IOC Report
WaveInstaller.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WaveInstaller.exe
"C:\Users\user\Desktop\WaveInstaller.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/dxgi/wave-binaries/raw/main/CefSharp.Wpf.124.3.8.rar
unknown
https://www.nuget.org/api/v2/package/chromiumembeddedframework.runtime.win-x86/124.3.8
unknown
https://github.com/dxgi/wave-binaries/raw/main/Wave-x64.rarmeP?
unknown
https://www.nuget.org/api/v2/package/chromiumembeddedframework.runtime.win-x86/124.3.87CefSharp.Comm
unknown
https://github.com/dxgi/wave-binaries/raw/main/CefSharp.Common.124.3.8.rar
unknown
https://github.com/dxgi/wave-binaries/raw/main/Luau-x64.rar
unknown
https://github.com/dxgi/wave-binaries/raw/main/Wave-x64.rar
unknown
https://github.com/dxgi/wave-binaries/raw/main/CefSharp.Common.124.3.8.rar1CefSharp.Wpf.124.3.8.rar
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2BA1000
trusted library allocation
page read and write
malicious
5C2000
unkown
page readonly
malicious
C709000
heap
page read and write
C370000
trusted library allocation
page read and write
58BC000
heap
page read and write
FF1F9000
trusted library allocation
page execute read
FF1E5000
trusted library allocation
page execute read
C230000
trusted library allocation
page read and write
C20000
heap
page read and write
5A5C000
stack
page read and write
9641000
heap
page read and write
FF1C8000
trusted library allocation
page readonly
58D3000
heap
page read and write
C7BF000
heap
page read and write
FF1B0000
trusted library allocation
page readonly
94E2000
heap
page read and write
95BA000
heap
page read and write
C791000
heap
page read and write
C7AE000
heap
page read and write
C210000
trusted library allocation
page read and write
95ED000
heap
page read and write
BD70000
trusted library allocation
page read and write
956D000
heap
page read and write
590E000
heap
page read and write
FF204000
trusted library allocation
page execute read
BD10000
trusted library allocation
page read and write
5875000
heap
page read and write
BC50000
trusted library allocation
page read and write
7340000
heap
page read and write
5843000
heap
page read and write
C1C0000
trusted library allocation
page read and write
55D0000
heap
page read and write
55C8000
stack
page read and write
C6C1000
heap
page read and write
C7B2000
heap
page read and write
9600000
heap
page read and write
FF1F5000
trusted library allocation
page execute read
FF1D8000
trusted library allocation
page execute read
9610000
heap
page read and write
95C9000
heap
page read and write
C6F0000
heap
page read and write
1050000
trusted library allocation
page read and write
FF1C1000
trusted library allocation
page execute read
949B000
heap
page read and write
3BB1000
trusted library allocation
page read and write
9603000
heap
page read and write
C340000
trusted library allocation
page read and write
C6F7000
heap
page read and write
586D000
heap
page read and write
55FF000
heap
page read and write
BC60000
trusted library allocation
page read and write
C350000
trusted library allocation
page read and write
94B0000
heap
page read and write
FF1E9000
trusted library allocation
page readonly
FF1CD000
trusted library allocation
page execute read
95BD000
heap
page read and write
1130000
heap
page read and write
588E000
heap
page read and write
B000000
trusted library allocation
page read and write
BCA0000
trusted library allocation
page read and write
9547000
heap
page read and write
4C9E000
stack
page read and write
C7B0000
heap
page read and write
B845000
heap
page read and write
FF209000
trusted library allocation
page readonly
9460000
heap
page read and write
C220000
trusted library allocation
page read and write
94B2000
heap
page read and write
C58D000
heap
page read and write
94B6000
heap
page read and write
5914000
heap
page read and write
C33000
heap
page read and write
94D9000
heap
page read and write
C78E000
heap
page read and write
29E4000
heap
page read and write
961B000
heap
page read and write
977C000
stack
page read and write
5150000
heap
page execute and read and write
B6E000
heap
page read and write
FF1EA000
trusted library allocation
page execute read
5857000
heap
page read and write
C4F4000
heap
page read and write
94F7000
heap
page read and write
B95000
heap
page read and write
2980000
trusted library allocation
page read and write
C7A3000
heap
page read and write
FF1D6000
trusted library allocation
page execute read
FF1EE000
trusted library allocation
page execute read
FF208000
trusted library allocation
page execute read
C1D0000
trusted library allocation
page read and write
5824000
heap
page read and write
C4FE000
heap
page read and write
C796000
heap
page read and write
FF1DE000
trusted library allocation
page execute read
C410000
trusted library allocation
page read and write
2B9F000
stack
