInstaller Official.exeWaveBootstrapper.exeWaveWindows.exeMicrosoftEdgeCP.exebrowser_broker.exewindowsdesktop-runtime-6.0.32-win-x64.exewindowsdesktop-runtime-6.0.32-win-x64.exemsiexec.exedescription pid process target process PID 4360 wrote to memory of 4596 4360 WaveInstaller Official.exe WaveBootstrapper.exe PID 4360 wrote to memory of 4596 4360 WaveInstaller Official.exe WaveBootstrapper.exe PID 4360 wrote to memory of 4596 4360 WaveInstaller Official.exe WaveBootstrapper.exe PID 4596 wrote to memory of 1924 4596 WaveBootstrapper.exe WaveWindows.exe PID 4596 wrote to memory of 1924 4596 WaveBootstrapper.exe WaveWindows.exe PID 4596 wrote to memory of 1924 4596 WaveBootstrapper.exe WaveWindows.exe PID 1924 wrote to memory of 3052 1924 WaveWindows.exe node.exe PID 1924 wrote to memory of 3052 1924 WaveWindows.exe node.exe PID 1924 wrote to memory of 1016 1924 WaveWindows.exe Bloxstrap.exe PID 1924 wrote to memory of 1016 1924 WaveWindows.exe Bloxstrap.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1716 wrote to memory of 3220 1716 browser_broker.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 1716 wrote to memory of 3220 1716 browser_broker.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 1716 wrote to memory of 3220 1716 browser_broker.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 3220 wrote to memory of 1464 3220 windowsdesktop-runtime-6.0.32-win-x64.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 3220 wrote to memory of 1464 3220 windowsdesktop-runtime-6.0.32-win-x64.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 3220 wrote to memory of 1464 3220 windowsdesktop-runtime-6.0.32-win-x64.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 1464 wrote to memory of 4104 1464 windowsdesktop-runtime-6.0.32-win-x64.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 1464 wrote to memory of 4104 1464 windowsdesktop-runtime-6.0.32-win-x64.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 1464 wrote to memory of 4104 1464 windowsdesktop-runtime-6.0.32-win-x64.exe windowsdesktop-runtime-6.0.32-win-x64.exe PID 3624 wrote to memory of 2076 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 2076 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 2076 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 3708 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 3708 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 3708 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 3464 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 3464 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 3464 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 2436 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 2436 3624 msiexec.exe MsiExec.exe PID 3624 wrote to memory of 2436 3624 msiexec.exe MsiExec.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4124 wrote to memory of 4692 4124 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveInstaller Official.exe"C:\Users\Admin\AppData\Local\Temp\WaveInstaller Official.