URL:

swatchseries.is

Full analysis: https://app.any.run/tasks/7edb8f75-7170-42c8-a6aa-16ce11bbd326
Verdict: Malicious activity
Analysis date: November 17, 2023, 21:23:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B3C713FA2D974F6E0E17023B3DB3FF37

SHA1:

BC31D0D94924C049DD8214568EEFDED3C110B87F

SHA256:

687E0D28DB5AC5BF385AB6779F06217B757D0A9D811FD4A75173359E57F86224

SSDEEP:

3:eaWAxMX:zRMX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • PixelSee_id2925481id.exe (PID: 2748)
    • Drops the executable file immediately after the start

      • lum_inst.tmp (PID: 2832)
      • luminati-m-controller.exe (PID: 1444)
      • lum_inst.exe (PID: 2308)
      • net_updater32.exe (PID: 2840)
      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 2916)
      • opera_binst.exe (PID: 3720)
      • antivirus360.exe (PID: 3012)
    • Creates a writable file the system directory

      • net_updater32.exe (PID: 2840)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • PixelSee_id2925481id.exe (PID: 2748)
    • Reads the Internet Settings

      • PixelSee_id2925481id.exe (PID: 2748)
      • lum_inst.tmp (PID: 2832)
      • luminati-m-controller.exe (PID: 1444)
      • pixelsee.exe (PID: 2300)
      • luminati-m-controller.exe (PID: 2916)
      • pixelsee.exe (PID: 1272)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
    • Reads Internet Explorer settings

      • PixelSee_id2925481id.exe (PID: 2748)
    • The process drops C-runtime libraries

      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
    • Reads the Windows owner or organization settings

      • lum_inst.tmp (PID: 2832)
    • Process drops legitimate windows executable

      • luminati-m-controller.exe (PID: 1444)
      • PixelSee_id2925481id.exe (PID: 2748)
    • Reads settings of System Certificates

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 1672)
      • pixelsee.exe (PID: 2300)
      • pixelsee.exe (PID: 1272)
      • pixelsee.exe (PID: 2560)
    • Adds/modifies Windows certificates

      • lum_inst.tmp (PID: 2832)
    • Detected use of alternative data streams (AltDS)

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 2840)
      • luminati-m-controller.exe (PID: 2916)
    • Executes as Windows Service

      • net_updater32.exe (PID: 2840)
    • Checks Windows Trust Settings

      • net_updater32.exe (PID: 2840)
    • Process requests binary or script from the Internet

      • antivirus360.exe (PID: 3012)
  • INFO

    • Reads the computer name

      • PixelSee_id2925481id.exe (PID: 2748)
      • wmpnscfg.exe (PID: 3548)
      • lum_inst.tmp (PID: 2832)
      • test_wpf.exe (PID: 3744)
      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • test_wpf.exe (PID: 1556)
      • idle_report.exe (PID: 712)
      • brightdata.exe (PID: 1036)
      • test_wpf.exe (PID: 2968)
      • luminati-m-controller.exe (PID: 2916)
      • pixelsee.exe (PID: 2300)
      • idle_report.exe (PID: 3224)
      • pixelsee.exe (PID: 1272)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
    • Create files in a temporary directory

      • PixelSee_id2925481id.exe (PID: 2748)
      • lum_inst.exe (PID: 2308)
      • opera_binst.exe (PID: 3720)
      • antivirus360.exe (PID: 3012)
    • Checks proxy server information

      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
      • antivirus360.exe (PID: 3012)
    • The process uses the downloaded file

      • chrome.exe (PID: 3460)
      • chrome.exe (PID: 2400)
      • chrome.exe (PID: 3244)
      • chrome.exe (PID: 2000)
      • chrome.exe (PID: 880)
    • Checks supported languages

