File name:

speccy_jJF-bt1.exe

Full analysis: https://app.any.run/tasks/002f26c4-1e37-426d-84a5-fcc3147e48d4
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 23, 2025, 15:22:18
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
inno
installer
bundleinstaller
adware
innosetup
loader
stealer
cpuz
tool
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

3CB9E3F7A1DF28E0B98833B67DF26E02

SHA1:

16F0F99150D211B749AF0BDF0CD0D143BD6BBA82

SHA256:

519688CC87911D8A7D53DCCF23FA72B9D7902A825A93758C5E11860991F30F17

SSDEEP:

98304:nrq3Bdw5pSn/pNE1dJ3Hnbfc1zEnxBy3XwqhZOYcSSZRrY+04eMZmyMXecaJsB6B:B77lNGl5wjJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bundleinstaller mutex has been found

      • speccy_jJF-bt1.tmp (PID: 1052)
    • INNOSETUP has been detected (SURICATA)

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Steals credentials from Web Browsers

      • speccy.exe (PID: 5360)
    • Actions looks like stealing of personal data

      • speccy.exe (PID: 5360)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Reads the Windows owner or organization settings

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Reads security settings of Internet Explorer

      • speccy_jJF-bt1.tmp (PID: 2416)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Potential Corporate Privacy Violation

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Process requests binary or script from the Internet

      • speccy_jJF-bt1.tmp (PID: 1052)
    • The process creates files with name similar to system file names

      • speccy.exe (PID: 5360)
    • Access to an unwanted program domain was detected

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Reads Internet Explorer settings

      • speccy.exe (PID: 5360)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • speccy.exe (PID: 5360)
    • Creates a software uninstall entry

      • speccy.exe (PID: 5360)
    • Searches for installed software

      • speccy.exe (PID: 5360)
    • Drops a system driver (possible attempt to evade defenses)

      • Speccy64.exe (PID: 1228)
    • Checks for Java to be installed

      • Speccy64.exe (PID: 1228)
    • Executes as Windows Service

      • WmiApSrv.exe (PID: 8880)
    • Checks for external IP

      • Speccy64.exe (PID: 1228)
  • INFO

    • Create files in a temporary directory

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
      • java.exe (PID: 7640)
    • Checks supported languages

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy_jJF-bt1.tmp (PID: 2416)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
      • java.exe (PID: 7640)
      • identity_helper.exe (PID: 8276)
      • speccy_jJF-bt1.exe (PID: 5568)
    • Reads the computer name

      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 2416)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • Speccy64.exe (PID: 1228)
      • identity_helper.exe (PID: 8276)
    • Detects InnoSetup installer (YARA)

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 1052)
    • The sample compiled with english language support

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Reads the software policy settings

      • speccy_jJF-bt1.tmp (PID: 1052)
      • Speccy64.exe (PID: 1228)
      • speccy.exe (PID: 5360)
    • Process checks computer location settings

      • speccy_jJF-bt1.tmp (PID: 2416)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Compiled with Borland Delphi (YARA)

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy_jJF-bt1.tmp (PID: 2416)
    • Checks proxy server information

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Reads the machine GUID from the registry

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Creates files or folders in the user directory

      • speccy.exe (PID: 5360)
    • Creates files in the program directory

      • speccy.exe (PID: 5360)
      • java.exe (PID: 7640)
    • CPUZ mutex has been found

      • Speccy64.exe (PID: 1228)
    • Application launched itself

      • msedge.exe (PID: 5640)
      • msedge.exe (PID: 6136)
      • msedge.exe (PID: 8712)
    • Process checks whether UAC notifications are on

