File name:

speccy_jJF-bt1.exe

Full analysis: https://app.any.run/tasks/002f26c4-1e37-426d-84a5-fcc3147e48d4
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 23, 2025, 15:22:18
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
inno
installer
bundleinstaller
adware
innosetup
loader
stealer
cpuz
tool
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

3CB9E3F7A1DF28E0B98833B67DF26E02

SHA1:

16F0F99150D211B749AF0BDF0CD0D143BD6BBA82

SHA256:

519688CC87911D8A7D53DCCF23FA72B9D7902A825A93758C5E11860991F30F17

SSDEEP:

98304:nrq3Bdw5pSn/pNE1dJ3Hnbfc1zEnxBy3XwqhZOYcSSZRrY+04eMZmyMXecaJsB6B:B77lNGl5wjJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bundleinstaller mutex has been found

      • speccy_jJF-bt1.tmp (PID: 1052)
    • INNOSETUP has been detected (SURICATA)

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Steals credentials from Web Browsers

      • speccy.exe (PID: 5360)
    • Actions looks like stealing of personal data

      • speccy.exe (PID: 5360)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
      • speccy_jJF-bt1.exe (PID: 4608)
    • Potential Corporate Privacy Violation

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Access to an unwanted program domain was detected

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Process requests binary or script from the Internet

      • speccy_jJF-bt1.tmp (PID: 1052)
    • Reads security settings of Internet Explorer

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
      • speccy_jJF-bt1.tmp (PID: 2416)
    • Reads the Windows owner or organization settings

      • speccy_jJF-bt1.tmp (PID: 1052)
    • The process creates files with name similar to system file names

      • speccy.exe (PID: 5360)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • speccy.exe (PID: 5360)
    • Reads Internet Explorer settings

      • speccy.exe (PID: 5360)
    • Creates a software uninstall entry

      • speccy.exe (PID: 5360)
    • Searches for installed software

      • speccy.exe (PID: 5360)
    • Drops a system driver (possible attempt to evade defenses)

      • Speccy64.exe (PID: 1228)
    • Checks for Java to be installed

      • Speccy64.exe (PID: 1228)
    • Executes as Windows Service

      • WmiApSrv.exe (PID: 8880)
    • Checks for external IP

      • Speccy64.exe (PID: 1228)
  • INFO

    • Checks supported languages

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
      • java.exe (PID: 7640)
      • identity_helper.exe (PID: 8276)
      • speccy_jJF-bt1.tmp (PID: 2416)
    • Reads the computer name

      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 2416)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • Speccy64.exe (PID: 1228)
      • identity_helper.exe (PID: 8276)
    • Process checks computer location settings

      • speccy_jJF-bt1.tmp (PID: 2416)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Create files in a temporary directory

      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
      • java.exe (PID: 7640)
      • speccy_jJF-bt1.exe (PID: 4608)
    • Detects InnoSetup installer (YARA)

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy_jJF-bt1.exe (PID: 5568)
    • Reads the software policy settings

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Compiled with Borland Delphi (YARA)

      • speccy_jJF-bt1.exe (PID: 4608)
      • speccy_jJF-bt1.tmp (PID: 2416)
      • speccy_jJF-bt1.exe (PID: 5568)
      • speccy_jJF-bt1.tmp (PID: 1052)
    • Reads the machine GUID from the registry

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Checks proxy server information

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • The sample compiled with english language support

      • speccy_jJF-bt1.tmp (PID: 1052)
      • speccy.exe (PID: 5360)
      • Speccy64.exe (PID: 1228)
    • Creates files or folders in the user directory

      • speccy.exe (PID: 5360)
    • Creates files in the program directory

      • speccy.exe (PID: 5360)
      • java.exe (PID: 7640)
    • CPUZ mutex has been found

      • Speccy64.exe (PID: 1228)
    • Application launched itself

      • msedge.exe (PID: 5640)
      • msedge.exe (PID: 6136)
      • msedge.exe (PID: 8712)
    • Manual execution by a user

      • msedge.exe (PID: 6136)
    • Process checks whether UAC notifications are on

      • Speccy64.exe (PID: 1228)
    • Process checks Powershell version

      • Speccy64.exe (PID: 1228)
    • Reads Environment values

      • identity_helper.exe (PID: 8276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:53+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 685056
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0xa83bc
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 2.4.0.9160
ProductVersionNumber: 2.4.0.9160
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Portale delle applicazioni
FileVersion: 2.4.0.9160
LegalCopyright:
OriginalFileName:
ProductName: Applicazioni Windows
ProductVersion: 2.4.0.9160
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
187
Monitored processes
51
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start speccy_jjf-bt1.exe speccy_jjf-bt1.tmp no specs speccy_jjf-bt1.exe #BUNDLEINSTALLER speccy_jjf-bt1.tmp speccy.exe msedge.exe no specs speccy64.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs java.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs icacls.exe no specs conhost.exe no specs msedge.exe msedge.exe no specs wmiapsrv.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1052"C:\Users\admin\AppData\Local\Temp\is-AR6D5.tmp\speccy_jJF-bt1.tmp" /SL5="$9029A,4807120,845824,C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe" /SPAWNWND=$150162 /NOTIFYWND=$502CC C:\Users\admin\AppData\Local\Temp\is-AR6D5.tmp\speccy_jJF-bt1.tmp
speccy_jJF-bt1.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-ar6d5.tmp\speccy_jjf-bt1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
1228"C:\Program Files\Speccy\Speccy64.exe" C:\Program Files\Speccy\Speccy64.exe
speccy.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
Speccy
Version:
1.32.0.803
Modules
Images
c:\program files\speccy\speccy64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1472"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2172 --field-trial-handle=2176,i,15895958381034121134,4869866535320727713,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1616"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4312 --field-trial-handle=2436,i,1320339663493448319,3891208971783945969,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2284"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4848 --field-trial-handle=2436,i,1320339663493448319,3891208971783945969,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2416"C:\Users\admin\AppData\Local\Temp\is-1RTBR.tmp\speccy_jJF-bt1.tmp" /SL5="$502CC,4807120,845824,C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe" C:\Users\admin\AppData\Local\Temp\is-1RTBR.tmp\speccy_jJF-bt1.tmpspeccy_jJF-bt1.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-1rtbr.tmp\speccy_jjf-bt1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
2740"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5412 --field-trial-handle=2436,i,1320339663493448319,3891208971783945969,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4608"C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe" C:\Users\admin\AppData\Local\Temp\speccy_jJF-bt1.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Portale delle applicazioni
Exit code:
0
Version:
2.4.0.9160
Modules
Images
c:\users\admin\appdata\local\temp\speccy_jjf-bt1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
4652"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x294,0x298,0x29c,0x28c,0x2a4,0x7ffc88f35fd8,0x7ffc88f35fe4,0x7ffc88f35ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4692"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x318,0x31c,0x320,0x314,0x308,0x7ffc88f35fd8,0x7ffc88f35fe4,0x7ffc88f35ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
12 649
Read events
12 601
Write events
46
Delete events
2

Modification events

(PID) Process:(5360) speccy.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFavoritesInitialSelection
Value:
(PID) Process:(5360) speccy.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFeedsInitialSelection
Value:
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\Speccy
Operation:writeName:UpdateCheck
Value:
1
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Speccy.exe
Operation:writeName:Path
Value:
C:\Program Files\Speccy
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:DisplayName
Value:
Speccy
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:UninstallString
Value:
"C:\Program Files\Speccy\uninst.exe"
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:Publisher
Value:
Piriform
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:InstallLocation
Value:
C:\Program Files\Speccy
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:VersionMajor
Value:
1
(PID) Process:(5360) speccy.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Speccy
Operation:writeName:VersionMinor
Value:
32
Executable files
100
Suspicious files
137
Text files
59
Unknown types
0