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"3⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Luau Language Server\node.exe"C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=19244⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 59844⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\windowsdesktop-runtime-6.0.32-win-x64.exe"C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\windowsdesktop-runtime-6.0.32-win-x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{D49BDB83-3528-48B2-B370-42DBDA7CE63B}\.cr\windowsdesktop-runtime-6.0.32-win-x64.exe"C:\Windows\Temp\{D49BDB83-3528-48B2-B370-42DBDA7CE63B}\.cr\windowsdesktop-runtime-6.0.32-win-x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\windowsdesktop-runtime-6.0.32-win-x64.exe" -burn.filehandle.attached=548 -burn.filehandle.self=5443⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\.be\windowsdesktop-runtime-6.0.32-win-x64.exe"C:\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\.be\windowsdesktop-runtime-6.0.32-win-x64.exe" -q -burn.elevated BurnPipe.{A27DFD88-11B4-405E-B829-8F09F8501E5B} {9F2D92AF-3AE0-4697-8398-D6E26C61727A} 14644⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C96E3A732767E089C8D855FA5876FE632⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 07086B114D99FA5267418C7A17DCA1C92⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56F291DDCB119B33B8BA4A88E09B47D32⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4F2616B7F890E6B110A9A3A1274A9AA82⤵
- Loads dropped DLL
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2b81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e5c8160.rbsFilesize
55KB
MD547b5574a6bbb15ae1ab8c492fc88ca6d
SHA17781fecf70c27caa71113d2377c1662f8ae39d71
SHA256674786989295d3239ec755aa39a00e922431ec7eadd41a9b922bd0890d48f92e
SHA5122790d40a82075c57c7c626cd07f0ff08c0d08ce73154370225d949559991d58f82be4c9d2c8b70afad01585963281eb1d84432cb23f6ce1d594ce87b3c3dd5d8
-
C:\Config.Msi\e5c8165.rbsFilesize
8KB
MD5586d2da214079d9b5828ce7a6d6ef77c
SHA15ce0bb9225d58b5e350871250ce257183b59e8d8
SHA25674932c4256984be21f9758810cd48a511264da6eee94bea0ae55ffc264199523
SHA5128a16e541fcaec6cd2063270559441b6f72f9344d9d276466f47cfff052889fc1f889729969c356b0e2cd4a56cb1ed14281d3dbb5d6f5c336370423c45e06f8b3
-
C:\Config.Msi\e5c816a.rbsFilesize
9KB
MD5f6002f2df884cca10de5f39f7f802b55
SHA174436024a115361cc1fb548da3a580c8e6ac7390
SHA25660dd635dca4dc7dd4b8757f745a15e05feb032c09d695e80c8c7faafe50c3164
SHA512e5bf5daa3254adbe81e1c03fae199713f99a6725e3b981680511da9e01172d1015be67417b4c2414f9c6d5b8713f481ef18d8aa72c2e0d31ac83b2ff17573250
-
C:\Config.Msi\e5c816f.rbsFilesize
87KB
MD55af1ed1a1496483011124cef4409578e
SHA1ae635f9eda97fcc85c2c7ca4d9a851f692ee0a08
SHA2562f2d56f5ea71556ab9abd8284430f5b4321dc3e15ce87633f8ab70b5634d9132
SHA51246fb36b06527222da151876d3b3d1a18e3d0802311f66751956b654f112a483bde33e4c55acba4315e9bc44764fe544c60a3af8f5e785a1d65e641857a6b27a4
-
C:\Program Files\dotnet\LICENSE.txtFilesize
9KB
MD531c5a77b3c57c8c2e82b9541b00bcd5a
SHA1153d4bc14e3a2c1485006f1752e797ca8684d06d
SHA2567f6839a61ce892b79c6549e2dc5a81fdbd240a0b260f8881216b45b7fda8b45d
SHA512ad33e3c0c3b060ad44c5b1b712c991b2d7042f6a60dc691c014d977c922a7e3a783ba9bade1a34de853c271fde1fb75bc2c47869acd863a40be3a6c6d754c0a6
-
C:\Program Files\dotnet\ThirdPartyNotices.txtFilesize
78KB
MD5f77a4aecfaf4640d801eb6dcdfddc478
SHA17424710f255f6205ef559e4d7e281a3b701183bb
SHA256d5db0ed54363e40717ae09e746dec99ad5b09223cc1273bb870703176dd226b7
SHA5121b729dfa561899980ba8b15128ea39bc1e609fe07b30b283001fd9cf9da62885d78c18082d0085edd81f09203f878549b48f7f888a8486a2a526b134c849fd6b
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exeFilesize
249KB
MD5772c9fecbd0397f6cfb3d866cf3a5d7d
SHA16de3355d866d0627a756d0d4e29318e67650dacf
