File name:

PixelSee_id3970862id.exe

Full analysis: https://app.any.run/tasks/c0873aed-5946-4e9e-ab59-546856d2a962
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: November 19, 2024, 11:35:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
arch-html
stealer
lua
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

CC4805556AFBAD7A49B6D2D32770977E

SHA1:

0DC67AA9AABF25BC6920432FFD3F70FCFF532222

SHA256:

DC5FC727D8478BD4069E5FBC75044EF1166140AB5CBBE2CBB41520C66E0646A0

SSDEEP:

98304:Qs09dMO3/N0Kdbgnvr+DpGRoPct/uN7cZzb8m/3uji6eWYw9wNdlk8CyNShgyIfV:dfIxwn1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • PixelSee_id3970862id.exe (PID: 936)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • PixelSee_id3970862id.exe (PID: 936)
    • Reads Microsoft Outlook installation path

      • PixelSee_id3970862id.exe (PID: 936)
    • Process drops legitimate windows executable

      • PixelSee_id3970862id.exe (PID: 936)
      • luminati-m-controller.exe (PID: 6920)
    • Executable content was dropped or overwritten

      • lum_inst.exe (PID: 6836)
      • PixelSee_id3970862id.exe (PID: 936)
      • lum_inst.tmp (PID: 6860)
      • luminati-m-controller.exe (PID: 6920)
      • net_updater32.exe (PID: 6276)
      • luminati-m-controller.exe (PID: 6324)
    • The process drops C-runtime libraries

      • PixelSee_id3970862id.exe (PID: 936)
      • luminati-m-controller.exe (PID: 6920)
    • Executes as Windows Service

      • net_updater32.exe (PID: 6276)
      • WmiApSrv.exe (PID: 1192)
    • Reads Internet Explorer settings

      • PixelSee_id3970862id.exe (PID: 936)
    • There is functionality for taking screenshot (YARA)

      • pixelsee.exe (PID: 6300)
  • INFO

    • Reads the computer name

      • PixelSee_id3970862id.exe (PID: 936)
    • Checks supported languages

      • PixelSee_id3970862id.exe (PID: 936)
    • Checks proxy server information

      • PixelSee_id3970862id.exe (PID: 936)
    • The process uses the downloaded file

      • PixelSee_id3970862id.exe (PID: 936)
    • Create files in a temporary directory

      • PixelSee_id3970862id.exe (PID: 936)
    • The process uses Lua

      • pixelsee.exe (PID: 6300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:09:29 17:25:35+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2723328
InitializedDataSize: 2256896
UninitializedDataSize: -
EntryPoint: 0x263f3f
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 13.0.0.0
ProductVersionNumber: 13.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: PixelSee Player Installer
CompanyName: SIA Circle Solutions
FileDescription: PixelSee Player Installer
FileVersion: 13.0.0.0
InternalName: pixelsee
LegalCopyright: Copyright © 2022-2023 SIA Circle Solutions
OriginalFileName: pixelsee
PrivateBuild: -
ProductName: PixelSee
ProductVersion: 13.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
23
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start pixelsee_id3970862id.exe lum_inst.exe lum_inst.tmp luminati-m-controller.exe test_wpf.exe no specs net_updater32.exe conhost.exe no specs pixelsee.exe net_updater32.exe test_wpf.exe no specs idle_report.exe no specs conhost.exe no specs pixelsee_crashpad_handler.exe no specs wmiapsrv.exe no specs brightdata.exe no specs conhost.exe no specs luminati-m-controller.exe test_wpf.exe no specs idle_report.exe no specs conhost.exe no specs idle_report.exe no specs conhost.exe no specs pixelsee_id3970862id.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
936"C:\Users\admin\AppData\Local\Temp\PixelSee_id3970862id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id3970862id.exe
explorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Player Installer
Exit code:
0
Version:
13.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id3970862id.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
1192C:\WINDOWS\system32\wbem\WmiApSrv.exeC:\Windows\System32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmiapsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\psapi.dll
1512\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeidle_report.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
4504\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exebrightdata.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4556\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeidle_report.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
5288C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exe --id 62949C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\idle_report.exenet_updater32.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
MEDIUM
Description:
idle_report
Exit code:
0
Version:
1.474.630
5496C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\brightdata.exe --appid win_pixelsee.appC:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\brightdata.exenet_updater32.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
MEDIUM
Description:
BrightData service allows free use of certain features in an app you installed
Version:
1.474.630
Modules
Images
c:\programdata\brightdata\b85f5ef603041f1fc4e7f943c177a0d440a01266\brightdata.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5556"C:\Users\admin\AppData\Local\Temp\PixelSee_id3970862id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id3970862id.exeexplorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
MEDIUM
Description:
PixelSee Player Installer
Exit code:
3221226540
Version:
13.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id3970862id.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5776C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exe --no-rate-limit "--database=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" "--metrics-dir=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps" --url=https://o612922.ingest.sentry.io:443/api/6420364/minidump/?sentry_client=sentry.native/0.4.6&sentry_key=297ce3230e5f4bcf957dbf23e9597dc9 "--attachment=C:/Users/admin/AppData/Local/PixelSee LLC/PixelSee/crashdumps/logs/log" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\0b16308b-ffc1-4c3d-4780-2cce5c7f06eb.run\__sentry-event" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\0b16308b-ffc1-4c3d-4780-2cce5c7f06eb.run\__sentry-breadcrumb1" "--attachment=C:\Users\admin\AppData\Local\PixelSee LLC\PixelSee\crashdumps\0b16308b-ffc1-4c3d-4780-2cce5c7f06eb.run\__sentry-breadcrumb2" --initial-client-data=0x5f0,0x5f4,0x5f8,0x5c4,0x5fc,0x6ffc7b7c,0x6ffc7b90,0x6ffc7ba0C:\Users\admin\PixelSee\pixelsee_crashpad_handler.exepixelsee.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Crash Handler
Exit code:
0
Version:
12.0.0.0
Modules
Images
c:\users\admin\pixelsee\pixelsee_crashpad_handler.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6024C:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\test_wpf.exeC:\ProgramData\BrightData\b85f5ef603041f1fc4e7f943c177a0d440a01266\test_wpf.exenet_updater32.exe
User:
SYSTEM
Company:
BrightData Ltd.
Integrity Level:
SYSTEM
Description:
test_wpf
Exit code:
0
Version:
1.474.630
Modules
Images
c:\programdata\brightdata\b85f5ef603041f1fc4e7f943c177a0d440a01266\test_wpf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
Total events
15 888
Read events
15 675
Write events
137
Delete events
76

