File name:

PixelSee_id2536903id.exe

Full analysis: https://app.any.run/tasks/19eccba0-526a-4e06-9ae1-4484833194bf
Verdict: Malicious activity
Analysis date: November 15, 2023, 23:17:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

CC4805556AFBAD7A49B6D2D32770977E

SHA1:

0DC67AA9AABF25BC6920432FFD3F70FCFF532222

SHA256:

DC5FC727D8478BD4069E5FBC75044EF1166140AB5CBBE2CBB41520C66E0646A0

SSDEEP:

98304:Qs09dMO3/N0Kdbgnvr+DpGRoPct/uN7cZzb8m/3uji6eWYw9wNdlk8CyNShgyIfV:dfIxwn1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • PixelSee_id2536903id.exe (PID: 3412)
  • SUSPICIOUS

    • Reads the Internet Settings

      • PixelSee_id2536903id.exe (PID: 3412)
    • Reads Microsoft Outlook installation path

      • PixelSee_id2536903id.exe (PID: 3412)
    • Reads Internet Explorer settings

      • PixelSee_id2536903id.exe (PID: 3412)
  • INFO

    • Checks supported languages

      • PixelSee_id2536903id.exe (PID: 3412)
      • wmpnscfg.exe (PID: 3764)
    • Reads the computer name

      • PixelSee_id2536903id.exe (PID: 3412)
      • wmpnscfg.exe (PID: 3764)
    • Checks proxy server information

      • PixelSee_id2536903id.exe (PID: 3412)
    • Reads the machine GUID from the registry

      • PixelSee_id2536903id.exe (PID: 3412)
      • wmpnscfg.exe (PID: 3764)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3764)
    • Create files in a temporary directory

      • PixelSee_id2536903id.exe (PID: 3412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:09:29 19:25:35+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2723328
InitializedDataSize: 2256896
UninitializedDataSize: -
EntryPoint: 0x263f3f
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 13.0.0.0
ProductVersionNumber: 13.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: PixelSee Player Installer
CompanyName: SIA Circle Solutions
FileDescription: PixelSee Player Installer
FileVersion: 13.0.0.0
InternalName: pixelsee
LegalCopyright: Copyright © 2022-2023 SIA Circle Solutions
OriginalFileName: pixelsee
PrivateBuild: -
ProductName: PixelSee
ProductVersion: 13.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pixelsee_id2536903id.exe wmpnscfg.exe no specs pixelsee_id2536903id.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2912"C:\Users\admin\AppData\Local\Temp\PixelSee_id2536903id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id2536903id.exeexplorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
MEDIUM
Description:
PixelSee Player Installer
Exit code:
3221226540
Version:
13.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id2536903id.exe
c:\windows\system32\ntdll.dll
3412"C:\Users\admin\AppData\Local\Temp\PixelSee_id2536903id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id2536903id.exe
explorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Player Installer
Exit code:
0
Version:
13.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id2536903id.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
3764"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
Total events
627
Read events
614
Write events
10
Delete events
3

Modification events

(PID) Process:(3412) PixelSee_id2536903id.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3412) PixelSee_id2536903id.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3412) PixelSee_id2536903id.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3412) PixelSee_id2536903id.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3412) PixelSee_id2536903id.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3412) PixelSee_id2536903id.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3764) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{41E6BB50-9A5F-48DF-A131-EE870C8E13A7}\{413AEF60-D414-429B-8D27-F76C4BE971E5}
Operation:delete keyName:(default)
Value:
(PID) Process:(3764) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{41E6BB50-9A5F-48DF-A131-EE870C8E13A7}
Operation:delete keyName:(default)
Value:
(PID) Process:(3764) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{0D6535D3-1EA8-4A1F-841F-C55EFEE4C550}
Operation:delete keyName:(default)
Value:
Executable files
0
Suspicious files
6
Text files
58
Unknown types
0

Dropped files

PID
Process
Filename
Type
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-luminati-wait.htmltext
MD5:FEA427802F9F1505612945D97AAC9568
SHA256:B550D0875D5DC5292C979981400782FAE63AACFC002CA03911FDC44A7C28E58A
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-av360.htmlhtml
MD5:464131FD397126E3B60443F381C299D5
SHA256:B01A533DDDD6629DCDFBCE0816E553D5DB36A99A233DB33719BE0646476A7C0B
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-coc.htmlhtml
MD5:9C040C5F4DB773934730C0471363B4A4
SHA256:794AA2B7DCC14CF1A7017A9568AB47A81DA2F2D81CE6DE5BB777EDAE21AEF189
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\curl-ca-bundle.crttext
MD5:BE2B0736EA029FFF398559FA7DF4E646
SHA256:C05A79296D61E3B2A2EBAF5AF476839B976D69A5ACB6F581A667E60E681049A2
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\Montserrat-Regular.eotbinary
MD5:2DD0A1DE870AF34D48D43B7CAD82B8D9
SHA256:057BC6C47C47AACCDF31ADC48A6B401F6090A02C28E354099EFF80907DC2AF32
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\archive.7zcompressed
MD5:6490FE5A120A08B44B563C7FF2ED3269
SHA256:A5D248B9A5C1CEAF8270829B0676A2DC101EADFC64CBE099ADEC24C92ECC4420
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-operagx.htmlhtml
MD5:B71B89489F452A94D44DD25D261DE4CC
SHA256:40007B26BCD6976787671BC683375EE63E8BA7497E67BE3409B8A49CBB10731F
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-opera-friendly.htmlhtml
MD5:5FF70AC1AA57AD1E40649C8EB9F6FAEC
SHA256:75EACCB36D17B83EB30891AB9C5A3F99BBEEC1AFC82806E1CFE45076E6A94891
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-opera.htmlhtml
MD5:A0FD3EC1D58F5805C3ECBD3628B21815
SHA256:0C94BD8D4EAB1C2B4CE4FC9A8BB3F8FD11524DC9F8C8B2FEBE5FBC132978B4DD
3412PixelSee_id2536903id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\preloader.htmlhtml
MD5:37A05031BEC9D3E093388407848AF66F
SHA256:CF38F4F8663028BEFF3A7650A9D426B4116891E8547029B66B8D2A13FAD63A48
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
8
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
3412
PixelSee_id2536903id.exe
51.158.130.233:443
pixelsee.app
Online S.a.s.
FR
unknown
868
svchost.exe
95.101.148.135:80
armmf.adobe.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
pixelsee.app
  • 51.158.130.233
unknown
armmf.adobe.com
  • 95.101.148.135
whitelisted

Threats

No threats detected
No debug info