IOC Report
WaveInstaller.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WaveInstaller.exe
"C:\Users\user\Desktop\WaveInstaller.exe"
malicious

URLs

Name
IP
Malicious
https://cdn.getwave.gg/bootstrapper/WaveWindows.exe-Wave
unknown
https://github.com/dxgi/wave-binaries/raw/main/CefSharp.Wpf.124.3.8.rar
unknown
https://www.nuget.org/api/v2/package/chromiumembeddedframework.runtime.win-x86/124.3.8
unknown
https://www.nuget.org/api/v2/package/chromiumembeddedframework.runtime.win-x86/124.3.87CefSharp.Comm
unknown
https://github.com/dxgi/wave-binaries/raw/main/CefSharp.Common.124.3.8.rar
unknown
https://github.com/dxgi/wave-binaries/raw/main/Luau-x64.rar
unknown
https://github.com/dxgi/wave-binaries/raw/main/Wave-x64.rar
unknown
https://cdn.getwave.gg/bootstrapper/WaveWindows.exeio
unknown
https://github.com/dxgi/wave-binaries/raw/main/CefSharp.Common.124.3.8.rar1CefSharp.Wpf.124.3.8.rar
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
B82000
unkown
page readonly
malicious
31A1000
trusted library allocation
page read and write
malicious
5AEF000
stack
page read and write
1570000
trusted library allocation
page read and write
1600000
heap
page read and write
CE48000
heap
page read and write
63A3000
heap
page read and write
CB51000
heap
page read and write
CC56000
heap
page read and write
6410000
heap
page read and write
15B2000
trusted library allocation
page read and write
6530000
heap
page read and write
CD5D000
heap
page read and write
CACD000
heap
page read and write
D499000
heap
page read and write
CD7D000
heap
page read and write
CD4D000
heap
page read and write
FF721000
trusted library allocation
page execute read
D94000
unkown
page readonly
CE54000
heap
page read and write
11D0000
heap
page read and write
5633000
heap
page execute and read and write
15B0000
trusted library allocation
page read and write
CE08000
heap
page read and write
C9C0000
trusted library allocation
page read and write
D2F7000
heap
page read and write
6452000
heap
page read and write
CDDC000
heap
page read and write
15B7000
trusted library allocation
page execute and read and write
63B7000
heap
page read and write
FF708000
trusted library allocation
page execute read
CA3A000
heap
page read and write
1372000
heap
page read and write
142A000
heap
page read and write
CCB7000
heap
page read and write
60CC000
stack
page read and write
CD6B000
heap
page read and write
5C70000
heap
page read and write
6402000
heap
page read and write
FF72B000
trusted library allocation
page execute read
D540000
heap
page read and write
C390000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
CCAC000
heap
page read and write
2F90000
heap
page read and write
6550000
trusted library allocation
page read and write
C420000
trusted library allocation
page read and write
11C0000
heap
page read and write
C410000
trusted library allocation
page read and write
FF706000
trusted library allocation
page execute read
CDDE000
heap
page read and write
FF6FD000
trusted library allocation
page execute read
5DB0000
heap
page read and write
5DA6000
heap
page read and write
6220000
heap
page read and write
FF73A000
trusted library allocation
page execute read
5D4E000
heap
page read and write
CCB1000
heap
page read and write
15AA000
trusted library allocation
page execute and read and write
D4F4000
heap
page read and write
CDBB000
heap
page read and write
63AA000
heap
page read and write
FF73B000
trusted library allocation
page readonly
5D90000
heap
page read and write
1590000
trusted library allocation
page read and write
5B3B000
stack
page read and write
C3C0000
trusted library allocation
page read and write
C990000
trusted library allocation
page read and write
C9A0000
trusted library allocation
page read and write
FF6F9000
trusted library allocation
page execute read
C8F0000
trusted library allocation
page read and write
C8D0000
trusted library allocation
page read and write
1339000
heap
page read and write
64C0000
heap
page read and write
CE03000
heap
page read and write
CCA8000
heap
page read and write
CD82000
heap
page read and write
D536000
heap
page read and write
C980000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
15A6000
trusted library allocation
page execute and read and write
9EBC000
stack
page read and write
64C9000
heap
page read and write
CBCE000
heap
page read and write
5E18000
heap
page read and write
56F4000
heap
page read and write
C13E000
heap
page read and write
5630000
heap
page execute and read and write
CE21000
heap
page read and write
D571000
heap
page read and write
5D94000
heap
page read and write
1365000
heap
page read and write
6500000
heap
page read and write
5D7D000
heap
page read and write
CE39000
heap
page read and write
FF6F8000
trusted library allocation
page readonly
9DBE000
stack
page read and write
C970000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
CDE1000
heap
page read and write
FF732000
trusted library allocation
page execute read
D45E000
heap
page read and write
FF6F5000
trusted library allocation
page execute read
64AD000
heap
