Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://https://https/:://websocketpp.processorGeneric |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: WaveExecutor.exe, 00000000.00000003.1483688447.000002C33ACB1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/ |
Source: WaveExecutor.exe, 00000000.00000003.1451712581.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1457751354.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1464996705.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3888813379.000002C33B170000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462341885.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1468124629.000002C33B170000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/7 |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/Russia |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993. |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage |
Source: WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold |
Source: WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44 |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202FCE0 | 0_2_00007FF65202FCE0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202EA60 | 0_2_00007FF65202EA60 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202F2F0 | 0_2_00007FF65202F2F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652030330 | 0_2_00007FF652030330 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652034320 | 0_2_00007FF652034320 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65200DB50 | 0_2_00007FF65200DB50 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202CB40 | 0_2_00007FF65202CB40 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202A370 | 0_2_00007FF65202A370 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FE7390 | 0_2_00007FF651FE7390 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FEFBB0 | 0_2_00007FF651FEFBB0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652016BC0 | 0_2_00007FF652016BC0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652006C90 | 0_2_00007FF652006C90 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FE6CB0 | 0_2_00007FF651FE6CB0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF6520054F0 | 0_2_00007FF6520054F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652017CE0 | 0_2_00007FF652017CE0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65200BD10 | 0_2_00007FF65200BD10 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652030D02 | 0_2_00007FF652030D02 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65201D530 | 0_2_00007FF65201D530 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FFE1C0 | 0_2_00007FF651FFE1C0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF6520159E0 | 0_2_00007FF6520159E0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65200B1E0 | 0_2_00007FF65200B1E0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65201F9E0 | 0_2_00007FF65201F9E0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FFFA00 | 0_2_00007FF651FFFA00 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652022A00 | 0_2_00007FF652022A00 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FF5A30 | 0_2_00007FF651FF5A30 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FFC250 | 0_2_00007FF651FFC250 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FFF250 | 0_2_00007FF651FFF250 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65200C270 | 0_2_00007FF65200C270 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202BA80 | 0_2_00007FF65202BA80 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202C310 | 0_2_00007FF65202C310 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FEDFB0 | 0_2_00007FF651FEDFB0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65200BFC0 | 0_2_00007FF65200BFC0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF6520197F0 | 0_2_00007FF6520197F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652026090 | 0_2_00007FF652026090 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65200AD40 | 0_2_00007FF65200AD40 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FE5D90 | 0_2_00007FF651FE5D90 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65202E5B0 | 0_2_00007FF65202E5B0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65201CDD0 | 0_2_00007FF65201CDD0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF6520125F0 | 0_2_00007FF6520125F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652020DE0 | 0_2_00007FF652020DE0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FE9E10 | 0_2_00007FF651FE9E10 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FF4620 | 0_2_00007FF651FF4620 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FFD620 | 0_2_00007FF651FFD620 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF6520096B0 | 0_2_00007FF6520096B0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FF6EC0 | 0_2_00007FF651FF6EC0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FF46F0 | 0_2_00007FF651FF46F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF652007EF0 | 0_2_00007FF652007EF0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF651FE9730 | 0_2_00007FF651FE9730 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_000002C33ADB2720 | 0_2_000002C33ADB2720 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_000002C33ACDBA30 | 0_2_000002C33ACDBA30 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_000002C33AD13841 | 0_2_000002C33AD13841 |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1753164467.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462576926.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889656381.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1610058737.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2046470525.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B438000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE autofill (name VARCHAR, value VARCHAR, value_lower VARCHAR, date_created INTEGER DEFAULT 0, date_last_used INTEGER DEFAULT 0, count INTEGER DEFAULT 1, PRIMARY KEY (name, value))t4; |
Source: WaveExecutor.exe, 00000000.00000002.3889012697.000002C33B320000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE server_addresses (id VARCHAR, company_name VARCHAR, street_address VARCHAR, address_1 VARCHAR, address_2 VARCHAR, address_3 VARCHAR, address_4 VARCHAR, postal_code VARCHAR, sorting_code VARCHAR, country_code VARCHAR, language_code VARCHAR, recipient_name VARCHAR, phone_number VARCHAR); |
Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1753164467.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462576926.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889656381.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1610058737.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2046470525.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B438000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE offer_data (offer_id UNSIGNED LONG, offer_reward_amount VARCHAR, expiry UNSIGNED LONG, offer_details_url VARCHAR, merchant_domain VARCHAR, promo_code VARCHAR, value_prop_text VARCHAR, see_details_text VARCHAR, usage_instructions_text VARCHAR);M |
Source: WaveExecutor.exe, 00000000.00000002.3886336510.000002C33ABF6000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE server_card_cloud_token_data (id VARCHAR, suffix VARCHAR, exp_month INTEGER DEFAULT 0, exp_year INTEGER DEFAULT 0, card_art_url VARCHAR, instrument_token VARCHAR);~ |