Dropped files

PID
Process
Filename
Type
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\loader.gifimage
MD5:12D7FD91A06CEE2D0E76ABE0485036EE
SHA256:A6192B9A3FA5DB9917AEF72D651B7AD8FD8CCB9B53F3AD99D7C46701D00C78CB
4608speccy_jJF-bt1.exeC:\Users\admin\AppData\Local\Temp\is-1RTBR.tmp\speccy_jJF-bt1.tmpexecutable
MD5:05C3B2D8623639C558B187AFB548B33F
SHA256:49738861D839BB494DE588D33F9A5AC2F2977BD305A758C7691CB35BE6D0AB5F
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\mainlogo.pngimage
MD5:0D49DB5AEF52EED1C080B5035835EBC6
SHA256:35D0C4A586C42210A5282FA8B110967FE7C465E070760214F9C610FC925BBA0D
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
5568speccy_jJF-bt1.exeC:\Users\admin\AppData\Local\Temp\is-AR6D5.tmp\speccy_jJF-bt1.tmpexecutable
MD5:05C3B2D8623639C558B187AFB548B33F
SHA256:49738861D839BB494DE588D33F9A5AC2F2977BD305A758C7691CB35BE6D0AB5F
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\error.pngimage
MD5:2F432B7455D40E2E010C30A7C76585E6
SHA256:E162B1D21DA5E8E2092EC16B5285C32136C321DCB7FF99F4AE8ED765D518AEF5
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\is-K4PBM.tmpimage
MD5:4CFFF8DC30D353CD3D215FD3A5DBAC24
SHA256:0C430E56D69435D8AB31CBB5916A73A47D11EF65B37D289EE7D11130ADF25856
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\is-V8QGG.tmpimage
MD5:0D49DB5AEF52EED1C080B5035835EBC6
SHA256:35D0C4A586C42210A5282FA8B110967FE7C465E070760214F9C610FC925BBA0D
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\finish.pngimage
MD5:89DAD13A844B5C8CAB8A08FF4422B3E4
SHA256:2F5F471DBB1C469A3369DEA7596B33E1B24605C8C7D23583ABDD685AC3731813
1052speccy_jJF-bt1.tmpC:\Users\admin\AppData\Local\Temp\is-MC5TG.tmp\is-UKJ0T.tmpexecutable
MD5:2E57838AF780FBA75F9085A67CDE99E4
SHA256:0A9E739910578192E2AD3F8F805A863D5CBCACBC38CDE6488D7BBEF5395DBA87
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
91
DNS requests
108
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.10:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1052
speccy_jJF-bt1.tmp
GET
200
95.168.168.24:80
http://dl.jalecdn.com/BR/speccy.exe
unknown
unknown
3304
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3304
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1228
Speccy64.exe
GET
301
23.206.209.82:80
http://www.ccleaner.com/auto?p=sp&v=1.32.803&l=1033&o=6.2W6&mk=BXRJ-R3BN-G8KM-4Z2M-3SGJ-4IVA-3432-99N6-73VS
unknown
whitelisted
5360
speccy.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
whitelisted
1228
Speccy64.exe
GET
200
13.90.213.204:80
http://speccy.piriform.com/ip/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.10:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5796
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
864
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.216.77.10
  • 23.216.77.21
  • 23.216.77.23
  • 23.216.77.30
  • 23.216.77.18
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.67
  • 40.126.31.131
  • 40.126.31.128
  • 40.126.31.2
  • 20.190.159.23
  • 40.126.31.1
  • 40.126.31.130
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
djloiq2ki6v9p.cloudfront.net
  • 52.222.250.13
  • 52.222.250.201
  • 52.222.250.155
  • 52.222.250.150
whitelisted
static.download.it
  • 104.22.57.224
  • 104.22.56.224
  • 172.67.26.92
unknown
dl.jalecdn.com
  • 95.168.168.24
unknown

Threats

PID
Process
Class
Message
1052
speccy_jJF-bt1.tmp
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
1052
speccy_jJF-bt1.tmp
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7196
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
1228
Speccy64.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
No debug info