page read and write
10BE000
stack
page read and write
FF1E7000
trusted library allocation
page execute read
C6DF000
heap
page read and write
5885000
heap
page read and write
C7A1000
heap
page read and write
C1B0000
trusted library allocation
page read and write
C200000
trusted library allocation
page read and write
585B000
heap
page read and write
9573000
heap
page read and write
9564000
heap
page read and write
C6AD000
heap
page read and write
1100000
heap
page read and write
C819000
heap
page read and write
C681000
heap
page read and write
C7D8000
heap
page read and write
C73A000
heap
page read and write
AF8000
stack
page read and write
55E9000
heap
page read and write
B60000
heap
page read and write
C310000
trusted library allocation
page read and write
534E000
stack
page read and write
C1F0000
trusted library allocation
page read and write
583E000
heap
page read and write
C38000
heap
page read and write
C776000
heap
page read and write
58A1000
heap
page read and write
58D8000
heap
page read and write
1020000
trusted library allocation
page read and write
94AB000
heap
page read and write
94EF000
heap
page read and write
5888000
heap
page read and write
C450000
trusted library allocation
page read and write
29E0000
heap
page read and write
BCD0000
trusted library allocation
page read and write
C52F000
heap
page read and write
595B000
stack
page read and write
C786000
heap
page read and write
C737000
heap
page read and write
952C000
heap
page read and write
1139000
heap
page read and write
C2E0000
trusted library allocation
page read and write
5835000
heap
page read and write
960E000
heap
page read and write
56D0000
heap
page execute and read and write
D40000
heap
page read and write
C330000
trusted library allocation
page read and write
FF1FB000
trusted library allocation
page execute read
FF1E3000
trusted library allocation
page execute read
C320000
trusted library allocation
page read and write
55E0000
heap
page read and write
C7BA000
heap
page read and write
94F3000
heap
page read and write
1010000
trusted library allocation
page read and write
C6CF000
heap
page read and write
C4F6000
heap
page read and write
C546000
heap
page read and write
BD50000
trusted library allocation
page read and write
1120000
trusted library allocation
page execute and read and write
C5D9000
heap
page read and write
C77F000
heap
page read and write
95F0000
heap
page read and write
C730000
heap
page read and write
FF1F3000
trusted library allocation
page execute read
BDB2000
trusted library allocation
page read and write
C734000
heap
page read and write
FF1B1000
trusted library allocation
page execute read
FF206000
trusted library allocation
page execute read
BC80000
trusted library allocation
page read and write
FF1D7000
trusted library allocation
page readonly
FF1EC000
trusted library allocation
page execute read
FF203000
trusted library allocation
page readonly
FF1C5000
trusted library allocation
page execute read
B20000
heap
page read and write
C720000
heap
page read and write
94C1000
heap
page read and write
94EB000
heap
page read and write
1052000
trusted library allocation
page read and write
FF1C7000
trusted library allocation
page execute read
9552000
heap
page read and write
58DC000
heap
page read and write
C3D000
heap
page read and write
BCF0000
trusted library allocation
page read and write
C3B0000
trusted library allocation
page read and write
FF1F1000
trusted library allocation
page execute read
55F0000
heap
page read and write
C706000
heap
page read and write
5849000
heap
page read and write
9670000
trusted library allocation
page read and write
953D000
heap
page read and write
C46B000
heap
page read and write
C300000
trusted library allocation
page read and write
FF1DB000
trusted library allocation
page readonly
FF1FD000
trusted library allocation
page execute read
BCE0000
trusted library allocation
page read and write
947E000
heap
page read and write
FF20A000
trusted library allocation
page execute read
FF1FF000
trusted library allocation
page execute read
C778000
heap
page read and write
9535000
heap
page read and write
C3F0000
trusted library allocation
page read and write
C6A6000
heap
page read and write
C360000
trusted library allocation
page read and write
C2F0000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
FF1DC000
trusted library allocation
page execute read
95C6000
heap
page read and write
103D000
trusted library allocation
page execute and read and write
C60A000
heap
page read and write
95EA000
heap
page read and write
1040000
trusted library allocation
page read and write
94F1000
heap
page read and write
5C1E000
stack
page read and write
C7A7000
heap
page read and write
FF1C9000
trusted library allocation
page execute read
5B9C000
stack
page read and write
1046000
trusted library allocation
page execute and read and write
