File name:

PixelSee_id3316572id.exe

Full analysis: https://app.any.run/tasks/d8733e38-f6f9-4686-a024-00f275a927aa
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: March 24, 2025, 12:50:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-doc
arch-html
mentalmentor
adware
loader
evasion
stealer
inno
installer
delphi
opera
tool
arch-scr
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

EE0636A5D4268A5D1B2F618DAA1C7535

SHA1:

877282C79F7C4C75924A8D144B6B5B8AD11EDAE3

SHA256:

F2388417341CFAE06FA72F558D9FF870BCDFAC573D503B5A76C9657D63B925EA

SSDEEP:

98304:9s0trcwir/NgZigiPi1CqnoQp3YtoMNdrUArdvddEi7T9GNVNPRix9tFNwSA2U71:7eI+w6Fn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MENTALMENTOR mutex has been found

      • luminati-m-controller.exe (PID: 3176)
      • luminati-m-controller.exe (PID: 3396)
    • Steals credentials from Web Browsers

      • setup.exe (PID: 3968)
      • setup.exe (PID: 5548)
      • assistant_installer.exe (PID: 7668)
      • installer.exe (PID: 8048)
      • installer.exe (PID: 8012)
      • assistant_installer.exe (PID: 7540)
      • assistant_installer.exe (PID: 516)
      • opera.exe (PID: 6124)
      • opera.exe (PID: 7628)
      • opera.exe (PID: 5480)
      • opera.exe (PID: 4948)
      • browser_assistant.exe (PID: 1176)
      • opera.exe (PID: 5504)
      • opera.exe (PID: 8168)
      • installer.exe (PID: 7320)
    • Actions looks like stealing of personal data

      • setup.exe (PID: 3968)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 3396)
      • assistant_installer.exe (PID: 7668)
      • installer.exe (PID: 8048)
      • installer.exe (PID: 8012)
      • 360TS_Setup.exe (PID: 8132)
      • assistant_installer.exe (PID: 516)
      • assistant_installer.exe (PID: 7540)
      • opera.exe (PID: 7628)
      • opera.exe (PID: 6124)
      • opera.exe (PID: 2644)
      • opera.exe (PID: 4948)
      • opera.exe (PID: 5480)
      • browser_assistant.exe (PID: 1176)
      • opera.exe (PID: 1740)
      • opera.exe (PID: 5504)
      • opera.exe (PID: 2216)
      • opera.exe (PID: 7380)
      • opera.exe (PID: 8168)
      • opera.exe (PID: 8568)
      • opera.exe (PID: 8520)
      • installer.exe (PID: 7320)
    • Starts NET.EXE for service management

      • bdvpn_setup.exe (PID: 6800)
      • net.exe (PID: 8356)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • PixelSee_id3316572id.exe (PID: 6592)
      • lum_inst.exe (PID: 300)
      • luminati-m-controller.exe (PID: 3176)
      • lum_inst.tmp (PID: 5024)
      • bdvpn_setup.exe (PID: 6800)
      • antivirus360.exe (PID: 900)
      • luminati-m-controller.exe (PID: 3396)
      • opera_binst.exe (PID: 2108)
      • net_updater32.exe (PID: 4348)
      • net_updater32.exe (PID: 5428)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 3968)
      • setup.exe (PID: 5796)
      • setup.exe (PID: 3396)
      • setup.exe (PID: 4488)
      • Assistant_117.0.5408.35_Setup.exe_sfx.exe (PID: 7608)
      • 360TS_Setup.exe (PID: 7956)
      • installer.exe (PID: 8012)
      • installer.exe (PID: 8048)
      • 360TS_Setup.exe (PID: 8132)
      • assistant_installer.exe (PID: 516)
      • installer.exe (PID: 8672)
      • installer.exe (PID: 7320)
      • opera_autoupdate.exe (PID: 8264)
      • installer.exe (PID: 8848)
    • Process drops legitimate windows executable

