URL:

pixel-see.com

Full analysis: https://app.any.run/tasks/56d629c2-1452-4147-a49c-6680a3f9a56b
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: March 29, 2025, 17:17:53
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
botnet
amadey
stealer
arch-doc
arch-html
mentalmentor
adware
evasion
lua
Indicators:
MD5:

0539A86344C0D7B88A60F1898A5D0DFE

SHA1:

E9365F26B000D7FFD1247E6B52B804A673999E1B

SHA256:

BCCC5D9B393FEE7032CD7F4080951C6711638EAAF484BA1A15AC574DAE73825A

SSDEEP:

3:72A2:72

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AMADEY has been found (auto)

      • chrome.exe (PID: 5956)
    • Actions looks like stealing of personal data

      • PixelSee_id270860id.exe (PID: 8160)
    • MENTALMENTOR mutex has been found

      • luminati-m-controller.exe (PID: 2904)
      • luminati-m-controller.exe (PID: 6300)
    • Changes the autorun value in the registry

      • pixelsee.exe (PID: 1184)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • PixelSee_id270860id.exe (PID: 8160)
    • Reads security settings of Internet Explorer

      • PixelSee_id270860id.exe (PID: 8160)
      • lum_inst.tmp (PID: 4696)
      • luminati-m-controller.exe (PID: 2904)
      • pixelsee.exe (PID: 1184)
    • Reads Internet Explorer settings

      • PixelSee_id270860id.exe (PID: 8160)
    • Creates a software uninstall entry

      • PixelSee_id270860id.exe (PID: 8160)
    • Executable content was dropped or overwritten

      • lum_inst.exe (PID: 3768)
      • lum_inst.tmp (PID: 4696)
      • PixelSee_id270860id.exe (PID: 8160)
      • luminati-m-controller.exe (PID: 2904)
      • luminati-m-controller.exe (PID: 6300)
      • net_updater32.exe (PID: 7884)
    • Reads the Windows owner or organization settings

      • lum_inst.tmp (PID: 4696)
    • Process drops legitimate windows executable

      • PixelSee_id270860id.exe (PID: 8160)
      • luminati-m-controller.exe (PID: 2904)
    • The process drops C-runtime libraries

      • PixelSee_id270860id.exe (PID: 8160)
      • luminati-m-controller.exe (PID: 2904)
    • Detected use of alternative data streams (AltDS)

      • luminati-m-controller.exe (PID: 2904)
      • net_updater32.exe (PID: 7884)
      • luminati-m-controller.exe (PID: 6300)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • PixelSee_id270860id.exe (PID: 8160)
    • Executes as Windows Service

      • net_updater32.exe (PID: 7884)
      • WmiApSrv.exe (PID: 4212)
    • Checks for external IP

      • net_updater32.exe (PID: 7884)
    • The process checks if it is being run in the virtual environment

      • net_updater32.exe (PID: 7884)
    • There is functionality for taking screenshot (YARA)

      • pixelsee.exe (PID: 1184)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 5956)
    • Autorun file from Downloads

      • chrome.exe (PID: 5956)
      • chrome.exe (PID: 5640)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 5956)
      • chrome.exe (PID: 1388)
    • The sample compiled with english language support

      • chrome.exe (PID: 5956)
      • lum_inst.tmp (PID: 4696)
      • PixelSee_id270860id.exe (PID: 8160)
      • luminati-m-controller.exe (PID: 2904)
      • chrome.exe (PID: 1388)
    • Checks supported languages

      • PixelSee_id270860id.exe (PID: 8160)
      • lum_inst.exe (PID: 3768)
      • lum_inst.tmp (PID: 4696)
      • test_wpf.exe (PID: 6656)
      • luminati-m-controller.exe (PID: 2904)
      • net_updater32.exe (PID: 4728)
      • pixelsee.exe (PID: 1184)
      • pixelsee_crashpad_handler.exe (PID: 5232)
      • idle_report.exe (PID: 2896)
      • luminati-m-controller.exe (PID: 6300)
      • net_updater32.exe (PID: 7884)
      • test_wpf.exe (PID: 5512)
      • brightdata.exe (PID: 132)
      • test_wpf.exe (PID: 2644)
      • idle_report.exe (PID: 3016)
      • idle_report.exe (PID: 5344)
    • Reads the computer name