SHA2562f88ea7e1183d320fb2b7483de2e860da13dc0c0caaf58f41a888528d78c809f
SHA51282048bd6e50d38a863379a623b8cfda2d1553d8141923acf13f990c7245c833082523633eaa830362a12bfff300da61b3d8b3cccbe038ce2375fdfbd20dbca31
-
C:\Users\Admin\AppData\Local\Luau Language Server\server\index.jsFilesize
6.1MB
MD56b1cad741d0b6374435f7e1faa93b5e7
SHA17b1957e63c10f4422421245e4dc64074455fd62a
SHA2566f17add2a8c8c2d9f592adb65d88e08558e25c15cedd82e3f013c8146b5d840f
SHA512a662fc83536eff797b8d59e2fb4a2fb7cd903be8fc4137de8470b341312534326383bb3af58991628f15f93e3bdd57621622d9d9b634fb5e6e03d4aa06977253
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdbFilesize
896KB
MD5f4795970c1f83c2426ec62befb512ebd
SHA16a7e867e3b8e3c497449518b96c1aab9964b2089
SHA2565dff43f783d712236a87aa4e6a8305b693857c0462b704aa7505a8c8fb862205
SHA512b76d642f5dbcb00615205e73f25113f6736aa3898fe38a99b86d4d4baf597c6e3b3b5448b27d14214616b67ba50aad6d351321bbefd0d9c948389cffb6d10995
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XMLFilesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\edgecompatviewlist[1].xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\F2AOOKW1\dotnet.microsoft[1].xmlFilesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\F2AOOKW1\dotnet.microsoft[1].xmlFilesize
84B
MD54019b2396d806dc6144da7be63c474ea
SHA1eb8d052ca1908a6d549b20a148d5162dbb90c9bb
SHA25689d293d531dd01471eb48ab521bca53e06469965f008f251e233fe1e2f90674c
SHA51286ad5db65a4ab3ff7e9c5f62f670ca2e9f57666a0b3e113ae72d79734ffa05a637186c697432605efc959a4d84f90cf8d1caefed61ef894dd9936b39a3f094fc
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\4SVC5XL2\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FGR3ATTS\windowsdesktop-runtime-6.0.32-win-x64[1].exeFilesize
32KB
MD547755c618a9a9e4c5bda3a442f99485f
SHA1382cbb19d802d77b52cf8c1cf85ba32eddcbd07e
SHA2567f743326cbab2e1312dff1614a09ebdb17d1a4963ad5fbd73eaee2b90b966aba
SHA5129c93583b11f2e8b4fcad6055d6ca05ac853d5314cd15295284ad260b81073af9dbcdcf558420e2a367561e6e98b361842e7a322fb9f04d0238d2b4a9c780f6b5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.32_(x64)_20240717135818_000_dotnet_runtime_6.0.32_win_x64.msi.logFilesize
3KB
MD5dc44d65ff1a44ed5c86b94232975bc6d
SHA1f726fff8ad28828e153911e8c48156e3404ae652
SHA256c7ce3c529d7a69d90d8458c1b9b881dbb916c0ab9ffe631b6cbfc1856acd3d9f
SHA512a42f209e46316381d6f739a5b38a47622ecf891f39d6e97ebd7632edfaac3c85b8c978ea6bc8b87bd5f4a9698a44e05deb1abf0c5f31a73b97c487204c2280c2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.32_(x64)_20240717135818_001_dotnet_hostfxr_6.0.32_win_x64.msi.logFilesize
2KB
MD56ed01f360bb93e3f8faaa298bc7dcbac
SHA13f931f2677889a923e726aef3784b8490cbcb6b2
SHA2569c360dc522b9fa59a32db12296219935b9002f9f9e323e932d517a7690953f43
SHA51217b3c5cf4cb7ad2a8dba579e15d64d08260b7b8e45e3a744a4f75854f7e0937be553ca74d4e974f9c46a5f532829dbccaeeacb6329456196ca886ab96e3a3e32
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.32_(x64)_20240717135818_002_dotnet_host_6.0.32_win_x64.msi.logFilesize
2KB
MD5ebc4be933a502f2fd4e65aaf661e01e2
SHA133122455f234545a61ed10d9bab044b56e4f8978
SHA256617edb58586ecc0d3ba8c723b8164bbad7c924aa393399388fbabd0f3e3d5e8f
SHA5128f6198b5987918677b1914241d4defd7e790043013c3f812dcddccc40734bd4559b9f05f363ddade36996fe0a12e27f4579c79c8d00e77ca09d7bf5358a46ff1
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.32_(x64)_20240717135818_003_windowsdesktop_runtime_6.0.32_win_x64.msi.logFilesize
2KB
MD5df073cf860931106fd9ea6c8ecfda934
