URL:

swatchseries.is

Full analysis: https://app.any.run/tasks/7edb8f75-7170-42c8-a6aa-16ce11bbd326
Verdict: Malicious activity
Analysis date: November 17, 2023, 21:23:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B3C713FA2D974F6E0E17023B3DB3FF37

SHA1:

BC31D0D94924C049DD8214568EEFDED3C110B87F

SHA256:

687E0D28DB5AC5BF385AB6779F06217B757D0A9D811FD4A75173359E57F86224

SSDEEP:

3:eaWAxMX:zRMX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • PixelSee_id2925481id.exe (PID: 2748)
    • Drops the executable file immediately after the start

      • lum_inst.exe (PID: 2308)
      • lum_inst.tmp (PID: 2832)
      • luminati-m-controller.exe (PID: 1444)
      • PixelSee_id2925481id.exe (PID: 2748)
      • net_updater32.exe (PID: 2840)
      • luminati-m-controller.exe (PID: 2916)
      • opera_binst.exe (PID: 3720)
      • antivirus360.exe (PID: 3012)
    • Creates a writable file the system directory

      • net_updater32.exe (PID: 2840)
  • SUSPICIOUS

    • Reads the Internet Settings

      • PixelSee_id2925481id.exe (PID: 2748)
      • lum_inst.tmp (PID: 2832)
      • luminati-m-controller.exe (PID: 1444)
      • pixelsee.exe (PID: 2300)
      • luminati-m-controller.exe (PID: 2916)
      • pixelsee.exe (PID: 1272)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
    • Reads Microsoft Outlook installation path

      • PixelSee_id2925481id.exe (PID: 2748)
    • Reads Internet Explorer settings

      • PixelSee_id2925481id.exe (PID: 2748)
    • The process drops C-runtime libraries

      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
    • Process drops legitimate windows executable

      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
    • Reads the Windows owner or organization settings

      • lum_inst.tmp (PID: 2832)
    • Adds/modifies Windows certificates

      • lum_inst.tmp (PID: 2832)
    • Reads settings of System Certificates

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 1672)
      • pixelsee.exe (PID: 2300)
      • pixelsee.exe (PID: 1272)
      • pixelsee.exe (PID: 2560)
    • Detected use of alternative data streams (AltDS)

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 2840)
      • luminati-m-controller.exe (PID: 2916)
    • Executes as Windows Service

      • net_updater32.exe (PID: 2840)
    • Checks Windows Trust Settings

      • net_updater32.exe (PID: 2840)
    • Process requests binary or script from the Internet

      • antivirus360.exe (PID: 3012)
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 3548)
      • pixelsee.exe (PID: 1272)
      • pixelsee.exe (PID: 2560)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3548)
      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
      • lum_inst.tmp (PID: 2832)
      • lum_inst.exe (PID: 2308)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • test_wpf.exe (PID: 3744)
      • test_wpf.exe (PID: 1556)
      • idle_report.exe (PID: 712)
      • brightdata.exe (PID: 1036)
      • pixelsee_crashpad_handler.exe (PID: 880)
      • test_wpf.exe (PID: 2968)
      • luminati-m-controller.exe (PID: 2916)
      • pixelsee.exe (PID: 2300)
      • idle_report.exe (PID: 3224)
      • pixelsee.exe (PID: 1272)
      • opera_binst.exe (PID: 3720)
      • pixelsee_crashpad_handler.exe (PID: 2672)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
      • pixelsee_crashpad_handler.exe (PID: 1248)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3548)
      • PixelSee_id2925481id.exe (PID: 2748)
      • lum_inst.tmp (PID: 2832)
      • test_wpf.exe (PID: 3744)
      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • test_wpf.exe (PID: 1556)
      • idle_report.exe (PID: 712)
      • brightdata.exe (PID: 1036)
      • pixelsee.exe (PID: 2300)
      • test_wpf.exe (PID: 2968)
      • luminati-m-controller.exe (PID: 2916)
      • idle_report.exe (PID: 3224)
      • pixelsee.exe (PID: 1272)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 3548)
      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
      • test_wpf.exe (PID: 3744)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • test_wpf.exe (PID: 1556)
      • idle_report.exe (PID: 712)
      • brightdata.exe (PID: 1036)
      • pixelsee.exe (PID: 2300)
      • luminati-m-controller.exe (PID: 2916)
      • test_wpf.exe (PID: 2968)
      • pixelsee.exe (PID: 1272)
      • idle_report.exe (PID: 3224)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
    • The process uses the downloaded file

