URL:

https://www.waveterm.dev/download-old

Full analysis: https://app.any.run/tasks/007103cd-2aef-4732-9400-35ab917fe9dc
Verdict: Malicious activity
Analysis date: April 09, 2025, 09:58:15
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
golang
Indicators:
MD5:

534B1E1074CD97D3B9B64FD3B9553A0E

SHA1:

A11B327926B1036B4F64C6F2E29012E9D4195C46

SHA256:

0FA8DAEDC8BBDED930B0C124656749327A5FB4B683B6EBABBF1C2D5F09490CF5

SSDEEP:

3:N8DSLAym6KJBn:2OLNCP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5408)
    • Changes powershell execution policy (Bypass)

      • wavesrv.x64.exe (PID: 8092)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
    • Executable content was dropped or overwritten

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • wavesrv.x64.exe (PID: 8092)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
      • wavesrv.x64.exe (PID: 6252)
      • wavesrv.x64.exe (PID: 8300)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
    • Starts CMD.EXE for commands execution

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave.exe (PID: 1300)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
    • Get information on the list of running processes

      • cmd.exe (PID: 5544)
      • cmd.exe (PID: 9176)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • old-uninstaller.exe (PID: 8212)
      • cmd.exe (PID: 7856)
      • cmd.exe (PID: 924)
    • There is functionality for taking screenshot (YARA)

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
    • Reads security settings of Internet Explorer

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • ShellExperienceHost.exe (PID: 8660)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
    • Creates a software uninstall entry

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
    • Application launched itself

      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 8280)
    • The process executes Powershell scripts

      • wavesrv.x64.exe (PID: 8092)
    • Starts POWERSHELL.EXE for commands execution

      • wavesrv.x64.exe (PID: 8092)
      • cmd.exe (PID: 8264)
    • Process drops legitimate windows executable

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
    • Drops 7-zip archiver for unpacking

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
    • Hides command output

      • cmd.exe (PID: 8264)
    • The process hide an interactive prompt from the user

      • cmd.exe (PID: 8264)
    • Starts application with an unusual extension

      • cmd.exe (PID: 8264)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 8264)
    • Searches for installed software

      • Wave-win32-x64-0.11.2.exe (PID: 8820)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 4016)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 6036)
      • firefox.exe (PID: 6640)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 6036)
    • Checks supported languages

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave.exe (PID: 3760)
      • wavesrv.x64.exe (PID: 8092)
      • Wave.exe (PID: 6256)
      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 4040)
      • Wave.exe (PID: 236)
      • Wave.exe (PID: 5036)
      • Wave.exe (PID: 8172)
      • Wave.exe (PID: 7720)
      • Wave.exe (PID: 3304)
      • chcp.com (PID: 8316)
      • ShellExperienceHost.exe (PID: 8660)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
      • Wave.exe (PID: 5304)
      • wavesrv.x64.exe (PID: 6252)
      • Wave.exe (PID: 2904)
      • Wave.exe (PID: 2316)
      • Wave.exe (PID: 6876)
      • Wave.exe (PID: 5868)
      • Wave.exe (PID: 8280)
      • wavesrv.x64.exe (PID: 8300)
      • Wave.exe (PID: 5036)
      • Wave.exe (PID: 4164)
      • Wave.exe (PID: 4068)
      • Wave.exe (PID: 6564)
      • Wave.exe (PID: 6080)
      • Wave.exe (PID: 6800)
      • Wave.exe (PID: 664)
      • Wave.exe (PID: 5064)
      • pwsh.exe (PID: 6148)
      • wsh.exe (PID: 3796)
      • wsh.exe (PID: 8988)
    • Reads the software policy settings

      • slui.exe (PID: 4428)
      • wavesrv.x64.exe (PID: 8092)
      • slui.exe (PID: 6004)
      • wavesrv.x64.exe (PID: 8300)
    • Autorun file from Downloads

      • firefox.exe (PID: 6036)
    • The sample compiled with english language support

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
    • Reads the computer name

      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave.exe (PID: 6256)
      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 3760)
      • wavesrv.x64.exe (PID: 8092)
      • ShellExperienceHost.exe (PID: 8660)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 2904)
      • Wave.exe (PID: 2316)
      • Wave.exe (PID: 8280)
      • Wave.exe (PID: 5036)
      • pwsh.exe (PID: 6148)
      • Wave.exe (PID: 4164)
      • wavesrv.x64.exe (PID: 8300)
      • wsh.exe (PID: 3796)
    • Process checks computer location settings