SHA1d3360f6a175614132e78fdf5e4c11dd61c26fcf5
SHA256621cddd9d97f3c106aebdec03cc21c60d887b7754808e7abcff54b507e2b9f81
SHA51226192c3343269177adacb2da197a3698aeca66a4a1118cbd52d7ce50b2e185b927f8c1705be9d7a927b1aab4ef2bf517cae35f043da2dfb8359a2667168469ac
-
C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exeFilesize
949KB
MD58fb51b92d496c6765f7ba44e6d4a8990
SHA1d3e5a8465622cd5adae05babeb7e34b2b5c777d7
SHA256ab49d6166a285b747e5f279620ab9cea12f33f7656d732aa75900fcb981a5394
SHA51220de93a52fff7b092cb9d77bd26944abed5f5cb67146e6d2d70be6a431283b6de52eb37a0e13dc8bc57dcf8be2d5a95b9c11b3b030a3e2f03dd6e4efc23527a6
-
C:\Users\Admin\AppData\Local\Wave\WaveWindows.exeFilesize
8.0MB
MD5b8631bbd78d3935042e47b672c19ccc3
SHA1cd0ea137f1544a31d2a62aaed157486dce3ecebe
SHA2569cfda541d595dc20a55df5422001dfb58debd401df3abff21b1eee8ede28451c
SHA5120c51d6247e39f7851538a5916b24972e845abfe429f0abdc7b532f654b4afe73dc6e1936f1b062da63bfc90273d3cbc297bf6c802e615f3711d0f180c070aa26
-
C:\Users\Admin\AppData\Local\Wave\bin\Background.mp4Filesize
4.6MB
MD59782180eb68f73030fe24ef6a1735932
SHA1589827fe098ba048c9f871a28db8eae3e3537ff4
SHA2563a1cbb800f8f25c2ab703ba8bfdb01e938e4143c3bc0fea8ca734fb5ba779ba7
SHA512dc768638bae2d6d47d8910252ae64a656d8a6fd88efdf24165ddce51b7afdb4acb3fddd41dfe788737a2cab4fab66174db2f0d2f48bc8669af76d1656bca8be1
-
C:\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\.ba\bg.pngFilesize
4KB
MD59eb0320dfbf2bd541e6a55c01ddc9f20
SHA1eb282a66d29594346531b1ff886d455e1dcd6d99
SHA2569095bf7b6baa0107b40a4a6d727215be077133a190f4ca9bd89a176842141e79
SHA5129ada3a1757a493fbb004bd767fab8f77430af69d71479f340b8b8ede904cc94cd733700db593a4a2d2e1184c0081fd0648318d867128e1cb461021314990931d
-
C:\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\dotnet_host_6.0.32_win_x64.msiFilesize
792KB
MD5ac53c5d5e2f1e2ccfd83408856ce81db
SHA114f67d98612aad86c092dd05200b21a4fdfb8e1c
SHA256756c0d73225da2a0da97c879e00f6d5b273a0078d0bab55eb52755b449d1a896
SHA5120fab821d87fd7daab480db7bf54f0a51a73a16e91440d7ea440a56f6bb3d177105bf1e0741f7d4b94d206f6152104f7b35456ae1f1054b6f679ff0a126588454
-
C:\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\dotnet_hostfxr_6.0.32_win_x64.msiFilesize
856KB
MD546db6c104f1b633927dee575b5c38c0b
SHA19d5e6cf836e28959181b855102e70f5a37550314
SHA2562c8dfb556f4a6576205af03f8d5e2f0a939395ca2de6d69f06478b3008d1a2ce
SHA512007877e08b1958fdc5fec7da9fe8ad1a678c2e59bf0b5f4b4080640c1fab96a34f27af81f5a733580e95b897d0e27e1c1fd45a4ca20a673a20f3331f3d5c2b62
-
C:\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\dotnet_runtime_6.0.32_win_x64.msiFilesize
26.0MB
MD54e9eb394f40e78755fa76e67f9190cd0
SHA136310c7f007992d911e8402e4aa34a2bb1682063
SHA2568701e309396c5232a4fe1606c6e3549134fe01dc0d9fe4a74cb9d26531ddd9a4
SHA5122cb71f44e7bba16143120512718dd128185a5063ba4767146d10c93b81b6caa4226cfc30fa44b1e50ee41c37b55852e32ea63554fd438fb9ed60de2ce93ca8e3
-
C:\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\windowsdesktop_runtime_6.0.32_win_x64.msiFilesize
28.7MB
MD56631bf8cc9b765110110130467cdf840
SHA1ccc090918b2636279c2fd093d8e0d4ba99f5513f
SHA256afc5aeb00ccfb01f8428597fa7d44bf07d2811f712b998e4683e288404eb2e91
SHA512cfa6f85ab7c5865245e879e46063e63c53e835e81d8fc0ecde802a6ca3f898e4a94e58c10d99ac53f147dcc630c502c11596901dc4102dd758404730e91b0a3f
-
C:\Windows\Temp\{D49BDB83-3528-48B2-B370-42DBDA7CE63B}\.cr\windowsdesktop-runtime-6.0.32-win-x64.exeFilesize