      • PixelSee_id3316572id.exe (PID: 6592)
      • luminati-m-controller.exe (PID: 3176)
      • net_updater32.exe (PID: 4348)
      • Assistant_117.0.5408.35_Setup.exe_sfx.exe (PID: 7608)
      • assistant_installer.exe (PID: 516)
    • Reads security settings of Internet Explorer

      • PixelSee_id3316572id.exe (PID: 6592)
      • lum_inst.tmp (PID: 5024)
      • luminati-m-controller.exe (PID: 3176)
      • antivirus360.exe (PID: 900)
      • brightvpn_installer.exe (PID: 5044)
      • bdvpn_setup.exe (PID: 6800)
      • setup.exe (PID: 5548)
      • net_updater32.exe (PID: 4348)
      • installer.exe (PID: 8012)
      • 360TS_Setup.exe (PID: 8132)
      • browser_assistant.exe (PID: 1176)
    • Creates a software uninstall entry

      • PixelSee_id3316572id.exe (PID: 6592)
      • installer.exe (PID: 8012)
    • The process drops C-runtime libraries

      • PixelSee_id3316572id.exe (PID: 6592)
      • luminati-m-controller.exe (PID: 3176)
      • net_updater32.exe (PID: 4348)
    • Reads the Windows owner or organization settings

      • lum_inst.tmp (PID: 5024)
    • Detected use of alternative data streams (AltDS)

      • luminati-m-controller.exe (PID: 3176)
      • net_updater32.exe (PID: 5428)
      • net_updater32.exe (PID: 4348)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • PixelSee_id3316572id.exe (PID: 6592)
    • The process creates files with name similar to system file names

      • bdvpn_setup.exe (PID: 6800)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • bdvpn_setup.exe (PID: 6800)
    • Process requests binary or script from the Internet

      • antivirus360.exe (PID: 900)
    • Application launched itself

      • net_updater32.exe (PID: 4464)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 3396)
      • assistant_installer.exe (PID: 7644)
      • installer.exe (PID: 8012)
      • assistant_installer.exe (PID: 7540)
      • net_updater32.exe (PID: 4348)
      • assistant_installer.exe (PID: 516)
      • browser_assistant.exe (PID: 1176)
      • opera.exe (PID: 7628)
      • opera.exe (PID: 5504)
      • opera_autoupdate.exe (PID: 7144)
      • opera_autoupdate.exe (PID: 8264)
      • installer.exe (PID: 8672)
    • Executes as Windows Service

      • net_updater32.exe (PID: 5428)
      • WmiApSrv.exe (PID: 7216)
    • Potential Corporate Privacy Violation

      • antivirus360.exe (PID: 900)
    • Starts itself from another location

      • setup.exe (PID: 5548)
      • 360TS_Setup.exe (PID: 7956)
    • Checks for external IP

      • net_updater32.exe (PID: 5428)
    • Searches for installed software

      • installer.exe (PID: 8012)
      • browser_assistant.exe (PID: 1176)
    • The process verifies whether the antivirus software is installed

      • 360TS_Setup.exe (PID: 8132)
    • Drops 7-zip archiver for unpacking

      • 360TS_Setup.exe (PID: 8132)
      • bdvpn_setup.exe (PID: 6800)
    • The process executes via Task Scheduler

      • opera_autoupdate.exe (PID: 8264)
    • The process checks if it is being run in the virtual environment

      • opera.exe (PID: 5504)
  • INFO

    • The sample compiled with english language support

      • PixelSee_id3316572id.exe (PID: 6592)
      • lum_inst.tmp (PID: 5024)
      • luminati-m-controller.exe (PID: 3176)
      • bdvpn_setup.exe (PID: 6800)
      • antivirus360.exe (PID: 900)
      • opera_binst.exe (PID: 2108)
      • net_updater32.exe (PID: 4348)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 3968)
      • setup.exe (PID: 3396)
      • setup.exe (PID: 5796)
      • setup.exe (PID: 4488)
      • Assistant_117.0.5408.35_Setup.exe_sfx.exe (PID: 7608)
      • installer.exe (PID: 8048)
      • installer.exe (PID: 8012)
      • 360TS_Setup.exe (PID: 8132)
      • assistant_installer.exe (PID: 516)
      • installer.exe (PID: 8672)
      • installer.exe (PID: 7320)
      • opera_autoupdate.exe (PID: 8264)
      • installer.exe (PID: 8848)
    • Creates files or folders in the user directory

      • PixelSee_id3316572id.exe (PID: 6592)
      • luminati-m-controller.exe (PID: 3176)
      • pixelsee.exe (PID: 5072)
      • pixelsee_crashpad_handler.exe (PID: 4724)
      • antivirus360.exe (PID: 900)
      • bdvpn_setup.exe (PID: 6800)
      • setup.exe (PID: 3968)
      • setup.exe (PID: 5548)
      • net_updater32.exe (PID: 4348)
      • installer.exe (PID: 8012)
      • setup.exe (PID: 3396)
      • 360TS_Setup.exe (PID: 8132)
      • assistant_installer.exe (PID: 516)
      • opera.exe (PID: 7628)
      • opera.exe (PID: 8168)
      • opera.exe (PID: 5504)
    • Checks supported languages

      • PixelSee_id3316572id.exe (PID: 6592)
      • lum_inst.tmp (PID: 5024)
      • lum_inst.exe (PID: 300)
      • test_wpf.exe (PID: 4228)
      • luminati-m-controller.exe (PID: 3176)
      • pixelsee.exe (PID: 5072)
      • bdvpn_setup.exe (PID: 6800)
      • antivirus360.exe (PID: 900)
      • test_wpf.exe (PID: 4008)
      • test_wpf.exe (PID: 6272)
      • net_updater32.exe (PID: 5428)
      • opera_binst.exe (PID: 2108)
      • setup.exe (PID: 3968)
      • setup.exe (PID: 5796)
      • idle_report.exe (PID: 6436)
      • brightdata.exe (PID: 4040)
      • setup.exe (PID: 3396)
      • net_updater32.exe (PID: 4348)
      • assistant_installer.exe (PID: 7644)
      • idle_report.exe (PID: 7800)
      • installer.exe (PID: 8012)
      • 360TS_Setup.exe (PID: 7956)
      • 360TS_Setup.exe (PID: 8132)
      • installer.exe (PID: 8048)
      • setup.exe (PID: 4488)
      • opera.exe (PID: 7628)
      • opera_crashreporter.exe (PID: 7936)
      • opera.exe (PID: 7900)
      • opera_crashreporter.exe (PID: 7020)
      • opera.exe (PID: 5480)
      • opera_crashreporter.exe (PID: 3024)
      • net_updater32.exe (PID: 7744)
      • opera.exe (PID: 1740)
      • opera.exe (PID: 5536)
      • opera_crashreporter.exe (PID: 7132)
      • opera.exe (PID: 4948)
      • opera.exe (PID: 7928)
      • opera.exe (PID: 7424)
      • opera.exe (PID: 4280)
      • opera.exe (PID: 1700)
      • opera.exe (PID: 7552)
      • opera.exe (PID: 7532)
      • opera_gx_splash.exe (PID: 3300)
      • opera.exe (PID: 5504)
      • opera.exe (PID: 7824)
      • opera.exe (PID: 1660)
      • opera.exe (PID: 7136)
      • opera.exe (PID: 4620)
      • opera.exe (PID: 1184)
      • opera.exe (PID: 8568)
      • opera.exe (PID: 8580)
      • opera.exe (PID: 8620)
      • opera.exe (PID: 8612)
      • opera.exe (PID: 8560)
      • opera.exe (PID: 8628)
      • installer.exe (PID: 8672)
      • opera.exe (PID: 8544)
      • opera.exe (PID: 8520)
      • opera.exe (PID: 732)
      • opera_autoupdate.exe (PID: 8264)
      • idle_report.exe (PID: 8716)
      • opera_autoupdate.exe (PID: 7588)
    • Reads the software policy settings