      • Speccy64.exe (PID: 1228)
    • Process checks Powershell version

      • Speccy64.exe (PID: 1228)
    • Manual execution by a user

      • msedge.exe (PID: 6136)
    • Reads Environment values

      • identity_helper.exe (PID: 8276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:53+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 685056
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0xa83bc
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 2.4.0.9160
ProductVersionNumber: 2.4.0.9160
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Portale delle applicazioni
FileVersion: 2.4.0.9160
LegalCopyright:
OriginalFileName:
ProductName: Applicazioni Windows
ProductVersion: 2.4.0.9160
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
187
Monitored processes
51
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start speccy_jjf-bt1.exe speccy_jjf-bt1.tmp no specs speccy_jjf-bt1.exe #BUNDLEINSTALLER speccy_jjf-bt1.tmp speccy.exe msedge.exe no specs speccy64.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs java.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs icacls.exe no specs conhost.exe no specs msedge.exe msedge.exe no specs wmiapsrv.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1052"C:\Users\admin\AppData\Local\Temp\is-AR6D5.tmp\speccy_jJF-bt1.tmp" /SL5="$9029A,4807120,845824,C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe" /SPAWNWND=$150162 /NOTIFYWND=$502CC C:\Users\admin\AppData\Local\Temp\is-AR6D5.tmp\speccy_jJF-bt1.tmp
speccy_jJF-bt1.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-ar6d5.tmp\speccy_jjf-bt1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
1228"C:\Program Files\Speccy\Speccy64.exe" C:\Program Files\Speccy\Speccy64.exe
speccy.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
Speccy
Version:
1.32.0.803
Modules
Images
c:\program files\speccy\speccy64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1472"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2172 --field-trial-handle=2176,i,15895958381034121134,4869866535320727713,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1616"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4312 --field-trial-handle=2436,i,1320339663493448319,3891208971783945969,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2284"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4848 --field-trial-handle=2436,i,1320339663493448319,3891208971783945969,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2416"C:\Users\admin\AppData\Local\Temp\is-1RTBR.tmp\speccy_jJF-bt1.tmp" /SL5="$502CC,4807120,845824,C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe" C:\Users\admin\AppData\Local\Temp\is-1RTBR.tmp\speccy_jJF-bt1.tmpspeccy_jJF-bt1.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-1rtbr.tmp\speccy_jjf-bt1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
2740"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5412 --field-trial-handle=2436,i,1320339663493448319,3891208971783945969,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4608"C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe" C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Portale delle applicazioni
Exit code:
0
Version:
2.4.0.9160
Modules
Images
c:\users\admin\appdata\local\temp\speccy_jjf-bt1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
4652"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x294,0x298,0x29c,0x28c,0x2a4,0x7ffc88f35fd8,0x7ffc88f35fe4,0x7ffc88f35ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4692"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x318,0x31c,0x320,0x314,0x308,0x7ffc88f35fd8,0x7ffc88f35fe4,0x7ffc88f35ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
12 649
Read events
12 601
Write events
46
Delete events
2

Modification events

(PID) Process:(5360) speccy.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFavoritesInitialSelection
Value:
(PID) Process:(5360) speccy.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFeedsInitialSelection
Value:
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\Speccy
Operation:writeName:UpdateCheck
Value:
1
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Speccy.exe
Operation:writeName:Path
Value:
C:\Program Files\Speccy
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:DisplayName
Value:
Speccy
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:UninstallString
Value:
"C:\Program Files\Speccy\uninst.exe"
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:Publisher
Value:
Piriform
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:InstallLocation
Value:
C:\Program Files\Speccy
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:VersionMajor
Value:
1
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:VersionMinor
Value:
32
Executable files
100
Suspicious files
137
Text files
59
Unknown types
0