636KB
MD573fa53cc1472a5868b64e379cc781e83
SHA15b2bb58b39ed3fd3f6b35b4f957430ba5ac305d3
SHA2569ee6a2a1c3a8102f2500b7a1159f383aa888164f8af174445473b675a6f7e631
SHA5129b7e382564f0fefbb35da95c905cf90b6b82be6f1fd78f338e36bf2b2863d91ed8715c79500eec43f941ff20948e08b580d8ab8259a0797ddb6469571a0a7767
-
\Windows\Installer\MSI8489.tmpFilesize
244KB
MD560e8c139e673b9eb49dc83718278bc88
SHA100a3a9cd6d3a9f52628ea09c2e645fe56ee7cd56
SHA256b181b6b4d69a53143a97a306919ba1adbc0b036a48b6d1d41ae7a01e8ef286cb
SHA512ac7cb86dbf3b86f00da7b8a246a6c7ef65a6f1c8705ea07f9b90e494b6239fb9626b55ee872a9b7f16575a60c82e767af228b8f018d4d7b9f783efaccca2b103
-
\Windows\Temp\{0DEF80AB-58A3-4E04-8B1F-3F8EE172182B}\.ba\wixstdba.dllFilesize
215KB
MD5f68f43f809840328f4e993a54b0d5e62
SHA101da48ce6c81df4835b4c2eca7e1d447be893d39
SHA256e921f69b9fb4b5ad4691809d06896c5f1d655ab75e0ce94a372319c243c56d4e
SHA512a7a799ecf1784fb5e8cd7191bf78b510ff5b07db07363388d7b32ed21f4fddc09e34d1160113395f728c0f4e57d13768a0350dbdb207d9224337d2153dc791e1
-
memory/1924-244-0x0000000000810000-0x0000000001012000-memory.dmpFilesize
8.0MB
-
memory/1924-1528-0x0000000008D20000-0x0000000008D86000-memory.dmpFilesize
408KB
-
memory/1924-252-0x000000000A310000-0x000000000A3C2000-memory.dmpFilesize
712KB
-
memory/1924-257-0x000000000B8F0000-0x000000000B912000-memory.dmpFilesize
136KB
-
memory/1924-258-0x000000000C030000-0x000000000C380000-memory.dmpFilesize
3.3MB
-
memory/1924-246-0x0000000005A00000-0x0000000005AA0000-memory.dmpFilesize
640KB
-
memory/1924-1525-0x0000000001840000-0x0000000001878000-memory.dmpFilesize
224KB
-
memory/1924-1526-0x000000000DD90000-0x000000000E2BC000-memory.dmpFilesize
5.2MB
-
memory/1924-1527-0x00000000016A0000-0x00000000016DE000-memory.dmpFilesize
248KB
-
memory/1924-1529-0x0000000005F60000-0x0000000005F68000-memory.dmpFilesize
32KB
-
memory/1924-1552-0x0000000011900000-0x00000000119D6000-memory.dmpFilesize
856KB
-
memory/1924-1583-0x0000000016260000-0x00000000162D6000-memory.dmpFilesize
472KB
-
memory/1924-1581-0x000000001E130000-0x000000001E162000-memory.dmpFilesize
200KB
-
memory/1924-1580-0x00000000030F0000-0x0000000003166000-memory.dmpFilesize
472KB
-
memory/1924-1579-0x000000001FF90000-0x00000000200EB000-memory.dmpFilesize
1.4MB
-
memory/1924-245-0x0000000005950000-0x0000000005A02000-memory.dmpFilesize
712KB
-
memory/1924-1578-0x000000001E330000-0x000000001E416000-memory.dmpFilesize
920KB
-
memory/1924-1577-0x0000000011240000-0x000000001128A000-memory.dmpFilesize
296KB
-
memory/1924-1576-0x0000000006160000-0x0000000006184000-memory.dmpFilesize
144KB
-
memory/1924-247-0x0000000005860000-0x0000000005868000-memory.dmpFilesize
32KB
-
memory/3156-299-0x0000021E1BE50000-0x0000021E1BE52000-memory.dmpFilesize
8KB
-
memory/3156-725-0x0000021E23E30000-0x0000021E23E31000-memory.dmpFilesize
4KB
-
memory/3156-724-0x0000021E23E20000-0x0000021E23E21000-memory.dmpFilesize
4KB
-
memory/3156-280-0x0000021E1CD20000-0x0000021E1CD30000-memory.dmpFilesize
64KB
-
memory/3156-264-0x0000021E1CC20000-0x0000021E1CC30000-memory.dmpFilesize
64KB
-
memory/4160-308-0x000001AC09800000-0x000001AC09900000-memory.dmpFilesize
1024KB
-
memory/4160-306-0x000001AC09800000-0x000001AC09900000-memory.dmpFilesize
1024KB
-
memory/4360-19-0x00000000098E0000-0x0000000009952000-memory.dmpFilesize
456KB
-
memory/4360-8-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4360-4-0x0000000009D20000-0x0000000009D58000-memory.dmpFilesize