Source: WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1945634611.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1465375008.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1517096164.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1758631606.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2036016440.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE clusters(cluster_id INTEGER PRIMARY KEY AUTOINCREMENT,should_show_on_prominent_ui_surfaces BOOLEAN NOT NULL,label VARCHAR NOT NULL,raw_label VARCHAR NOT NULL,triggerability_calculated BOOLEAN NOT NULL,originator_cache_guid TEXT NOT NULL,originator_cluster_id INTEGER NOT NULL)>; |
Source: WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1945634611.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1465375008.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1517096164.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1758631606.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2036016440.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE safety_hub_navigations (navigation_date INTEGER,smartscreen_scanned_navigations_counter INTEGER,typosquatting_scanned_navigations_counter INTEGER,lookalike_scanned_navigations_counter INTEGER,certificate_warning_scanned_navigations_counter INTEGER,PRIMARY KEY(navigation_date))c4; |
Source: WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B443000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4C5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: WaveExecutor.exe, 00000000.00000002.3889656381.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1753164467.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1610058737.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2046470525.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1457995357.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462576926.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1758631606.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE masked_credit_cards (id VARCHAR, name_on_card VARCHAR, network VARCHAR, last_four VARCHAR, exp_month INTEGER DEFAULT 0, exp_year INTEGER DEFAULT 0, bank_name VARCHAR, nickname VARCHAR, card_issuer INTEGER DEFAULT 0, instrument_id INTEGER DEFAULT 0, virtual_card_enrollment_state INTEGER DEFAULT 0, card_art_url VARCHAR, product_description VARCHAR, card_issuer_id VARCHAR, virtual_card_enrollment_type INTEGER DEFAULT 0)H; |
Source: WaveExecutor.exe, 00000000.00000003.1458873429.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3891175971.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE masked_credit_cards (id VARCHAR, name_on_card VARCHAR, network VARCHAR, last_four VARCHAR, exp_month INTEGER DEFAULT 0, exp_year INTEGER DEFAULT 0, bank_name VARCHAR, nickname VARCHAR, card_issuer INTEGER DEFAULT 0, instrument_id INTEGER DEFAULT 0, virtual_card_enrollment_state INTEGER DEFAULT 0, card_art_url VARCHAR, product_description VARCHAR, card_issuer_id VARCHAR, virtual_card_enrollment_type INTEGER DEFAULT 0)C; |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: xinput1_4.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D168 push rbp; retf | 0_2_00007FF65203D11B |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203B810 push rbp; retf | 0_2_00007FF65203D09B |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D028 push rsi; retf | 0_2_00007FF65203D02B |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D050 push rsi; retf | 0_2_00007FF65203D063 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D038 push rbp; retf | 0_2_00007FF65203D043 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D070 push r14; retf | 0_2_00007FF65203D07B |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D060 push r14; retf | 0_2_00007FF65203D06B |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D080 push rsi; retf | 0_2_00007FF65203D063 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D080 push rbp; retf | 0_2_00007FF65203D09B |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D0E8 push rbp; retf | 0_2_00007FF65203D0EB |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D0D8 push rbp; retf | 0_2_00007FF65203D0DB |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D0E0 push rsi; retf | 0_2_00007FF65203D0E3 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF65203D100 push rbp; retf | 0_2_00007FF65203D103 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_000002C33AD04970 push es; ret | 0_2_000002C33AD0497F |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdvboxserviceu |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696494690f |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayx64dbgh |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696494690s |
Source: WaveExecutor.exe, 00000000.00000002.3886336510.000002C33AC30000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWXU |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696494690n |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: P}GUqEmuneLbN\ |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwareuser |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696494690d |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696494690u |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696494690t |
Source: WaveExecutor.exe, 00000000.00000003.1468124629.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1464996705.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3886336510.000002C33ABF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3888813379.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1457751354.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1451712581.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462341885.000002C33B187000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696494690} |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwaretray |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696494690x |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690^ |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-gaVGAuthServicevmwaretrayv |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696494690h |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696494690o |
Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtray |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696494690~ |
Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-ga |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696494690j |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: wiresharkvmwareuseri |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696494690t |
Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsd |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696494690x |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690} |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696494690] |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696494690x |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690 |
Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696494690|UE |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kz8kl7vh.default\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |