URL:

https://pixelsee.app/installer/installer/pixelsee_installer_11.exe?filename=PixelSee_id3358354id.exe

Full analysis: https://app.any.run/tasks/5ef1d3a4-3b4d-4406-8181-1f16a7534f77
Verdict: Malicious activity
Analysis date: October 26, 2023, 11:14:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
SHA1:

6CB46890409D3827A840150C69EFA0CCFBBA82B0

SHA256:

C779C714EBCEF9DBD3F820F0D130CBF47E1B005A69A9C8E42A607C51956D441D

SSDEEP:

3:N8ISDKMLWEJOXKMXJOXKVcwkyEJOXcJxOiYMtl6zXCn:2IEKkOXXZOXh5ygOXCVtuXC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PixelSee_id3358354id.exe (PID: 2876)
      • PixelSee_id3358354id.exe (PID: 3016)
      • lum_inst.exe (PID: 3432)
      • luminati-m-controller.exe (PID: 1052)
      • test_wpf.exe (PID: 1892)
      • pixelsee.exe (PID: 2704)
      • pixelsee_crashpad_handler.exe (PID: 560)
      • QtWebEngineProcess.exe (PID: 668)
      • antivirus360.exe (PID: 2016)
      • pixelsee_crashpad_handler.exe (PID: 2348)
      • pixelsee.exe (PID: 2440)
      • QtWebEngineProcess.exe (PID: 3584)
      • QtWebEngineProcess.exe (PID: 2128)
    • Actions looks like stealing of personal data

      • PixelSee_id3358354id.exe (PID: 3016)
      • 360TS_Setup.exe (PID: 4052)
    • Drops the executable file immediately after the start

      • lum_inst.exe (PID: 3432)
      • lum_inst.tmp (PID: 2416)
      • luminati-m-controller.exe (PID: 1052)
      • antivirus360.exe (PID: 2016)
      • PixelSee_id3358354id.exe (PID: 3016)
      • 360TS_Setup.exe (PID: 1864)
      • 360TS_Setup.exe (PID: 4052)
    • Loads dropped or rewritten executable

      • luminati-m-controller.exe (PID: 1052)
      • pixelsee_crashpad_handler.exe (PID: 560)
      • QtWebEngineProcess.exe (PID: 668)
      • pixelsee.exe (PID: 2704)
      • antivirus360.exe (PID: 2016)
      • pixelsee_crashpad_handler.exe (PID: 2348)
      • QtWebEngineProcess.exe (PID: 3584)
      • QtWebEngineProcess.exe (PID: 2128)
      • pixelsee.exe (PID: 2440)
      • 360TS_Setup.exe (PID: 1864)
      • 360TS_Setup.exe (PID: 4052)
  • SUSPICIOUS

    • Reads the Internet Settings

      • PixelSee_id3358354id.exe (PID: 3016)
      • lum_inst.tmp (PID: 2416)
      • luminati-m-controller.exe (PID: 1052)
      • pixelsee.exe (PID: 2704)
      • antivirus360.exe (PID: 2016)
      • pixelsee.exe (PID: 2440)
      • QtWebEngineProcess.exe (PID: 2128)
      • 360TS_Setup.exe (PID: 4052)
    • Reads Microsoft Outlook installation path

      • PixelSee_id3358354id.exe (PID: 3016)
    • Reads Internet Explorer settings

      • PixelSee_id3358354id.exe (PID: 3016)
    • Process drops legitimate windows executable

      • PixelSee_id3358354id.exe (PID: 3016)
      • luminati-m-controller.exe (PID: 1052)
      • 360TS_Setup.exe (PID: 4052)
    • The process drops C-runtime libraries

      • PixelSee_id3358354id.exe (PID: 3016)
      • luminati-m-controller.exe (PID: 1052)
    • Reads the Windows owner or organization settings

      • lum_inst.tmp (PID: 2416)
    • Reads settings of System Certificates

      • luminati-m-controller.exe (PID: 1052)
      • pixelsee.exe (PID: 2704)
      • QtWebEngineProcess.exe (PID: 2128)
      • pixelsee.exe (PID: 2440)
      • 360TS_Setup.exe (PID: 4052)
    • Detected use of alternative data streams (AltDS)

      • luminati-m-controller.exe (PID: 1052)
    • Adds/modifies Windows certificates

      • lum_inst.tmp (PID: 2416)
    • Process requests binary or script from the Internet