Modification events

(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\PixelSee LLC\PixelSee-systemScope\pixelsee_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:InstallLocation
Value:
C:\Users\admin\PixelSee\
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:DisplayName
Value:
PixelSee
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\PixelSee\pixelsee.exe
(PID) Process:(936) PixelSee_id3970862id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:UninstallString
Value:
C:\Users\admin\PixelSee\pixelsee-uninstaller.exe
Executable files
466
Suspicious files
146
Text files
119
Unknown types
48

Dropped files

PID
Process
Filename
Type
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\Montserrat-Regular.eoteot
MD5:2DD0A1DE870AF34D48D43B7CAD82B8D9
SHA256:057BC6C47C47AACCDF31ADC48A6B401F6090A02C28E354099EFF80907DC2AF32
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-avgbro-skipall.htmlhtml
MD5:AE3E7684E42E8C18F2673A1C08EDE285
SHA256:B977C254148A8FBE90E0F79D329E33A52398A0D9A793C1126F4A563E261536E9
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-avgbro.htmlhtml
MD5:E249937FE0EE2AA0EE81C0EE4538F465
SHA256:57DD3EB82A2FC4B1F1904AB1BF3DFA347AF5457CFA5D3DF2797B12A0ECFF56E2
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\preloader.htmlhtml
MD5:37A05031BEC9D3E093388407848AF66F
SHA256:CF38F4F8663028BEFF3A7650A9D426B4116891E8547029B66B8D2A13FAD63A48
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-av360-skipall.htmlhtml
MD5:238EB5DE513CE2893822F7C0897157C4
SHA256:92626A600DA4DF6B5526807B9079E7C4C733521FCA9C039BA7F62838E8E4E36F
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-coc-skipall.htmlhtml
MD5:EA7B7A1C8279C0798A38F0401FBFCE59
SHA256:51333C328758037E356696C5B2532733BAC04F8FA4A4DE20EC9AA8CE40EC767E
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-bdvpn.htmlhtml
MD5:2A0FAF94304C25F8748DB0A788F4A3DF
SHA256:26D76E50470DFEBDAAE1897D7D4976955EF685428B5E206E19048C95A955F32A
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-soax.htmlhtml
MD5:7460B2A28D6D735E69E5207E999D5CA4
SHA256:ADFA61CFD83D977B6E81012AFB6B5D2A7EF37865C8C2EA5D42DB58CE3A36E40D
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-coc.htmlhtml
MD5:D58EC1964E849BD46089CAC5E9FF1E6B
SHA256:8477FA912F965C4E56F3F59E4C5B05CC644F8F9B97E35F6FF704982ABDA79C04
936PixelSee_id3970862id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-opera-close.htmlhtml
MD5:CDB9E872D5A41DFDB8FCED7BF75D1C89
SHA256:1D24E399F3AD1B056876C8DC0A3B58005302BD6C7935A1B49A2E64955082AF71
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
94
DNS requests
30
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4932
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4932
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6332
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6332
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3988
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6276
net_updater32.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4308
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4932
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4932
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
2.23.209.135:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 172.217.16.206
whitelisted
www.bing.com
  • 2.23.209.135
  • 2.23.209.140
  • 2.23.209.144
  • 2.23.209.137
  • 2.23.209.136
  • 2.23.209.150
  • 2.23.209.149
  • 2.23.209.151
  • 2.23.209.143
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
pixelsee.app
  • 51.158.130.233
unknown
login.live.com
  • 40.126.31.71
  • 20.190.159.2
  • 20.190.159.68
  • 20.190.159.23
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.0
  • 40.126.31.69
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
Not Suspicious Traffic
INFO [ANY.RUN] An application monitoring request to sentry .io
1 ETPRO signatures available at the full report
Process
Message
pixelsee.exe
> __thiscall Application::Application(int &,char *[])
pixelsee.exe
os version: "10.0.19045v" __ os name: "Windows 10 Version 2009"
pixelsee.exe
> int __thiscall Application::exec(void)
pixelsee.exe
> __thiscall PixelseeSettings::PixelseeSettings(void)
pixelsee.exe
INSTALL ID: "" _ OLD ID: ""
pixelsee.exe
> void __thiscall PixelseeSettings::flushSettings(void)
pixelsee.exe
reseller - "" installId ""
pixelsee.exe
main libvlc debug: revision 3.0.16-0-g5e70837d8d
pixelsee.exe
main libvlc debug: Copyright © 1996-2021 the VideoLAN team
pixelsee.exe
main libvlc debug: VLC media player - 3.0.16 Vetinari