      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 236)
      • Wave.exe (PID: 4040)
      • Wave.exe (PID: 7720)
      • Wave.exe (PID: 8172)
      • Wave.exe (PID: 5036)
      • Wave.exe (PID: 3304)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 6876)
      • Wave.exe (PID: 5868)
      • Wave.exe (PID: 8280)
      • Wave.exe (PID: 4068)
      • Wave.exe (PID: 6564)
      • Wave.exe (PID: 5064)
      • Wave.exe (PID: 6080)
      • Wave.exe (PID: 6800)
      • Wave.exe (PID: 664)
      • pwsh.exe (PID: 6148)
    • Reads product name

      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 8280)
    • Reads Environment values

      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 8280)
    • Manual execution by a user

      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 8280)
    • Reads the machine GUID from the registry

      • Wave.exe (PID: 1300)
      • wavesrv.x64.exe (PID: 8092)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 8280)
      • wavesrv.x64.exe (PID: 8300)
    • Creates files or folders in the user directory

      • wavesrv.x64.exe (PID: 8092)
      • Wave.exe (PID: 1300)
      • Wave.exe (PID: 6256)
      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • wavesrv.x64.exe (PID: 6252)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 2904)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • Wave.exe (PID: 8280)
      • wavesrv.x64.exe (PID: 8300)
      • Wave.exe (PID: 4164)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • wavesrv.x64.exe (PID: 8092)
      • wavesrv.x64.exe (PID: 8300)
    • Create files in a temporary directory

      • Wave.exe (PID: 1300)
      • Wave-win32-x64-0.9.3.exe (PID: 6800)
      • Wave-win32-x64-0.11.2.exe (PID: 8820)
      • old-uninstaller.exe (PID: 8212)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 8280)
    • Checks proxy server information

      • Wave.exe (PID: 1300)
      • slui.exe (PID: 6004)
      • Wave.exe (PID: 5304)
      • Wave.exe (PID: 8280)
    • Application based on Golang

      • wavesrv.x64.exe (PID: 8092)
    • Detects GO elliptic curve encryption (YARA)

      • wavesrv.x64.exe (PID: 8092)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 5408)
    • Changes the display of characters in the console

      • cmd.exe (PID: 8264)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
221
Monitored processes
80
Malicious processes
6
Suspicious processes
3

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs sppextcomobj.exe no specs slui.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs slui.exe wave-win32-x64-0.9.3.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs wave.exe no specs wavesrv.x64.exe conhost.exe no specs wave.exe no specs wave.exe wave.exe no specs wave.exe no specs wave.exe no specs wave.exe no specs wave.exe no specs wave.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs powershell.exe no specs shellexperiencehost.exe no specs wave-win32-x64-0.11.2.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs old-uninstaller.exe wave.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs wavesrv.x64.exe conhost.exe no specs wave.exe no specs wave.exe wave.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs wave.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs wave.exe no specs wavesrv.x64.exe conhost.exe no specs wave.exe no specs wave.exe wave.exe no specs wave.exe no specs wave.exe no specs wave.exe no specs wave.exe no specs wave.exe no specs conhost.exe no specs pwsh.exe wsh.exe no specs wsh.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\Wave" --app-path="C:\Users\admin\AppData\Local\Programs\waveterm\resources\app.asar" --enable-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3572,i,8650699057520707047,5879924895801712616,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:1C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exeWave.exe
User:
admin
Company:
Command Line Inc
Integrity Level:
LOW
Description:
Open-Source AI-Native Terminal Built for Seamless Workflows
Exit code:
0
Version:
0.9.3
Modules
Images
c:\users\admin\appdata\local\programs\waveterm\wave.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
664"C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\Wave" --app-path="C:\Users\admin\AppData\Local\Programs\waveterm\resources\app.asar" --enable-sandbox --enable-blink-features --disable-blink-features --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3924,i,2236255096315619488,9656426897110430988,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:1C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exeWave.exe
User:
admin
Company:
Command Line Inc
Integrity Level:
LOW
Description:
Wave
Exit code:
0
Version:
0.11.2
Modules
Images
c:\users\admin\appdata\local\programs\waveterm\wave.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
924\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
924"C:\WINDOWS\system32\cmd.exe" /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Wave.exe" /FO csv | "C:\WINDOWS\system32\find.exe" "Wave.exe"C:\Windows\SysWOW64\cmd.exeold-uninstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1300"C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exe" C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exeexplorer.exe
User:
admin
Company:
Command Line Inc
Integrity Level:
MEDIUM
Description:
Open-Source AI-Native Terminal Built for Seamless Workflows
Exit code:
0
Version:
0.9.3
Modules
Images
c:\users\admin\appdata\local\programs\waveterm\wave.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\combase.dll
1328"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6048 -parentBuildID 20240213221259 -prefsHandle 4820 -prefMapHandle 5176 -prefsLen 36970 -prefMapSize 244583 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e549fe1-c4de-4932-89ba-48e168689027} 6036 "\\.\pipe\gecko-crash-server-pipe.6036" 12e77589710 rddC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
1452C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2316"C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exe" --type=gpu-process --user-data-dir="C:\Users\admin\AppData\Roaming\Wave" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1888,i,2229720691238047758,1988960371223948045,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1876 /prefetch:2C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exeWave.exe
User:
admin
Company:
Command Line Inc
Integrity Level:
LOW
Description:
Open-Source AI-Native Terminal Built for Seamless Workflows
Exit code:
0
Version:
0.9.3
Modules
Images
c:\users\admin\appdata\local\programs\waveterm\wave.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
2416tasklist /FI "USERNAME eq admin" /FI "IMAGENAME eq Wave.exe" /FO csv C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
57 188
Read events
57 103
Write events
29
Delete events
56