      • antivirus360.exe (PID: 2016)
    • Starts itself from another location

      • 360TS_Setup.exe (PID: 1864)
    • Reads security settings of Internet Explorer

      • 360TS_Setup.exe (PID: 4052)
    • Checks Windows Trust Settings

      • 360TS_Setup.exe (PID: 4052)
    • The process verifies whether the antivirus software is installed

      • 360TS_Setup.exe (PID: 4052)
    • Drops 7-zip archiver for unpacking

      • 360TS_Setup.exe (PID: 4052)
  • INFO

    • The process uses the downloaded file

      • chrome.exe (PID: 2996)
      • chrome.exe (PID: 372)
      • chrome.exe (PID: 1792)
      • chrome.exe (PID: 4056)
      • chrome.exe (PID: 2544)
    • Application launched itself

      • chrome.exe (PID: 372)
      • msedge.exe (PID: 4008)
    • Checks supported languages

      • PixelSee_id3358354id.exe (PID: 3016)
      • lum_inst.tmp (PID: 2416)
      • lum_inst.exe (PID: 3432)
      • test_wpf.exe (PID: 1892)
      • luminati-m-controller.exe (PID: 1052)
      • pixelsee.exe (PID: 2704)
      • antivirus360.exe (PID: 2016)
      • pixelsee_crashpad_handler.exe (PID: 560)
      • QtWebEngineProcess.exe (PID: 668)
      • pixelsee.exe (PID: 2440)
      • pixelsee_crashpad_handler.exe (PID: 2348)
      • QtWebEngineProcess.exe (PID: 2128)
      • 360TS_Setup.exe (PID: 1864)
      • QtWebEngineProcess.exe (PID: 3584)
      • 360TS_Setup.exe (PID: 4052)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 372)
      • chrome.exe (PID: 2888)
    • Reads the computer name

      • PixelSee_id3358354id.exe (PID: 3016)
      • lum_inst.tmp (PID: 2416)
      • test_wpf.exe (PID: 1892)
      • luminati-m-controller.exe (PID: 1052)
      • pixelsee.exe (PID: 2704)
      • QtWebEngineProcess.exe (PID: 668)
      • antivirus360.exe (PID: 2016)
      • pixelsee.exe (PID: 2440)
      • QtWebEngineProcess.exe (PID: 2128)
      • 360TS_Setup.exe (PID: 1864)
      • 360TS_Setup.exe (PID: 4052)
    • Checks proxy server information

      • PixelSee_id3358354id.exe (PID: 3016)
      • luminati-m-controller.exe (PID: 1052)
      • antivirus360.exe (PID: 2016)
      • 360TS_Setup.exe (PID: 4052)
    • Create files in a temporary directory

      • PixelSee_id3358354id.exe (PID: 3016)
      • lum_inst.exe (PID: 3432)
      • antivirus360.exe (PID: 2016)
      • QtWebEngineProcess.exe (PID: 2128)
      • 360TS_Setup.exe (PID: 1864)
      • 360TS_Setup.exe (PID: 4052)
    • Reads the machine GUID from the registry

      • PixelSee_id3358354id.exe (PID: 3016)
      • luminati-m-controller.exe (PID: 1052)
      • test_wpf.exe (PID: 1892)
      • pixelsee.exe (PID: 2704)
      • antivirus360.exe (PID: 2016)
      • pixelsee.exe (PID: 2440)
      • QtWebEngineProcess.exe (PID: 2128)
      • 360TS_Setup.exe (PID: 4052)
    • Creates files or folders in the user directory

      • PixelSee_id3358354id.exe (PID: 3016)
      • luminati-m-controller.exe (PID: 1052)
      • pixelsee.exe (PID: 2704)
      • pixelsee_crashpad_handler.exe (PID: 560)
      • QtWebEngineProcess.exe (PID: 668)
      • antivirus360.exe (PID: 2016)
      • pixelsee.exe (PID: 2440)
      • QtWebEngineProcess.exe (PID: 2128)
      • 360TS_Setup.exe (PID: 4052)
    • Application was dropped or rewritten from another process

      • lum_inst.tmp (PID: 2416)
    • Creates files in the program directory

      • luminati-m-controller.exe (PID: 1052)
      • 360TS_Setup.exe (PID: 1864)
      • 360TS_Setup.exe (PID: 4052)
    • Reads Environment values

      • luminati-m-controller.exe (PID: 1052)
      • pixelsee.exe (PID: 2704)
      • pixelsee.exe (PID: 2440)
    • Process checks computer location settings

      • luminati-m-controller.exe (PID: 1052)
      • QtWebEngineProcess.exe (PID: 3584)
      • 360TS_Setup.exe (PID: 4052)
    • Manual execution by a user

      • pixelsee.exe (PID: 2440)
    • Dropped object may contain TOR URL's

      • 360TS_Setup.exe (PID: 4052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
104
Monitored processes
60
Malicious processes
14
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pixelsee_id3358354id.exe no specs pixelsee_id3358354id.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs searchprotocolhost.exe no specs lum_inst.exe no specs lum_inst.tmp no specs luminati-m-controller.exe test_wpf.exe no specs chrome.exe no specs wisptis.exe no specs wisptis.exe no specs pixelsee.exe pixelsee_crashpad_handler.exe no specs qtwebengineprocess.exe no specs antivirus360.exe pixelsee.exe pixelsee_crashpad_handler.exe no specs qtwebengineprocess.exe qtwebengineprocess.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 360ts_setup.exe no specs 360ts_setup.exe msedge.exe no specs msedge.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3612 --field-trial-handle=1176,i,7219288565268048659,7555226863002751099,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
316"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2516 --field-trial-handle=1172,i,1444335867857748108,13119054930654378232,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
372"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "https://pixelsee.app/installer/installer/pixelsee_installer_11.exe?filename=PixelSee_id3358354id.exe"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
520"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
560C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exe --no-rate-limit "--database=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" "--metrics-dir=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" --url=https://o612922.ingest.sentry.io:443/api/6420364/minidump/?sentry_client=sentry.native/0.4.6&sentry_key=297ce3230e5f4bcf957dbf23e9597dc9 "--attachment=C:/Users/admin/AppData/Local/PixelSee LLC/PixelSee/crashdumps/logs/log" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\08e7791c-9ea5-4bc0-5e81-0c7a0feb9956.run\__sentry-event" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\08e7791c-9ea5-4bc0-5e81-0c7a0feb9956.run\__sentry-breadcrumb1" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\08e7791c-9ea5-4bc0-5e81-0c7a0feb9956.run\__sentry-breadcrumb2" --initial-client-data=0x380,0x384,0x388,0x354,0x38c,0x6acd7b7c,0x6acd7b90,0x6acd7ba0C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exepixelsee.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Crash Handler
Exit code:
0
Version:
12.0.0.0
Modules
Images
c:\users\admin\pixelsee\pixelsee_crashpad_handler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\advapi32.dll
576"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=3760 --field-trial-handle=1172,i,1444335867857748108,13119054930654378232,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptbase.dll
668"C:\Users\admin\PixelSee\QtWebEngineProcess.exe" --type=utility --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en-US --service-sandbox-type=network --application-name=PixelSee --webengine-schemes=qrc:sLV --mojo-platform-channel-handle=1660 /prefetch:8C:\Users\admin\PixelSee\QtWebEngineProcess.exepixelsee.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
HIGH
Description:
C++ Application Development Framework
Exit code:
0
Version:
5.15.2.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\pixelsee\qtwebengineprocess.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\users\admin\pixelsee\qt5core.dll
c:\windows\system32\mpr.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\profapi.dll
852"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2596 --field-trial-handle=1172,i,1444335867857748108,13119054930654378232,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
888"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1460 --field-trial-handle=1176,i,7219288565268048659,7555226863002751099,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
1052"C:\Users\admin\PixelSee\Luminati-m\luminati-m-controller.exe" switch_onC:\Users\admin\PixelSee\Luminati-m\luminati-m-controller.exe
lum_inst.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
100
Modules
Images
c:\users\admin\pixelsee\luminati-m\luminati-m-controller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\users\admin\pixelsee\luminati-m\lum_sdk32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\user32.dll
Total events
46 348
Read events
45 812
Write events
501
Delete events
35

Modification events

(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
1
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(372) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_installdate
Value:
0
(PID) Process:(372) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_enableddate
Value:
0
Executable files
818
Suspicious files
740
Text files
362
Unknown types
1