page read and write
2F75000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
C910000
trusted library allocation
page read and write
D538000
heap
page read and write
63F8000
heap
page read and write
FF733000
trusted library allocation
page readonly
6340000
trusted library allocation
page read and write
FF72F000
trusted library allocation
page execute read
6459000
heap
page read and write
5D77000
heap
page read and write
13ED000
heap
page read and write
D39B000
heap
page read and write
5C38000
stack
page read and write
B80000
unkown
page readonly
15D0000
trusted library allocation
page read and write
5D6E000
heap
page read and write
FF73C000
trusted library allocation
page execute read
FF730000
trusted library allocation
page execute read
1158000
stack
page read and write
FF6F1000
trusted library allocation
page execute read
646C000
heap
page read and write
1580000
trusted library allocation
page read and write
6443000
heap
page read and write
9FFC000
stack
page read and write
C360000
trusted library allocation
page read and write
13F6000
heap
page read and write
CD94000
heap
page read and write
C370000
trusted library allocation
page read and write
CDD1000
heap
page read and write
CE26000
heap
page read and write
6526000
heap
page read and write
C350000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
FF713000
trusted library allocation
page execute read
C8E0000
trusted library allocation
page read and write
133E000
heap
page read and write
63A5000
heap
page read and write
CAC3000
heap
page read and write
FF71C000
trusted library allocation
page execute read
B880000
trusted library allocation
page read and write
1358000
heap
page read and write
FF729000
trusted library allocation
page execute read
642F000
heap
page read and write
D34F000
heap
page read and write
C8C0000
trusted library allocation
page read and write
FF73E000
trusted library allocation
page execute read
65CE000
stack
page read and write
CDBD000
heap
page read and write
FF71A000
trusted library allocation
page execute read
FF727000
trusted library allocation
page execute read
5C60000
heap
page read and write
5E40000
heap
page execute and read and write
6471000
heap
page read and write
641F000
heap
page read and write
CE3E000
heap
page read and write
643A000
heap
page read and write
644D000
heap
page read and write
5E31000
heap
page read and write
FF6E0000
trusted library allocation
page readonly
FF715000
trusted library allocation
page execute read
5D64000
heap
page read and write
5DF9000
heap
page read and write
1584000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
C3F0000
trusted library allocation
page read and write
64FC000
heap
page read and write
CE2F000
heap
page read and write
CA00000
trusted library allocation
page read and write
CE43000
heap
page read and write
FF731000
trusted library allocation
page readonly
636E000
heap
page read and write
5DE4000
heap
page read and write
5DC2000
heap
page read and write
18A0000
trusted library allocation
page execute and read and write
FF71D000
trusted library allocation
page readonly
C3D0000
trusted library allocation
page read and write
15E0000
heap
page read and write
1376000
heap
page read and write
CB0B000
heap
page read and write
5DF4000
heap
page read and write
5DA0000
heap
page read and write
55E0000
trusted library allocation
page read and write
C9F0000
trusted library allocation
page read and write
643D000
heap
page read and write
D4AD000
heap
page read and write
646F000
heap
page read and write
C930000
trusted library allocation
page read and write
159D000
trusted library allocation
page execute and read and write
CD77000
heap
page read and write
FF701000
trusted library allocation
page execute read
CDC4000
heap
page read and write
5D40000
heap
page read and write
CC50000
heap
page read and write
99D0000
trusted library allocation
page read and write
63BB000
heap
page read and write
FF6E1000
trusted library allocation
page execute read
15A2000
trusted library allocation
page read and write
15BB000
trusted library allocation
page execute and read and write
CCA3000
heap
page read and write
CD8D000
heap
page read and write
5FCB000
stack
page read and write
FF705000
trusted library allocation
page readonly
D27A000
heap
page read and write
FF723000
trusted library allocation
page execute read
66CC000
stack
page read and write
647A000
heap
page read and write
FF717000
trusted library allocation
page execute read
652D000
heap
page read and write
6510000
heap
page read and write
FF707000
trusted library allocation
page readonly
C3E0000
trusted library allocation
page read and write
FF6F3000
trusted library allocation
page execute read
1059000
stack
page read and write
D3D5000
heap
page read and write
CDEE000
heap
page read and write
140C000
heap
page read and write
1583000
trusted library allocation
page execute and read and write
5C59000
heap
page read and write
CA81000
heap
page read and write
CC6B000
heap
page read and write
11F5000
heap
page read and write
FF71E000
trusted library allocation
page execute read
FF6FB000
