Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://https://https/:://websocketpp.processorGeneric |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2092380311.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2081061687.0000023830AF3000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098731426.0000023830AFB000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3884734345.0000023830B11000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2239184718.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2245590997.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2227642640.0000023830AFA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2252206172.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2107968318.0000023830B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2189487968.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071700097.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2084849656.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2087412868.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098472823.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2216852864.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2116665136.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2101038068.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2147002085.0000023830ADB000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2105261193.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/ |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/Russia |
Source: WaveExecutor.exe, 00000000.00000003.2071700097.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2084849656.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2086876634.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3885062139.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/oZ |
Source: WaveExecutor.exe, 00000000.00000003.2092380311.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2081061687.0000023830AF3000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098731426.0000023830AFB000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3884734345.0000023830B11000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2239184718.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2245590997.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2227642640.0000023830AFA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2252206172.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2107968318.0000023830B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2189487968.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2087412868.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098472823.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2216852864.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2116665136.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2101038068.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2105261193.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2166369796.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2258234006.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2170700818.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2119493614.0000023830AFD000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2126774495.0000023830B06000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/qI |
Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2050747203.0000023832B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071857072.0000023832AFE000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2050368050.0000023832AFF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage |
Source: WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold |
Source: WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: WaveExecutor.exe, 00000000.00000003.2079759931.00000238329A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f10 |
Source: WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98FCE0 | 0_2_00007FF7AB98FCE0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB994320 | 0_2_00007FF7AB994320 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB990330 | 0_2_00007FF7AB990330 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98F2F0 | 0_2_00007FF7AB98F2F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98EA60 | 0_2_00007FF7AB98EA60 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB96C270 | 0_2_00007FF7AB96C270 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB986090 | 0_2_00007FF7AB986090 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB9725F0 | 0_2_00007FF7AB9725F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB946CB0 | 0_2_00007FF7AB946CB0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB990D02 | 0_2_00007FF7AB990D02 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB96BD10 | 0_2_00007FF7AB96BD10 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB977CE0 | 0_2_00007FF7AB977CE0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB9654F0 | 0_2_00007FF7AB9654F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB966C90 | 0_2_00007FF7AB966C90 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB976BC0 | 0_2_00007FF7AB976BC0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB94FBB0 | 0_2_00007FF7AB94FBB0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98CB40 | 0_2_00007FF7AB98CB40 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB96DB50 | 0_2_00007FF7AB96DB50 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB95038C | 0_2_00007FF7AB95038C |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB947390 | 0_2_00007FF7AB947390 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98A370 | 0_2_00007FF7AB98A370 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB950AC1 | 0_2_00007FF7AB950AC1 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98C310 | 0_2_00007FF7AB98C310 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB95C250 | 0_2_00007FF7AB95C250 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB95F250 | 0_2_00007FF7AB95F250 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB955A30 | 0_2_00007FF7AB955A30 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98BA80 | 0_2_00007FF7AB98BA80 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB95E1C0 | 0_2_00007FF7AB95E1C0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB95FA00 | 0_2_00007FF7AB95FA00 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB982A00 | 0_2_00007FF7AB982A00 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB97F9E0 | 0_2_00007FF7AB97F9E0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB9759E0 | 0_2_00007FF7AB9759E0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB96B1E0 | 0_2_00007FF7AB96B1E0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB951057 | 0_2_00007FF7AB951057 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB96BFC0 | 0_2_00007FF7AB96BFC0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB94DFB0 | 0_2_00007FF7AB94DFB0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB9797F0 | 0_2_00007FF7AB9797F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB949730 | 0_2_00007FF7AB949730 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB951788 | 0_2_00007FF7AB951788 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB956EC0 | 0_2_00007FF7AB956EC0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB9696B0 | 0_2_00007FF7AB9696B0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB967EF0 | 0_2_00007FF7AB967EF0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB9546F0 | 0_2_00007FF7AB9546F0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB95D620 | 0_2_00007FF7AB95D620 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB954620 | 0_2_00007FF7AB954620 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB97CDD0 | 0_2_00007FF7AB97CDD0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB950597 | 0_2_00007FF7AB950597 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB98E5B0 | 0_2_00007FF7AB98E5B0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB949E10 | 0_2_00007FF7AB949E10 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB980DE0 | 0_2_00007FF7AB980DE0 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB9515F4 | 0_2_00007FF7AB9515F4 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB96AD40 | 0_2_00007FF7AB96AD40 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB97D530 | 0_2_00007FF7AB97D530 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_00007FF7AB945D90 | 0_2_00007FF7AB945D90 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_0000023830B93841 | 0_2_0000023830B93841 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_0000023830B5BA30 | 0_2_0000023830B5BA30 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Code function: 0_2_0000023830C32720 | 0_2_0000023830C32720 |
Source: WaveExecutor.exe, 00000000.00000002.3883600686.000002382C1AC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE context_annotations(visit_id INTEGER PRIMARY KEY,context_annotation_flags INTEGER NOT NULL,duration_since_last_visit INTEGER,page_end_reason INTEGER,total_foreground_duration INTEGER,browser_type INTEGER DEFAULT 0 NOT NULL,window_id INTEGER DEFAULT -1 NOT NULL,tab_id INTEGER DEFAULT -1 NOT NULL,task_id INTEGER DEFAULT -1 NOT NULL,root_task_id INTEGER DEFAULT -1 NOT NULL,parent_task_id INTEGER DEFAULT -1 NOT NULL,response_code INTEGER DEFAULT 0 NOT NULL); |
Source: WaveExecutor.exe, 00000000.00000003.2071700097.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2084849656.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2086876634.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3885062139.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE credit_cards (guid VARCHAR PRIMARY KEY, name_on_card VARCHAR, expiration_month INTEGER, expiration_year INTEGER, card_number_encrypted BLOB, date_modified INTEGER NOT NULL DEFAULT 0, origin VARCHAR DEFAULT '', use_count INTEGER NOT NULL DEFAULT 0, use_date INTEGER NOT NULL DEFAULT 0, billing_address_id VARCHAR, nickname VARCHAR);tGc |
Source: WaveExecutor.exe, 00000000.00000003.2243930070.00000238329F8000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2049360841.0000023832AFA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: xinput1_4.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdvboxserviceu |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayx64dbgh |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: P}GUqEmuneLbN\ |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwareuser |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: WaveExecutor.exe, 00000000.00000003.2252206172.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2107968318.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2075216465.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2101038068.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2258234006.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2245590997.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2170700818.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2201180760.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2146951068.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2166369796.0000023830B24000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwaretray |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-gaVGAuthServicevmwaretrayv |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtray |
Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-ga |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: wiresharkvmwareuseri |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsd |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\WaveExecutor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |