File name:

PixelSee_id3316572id.exe

Full analysis: https://app.any.run/tasks/e12c137b-ebaf-47a2-b1d1-a371c39c3ccb
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 24, 2025, 12:48:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
arch-html
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

EE0636A5D4268A5D1B2F618DAA1C7535

SHA1:

877282C79F7C4C75924A8D144B6B5B8AD11EDAE3

SHA256:

F2388417341CFAE06FA72F558D9FF870BCDFAC573D503B5A76C9657D63B925EA

SSDEEP:

98304:9s0trcwir/NgZigiPi1CqnoQp3YtoMNdrUArdvddEi7T9GNVNPRix9tFNwSA2U71:7eI+w6Fn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • PixelSee_id3316572id.exe (PID: 7496)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • PixelSee_id3316572id.exe (PID: 7496)
    • Reads Internet Explorer settings

      • PixelSee_id3316572id.exe (PID: 7496)
    • Reads Microsoft Outlook installation path

      • PixelSee_id3316572id.exe (PID: 7496)
  • INFO

    • Checks supported languages

      • PixelSee_id3316572id.exe (PID: 7496)
    • The sample compiled with english language support

      • PixelSee_id3316572id.exe (PID: 7496)
    • Reads the computer name

      • PixelSee_id3316572id.exe (PID: 7496)
    • Create files in a temporary directory

      • PixelSee_id3316572id.exe (PID: 7496)
    • Checks proxy server information

      • PixelSee_id3316572id.exe (PID: 7496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:07 15:39:23+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2696192
InitializedDataSize: 1864704
UninitializedDataSize: -
EntryPoint: 0x25dfa0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 14.0.0.0
ProductVersionNumber: 14.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: PixelSee Player Installer
CompanyName: SIA Circle Solutions
FileDescription: PixelSee Player Installer
FileVersion: 14.0.0.0
InternalName: pixelsee
LegalCopyright: Copyright � 2022-2023 SIA Circle Solutions
OriginalFileName: pixelsee
PrivateBuild: -
ProductName: PixelSee
ProductVersion: 14.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pixelsee_id3316572id.exe sppextcomobj.exe no specs slui.exe no specs pixelsee_id3316572id.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7400"C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exeexplorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
MEDIUM
Description:
PixelSee Player Installer
Exit code:
3221226540
Version:
14.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id3316572id.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7496"C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exe
explorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Player Installer
Version:
14.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id3316572id.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7564C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7596"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
907
Read events
901
Write events
6
Delete events
0

Modification events

(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\PixelSee LLC\PixelSee-systemScope\pixelsee_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
Executable files
0
Suspicious files
11
Text files
58
Unknown types
0

Dropped files

PID
Process
Filename
Type
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\archive.7zcompressed
MD5:0666F17FF760DF7F04529AD2D75E596F
SHA256:C9BDC1B954D3CB4D1E38CB5F4BE7DFAE4493B416E1E7FC2F81707E41D7FCFF09
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\preloader.htmlhtml
MD5:37A05031BEC9D3E093388407848AF66F
SHA256:CF38F4F8663028BEFF3A7650A9D426B4116891E8547029B66B8D2A13FAD63A48
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-avgbro.htmlhtml
MD5:E249937FE0EE2AA0EE81C0EE4538F465
SHA256:57DD3EB82A2FC4B1F1904AB1BF3DFA347AF5457CFA5D3DF2797B12A0ECFF56E2
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-avgbro-skipall.htmlhtml
MD5:AE3E7684E42E8C18F2673A1C08EDE285
SHA256:B977C254148A8FBE90E0F79D329E33A52398A0D9A793C1126F4A563E261536E9
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-av360-close.htmlhtml
MD5:E2C2ADAB52558C6D87CB695136B6DA9B
SHA256:595DFB13A2DBA9EB4EEA028229872250BF0EF71921DAF1A131EC6EE87873B348
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-coc-skipall.htmlhtml
MD5:EA7B7A1C8279C0798A38F0401FBFCE59
SHA256:51333C328758037E356696C5B2532733BAC04F8FA4A4DE20EC9AA8CE40EC767E
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-luminati-wait.htmltext
MD5:FEA427802F9F1505612945D97AAC9568
SHA256:B550D0875D5DC5292C979981400782FAE63AACFC002CA03911FDC44A7C28E58A
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-opera-close.htmlhtml
MD5:CDB9E872D5A41DFDB8FCED7BF75D1C89
SHA256:1D24E399F3AD1B056876C8DC0A3B58005302BD6C7935A1B49A2E64955082AF71
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\Montserrat-Regular.eotbinary
MD5:2DD0A1DE870AF34D48D43B7CAD82B8D9
SHA256:057BC6C47C47AACCDF31ADC48A6B401F6090A02C28E354099EFF80907DC2AF32
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\main-icon-big.pngimage
MD5:0E5FEA82CC4F4A8225532E5B2F45C6C8
SHA256:81B5F50491579127D13E050847EF6D817265AB4B70D2796FB74021463B778BB9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
26
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4608
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4608
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7856
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7496
PixelSee_id3316572id.exe
51.158.216.85:443
pixelsee.app
Online S.a.s.
FR
suspicious
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
google.com
  • 142.250.185.174
whitelisted
pixelsee.app
  • 51.158.216.85
  • 51.158.227.42
  • 51.158.210.107
  • 51.158.227.68
unknown
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.160.131
  • 20.190.160.3
  • 20.190.160.4
  • 20.190.160.22
  • 20.190.160.5
  • 20.190.160.14
  • 20.190.160.132
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
arc.msn.com
  • 20.105.99.58
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted

Threats

No threats detected
No debug info