      • PixelSee_id270860id.exe (PID: 8160)
      • lum_inst.tmp (PID: 4696)
      • luminati-m-controller.exe (PID: 2904)
      • test_wpf.exe (PID: 6656)
      • net_updater32.exe (PID: 4728)
      • pixelsee.exe (PID: 1184)
      • net_updater32.exe (PID: 7884)
      • idle_report.exe (PID: 2896)
      • test_wpf.exe (PID: 5512)
      • test_wpf.exe (PID: 2644)
      • luminati-m-controller.exe (PID: 6300)
      • brightdata.exe (PID: 132)
      • idle_report.exe (PID: 3016)
      • idle_report.exe (PID: 5344)
    • Checks proxy server information

      • PixelSee_id270860id.exe (PID: 8160)
      • luminati-m-controller.exe (PID: 2904)
      • pixelsee.exe (PID: 1184)
      • luminati-m-controller.exe (PID: 6300)
      • slui.exe (PID: 5528)
    • Create files in a temporary directory

      • PixelSee_id270860id.exe (PID: 8160)
      • lum_inst.tmp (PID: 4696)
      • lum_inst.exe (PID: 3768)
    • Process checks computer location settings

      • PixelSee_id270860id.exe (PID: 8160)
      • lum_inst.tmp (PID: 4696)
      • luminati-m-controller.exe (PID: 2904)
      • net_updater32.exe (PID: 7884)
      • luminati-m-controller.exe (PID: 6300)
    • Reads the software policy settings

      • slui.exe (PID: 7900)
      • luminati-m-controller.exe (PID: 2904)
      • luminati-m-controller.exe (PID: 6300)
      • net_updater32.exe (PID: 7884)
      • slui.exe (PID: 5528)
    • Creates files or folders in the user directory

      • PixelSee_id270860id.exe (PID: 8160)
      • luminati-m-controller.exe (PID: 2904)
      • pixelsee.exe (PID: 1184)
      • pixelsee_crashpad_handler.exe (PID: 5232)
    • Reads the machine GUID from the registry

      • luminati-m-controller.exe (PID: 2904)
      • test_wpf.exe (PID: 6656)
      • pixelsee.exe (PID: 1184)
      • idle_report.exe (PID: 2896)
      • test_wpf.exe (PID: 5512)
      • net_updater32.exe (PID: 7884)
      • luminati-m-controller.exe (PID: 6300)
      • test_wpf.exe (PID: 2644)
      • brightdata.exe (PID: 132)
      • idle_report.exe (PID: 3016)
      • idle_report.exe (PID: 5344)
    • Creates files in the program directory

      • luminati-m-controller.exe (PID: 2904)
      • net_updater32.exe (PID: 4728)
      • net_updater32.exe (PID: 7884)
      • luminati-m-controller.exe (PID: 6300)
      • brightdata.exe (PID: 132)
    • Disables trace logs

      • luminati-m-controller.exe (PID: 2904)
      • net_updater32.exe (PID: 7884)
      • luminati-m-controller.exe (PID: 6300)
    • Reads CPU info

