File name:

Core-Temp-setup-v1.18.1.0.exe

Full analysis: https://app.any.run/tasks/2d129bf6-ca97-4cb9-9d1b-61285a027397
Verdict: Malicious activity
Analysis date: May 21, 2025, 18:12:13
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
alsysio64-sys
vuln-driver
inno
installer
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

176642114EE7A82E0486BF5FAC5777C0

SHA1:

F4329A1AFC37F143BA1D39D9670CA4B1ACD61C23

SHA256:

CA7D1365E934B3BD122AB8B0DBD24EF5E0C52471CFCA15921555FC6B244E9AB6

SSDEEP:

49152:TwE0bqq2LkelPNf4qz2ZBQq9RuNkDtz7OU4SD3e9yDZocZIOtAcAmWoz4IY3WO+y:z0bBWTJ4VBL9RBtzBO9yGgMu40X9SFuu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Vulnerable driver has been detected

      • Core Temp.exe (PID: 2088)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Core-Temp-setup-v1.18.1.0.exe (PID: 4880)
      • Core-Temp-setup-v1.18.1.0.tmp (PID: 2852)
      • Core Temp.exe (PID: 2088)
    • Reads security settings of Internet Explorer

      • Core-Temp-setup-v1.18.1.0.tmp (PID: 5640)
      • Core Temp.exe (PID: 2088)
    • Start notepad (likely ransomware note)

      • Core-Temp-setup-v1.18.1.0.tmp (PID: 5640)
    • Creates file in the systems drive root

      • Core Temp.exe (PID: 2088)
    • Drops a system driver (possible attempt to evade defenses)

      • Core Temp.exe (PID: 2088)
  • INFO

    • Create files in a temporary directory

      • Core-Temp-setup-v1.18.1.0.exe (PID: 4880)
      • Core Temp.exe (PID: 2088)
    • Reads the computer name

      • Core-Temp-setup-v1.18.1.0.tmp (PID: 5640)
      • Core Temp.exe (PID: 2088)
    • Checks supported languages

      • Core-Temp-setup-v1.18.1.0.exe (PID: 4880)
      • Core-Temp-setup-v1.18.1.0.tmp (PID: 5640)
      • Core Temp.exe (PID: 2088)
    • Process checks computer location settings

      • Core-Temp-setup-v1.18.1.0.tmp (PID: 5640)
    • Detects InnoSetup installer (YARA)

      • Core-Temp-setup-v1.18.1.0.exe (PID: 4880)
      • Core-Temp-setup-v1.18.1.0.tmp (PID: 5640)
      • Core-Temp-setup-v1.18.1.0.exe (PID: 6620)
    • Compiled with Borland Delphi (YARA)

      • Core-Temp-setup-v1.18.1.0.exe (PID: 4880)
      • Core-Temp-setup-v1.18.1.0.tmp (PID: 5640)
      • Core-Temp-setup-v1.18.1.0.exe (PID: 6620)
    • Creates files in the program directory

      • Core-Temp-setup-v1.18.1.0.tmp (PID: 2852)
      • Core Temp.exe (PID: 2088)
    • The sample compiled with english language support

      • Core-Temp-setup-v1.18.1.0.tmp (PID: 2852)
      • Core Temp.exe (PID: 2088)
    • Creates a software uninstall entry

      • Core-Temp-setup-v1.18.1.0.tmp (PID: 2852)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (45.2)
.dll | Win32 Dynamic Link Library (generic) (20.9)
.exe | Win32 Executable (generic) (14.3)
.exe | Win16/32 Executable Delphi generic (6.6)
.exe | Generic Win/DOS Executable (6.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:06:14 13:27:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 66560
InitializedDataSize: 53760
UninitializedDataSize: -
EntryPoint: 0x1181c
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.18.1.0
ProductVersionNumber: 1.18.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: ALCPU
FileDescription: Core Temp Setup
FileVersion: 1.18.1.0
LegalCopyright:
ProductName: Core Temp
ProductVersion: 1.18.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start core-temp-setup-v1.18.1.0.exe core-temp-setup-v1.18.1.0.tmp no specs core-temp-setup-v1.18.1.0.exe core-temp-setup-v1.18.1.0.tmp no specs notepad.exe no specs THREAT core temp.exe