trusted library allocation
page execute read
C9E0000
trusted library allocation
page read and write
640D000
heap
page read and write
C4C2000
trusted library allocation
page read and write
D2C6000
heap
page read and write
63AE000
heap
page read and write
64A3000
heap
page read and write
CE12000
heap
page read and write
319E000
stack
page read and write
6393000
heap
page read and write
CB9D000
heap
page read and write
CA20000
trusted library allocation
page read and write
6464000
heap
page read and write
529E000
stack
page read and write
6469000
heap
page read and write
D468000
heap
page read and write
99F0000
trusted library allocation
page read and write
5C50000
heap
page read and write
CDAD000
heap
page read and write
3090000
heap
page execute and read and write
41A1000
trusted library allocation
page read and write
5DFD000
heap
page read and write
1421000
heap
page read and write
5DAA000
heap
page read and write
610E000
stack
page read and write
C960000
trusted library allocation
page read and write
FF6F4000
trusted library allocation
page readonly
18D0000
heap
page read and write
C8A0000
trusted library allocation
page read and write
CDB8000
heap
page read and write
D308000
heap
page read and write
CC9D000
heap
page read and write
C380000
trusted library allocation
page read and write
CCA6000
heap
page read and write
6350000
heap
page read and write
CDF9000
heap
page read and write
CCBC000
heap
page read and write
638B000
heap
page read and write
63C6000
heap
page read and write
CD86000
heap
page read and write
2F2E000
stack
page read and write
FF735000
trusted library allocation
page readonly
FF70A000
trusted library allocation
page execute read
C440000
trusted library allocation
page read and write
6446000
heap
page read and write
6421000
heap
page read and write
9A10000
trusted library allocation
page read and write
FF70C000
trusted library allocation
page execute read
CCCF000
heap
page read and write
56EE000
stack
page read and write
141B000
heap
page read and write
11F0000
heap
page read and write
1416000
heap
page read and write
CDD8000
heap
page read and write
2F6C000
stack
page read and write
CD84000
heap
page read and write
CC9F000
heap
page read and write
CDBF000
heap
page read and write
158D000
trusted library allocation
page execute and read and write
CD97000
heap
page read and write
650B000
heap
page read and write
C950000
trusted library allocation
page read and write
C8B0000
trusted library allocation
page read and write
FF6F7000
trusted library allocation
page execute read
CCCB000
heap
page read and write
C430000
trusted library allocation
page read and write
5D9D000
heap
page read and write
99E0000
trusted library allocation
page read and write
5AF0000
heap
page read and write
562E000
stack
page read and write
CDB6000
heap
page read and write
620C000
stack
page read and write
41B1000
trusted library allocation
page read and write
C9B0000
trusted library allocation
page read and write
FF70E000
trusted library allocation
page execute read
CAFE000
heap
page read and write
63C0000
heap
page read and write
5D42000
heap
page read and write
9EFE000
stack
page read and write
2F70000
trusted library allocation
page read and write
CC30000
heap
page read and write
15A0000
trusted library allocation
page read and write
D391000
heap
page read and write
5E02000
heap
page read and write
FF711000
trusted library allocation
page execute read
D3CC000
heap
page read and write
FF725000
trusted library allocation
page execute read
5DB5000
heap
page read and write
670E000
stack
page read and write
C0E0000
trusted library allocation
page read and write
6514000
heap
page read and write
CD62000
heap
page read and write
649E000
heap
page read and write
FF734000
trusted library allocation
page execute read
C920000
trusted library allocation
page read and write
18D9000
heap
page read and write
FF70B000
trusted library allocation
page readonly
FF719000
trusted library allocation
page readonly
D233000
heap
page read and write
5D5E000
heap
page read and write
5D6A000
heap
page read and write
FF738000
trusted library allocation
page execute read
5C40000
heap
page read and write
1330000
heap
page read and write
6467000
heap
page read and write
C900000
trusted library allocation
page read and write
CDC7000
heap
page read and write
CD1C000
heap
page read and write
C3A0000
trusted library allocation
page read and write
D41C000
heap
page read and write
C3B0000
trusted library allocation
page read and write
59EE000
stack
page read and write
9D7D000
stack
page read and write
FF736000
trusted library allocation
page execute read
C400000
trusted library allocation
page read and write
C940000
trusted library allocation
page read and write
FF72D000
trusted library allocation
page execute read
CE2A000
heap
page read and write
56F0000
heap
page read and write
15B5000
trusted library allocation
page execute and read and write
FF703000
trusted library allocation
page execute read
5DDE000
heap
page read and write
There are 338 hidden memdumps, click here to show them.