      • slui.exe (PID: 6488)
      • slui.exe (PID: 1072)
      • luminati-m-controller.exe (PID: 3176)
      • bdvpn_setup.exe (PID: 6800)
      • brightvpn_installer.exe (PID: 5044)
      • net_updater32.exe (PID: 5428)
      • luminati-m-controller.exe (PID: 3396)
      • net_updater32.exe (PID: 4348)
      • setup.exe (PID: 5548)
      • 360TS_Setup.exe (PID: 8132)
      • browser_assistant.exe (PID: 1176)
    • Create files in a temporary directory

      • lum_inst.exe (PID: 300)
      • PixelSee_id3316572id.exe (PID: 6592)
      • lum_inst.tmp (PID: 5024)
      • bdvpn_setup.exe (PID: 6800)
      • setup.exe (PID: 5548)
      • installer.exe (PID: 8012)
      • 360TS_Setup.exe (PID: 8132)
      • opera.exe (PID: 5504)
    • Process checks computer location settings

      • PixelSee_id3316572id.exe (PID: 6592)
      • lum_inst.tmp (PID: 5024)
      • luminati-m-controller.exe (PID: 3176)
      • net_updater32.exe (PID: 4348)
      • 360TS_Setup.exe (PID: 8132)
      • opera.exe (PID: 5504)
      • opera.exe (PID: 7552)
      • opera.exe (PID: 1184)
      • opera.exe (PID: 8628)
    • Reads the computer name

      • lum_inst.tmp (PID: 5024)
      • test_wpf.exe (PID: 4228)
      • luminati-m-controller.exe (PID: 3176)
      • pixelsee.exe (PID: 5072)
      • bdvpn_setup.exe (PID: 6800)
      • brightvpn_installer.exe (PID: 5044)
      • test_wpf.exe (PID: 4008)
      • test_wpf.exe (PID: 6272)
      • brightdata.exe (PID: 4040)
      • assistant_installer.exe (PID: 7644)
      • installer.exe (PID: 8012)
      • opera.exe (PID: 7908)
      • net_updater32.exe (PID: 7744)
      • opera.exe (PID: 1660)
      • opera_autoupdate.exe (PID: 7144)
      • installer.exe (PID: 8672)
      • idle_report.exe (PID: 8716)
    • Reads the machine GUID from the registry

      • luminati-m-controller.exe (PID: 3176)
      • test_wpf.exe (PID: 4228)
      • pixelsee.exe (PID: 5072)
      • brightvpn_installer.exe (PID: 5044)
      • bdvpn_setup.exe (PID: 6800)
      • luminati-m-controller.exe (PID: 3396)
      • test_wpf.exe (PID: 4008)
      • test_wpf.exe (PID: 6272)
      • net_updater32.exe (PID: 5428)
      • antivirus360.exe (PID: 900)
      • setup.exe (PID: 5548)
      • net_updater32.exe (PID: 4348)
      • 360TS_Setup.exe (PID: 8132)
      • opera.exe (PID: 5504)
      • browser_assistant.exe (PID: 1176)
      • opera_autoupdate.exe (PID: 7588)
      • idle_report.exe (PID: 8716)
    • Creates files in the program directory

      • luminati-m-controller.exe (PID: 3176)
      • net_updater32.exe (PID: 4892)
      • luminati-m-controller.exe (PID: 3396)
      • bdvpn_setup.exe (PID: 6800)
      • net_updater32.exe (PID: 5428)
      • net_updater32.exe (PID: 4348)
      • 360TS_Setup.exe (PID: 7956)
      • 360TS_Setup.exe (PID: 8132)
    • Compiled with Borland Delphi (YARA)

      • lum_inst.tmp (PID: 5024)
      • lum_inst.exe (PID: 300)
    • Detects InnoSetup installer (YARA)

      • lum_inst.exe (PID: 300)
      • lum_inst.tmp (PID: 5024)
    • Disables trace logs