224KB
-
memory/4360-0-0x000000007349E000-0x000000007349F000-memory.dmpFilesize
4KB
-
memory/4360-5-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4360-6-0x000000007349E000-0x000000007349F000-memory.dmpFilesize
4KB
-
memory/4360-7-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4360-20-0x0000000009980000-0x000000000998A000-memory.dmpFilesize
40KB
-
memory/4360-3-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4360-2-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4360-15-0x000000000C1C0000-0x000000000C256000-memory.dmpFilesize
600KB
-
memory/4360-234-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4360-16-0x0000000009670000-0x0000000009696000-memory.dmpFilesize
152KB
-
memory/4360-17-0x00000000016C0000-0x00000000016C8000-memory.dmpFilesize
32KB
-
memory/4360-1-0x0000000000CB0000-0x0000000000E42000-memory.dmpFilesize
1.6MB
-
memory/4360-21-0x000000000AEF0000-0x000000000AEFA000-memory.dmpFilesize
40KB
-
memory/4596-236-0x000000000A1B0000-0x000000000A1C6000-memory.dmpFilesize
88KB
-
memory/4596-230-0x0000000000CF0000-0x0000000000DE2000-memory.dmpFilesize
968KB
-
memory/4596-231-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4596-232-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4596-235-0x0000000009480000-0x0000000009584000-memory.dmpFilesize
1.0MB
-
memory/4596-243-0x0000000073490000-0x0000000073B7E000-memory.dmpFilesize
6.9MB
-
memory/4596-237-0x000000000A1F0000-0x000000000A1FA000-memory.dmpFilesize
40KB
-
memory/4596-238-0x000000000A230000-0x000000000A238000-memory.dmpFilesize
32KB
-
memory/4596-239-0x000000000A280000-0x000000000A29E000-memory.dmpFilesize
120KB
-
memory/4692-437-0x00000212D4EE0000-0x00000212D4EE2000-memory.dmpFilesize
8KB
-
memory/4692-1432-0x00000212BE9D0000-0x00000212BE9D2000-memory.dmpFilesize
8KB
-
memory/4692-1434-0x00000212BE9E0000-0x00000212BE9E2000-memory.dmpFilesize
8KB
-
memory/4692-1436-0x00000212BEB20000-0x00000212BEB22000-memory.dmpFilesize
8KB
-
memory/4692-1445-0x00000212D5130000-0x00000212D5230000-memory.dmpFilesize
1024KB
-
memory/4692-1461-0x00000212BEBA0000-0x00000212BEBB0000-memory.dmpFilesize
64KB
-
memory/4692-618-0x00000212D6480000-0x00000212D64A0000-memory.dmpFilesize
128KB
-
memory/4692-607-0x00000212D53A0000-0x00000212D53A2000-memory.dmpFilesize
8KB
-
memory/4692-550-0x00000212D6740000-0x00000212D6760000-memory.dmpFilesize
128KB
-
memory/4692-548-0x00000212D6720000-0x00000212D6740000-memory.dmpFilesize
128KB
-
memory/4692-515-0x00000212D0400000-0x00000212D0500000-memory.dmpFilesize
1024KB
-
memory/4692-478-0x00000212BF400000-0x00000212BF500000-memory.dmpFilesize
1024KB
-
memory/4692-462-0x00000212D5130000-0x00000212D5230000-memory.dmpFilesize
1024KB
-
memory/4692-439-0x00000212D4EF0000-0x00000212D4EF2000-memory.dmpFilesize
8KB
-
memory/4692-441-0x00000212D5110000-0x00000212D5112000-memory.dmpFilesize
8KB
-
memory/4692-434-0x00000212D4EC0000-0x00000212D4EC2000-memory.dmpFilesize
8KB
-
memory/4692-430-0x00000212D4E80000-0x00000212D4E82000-memory.dmpFilesize
8KB
-
memory/4692-432-0x00000212D4EA0000-0x00000212D4EA2000-memory.dmpFilesize
8KB
-
memory/4692-328-0x00000212BF400000-0x00000212BF500000-memory.dmpFilesize
1024KB
-
memory/4692-326-0x00000212BEBE0000-0x00000212BEBE2000-memory.dmpFilesize
8KB
-
memory/4692-324-0x00000212BEBC0000-0x00000212BEBC2000-memory.dmpFilesize
8KB
-
memory/4692-321-0x00000212BEB90000-0x00000212BEB92000-memory.dmpFilesize
8KB