      • chrome.exe (PID: 2400)
      • chrome.exe (PID: 880)
      • chrome.exe (PID: 3244)
      • chrome.exe (PID: 3460)
      • chrome.exe (PID: 2000)
    • Connects to unusual port

      • chrome.exe (PID: 3612)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 3460)
      • chrome.exe (PID: 1184)
    • Application launched itself

      • chrome.exe (PID: 3460)
    • Create files in a temporary directory

      • PixelSee_id2925481id.exe (PID: 2748)
      • lum_inst.exe (PID: 2308)
      • opera_binst.exe (PID: 3720)
      • antivirus360.exe (PID: 3012)
    • Checks proxy server information

      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
      • antivirus360.exe (PID: 3012)
    • Creates files or folders in the user directory

      • PixelSee_id2925481id.exe (PID: 2748)
      • luminati-m-controller.exe (PID: 1444)
      • pixelsee.exe (PID: 2300)
      • pixelsee_crashpad_handler.exe (PID: 880)
      • pixelsee.exe (PID: 1272)
      • antivirus360.exe (PID: 3012)
      • pixelsee.exe (PID: 2560)
    • Creates files in the program directory

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 1672)
      • net_updater32.exe (PID: 2840)
      • brightdata.exe (PID: 1036)
      • luminati-m-controller.exe (PID: 2916)
    • Reads Environment values

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 2840)
      • brightdata.exe (PID: 1036)
      • pixelsee.exe (PID: 2300)
      • luminati-m-controller.exe (PID: 2916)
      • pixelsee.exe (PID: 1272)
      • pixelsee.exe (PID: 2560)
    • Process checks computer location settings

      • luminati-m-controller.exe (PID: 1444)
      • net_updater32.exe (PID: 2840)
      • luminati-m-controller.exe (PID: 2916)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
79
Malicious processes
11
Suspicious processes
2

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wmpnscfg.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pixelsee_id2925481id.exe no specs pixelsee_id2925481id.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs lum_inst.exe no specs lum_inst.tmp no specs luminati-m-controller.exe test_wpf.exe no specs wisptis.exe no specs wisptis.exe no specs net_updater32.exe net_updater32.exe test_wpf.exe no specs idle_report.exe no specs brightdata.exe no specs pixelsee.exe pixelsee_crashpad_handler.exe no specs luminati-m-controller.exe test_wpf.exe no specs chrome.exe no specs idle_report.exe no specs opera_binst.exe no specs pixelsee.exe pixelsee_crashpad_handler.exe no specs antivirus360.exe pixelsee.exe pixelsee_crashpad_handler.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4012 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
448"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=4640 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
712C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exe --id 97001 --screenC:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exenet_updater32.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
MEDIUM
Description:
idle_report
Exit code:
0
Version:
1.418.267
Modules
Images
c:\programdata\brightdata\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
752"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3656 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
860"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4272 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4176 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
880C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exe --no-rate-limit "--database=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" "--metrics-dir=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" --url=https://o612922.ingest.sentry.io:443/api/6420364/minidump/?sentry_client=sentry.native/0.4.6&sentry_key=297ce3230e5f4bcf957dbf23e9597dc9 "--attachment=C:/Users/admin/AppData/Local/PixelSee LLC/PixelSee/crashdumps/logs/log" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\9ab30c49-c09f-4e0b-c1dd-b1e204fecc54.run\__sentry-event" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\9ab30c49-c09f-4e0b-c1dd-b1e204fecc54.run\__sentry-breadcrumb1" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\9ab30c49-c09f-4e0b-c1dd-b1e204fecc54.run\__sentry-breadcrumb2" --initial-client-data=0x384,0x388,0x38c,0x358,0x390,0x51737b7c,0x51737b90,0x51737ba0C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exepixelsee.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Crash Handler
Exit code:
0
Version:
12.0.0.0
Modules
Images
c:\users\admin\pixelsee\pixelsee_crashpad_handler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\advapi32.dll
924"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
924"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=47 --mojo-platform-channel-handle=6152 --field-trial-handle=1188,i,16233529621637108898,15105160570701214071,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
55 336
Read events
54 322
Write events
974
Delete events
40