      • luminati-m-controller.exe (PID: 3176)
      • antivirus360.exe (PID: 900)
    • Checks proxy server information

      • luminati-m-controller.exe (PID: 3176)
      • pixelsee.exe (PID: 5072)
      • antivirus360.exe (PID: 900)
      • bdvpn_setup.exe (PID: 6800)
      • brightvpn_installer.exe (PID: 5044)
      • net_updater32.exe (PID: 4348)
      • setup.exe (PID: 5548)
      • 360TS_Setup.exe (PID: 8132)
      • browser_assistant.exe (PID: 1176)
      • opera.exe (PID: 7628)
      • opera.exe (PID: 5504)
    • Reads CPU info

      • net_updater32.exe (PID: 5428)
    • Reads the time zone

      • net_updater32.exe (PID: 5428)
    • The sample compiled with chinese language support

      • 360TS_Setup.exe (PID: 7956)
      • 360TS_Setup.exe (PID: 8132)
    • Manual execution by a user

      • assistant_installer.exe (PID: 7540)
      • opera.exe (PID: 5504)
    • OPERA mutex has been found

      • opera.exe (PID: 7628)
      • browser_assistant.exe (PID: 1176)
      • opera.exe (PID: 5504)
      • opera_autoupdate.exe (PID: 7144)
    • The sample compiled with turkish language support

      • 360TS_Setup.exe (PID: 8132)
    • The sample compiled with russian language support

      • 360TS_Setup.exe (PID: 8132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:07 15:39:23+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2696192
InitializedDataSize: 1864704
UninitializedDataSize: -
EntryPoint: 0x25dfa0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 14.0.0.0
ProductVersionNumber: 14.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: PixelSee Player Installer
CompanyName: SIA Circle Solutions
FileDescription: PixelSee Player Installer
FileVersion: 14.0.0.0
InternalName: pixelsee
LegalCopyright: Copyright � 2022-2023 SIA Circle Solutions
OriginalFileName: pixelsee
PrivateBuild: -
ProductName: PixelSee
ProductVersion: 14.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
271
Monitored processes
128
Malicious processes
33
Suspicious processes
7

Behavior graph

Click at the process to see the details
start pixelsee_id3316572id.exe sppextcomobj.exe no specs slui.exe slui.exe lum_inst.exe lum_inst.tmp #MENTALMENTOR luminati-m-controller.exe test_wpf.exe no specs net_updater32.exe conhost.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs pixelsee.exe pixelsee_crashpad_handler.exe no specs bdvpn_setup.exe brightvpn_installer.exe antivirus360.exe net_updater32.exe #MENTALMENTOR luminati-m-controller.exe test_wpf.exe no specs test_wpf.exe no specs net_updater32.exe no specs conhost.exe no specs net_updater32.exe opera_binst.exe setup.exe setup.exe setup.exe idle_report.exe no specs conhost.exe no specs brightdata.exe no specs conhost.exe no specs setup.exe setup.exe wmiapsrv.exe no specs assistant_117.0.5408.35_setup.exe_sfx.exe assistant_installer.exe no specs assistant_installer.exe idle_report.exe no specs conhost.exe no specs 360ts_setup.exe installer.exe installer.exe 360ts_setup.exe UIAutomationCrossBitnessHook32 Class no specs assistant_installer.exe assistant_installer.exe no specs assistant_installer.exe assistant_installer.exe no specs browser_assistant.exe opera.exe opera.exe net_updater32.exe conhost.exe no specs opera_crashreporter.exe no specs opera_crashreporter.exe no specs browser_assistant.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera_crashreporter.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe no specs unsecapp.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe no specs opera.exe opera.exe opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe opera.exe no specs opera.exe no specs opera.exe no specs opera_gx_splash.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera_autoupdate.exe net.exe no specs conhost.exe no specs net1.exe no specs opera.exe opera.exe no specs opera.exe no specs opera.exe no specs opera.exe opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs installer.exe opera.exe no specs opera.exe no specs opera.exe no specs installer.exe opera_autoupdate.exe no specs opera_autoupdate.exe opera_autoupdate.exe no specs idle_report.exe no specs conhost.exe no specs installer.exe