Dropped files

PID
Process
Filename
Type
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF1eaaf3.TMP
MD5:
SHA256:
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF1eab13.TMPtext
MD5:CDCC923CEC2CD9228330551E6946A9C2
SHA256:592F4750166BE662AA88728F9969537163FEC5C3E95E81537C8C6917F8D0929E
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C016064A1F864C8140915D77CF3389A
SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:513218482935B0D388C0A990D868387A
SHA256:8E39CBAAF4AACC3A01AFA74EA8C30FB24FE69A22B8B30728AFB1614FD68809D9
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF1eab13.TMPtext
MD5:D5C9ECBD2DCA29D89266782824D7AF99
SHA256:D22D1243ACC064A30823180D0E583C853E9395367C78C2AD9DE59A463904F702
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LOG.old~RF1eadc2.TMP
MD5:
SHA256:
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LOG.old
MD5:
SHA256:
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
372chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\a0ae83b6-3f02-477e-9eef-721344ae037d.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
59
TCP/UDP connections
133
DNS requests
85
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
864
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
10.9 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
5.44 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
23.4 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
10.9 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
798 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
48.4 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
175 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
1.52 Mb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/k4ldha5kevpu7qn7k4s3mznvgu_4.10.2710.0/oimompecagnajdejgnnjijobebaeigek_4.10.2710.0_win32_ad2kbvs6jks3au5dsxn7cqflsiiq.crx3
unknown
binary
398 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
372
chrome.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
1484
chrome.exe
51.158.130.233:443
pixelsee.app
Online S.a.s.
FR
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
1484
chrome.exe
142.250.185.141:443
accounts.google.com
GOOGLE
US
whitelisted
372
chrome.exe
224.0.0.251:5353
unknown
2656
svchost.exe
239.255.255.250:1900
whitelisted
1484
chrome.exe
142.250.184.206:443
sb-ssl.google.com
GOOGLE
US
whitelisted
1484
chrome.exe
142.250.186.36:443
www.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
accounts.google.com
  • 142.250.185.141
shared
pixelsee.app
  • 51.158.130.233
unknown
sb-ssl.google.com
  • 142.250.184.206
whitelisted
www.google.com
  • 142.250.186.36
whitelisted
optimizationguide-pa.googleapis.com
  • 142.250.185.202
  • 142.250.181.234
  • 172.217.16.138
  • 142.250.186.74
  • 142.250.186.106
  • 142.250.186.138
  • 142.250.74.202
  • 142.250.186.42
  • 172.217.18.10
  • 172.217.16.202
  • 142.250.186.170
  • 142.250.184.202
  • 216.58.212.170
  • 216.58.212.138
  • 142.250.185.74
  • 142.250.185.106
whitelisted
www.googleapis.com
  • 142.250.185.106
  • 216.58.206.42
  • 142.250.74.202
  • 142.250.185.138
  • 142.250.185.234
  • 142.250.185.170
  • 172.217.18.10
  • 142.250.186.138
  • 172.217.16.202
  • 142.250.186.42
  • 142.250.181.234
  • 142.250.186.106
  • 172.217.16.138
  • 142.250.186.74
  • 142.250.185.202
  • 142.250.184.234
whitelisted
update.googleapis.com
  • 142.250.185.163
  • 142.251.140.67
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
clients1.google.com
  • 142.250.187.174
whitelisted
perr.lum-sdk.io
  • 159.223.133.120
  • 206.189.231.23
  • 192.81.214.145
  • 161.35.48.195
unknown

Threats

PID
Process
Class
Message
1088
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
2016
antivirus360.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
2016
antivirus360.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
2016
antivirus360.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
2016
antivirus360.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
pixelsee.exe
QWindowsEGLStaticContext::create: Could not initialize EGL display: error 0x3001
pixelsee.exe
QWindowsEGLStaticContext::create: When using ANGLE, check if d3dcompiler_4x.dll is available
pixelsee.exe
> __thiscall Application::Application(int &,char *[])
pixelsee.exe
os version: "6.1.7601v" __ os name: "Windows 7 Version 6.1 (Build 7601: SP 1)"
pixelsee.exe
> __thiscall PixelseeSettings::PixelseeSettings(void)
pixelsee.exe
> int __thiscall Application::exec(void)
pixelsee.exe
INSTALL ID: "" _ OLD ID: ""
pixelsee.exe
reseller - "" installId ""
pixelsee.exe
> void __thiscall PixelseeSettings::flushSettings(void)
pixelsee.exe
main libvlc debug: Copyright © 1996-2021 the VideoLAN team