Process information

PID
CMD
Path
Indicators
Parent process
2088"C:\Program Files\Core Temp\Core Temp.exe"C:\Program Files\Core Temp\Core Temp.exe
Core-Temp-setup-v1.18.1.0.tmp
User:
admin
Company:
ALCPU
Integrity Level:
HIGH
Description:
CPU temperature and system information utility
Exit code:
0
Version:
1.18.1.0
Modules
Images
c:\program files\core temp\core temp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2852"C:\Users\admin\AppData\Local\Temp\is-GGL8D.tmp\Core-Temp-setup-v1.18.1.0.tmp" /SL5="$802AE,868100,121344,C:\Users\admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe" /SPAWNWND=$302A2 /NOTIFYWND=$80288 C:\Users\admin\AppData\Local\Temp\is-GGL8D.tmp\Core-Temp-setup-v1.18.1.0.tmpCore-Temp-setup-v1.18.1.0.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\windows\syswow64\windows.ui.dll
c:\windows\syswow64\windowmanagementapi.dll
c:\windows\syswow64\inputhost.dll
c:\windows\syswow64\twinapi.appcore.dll
c:\windows\syswow64\propsys.dll
c:\windows\syswow64\sspicli.dll
c:\windows\syswow64\explorerframe.dll
c:\windows\syswow64\sfc.dll
c:\windows\syswow64\sfc_os.dll
c:\windows\syswow64\setupapi.dll
4880"C:\Users\admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe" C:\Users\admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe
explorer.exe
User:
admin
Company:
ALCPU
Integrity Level:
MEDIUM
Description:
Core Temp Setup
Exit code:
0
Version:
1.18.1.0
Modules
Images
c:\users\admin\appdata\local\temp\core-temp-setup-v1.18.1.0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5640"C:\Users\admin\AppData\Local\Temp\is-V4H6U.tmp\Core-Temp-setup-v1.18.1.0.tmp" /SL5="$80288,868100,121344,C:\Users\admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe" C:\Users\admin\AppData\Local\Temp\is-V4H6U.tmp\Core-Temp-setup-v1.18.1.0.tmpCore-Temp-setup-v1.18.1.0.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-v4h6u.tmp\core-temp-setup-v1.18.1.0.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6620"C:\Users\admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe" /SPAWNWND=$302A2 /NOTIFYWND=$80288 C:\Users\admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe
Core-Temp-setup-v1.18.1.0.tmp
User:
admin
Company:
ALCPU
Integrity Level:
HIGH
Description:
Core Temp Setup
Exit code:
0
Version:
1.18.1.0
7152"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Program Files\Core Temp\Readme.txtC:\Windows\SysWOW64\notepad.exeCore-Temp-setup-v1.18.1.0.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
Total events
4 210
Read events
4 147
Write events
61
Delete events
2

Modification events

(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.6.1 (u)
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files\Core Temp
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files\Core Temp\
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
Core Temp
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:Inno Setup: Selected Tasks
Value:
desktopicon,goodgamesempire,languagepacks
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:Inno Setup: Deselected Tasks
Value:
coretempgadget,remoteserver
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:Inno Setup: Language
Value:
en
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:DisplayName
Value:
Core Temp 1.18.1
(PID) Process:(2852) Core-Temp-setup-v1.18.1.0.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{086D343F-8E78-4AFC-81AC-D6D414AFD8AC}_is1
Operation:writeName:DisplayIcon
Value:
C:\Program Files\Core Temp\Core Temp.exe
Executable files
7
Suspicious files
5
Text files
71
Unknown types
0

Dropped files

PID
Process
Filename
Type
4880Core-Temp-setup-v1.18.1.0.exeC:\Users\admin\AppData\Local\Temp\is-V4H6U.tmp\Core-Temp-setup-v1.18.1.0.tmpexecutable
MD5:34ACC2BDB45A9C436181426828C4CB49
SHA256:9C81817ACD4982632D8C7F1DF3898FCA1477577738184265D735F49FC5480F07
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\Core Temp.exeexecutable
MD5:005727AA95C9F4899EA7673B114D91DE
SHA256:26259A6F290A799EEB1C7C9B311E528C77E458582F9396D4DFC1C69DD2AD6891
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\is-6O70T.tmpexecutable
MD5:E535020EB53AF0A8CC69FD8180F7275E
SHA256:F515206B2C2FD3A59CF6F003143EFCA98456E2BDC4B7A8F622BEB98F735CF667
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\unins000.exeexecutable
MD5:E535020EB53AF0A8CC69FD8180F7275E
SHA256:F515206B2C2FD3A59CF6F003143EFCA98456E2BDC4B7A8F622BEB98F735CF667
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\is-H1Q2O.tmptext
MD5:0FF2E6869879C98DC6144F3384DB16A0
SHA256:87E330164B239690BA6E3B99F16768CEE7C457225C2971C7C3E52C0E21F95332
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\Changes.txttext
MD5:0FF2E6869879C98DC6144F3384DB16A0
SHA256:87E330164B239690BA6E3B99F16768CEE7C457225C2971C7C3E52C0E21F95332
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\is-3GM7K.tmptext
MD5:9AB877751224D96448876F7ECF15559F
SHA256:ABB84CF36BD0E8F39248F5477CA0D427DA9B7E3C10B6666254B98D6E06B40E7B
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\is-RR1D6.tmpexecutable
MD5:005727AA95C9F4899EA7673B114D91DE
SHA256:26259A6F290A799EEB1C7C9B311E528C77E458582F9396D4DFC1C69DD2AD6891
2852Core-Temp-setup-v1.18.1.0.tmpC:\Users\admin\AppData\Local\Temp\is-GV9JP.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
2852Core-Temp-setup-v1.18.1.0.tmpC:\Program Files\Core Temp\Languages\is-8B1O7.tmpxml
MD5:2C69729BAFE1F9B6E5FA4BBCEB157F97
SHA256:9AA957B6815486B0009CD72244C06DE6ADB0C6A4435BA17502855BFA210CF319
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.48.23.188:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.48.23.188:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4488
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 23.48.23.188
  • 23.48.23.173
  • 23.48.23.185
  • 23.48.23.175
  • 23.48.23.181
  • 23.48.23.174
  • 23.48.23.194
  • 23.48.23.179
  • 23.48.23.183
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.131
  • 20.190.159.128
  • 20.190.159.64
  • 20.190.159.130
  • 20.190.159.73
  • 20.190.159.68
  • 40.126.31.130
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info