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\AppData\Local\Temp\luminati\lum_inst.exe" /verysilentC:\Users\admin\AppData\Local\Temp\luminati\lum_inst.exe
PixelSee_id3316572id.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
luminati_setup Setup
Exit code:
101
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\luminati\lum_inst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
516"C:\Users\admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202503241253391\assistant\assistant_installer.exe" --installfolder="C:\Users\admin\AppData\Local\Programs\Opera\assistant" --copyonly=0 --allusers=0C:\Users\admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202503241253391\assistant\assistant_installer.exe
installer.exe
User:
admin
Company:
Opera Software
Integrity Level:
HIGH
Description:
Opera Browser Assistant Installer
Exit code:
0
Version:
117.0.5408.35
Modules
Images
c:\users\admin\appdata\local\temp\.opera\opera installer temp\opera_package_202503241253391\assistant\assistant_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
664\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exebrightdata.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
732"C:\Users\admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=on --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-bookmarks-tags-update=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:bluesky-in-sidebar=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-amazon-us-associates=off --with-feature:continue-shopping-explore=off --with-feature:continue-shopping-structured-partners=on --with-feature:discord-in-sidebar=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:hide-navigations-from-extensions=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:new-personal-news-backend=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:proxy-switcher-ui-default-visible=on --with-feature:realtime-impressions-reporting=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:slack-in-sidebar=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner-ref=on --with-feature:installer-experiment-test=off --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=4060,i,3476469000557368600,2820187725726405252,262144 --disable-features=CertificateTransparencyAskBeforeEnabling,PlatformSoftwareH264EncoderInGpu --variations-seed-version --mojo-platform-channel-handle=4152 /prefetch:1C:\Users\admin\AppData\Local\Programs\Opera\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
LOW
Description:
Opera Internet Browser
Version:
117.0.5408.142
Modules
Images
c:\users\admin\appdata\local\programs\opera\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\programs\opera\117.0.5408.142\opera_elf.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
900"C:\Users\admin\AppData\Local\Temp\antivirus360\antivirus360.exe" /sC:\Users\admin\AppData\Local\Temp\antivirus360\antivirus360.exe
PixelSee_id3316572id.exe
User:
admin
Company:
Qihoo 360 Technology Co. Ltd.
Integrity Level:
HIGH
Description:
360 Total Security Online Installer
Exit code:
1
Version:
6, 6, 0, 1060
Modules
Images
c:\users\admin\appdata\local\temp\antivirus360\antivirus360.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
1072C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1088C:\Users\admin\AppData\Local\Programs\Opera\117.0.5408.142\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=117.0.5408.142 --initial-client-data=0x2c4,0x2c8,0x2cc,0x2c0,0x2d0,0x7ffc82b82260,0x7ffc82b82270,0x7ffc82b82280C:\Users\admin\AppData\Local\Programs\Opera\117.0.5408.142\opera_crashreporter.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera crash-reporter
Exit code:
0
Version:
117.0.5408.142
Modules
Images
c:\users\admin\appdata\local\programs\opera\117.0.5408.142\opera_crashreporter.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1176"C:\Users\admin\AppData\Local\Programs\Opera\assistant\browser_assistant.exe"C:\Users\admin\AppData\Local\Programs\Opera\assistant\browser_assistant.exe
assistant_installer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Browser Assistant
Version:
117.0.5408.35
Modules
Images
c:\users\admin\appdata\local\programs\opera\assistant\browser_assistant.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1184"C:\Users\admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=on --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-bookmarks-tags-update=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:bluesky-in-sidebar=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-amazon-us-associates=off --with-feature:continue-shopping-explore=off --with-feature:continue-shopping-structured-partners=on --with-feature:discord-in-sidebar=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:hide-navigations-from-extensions=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:new-personal-news-backend=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:proxy-switcher-ui-default-visible=on --with-feature:realtime-impressions-reporting=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:slack-in-sidebar=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner-ref=on --with-feature:installer-experiment-test=off --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3480,i,3476469000557368600,2820187725726405252,262144 --disable-features=CertificateTransparencyAskBeforeEnabling,PlatformSoftwareH264EncoderInGpu --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:2C:\Users\admin\AppData\Local\Programs\Opera\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
LOW
Description:
Opera Internet Browser
Version:
117.0.5408.142
Modules
Images
c:\users\admin\appdata\local\programs\opera\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\programs\opera\117.0.5408.142\opera_elf.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
1660"C:\Users\admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --enable-quic --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=on --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-bookmarks-tags-update=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:bluesky-in-sidebar=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-amazon-us-associates=off --with-feature:continue-shopping-explore=off --with-feature:continue-shopping-structured-partners=on --with-feature:discord-in-sidebar=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:hide-navigations-from-extensions=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:new-personal-news-backend=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:proxy-switcher-ui-default-visible=on --with-feature:realtime-impressions-reporting=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:slack-in-sidebar=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner-ref=on --with-feature:installer-experiment-test=off --field-trial-handle=6184,i,3476469000557368600,2820187725726405252,262144 --disable-features=CertificateTransparencyAskBeforeEnabling,PlatformSoftwareH264EncoderInGpu --variations-seed-version --mojo-platform-channel-handle=6676 /prefetch:8C:\Users\admin\AppData\Local\Programs\Opera\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Version:
117.0.5408.142
Modules
Images
c:\users\admin\appdata\local\programs\opera\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
48 656
Read events
48 049
Write events
515
Delete events
92