      • PixelSee_id2925481id.exe (PID: 2748)
      • wmpnscfg.exe (PID: 3548)
      • lum_inst.exe (PID: 2308)
      • lum_inst.tmp (PID: 2832)
      • luminati-m-controller.exe (PID: 1444)
      • test_wpf.exe (PID: 3744)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • test_wpf.exe (PID: 1556)
      • idle_report.exe (PID: 712)
      • brightdata.exe (PID: 1036)
      • pixelsee.exe (PID: 2300)
      • luminati-m-controller.exe (PID: 2916)
      • pixelsee_crashpad_handler.exe (PID: 880)
      • test_wpf.exe (PID: 2968)
      • idle_report.exe (PID: 3224)
      • pixelsee.exe (PID: 1272)
      • opera_binst.exe (PID: 3720)
      • pixelsee_crashpad_handler.exe (PID: 2672)
      • antivirus360.exe (PID: 3012)
      • pixelsee_crashpad_handler.exe (PID: 1248)
      • pixelsee.exe (PID: 2560)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 3548)
      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
      • test_wpf.exe (PID: 3744)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • test_wpf.exe (PID: 1556)
      • idle_report.exe (PID: 712)
      • brightdata.exe (PID: 1036)
      • pixelsee.exe (PID: 2300)
      • luminati-m-controller.exe (PID: 2916)
      • test_wpf.exe (PID: 2968)
      • idle_report.exe (PID: 3224)
      • pixelsee.exe (PID: 1272)
      • pixelsee.exe (PID: 2560)
      • antivirus360.exe (PID: 3012)
    • Connects to unusual port

      • chrome.exe (PID: 3612)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 3460)
      • chrome.exe (PID: 1184)
    • Application launched itself

      • chrome.exe (PID: 3460)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3548)
      • pixelsee.exe (PID: 1272)
      • pixelsee.exe (PID: 2560)
    • Creates files in the program directory

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • brightdata.exe (PID: 1036)
      • luminati-m-controller.exe (PID: 2916)
    • Creates files or folders in the user directory

      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
      • pixelsee.exe (PID: 2300)
      • pixelsee_crashpad_handler.exe (PID: 880)
      • pixelsee.exe (PID: 1272)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
    • Reads Environment values

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 2840)
      • pixelsee.exe (PID: 2300)
      • brightdata.exe (PID: 1036)
      • luminati-m-controller.exe (PID: 2916)
      • pixelsee.exe (PID: 1272)
      • pixelsee.exe (PID: 2560)
    • Process checks computer location settings

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 2840)
      • luminati-m-controller.exe (PID: 2916)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
79
Malicious processes
11
Suspicious processes
2

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wmpnscfg.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pixelsee_id2925481id.exe no specs pixelsee_id2925481id.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs lum_inst.exe no specs lum_inst.tmp no specs luminati-m-controller.exe test_wpf.exe no specs wisptis.exe no specs wisptis.exe no specs net_updater32.exe net_updater32.exe test_wpf.exe no specs idle_report.exe no specs brightdata.exe no specs pixelsee.exe pixelsee_crashpad_handler.exe no specs luminati-m-controller.exe test_wpf.exe no specs chrome.exe no specs idle_report.exe no specs opera_binst.exe no specs pixelsee.exe pixelsee_crashpad_handler.exe no specs antivirus360.exe pixelsee.exe pixelsee_crashpad_handler.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4012 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
448"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=4640 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
712C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exe --id 97001 --screenC:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exenet_updater32.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
MEDIUM
Description:
idle_report
Exit code:
0
Version:
1.418.267
Modules
Images
c:\programdata\brightdata\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
752"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3656 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
860"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4272 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4176 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
880C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exe --no-rate-limit "--database=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" "--metrics-dir=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" --url=https://o612922.ingest.sentry.io:443/api/6420364/minidump/?sentry_client=sentry.native/0.4.6&sentry_key=297ce3230e5f4bcf957dbf23e9597dc9 "--attachment=C:/Users/admin/AppData/Local/PixelSee LLC/PixelSee/crashdumps/logs/log" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\9ab30c49-c09f-4e0b-c1dd-b1e204fecc54.run\__sentry-event" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\9ab30c49-c09f-4e0b-c1dd-b1e204fecc54.run\__sentry-breadcrumb1" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\9ab30c49-c09f-4e0b-c1dd-b1e204fecc54.run\__sentry-breadcrumb2" --initial-client-data=0x384,0x388,0x38c,0x358,0x390,0x51737b7c,0x51737b90,0x51737ba0C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exepixelsee.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Crash Handler
Exit code:
0
Version:
12.0.0.0
Modules
Images
c:\users\admin\pixelsee\pixelsee_crashpad_handler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\advapi32.dll
924"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
924"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=47 --mojo-platform-channel-handle=6152 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
55 336
Read events
54 322
Write events
974
Delete events
40