Modification events

(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
1
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_installdate
Value:
0
(PID) Process:(3460) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_enableddate
Value:
0
Executable files
476
Suspicious files
412
Text files
230
Unknown types
0

Dropped files

PID
Process
Filename
Type
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF1678af.TMP
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:E91E138A25FD7E5BCA5E60111F39C91A
SHA256:B1F7E3537A31A4B847F862858E5D2581993CC9372F19ABF19EA2A9185FE42A4F
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:513218482935B0D388C0A990D868387A
SHA256:8E39CBAAF4AACC3A01AFA74EA8C30FB24FE69A22B8B30728AFB1614FD68809D9
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C016064A1F864C8140915D77CF3389A
SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF167c2a.TMP
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldtext
MD5:B806171F9E7C87423595645872D869B0
SHA256:851A8D533BEBF6A69C5518375396E97463302C1E2031D04F8EB5851C5C82CEB9
3460chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store\LOG.old~RF169109.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
399
DNS requests
522
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
868
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
5.55 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
10.5 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
12.5 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
8.46 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
10.2 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
722 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
101 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
24.0 Kb
unknown
868
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
209 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
3612
chrome.exe
142.250.185.173:443
accounts.google.com
GOOGLE
US
unknown
3612
chrome.exe
104.21.39.207:443
swatchseries.is
unknown
3460
chrome.exe
239.255.255.250:1900
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
3612
chrome.exe
104.17.25.14:443
cdnjs.cloudflare.com
CLOUDFLARENET
unknown
3612
chrome.exe
142.250.186.132:443
www.google.com
GOOGLE
US
whitelisted
3612
chrome.exe
139.45.197.245:443
meenetiy.com
RETN Limited
GB
unknown

DNS requests

Domain
IP
Reputation
swatchseries.is
  • 172.67.148.125
  • 104.21.39.207
unknown
accounts.google.com
  • 142.250.185.173
shared
cdnjs.cloudflare.com
  • 104.17.25.14
  • 104.17.24.14
whitelisted
www.google.com
  • 142.250.186.132
  • 142.250.185.196
  • 172.217.18.4
  • 142.250.181.228
whitelisted
connect.facebook.net
  • 31.13.84.4
  • 157.240.252.13
whitelisted
fonts.gstatic.com
  • 216.58.206.35
  • 142.250.185.225
  • 142.250.185.131
  • 142.250.186.163
whitelisted
graph.facebook.com
  • 157.240.0.13
whitelisted
static.zdassets.com
  • 104.18.72.113
  • 104.18.70.113
whitelisted
www.google-analytics.com
  • 172.217.18.14
  • 142.250.74.206
  • 216.58.206.46
  • 142.250.186.46
whitelisted
www.gstatic.com
  • 142.250.184.227
  • 142.250.186.99
  • 142.250.184.195
whitelisted

Threats

PID
Process
Class
Message
3612
chrome.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
3612
chrome.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
3612
chrome.exe
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
3612
chrome.exe
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
3612
chrome.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
2840
net_updater32.exe
Potential Corporate Privacy Violation
ET POLICY Dropbox.com Offsite File Backup in Use
2840
net_updater32.exe
Misc activity
ET INFO DropBox User Content Download Access over SSL M2
3012
antivirus360.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
3012
antivirus360.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
3012
antivirus360.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
Process
Message
pixelsee.exe
QWindowsEGLStaticContext::create: Could not initialize EGL display: error 0x3001
pixelsee.exe
QWindowsEGLStaticContext::create: When using ANGLE, check if d3dcompiler_4x.dll is available
pixelsee.exe
> __thiscall Application::Application(int &,char *[])
pixelsee.exe
os version: "6.1.7601v" __ os name: "Windows 7 Version 6.1 (Build 7601: SP 1)"
pixelsee.exe
> __thiscall PixelseeSettings::PixelseeSettings(void)
pixelsee.exe
> int __thiscall Application::exec(void)
pixelsee.exe
INSTALL ID: "" _ OLD ID: ""
pixelsee.exe
> void __thiscall PixelseeSettings::flushSettings(void)
pixelsee.exe
reseller - "" installId ""
pixelsee.exe
main libvlc debug: min period: 1 ms, max period: 1000000 ms