Modification events

(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:InstallLocation
Value:
C:\Users\admin\PixelSee\
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:DisplayName
Value:
PixelSee
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\PixelSee\pixelsee.exe
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:UninstallString
Value:
C:\Users\admin\PixelSee\pixelsee-uninstaller.exe
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:Publisher
Value:
SIA Circle Solutions
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:URLInfoAbout
Value:
https://pixelsee.app
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:HelpLink
Value:
https://pixelsee.app
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:URLUpdateInfo
Value:
https://pixelsee.app
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:DisplayVersion
Value:
14.0.0.0
(PID) Process:(6592) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PixelSee
Operation:writeName:VersionMajor
Value:
14
Executable files
741
Suspicious files
894
Text files
434
Unknown types
1

Dropped files

PID
Process
Filename
Type
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\Montserrat-Regular.eotbinary
MD5:2DD0A1DE870AF34D48D43B7CAD82B8D9
SHA256:057BC6C47C47AACCDF31ADC48A6B401F6090A02C28E354099EFF80907DC2AF32
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-opera-skipall.htmlhtml
MD5:A1F0390933AB5684E77D26E9E12DB0AA
SHA256:11E23704448E6088ECBCD940407BE00F7E497B3252EE4BC9C470B1B46EA2E845
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-av360-close.htmlhtml
MD5:E2C2ADAB52558C6D87CB695136B6DA9B
SHA256:595DFB13A2DBA9EB4EEA028229872250BF0EF71921DAF1A131EC6EE87873B348
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-avgbro-skipall.htmlhtml
MD5:AE3E7684E42E8C18F2673A1C08EDE285
SHA256:B977C254148A8FBE90E0F79D329E33A52398A0D9A793C1126F4A563E261536E9
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\finishinstall.htmlhtml
MD5:61628717AE545FB62D76CA790B2770BC
SHA256:0C5D5E157D96BB7756E0F7914BEE78E19F57B5E1B3938B83D4B86AEA02770B6D
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-opera-close.htmlhtml
MD5:CDB9E872D5A41DFDB8FCED7BF75D1C89
SHA256:1D24E399F3AD1B056876C8DC0A3B58005302BD6C7935A1B49A2E64955082AF71
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-bdvpn-skipall.htmlhtml
MD5:5D73E685D6F96E3133CEBAFB668F50D3
SHA256:704143B974B0430955F60E7D6F1F5B0579C2A050C22416F898AD5CD8B3555155
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-bdvpn.htmlhtml
MD5:4760334E4EF9C752B290C85A24847D9B
SHA256:E89C663227A94A96F0744B4B56A191278CE6AE3205CA534E422DCCCFEEADFEBA
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-avgbro.htmlhtml
MD5:E249937FE0EE2AA0EE81C0EE4538F465
SHA256:57DD3EB82A2FC4B1F1904AB1BF3DFA347AF5457CFA5D3DF2797B12A0ECFF56E2
6592PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-luminati-wait.htmltext
