File name:

PixelSee_id3316572id.exe

Full analysis: https://app.any.run/tasks/e12c137b-ebaf-47a2-b1d1-a371c39c3ccb
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 24, 2025, 12:48:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
arch-html
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

EE0636A5D4268A5D1B2F618DAA1C7535

SHA1:

877282C79F7C4C75924A8D144B6B5B8AD11EDAE3

SHA256:

F2388417341CFAE06FA72F558D9FF870BCDFAC573D503B5A76C9657D63B925EA

SSDEEP:

98304:9s0trcwir/NgZigiPi1CqnoQp3YtoMNdrUArdvddEi7T9GNVNPRix9tFNwSA2U71:7eI+w6Fn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • PixelSee_id3316572id.exe (PID: 7496)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • PixelSee_id3316572id.exe (PID: 7496)
    • Reads Internet Explorer settings

      • PixelSee_id3316572id.exe (PID: 7496)
    • Reads security settings of Internet Explorer

      • PixelSee_id3316572id.exe (PID: 7496)
  • INFO

    • Reads the computer name

      • PixelSee_id3316572id.exe (PID: 7496)
    • Checks supported languages

      • PixelSee_id3316572id.exe (PID: 7496)
    • The sample compiled with english language support

      • PixelSee_id3316572id.exe (PID: 7496)
    • Checks proxy server information

      • PixelSee_id3316572id.exe (PID: 7496)
    • Create files in a temporary directory

      • PixelSee_id3316572id.exe (PID: 7496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:07 15:39:23+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2696192
InitializedDataSize: 1864704
UninitializedDataSize: -
EntryPoint: 0x25dfa0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 14.0.0.0
ProductVersionNumber: 14.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: PixelSee Player Installer
CompanyName: SIA Circle Solutions
FileDescription: PixelSee Player Installer
FileVersion: 14.0.0.0
InternalName: pixelsee
LegalCopyright: Copyright � 2022-2023 SIA Circle Solutions
OriginalFileName: pixelsee
PrivateBuild: -
ProductName: PixelSee
ProductVersion: 14.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pixelsee_id3316572id.exe sppextcomobj.exe no specs slui.exe no specs pixelsee_id3316572id.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7400"C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exeexplorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
MEDIUM
Description:
PixelSee Player Installer
Exit code:
3221226540
Version:
14.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id3316572id.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7496"C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exe" C:\Users\admin\AppData\Local\Temp\PixelSee_id3316572id.exe
explorer.exe
User:
admin
Company:
SIA Circle Solutions
Integrity Level:
HIGH
Description:
PixelSee Player Installer
Version:
14.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pixelsee_id3316572id.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
7564C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7596"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
907
Read events
901
Write events
6
Delete events
0

Modification events

(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\PixelSee LLC\PixelSee-systemScope\pixelsee_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(7496) PixelSee_id3316572id.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
Executable files
0
Suspicious files
11
Text files
58
Unknown types
0

Dropped files

PID
Process
Filename
Type
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\preloader.htmlhtml
MD5:37A05031BEC9D3E093388407848AF66F
SHA256:CF38F4F8663028BEFF3A7650A9D426B4116891E8547029B66B8D2A13FAD63A48
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\main-icon-big.pngimage
MD5:0E5FEA82CC4F4A8225532E5B2F45C6C8
SHA256:81B5F50491579127D13E050847EF6D817265AB4B70D2796FB74021463B778BB9
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\Montserrat-Regular.eotbinary
MD5:2DD0A1DE870AF34D48D43B7CAD82B8D9
SHA256:057BC6C47C47AACCDF31ADC48A6B401F6090A02C28E354099EFF80907DC2AF32
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-av360-skipall.htmlhtml
MD5:238EB5DE513CE2893822F7C0897157C4
SHA256:92626A600DA4DF6B5526807B9079E7C4C733521FCA9C039BA7F62838E8E4E36F
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-avgbro-skipall.htmlhtml
MD5:AE3E7684E42E8C18F2673A1C08EDE285
SHA256:B977C254148A8FBE90E0F79D329E33A52398A0D9A793C1126F4A563E261536E9
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-bdvpn-skipall.htmlhtml
MD5:5D73E685D6F96E3133CEBAFB668F50D3
SHA256:704143B974B0430955F60E7D6F1F5B0579C2A050C22416F898AD5CD8B3555155
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-bdvpn.htmlhtml
MD5:4760334E4EF9C752B290C85A24847D9B
SHA256:E89C663227A94A96F0744B4B56A191278CE6AE3205CA534E422DCCCFEEADFEBA
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-coc-skipall.htmlhtml
MD5:EA7B7A1C8279C0798A38F0401FBFCE59
SHA256:51333C328758037E356696C5B2532733BAC04F8FA4A4DE20EC9AA8CE40EC767E
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-luminati-wait.htmltext
MD5:FEA427802F9F1505612945D97AAC9568
SHA256:B550D0875D5DC5292C979981400782FAE63AACFC002CA03911FDC44A7C28E58A
7496PixelSee_id3316572id.exeC:\Users\admin\AppData\Local\Temp\pixelsee-installer-tmp\bundles\bundle-av360-close.htmlhtml
MD5:E2C2ADAB52558C6D87CB695136B6DA9B
SHA256:595DFB13A2DBA9EB4EEA028229872250BF0EF71921DAF1A131EC6EE87873B348
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
26
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7856
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4608
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4608
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7496
PixelSee_id3316572id.exe
51.158.216.85:443
pixelsee.app
Online S.a.s.
FR
suspicious
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
google.com
  • 142.250.185.174
whitelisted
pixelsee.app
  • 51.158.216.85
  • 51.158.227.42
  • 51.158.210.107
  • 51.158.227.68
unknown
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.160.131
  • 20.190.160.3
  • 20.190.160.4
  • 20.190.160.22
  • 20.190.160.5
  • 20.190.160.14
  • 20.190.160.132
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
arc.msn.com
  • 20.105.99.58
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted

Threats

No threats detected
No debug info