File name:

Connectify Hotspot PRO 7.1+ Crack.zip

Full analysis: https://app.any.run/tasks/f4e1fd64-c701-4014-b197-2b5405a39d74
Verdict: Malicious activity
Analysis date: March 28, 2021, 18:42:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

C9FC63FB2AA61441CDAA5D0C8FAA435D

SHA1:

8E19C49B48479B3FD892EE9E0A46AAE98FDFF628

SHA256:

5C05F9C595AC4DC20EBD3A4EFB0061F00491E220201DD71019C37A9912B0D4FB

SSDEEP:

196608:Vj5LWEAyVvHsB1AaO8JB4+hXwMlK9NH1hv9GA2kpTDgwdmmm4AEe5:Vj56Xyl0vO8f4CwuQH1h32sTDLdNE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • cmd.exe (PID: 2104)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3180)
  • SUSPICIOUS

    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 3292)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3292)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2104)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 3292)
  • INFO

    • Manual execution by user

      • NOTEPAD.EXE (PID: 2920)
      • cmd.exe (PID: 2104)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2014:04:17 12:07:03
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
9
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs notepad.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3292"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Connectify Hotspot PRO 7.1+ Crack.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3180"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2920"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\How to use.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2104cmd /c ""C:\Users\admin\Desktop\ConnectifyExit.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
128
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2880net stop connectifyC:\Windows\system32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
3684C:\Windows\system32\net1 stop connectifyC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
124taskkill /t /f /IM Connectify.exeC:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
2852taskkill /t /f /IM Connectifyd.exeC:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
2800taskkill /t /f /IM ConnectifyService.exeC:\Windows\system32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
Total events
819
Read events
803
Write events
16
Delete events
0

Modification events

(PID) Process:(3292) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3292) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3292) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3292) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Connectify Hotspot PRO 7.1+ Crack.zip
(PID) Process:(3292) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3292) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3292) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3292) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3292) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(3292) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
26
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\Scannify.dllexecutable
MD5:7EEDFA23995A099FFF60D08F6A76FE00
SHA256:FA216958E139A66B86FE2F7A6781D5D44F64316C6CC4B60F5C2BB268FE679718
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\gopherlib.dllexecutable
MD5:669F6698C98854C687AFAEABF5A51CFB
SHA256:74A8A514A1AF7AAA7A97ED1463D6D271B0679FB58D659AA28ACB69FAC9A530A9
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\FsprgEmbeddedStore.dllexecutable
MD5:1849323C317DDFD19AF178165DF786CA
SHA256:DE8E9016C94049BF54B67A33527482A65BE8A511C8F62C892113652FE67248B1
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\Connectify.exeexecutable
MD5:A247ECF997B98DC14C39287FE27937CC
SHA256:5E662CDCF63E2164B1D37B20DD980A235150A28DD243810BA03DC474BAE5C09A
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\IconFinder.dllexecutable
MD5:A311166AB7E75F2302E343430DD074B8
SHA256:39E4E1EE87B1E03999143A9ADD8F90AADEAE1D63394097EE0C99099AF54BCE4E
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\LibraryFunctions.dllexecutable
MD5:40B6B3A055AE6C42DF91942F9432E489
SHA256:DC5CA98E6C610BDD90836FFB7AFF9306D101AE1064EB82DC3A0DF5F7CB856BA3
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\Interop.SHDocVw.dllexecutable
MD5:2BF64C3D3324CFBECAD519E67EC97308
SHA256:597A85DAE2DDAEBE12109081EC0FF58A716F0FC37A5177A5078D90D6D3E76B7F
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\gma.Windows.Firewall.dllexecutable
MD5:809424B8BCED3370A696D27CBFDAE870
SHA256:461516183A83CAAA005E99B92A9DA24741F451F60AD9A6AFC0E65F49ACA2F97D
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\Note.txttext
MD5:21C806EAF08ABE09BC717D1F739EC05C
SHA256:CBC6602D72C1D6FE96B9F6A76DA67708CB11FEAD0EE68E88AC75F60A23FB4E32
3292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3292.32289\Connectify Hotspot PRO 7.1.29279 + Crack [ThumperDC]\crack\ndisapinet.dllexecutable
MD5:72553EA997E637946A292C137071B10E
SHA256:CEF48B5C26937D896D9ACD062069D07B5E2ACD8ACCC26E22E7ACE93CFBF9AAB2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info