MD5:FEA427802F9F1505612945D97AAC9568
SHA256:B550D0875D5DC5292C979981400782FAE63AACFC002CA03911FDC44A7C28E58A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
51
TCP/UDP connections
222
DNS requests
104
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1512
svchost.exe
GET
200
2.16.164.99:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5256
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
3180
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3180
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
900
antivirus360.exe
GET
200
52.29.179.141:80
http://s.360safe.com/safei18n/query_env.htm?v611=DgY0MAEIlqbKJAABAABmnoigzg4fkwDsnwHfHzIkZ5iYyqduuExgVL7hFXmnTIp1oycKuS3A%2FIhr5aa6AAced5SicjfiQlXFU8%2BtDpUyaCzqu0JM14qUKWrZ3SRC8qvOYZ9WJDsqyd8SSetRkynxJl1ap2RAC%2BL9Xr84jCP6lWQqPfbGzzG0N1wOmFLI%2B74XAw%2BuAJ%2FR%2BppdJl0FlWl6SwAJ838mR4FyPdpoR1EZ0%2BWolxYdaOLdIaNuwcrgS%2FTFwzm0EPRIF1QdsCjnD8%2FDmgKPRl637JOMYFQB5Fka%2FMnwHQO1Vo6oCtlYQ8prctw4SM6znHVYcBdil6%2B%2BLcsWINXCXkLLlZAAr1oCVdhENXzk5orAEze9dvzsidq%2BBEDVvsmtffZLuYoAMg3bUJP7OP1H2FFTpmVFtV%2BkjM%2FjGGQosM%2FvMVTeVibfjL7DTw%3D%3D
unknown
whitelisted
6800
bdvpn_setup.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
6800
bdvpn_setup.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
whitelisted
900
antivirus360.exe
GET
200
151.236.118.173:80
http://iup.360safe.com/iv3/pc/360safe/360TS_Setup_For_Mini_Rel.cab
unknown
whitelisted
900
antivirus360.exe
GET
200
52.29.179.141:80
http://s.360safe.com/360ts/mini_inst.htm?ver=6.6.0.1060&pid=WW.Mediaget.CPI202309&os=10.0&mid=80342cb959da2233832ae840f019ccba&state=153
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1512
svchost.exe
2.16.164.99:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
20.198.162.76:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
51.158.227.68:443
pixelsee.app
Online S.a.s.
FR
suspicious
1812
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.99
  • 2.16.164.107
  • 2.16.164.34
  • 2.16.164.24
  • 2.16.164.9
  • 2.16.164.18
  • 2.16.164.40
  • 2.16.164.72
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 20.198.162.76
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.64
  • 20.190.160.2
  • 40.126.32.68
  • 40.126.32.133
  • 20.190.160.66
  • 40.126.32.136
  • 20.190.160.132
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 184.30.131.245
whitelisted
pixelsee.app
  • 51.158.227.68
  • 51.158.210.107
  • 51.158.227.42
  • 51.158.216.85
unknown
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 23.219.150.101
whitelisted

Threats

PID
Process
Class
Message
900
antivirus360.exe
Misc activity
ET INFO Packed Executable Download
900
antivirus360.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
5428
net_updater32.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
No debug info