582D000
heap
page read and write
3BA1000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
B88000
heap
page read and write
102D000
trusted library allocation
page execute and read and write
C704000
heap
page read and write
BD00000
trusted library allocation
page read and write
FF201000
trusted library allocation
page readonly
1057000
trusted library allocation
page execute and read and write
EA0000
heap
page read and write
B69000
heap
page read and write
C68B000
heap
page read and write
962D000
heap
page read and write
1042000
trusted library allocation
page read and write
94B8000
heap
page read and write
BCB0000
trusted library allocation
page read and write
5153000
heap
page execute and read and write
953A000
heap
page read and write
C1E000
heap
page read and write
BC90000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
94BD000
heap
page read and write
105B000
trusted library allocation
page execute and read and write
FF1F7000
trusted library allocation
page execute read
9529000
heap
page read and write
C190000
trusted library allocation
page read and write
FF20B000
trusted library allocation
page readonly
29B0000
trusted library allocation
page read and write
548E000
stack
page read and write
587C000
heap
page read and write
C718000
heap
page read and write
C732000
heap
page read and write
95E0000
heap
page read and write
28E8000
trusted library allocation
page read and write
C5CF000
heap
page read and write
9605000
heap
page read and write
54CC000
stack
page read and write
FF1D1000
trusted library allocation
page execute read
FF1CB000
trusted library allocation
page execute read
FF1ED000
trusted library allocation
page readonly
5C0000
unkown
page readonly
BD30000
trusted library allocation
page read and write
BD80000
trusted library allocation
page read and write
FF1E1000
trusted library allocation
page execute read
FF200000
trusted library allocation
page execute read
C60000
heap
page read and write
C42000
heap
page read and write
C662000
heap
page read and write
FF1EB000
trusted library allocation
page readonly
955A000
heap
page read and write
95F7000
heap
page read and write
964F000
heap
page read and write
C7AA000
heap
page read and write
C1E0000
trusted library allocation
page read and write
C80F000
heap
page read and write
58E0000
heap
page read and write
FF20C000
trusted library allocation
page execute read
C620000
heap
page read and write
603E000
stack
page read and write
B25000
heap
page read and write
C3E0000
trusted library allocation
page read and write
94A9000
heap
page read and write
FF1C3000
trusted library allocation
page execute read
1023000
trusted library allocation
page execute and read and write
2A90000
heap
page execute and read and write
29A0000
heap
page read and write
FF1DA000
trusted library allocation
page execute read
C79E000
heap
page read and write
1024000
trusted library allocation
page read and write
58F5000
heap
page read and write
C6FB000
heap
page read and write
BC70000
trusted library allocation
page read and write
2A80000
heap
page read and write
5871000
heap
page read and write
C814000
heap
page read and write
C4B2000
heap
page read and write
9540000
heap
page read and write
FF20E000
trusted library allocation
page execute read
538E000
stack
page read and write
C7AC000
heap
page read and write
9622000
heap
page read and write
9531000
heap
page read and write
1070000
trusted library allocation
page read and write
5D1C000
stack
page read and write
94A1000
heap
page read and write
C380000
trusted library allocation
page read and write
BD20000
trusted library allocation
page read and write
1055000
trusted library allocation
page execute and read and write
BD40000
trusted library allocation
page read and write
71C000
unkown
page readonly
FF1D4000
trusted library allocation
page execute read
BCC0000
trusted library allocation
page read and write
C725000
heap
page read and write
C4F000
heap
page read and write
5820000
heap
page read and write
7310000
trusted library allocation
page read and write
FF202000
trusted library allocation
page execute read
FF1C4000
trusted library allocation
page readonly
95A4000
heap
page read and write
BA4000
heap
page read and write
104A000
trusted library allocation
page execute and read and write
10FC000
stack
page read and write
9543000
heap
page read and write
9660000
trusted library allocation
page read and write
5A9E000
stack
page read and write
5880000
heap
page read and write
C809000
heap
page read and write
94C4000
heap
page read and write
C1A0000
trusted library allocation
page read and write
58C3000
heap
page read and write
7E8000
stack
page read and write
2A7E000
stack
page read and write
C71C000
heap
page read and write
BD60000
trusted library allocation
page read and write
There are 316 hidden memdumps, click here to show them.