Modification events

(PID) Process:(6036) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(6036) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Local\Programs\waveterm
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:KeepShortcuts
Value:
true
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:ShortcutName
Value:
Wave
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:DisplayName
Value:
Wave 0.9.3
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\waveterm\Uninstall Wave.exe" /currentuser
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\waveterm\Uninstall Wave.exe" /currentuser /S
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:DisplayVersion
Value:
0.9.3
(PID) Process:(6800) Wave-win32-x64-0.9.3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\acb9179c-3638-5f0d-8173-399943676f25
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Local\Programs\waveterm\Wave.exe,0
Executable files
69
Suspicious files
988
Text files
322
Unknown types
3

Dropped files

PID
Process
Filename
Type
6036firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-current.bin
MD5:
SHA256:
6036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
6036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\prefs.jstext
MD5:2C99A16AED3906D92FFE3EF1808E2753
SHA256:08412578CC3BB4922388F8FF8C23962F616B69A1588DA720ADE429129C73C452
6036firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-child-current.binbinary
MD5:C95DDC2B1A525D1A243E4C294DA2F326
SHA256:3A5919E086BFB31E36110CF636D2D5109EB51F2C410B107F126126AB25D67363
6036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
6036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
6036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
6036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
6036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\SiteSecurityServiceState.binbinary
MD5:C253A90691AE1C6200D99B3BD232669D
SHA256:AA07E227121171B851F7202696A0C00ACB3390A7B8FC222EC81D44FAAD5B9F2C
6036firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\urlCache-current.binbinary
MD5:297E88D7CEB26E549254EC875649F4EB
SHA256:8B75D4FB1845BAA06122888D11F6B65E6A36B140C54A72CC13DF390FD7C95702
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
46
TCP/UDP connections
202
DNS requests
243
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6036
firefox.exe
POST
200
2.16.206.148:80
http://r10.o.lencr.org/
unknown
whitelisted
6036
firefox.exe
POST
200
142.250.185.163:80
http://o.pki.goog/s/wr3/cgo
unknown
whitelisted
6036
firefox.exe
POST
200
2.16.206.148:80
http://r10.o.lencr.org/
unknown
whitelisted
6036
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
6036
firefox.exe
POST
200
2.16.206.148:80
http://r11.o.lencr.org/
unknown
whitelisted
6036
firefox.exe
POST
200
2.16.206.148:80
http://r11.o.lencr.org/
unknown
whitelisted
6036
firefox.exe
POST
200
2.16.206.148:80
http://r10.o.lencr.org/
unknown
whitelisted
6036
firefox.exe
POST
200
142.250.185.163:80
http://o.pki.goog/we2
unknown
whitelisted
6036
firefox.exe
POST
200
18.245.65.219:80
http://ocsp.r2m03.amazontrust.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6036
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
6036
firefox.exe
52.223.52.2:443
www.waveterm.dev
AMAZON-02
US
unknown
6036
firefox.exe
34.117.188.166:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
whitelisted
6036
firefox.exe
34.160.144.191:443
content-signature-2.cdn.mozilla.net
GOOGLE
US
whitelisted
6036
firefox.exe
142.250.186.42:443
safebrowsing.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.142
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.6
  • 23.216.77.36
  • 23.216.77.20
  • 23.216.77.28
  • 23.216.77.25
  • 23.216.77.8
whitelisted
www.waveterm.dev
  • 52.223.52.2
  • 35.71.142.77
unknown
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
sites.framer.app
  • 52.223.52.2
  • 35.71.142.77
unknown
example.org
  • 23.215.0.132
  • 23.215.0.133
  • 96.7.128.192
  • 96.7.128.186
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted
content-signature-2.cdn.mozilla.net
  • 34.160.144.191
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Framer web builder (.framer .app)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Framer web builder (.framer .app)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud development environments (csb .app)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud development environments (csb .app)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloud development environments (csb .app)
6036
firefox.exe
Not Suspicious Traffic
INFO [ANY.RUN] CodeSandbox domain observed in TLS SNI
No debug info