Modification events

(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
1
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_installdate
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_enableddate
Value:
0
Executable files
476
Suspicious files
412
Text files
230
Unknown types
0

Dropped files

PID
Process
Filename
Type
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF1678af.TMP
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C016064A1F864C8140915D77CF3389A
SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF167a45.TMPtext
MD5:561161B0FF5BCA89BF47F8AC972A7499
SHA256:ECCA5CCFA0BEED7581B39FCE03D0FD3B694DF0F92BFFF780F702118AD51FC17D
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF1678af.TMPtext
MD5:D5C9ECBD2DCA29D89266782824D7AF99
SHA256:D22D1243ACC064A30823180D0E583C853E9395367C78C2AD9DE59A463904F702
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:9F941EA08DBDCA2EB3CFA1DBBBA6F5DC
SHA256:127F71DF0D2AD895D4F293E62284D85971AE047CA15F90B87BF6335898B0B655
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF167c2a.TMP
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldtext
MD5:B806171F9E7C87423595645872D869B0
SHA256:851A8D533BEBF6A69C5518375396E97463302C1E2031D04F8EB5851C5C82CEB9
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store\LOG.old~RF169109.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
399
DNS requests
522
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
868
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
5.55 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
12.5 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
50.4 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
24.0 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
8.46 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
10.2 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
10.5 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
101 Kb
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
1.25 Mb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
3612
chrome.exe
142.250.185.173:443
accounts.google.com
GOOGLE
US
unknown
3612
chrome.exe
104.21.39.207:443
swatchseries.is
unknown
3460
chrome.exe
239.255.255.250:1900
unknown
2588
svchost.exe
239.255.255.250:1900
unknown
3612
chrome.exe
104.17.25.14:443
cdnjs.cloudflare.com
CLOUDFLARENET
unknown
3612
chrome.exe
142.250.186.132:443
www.google.com
GOOGLE
US
unknown
3612
chrome.exe
139.45.197.245:443
meenetiy.com
RETN Limited
GB
unknown

DNS requests

Domain
IP
Reputation
swatchseries.is
  • 172.67.148.125
  • 104.21.39.207
unknown
accounts.google.com
  • 142.250.185.173
unknown
cdnjs.cloudflare.com
  • 104.17.25.14
  • 104.17.24.14
unknown
www.google.com
  • 142.250.186.132
  • 142.250.185.196
  • 172.217.18.4
  • 142.250.181.228
unknown
connect.facebook.net
  • 31.13.84.4
  • 157.240.252.13
unknown
fonts.gstatic.com
  • 216.58.206.35
  • 142.250.185.225
  • 142.250.185.131
  • 142.250.186.163
unknown
graph.facebook.com
  • 157.240.0.13
unknown
static.zdassets.com
  • 104.18.72.113
  • 104.18.70.113
unknown
www.google-analytics.com
  • 172.217.18.14
  • 142.250.74.206
  • 216.58.206.46
  • 142.250.186.46
unknown
www.gstatic.com
  • 142.250.184.227
  • 142.250.186.99
  • 142.250.184.195
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .to TLD
Potentially Bad Traffic
ET DNS Query for .to TLD
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
Potential Corporate Privacy Violation
ET POLICY Dropbox.com Offsite File Backup in Use
Misc activity
ET INFO DropBox User Content Download Access over SSL M2
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
Process
Message
pixelsee.exe
QWindowsEGLStaticContext::create: Could not initialize EGL display: error 0x3001
pixelsee.exe
QWindowsEGLStaticContext::create: When using ANGLE, check if d3dcompiler_4x.dll is available
pixelsee.exe
> __thiscall Application::Application(int &,char *[])
pixelsee.exe
os version: "6.1.7601v" __ os name: "Windows 7 Version 6.1 (Build 7601: SP 1)"
pixelsee.exe
> __thiscall PixelseeSettings::PixelseeSettings(void)
pixelsee.exe
> int __thiscall Application::exec(void)
pixelsee.exe
INSTALL ID: "" _ OLD ID: ""
pixelsee.exe
> void __thiscall PixelseeSettings::flushSettings(void)
pixelsee.exe
reseller - "" installId ""
pixelsee.exe
main libvlc debug: min period: 1 ms, max period: 1000000 ms