      • net_updater32.exe (PID: 7884)
    • Reads the time zone

      • net_updater32.exe (PID: 7884)
    • The process uses Lua

      • pixelsee.exe (PID: 1184)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
191
Monitored processes
52
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #AMADEY chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pixelsee_id270860id.exe no specs pixelsee_id270860id.exe slui.exe lum_inst.exe lum_inst.tmp #MENTALMENTOR luminati-m-controller.exe test_wpf.exe no specs chrome.exe net_updater32.exe conhost.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs pixelsee.exe pixelsee_crashpad_handler.exe no specs chrome.exe no specs net_updater32.exe test_wpf.exe no specs idle_report.exe no specs conhost.exe no specs #MENTALMENTOR luminati-m-controller.exe test_wpf.exe no specs wmiapsrv.exe no specs brightdata.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs idle_report.exe no specs conhost.exe no specs chrome.exe no specs idle_report.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\brightdata.exe --appid win_pixelsee.appC:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\brightdata.exenet_updater32.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
MEDIUM
Description:
BrightData service allows free use of certain features in an app you installed
Version:
1.474.630
Modules
Images
c:\programdata\brightdata\b85f5ef603041f1fc4e7f943c177a0d440a01266\brightdata.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
968\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeidle_report.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1184"C:\Users\admin\PixelSee\pixelsee.exe" --installerC:\Users\admin\PixelSee\pixelsee.exe
PixelSee_id270860id.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Player
Version:
14.0.0.0
Modules
Images
c:\users\admin\pixelsee\pixelsee.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1388"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6128 --field-trial-handle=1908,i,12438865005045836363,3355463700048260189,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2420"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6128 --field-trial-handle=1908,i,12438865005045836363,3355463700048260189,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2644C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\test_wpf.exeC:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\test_wpf.exeluminati-m-controller.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
HIGH
Description:
test_wpf
Exit code:
0
Version:
1.474.630
Modules
Images
c:\programdata\brightdata\b85f5ef603041f1fc4e7f943c177a0d440a01266\test_wpf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2896C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exe --id 96140 --screenC:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exenet_updater32.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
MEDIUM
Description:
idle_report
Exit code:
0
Version:
1.474.630
Modules
Images
c:\programdata\brightdata\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
2904"C:\Users\admin\PixelSee\Luminati-m\luminati-m-controller.exe" switch_onC:\Users\admin\PixelSee\Luminati-m\luminati-m-controller.exe
lum_inst.tmp
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Luminati Controller
Exit code:
101
Version:
1.0.0.0
Modules
Images
c:\users\admin\pixelsee\luminati-m\luminati-m-controller.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
2908"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="PixelSee" dir=in action=allow program="C:\Users\admin\pixelsee\pixelsee.exe"C:\Windows\SysWOW64\netsh.exePixelSee_id270860id.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3012\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeidle_report.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
40 503
Read events
39 880
Write events
531
Delete events
92

Modification events

(PID) Process:(5956) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5956) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5956) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5956) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5956) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(5640) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000F958338DCEA0DB01
(PID) Process:(8160) PixelSee_id270860id.exeKey:HKEY_CURRENT_USER\SOFTWARE\PixelSee LLC\PixelSee-systemScope\pixelsee_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(8160) PixelSee_id270860id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(8160) PixelSee_id270860id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(8160) PixelSee_id270860id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
478
Suspicious files
633
Text files
153
Unknown types
2

Dropped files

PID
Process
Filename
Type
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF10c575.TMP
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF10c575.TMP
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10c575.TMP
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF10c575.TMP
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10c575.TMP
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5956chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
30
TCP/UDP connections
113
DNS requests
89
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5596
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5596
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2984
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2984
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2984
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
7884
net_updater32.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
2984
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2984
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5956
chrome.exe
239.255.255.250:1900
whitelisted
7296
chrome.exe
172.67.205.188:443
pixel-see.com
CLOUDFLARENET
US
malicious
7296
chrome.exe
173.194.69.84:443
accounts.google.com
GOOGLE
US
whitelisted
7296
chrome.exe
172.217.18.106:443
fonts.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
google.com
  • 216.58.206.46
whitelisted
pixel-see.com
  • 172.67.205.188
  • 104.21.77.82
malicious
accounts.google.com
  • 173.194.69.84
whitelisted
fonts.googleapis.com
  • 172.217.18.106
whitelisted
client.wns.windows.com
  • 172.172.255.218
whitelisted
www.googletagmanager.com
  • 172.217.18.8
whitelisted
pagead2.googlesyndication.com
  • 142.250.185.194
whitelisted
connect.facebook.net
  • 157.240.0.6
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
7884
net_updater32.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
No debug info