Dropped files

PID
Process
Filename
Type
4608speccy_jJF-bt1.exeC:\Users\admin\AppData\Local\Temp\is-1RTBR.tmp\speccy_jJF-bt1.tmpexecutable
MD5:05C3B2D8623639C558B187AFB548B33F
SHA256:49738861D839BB494DE588D33F9A5AC2F2977BD305A758C7691CB35BE6D0AB5F
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\Helper.dllexecutable
MD5:DE761970892FD126C0A130966215B363
SHA256:3AA8BA187B846D05BED20E2F6E71F330E029D958E943DC9DD102DB4CFC6AEB38
5568speccy_jJF-bt1.exeC:\Users\admin\AppData\Local\Temp\is-AR6D5.tmp\speccy_jJF-bt1.tmpexecutable
MD5:05C3B2D8623639C558B187AFB548B33F
SHA256:49738861D839BB494DE588D33F9A5AC2F2977BD305A758C7691CB35BE6D0AB5F
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\loader.gifimage
MD5:12D7FD91A06CEE2D0E76ABE0485036EE
SHA256:A6192B9A3FA5DB9917AEF72D651B7AD8FD8CCB9B53F3AD99D7C46701D00C78CB
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\finish.pngimage
MD5:89DAD13A844B5C8CAB8A08FF4422B3E4
SHA256:2F5F471DBB1C469A3369DEA7596B33E1B24605C8C7D23583ABDD685AC3731813
5360speccy.exeC:\Users\admin\AppData\Local\Temp\nsx2317.tmp\ui\res\Speccy_Logo_72px.pngimage
MD5:1787175D95EAB213CF5A8BC25E252676
SHA256:65FA6BAA9D140251D04069CF538F3262EBBB0E4E62D58D06CC58AD8B22085A83
5360speccy.exeC:\Users\admin\AppData\Local\Temp\nsx2317.tmp\ui\res\PF_logo.pngimage
MD5:079CCA30760CCA3C01863B6B96E87848
SHA256:8DD37D3721E25C32C5BF878B6DBA9E61D04B7CE8AEC45BDF703A41BC41802DFA
1052speccy_jJF-bt1.tmpC:\Users\admin\Downloads\speccy.exeexecutable
MD5:2E57838AF780FBA75F9085A67CDE99E4
SHA256:0A9E739910578192E2AD3F8F805A863D5CBCACBC38CDE6488D7BBEF5395DBA87
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\mainlogo.pngimage
MD5:0D49DB5AEF52EED1C080B5035835EBC6
SHA256:35D0C4A586C42210A5282FA8B110967FE7C465E070760214F9C610FC925BBA0D
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\is-K4PBM.tmpimage
MD5:4CFFF8DC30D353CD3D215FD3A5DBAC24
SHA256:0C430E56D69435D8AB31CBB5916A73A47D11EF65B37D289EE7D11130ADF25856
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
91
DNS requests
108
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3304
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.10:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3304
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1228
Speccy64.exe
GET
200
13.90.213.204:80
http://speccy.piriform.com/ip/
unknown
whitelisted
1228
Speccy64.exe
GET
301
23.206.209.82:80
http://www.ccleaner.com/auto?p=sp&v=1.32.803&l=1033&o=6.2W6&mk=BXRJ-R3BN-G8KM-4Z2M-3SGJ-4IVA-3432-99N6-73VS
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5360
speccy.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
whitelisted
1052
speccy_jJF-bt1.tmp
GET
200
95.168.168.24:80
http://dl.jalecdn.com/BR/speccy.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.10:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5796
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
864
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.216.77.10
  • 23.216.77.21
  • 23.216.77.23
  • 23.216.77.30
  • 23.216.77.18
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.67
  • 40.126.31.131
  • 40.126.31.128
  • 40.126.31.2
  • 20.190.159.23
  • 40.126.31.1
  • 40.126.31.130
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
djloiq2ki6v9p.cloudfront.net
  • 52.222.250.13
  • 52.222.250.201
  • 52.222.250.155
  • 52.222.250.150
whitelisted
static.download.it
  • 104.22.57.224
  • 104.22.56.224
  • 172.67.26.92
unknown
dl.jalecdn.com
  • 95.168.168.24
unknown

Threats

PID
Process
Class
Message
1052
speccy_jJF-bt1.tmp
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
1052
speccy_jJF-bt1.tmp
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
1228
Speccy64.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
No debug info