File name:

FiveMReadyAccountTool_1.rar

Full analysis: https://app.any.run/tasks/3033ec99-b81b-4916-a603-ea10915abfa9
Verdict: Malicious activity
Analysis date: May 31, 2025, 12:35:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-scr
arch-doc
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

885BD27E841544EFF00B4E1A56656EB7

SHA1:

B81B34C78F629FCAC40786183F67A6EBDC37E1F0

SHA256:

E4DD319505E5F1A37ED4007AB6ED9AA195FDBD254D22980F1A54609A76F376EC

SSDEEP:

96:0pDXt+qF1N1e0yuxCM89GHetj3Rcjgc2PD7Ko:0twqbDusu9+ihcjg37B

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 2600)
    • Creates a new folder (SCRIPT)

      • wscript.exe (PID: 2652)
      • wscript.exe (PID: 4560)
      • wscript.exe (PID: 8100)
    • Creates internet connection object (SCRIPT)

      • wscript.exe (PID: 2652)
      • wscript.exe (PID: 4560)
      • wscript.exe (PID: 8100)
    • Opens an HTTP connection (SCRIPT)

      • wscript.exe (PID: 2652)
      • wscript.exe (PID: 4560)
      • wscript.exe (PID: 8100)
    • Sends HTTP request (SCRIPT)

      • wscript.exe (PID: 2652)
      • wscript.exe (PID: 4560)
      • wscript.exe (PID: 8100)
  • SUSPICIOUS

    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 2652)
      • wscript.exe (PID: 8100)
      • wscript.exe (PID: 4560)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 2652)
      • wscript.exe (PID: 4560)
      • wscript.exe (PID: 8100)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2600)
    • The process executes VB scripts

      • WinRAR.exe (PID: 2600)
  • INFO

    • Manual execution by a user

      • wscript.exe (PID: 2652)
      • notepad.exe (PID: 7500)
      • notepad.exe (PID: 1268)
      • notepad.exe (PID: 7404)
      • notepad.exe (PID: 6268)
      • WinRAR.exe (PID: 7996)
      • wscript.exe (PID: 8100)
      • notepad++.exe (PID: 5604)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7500)
      • notepad.exe (PID: 1268)
      • notepad.exe (PID: 7404)
      • notepad.exe (PID: 6268)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 2600)
    • Checks proxy server information

      • slui.exe (PID: 7636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 62
UncompressedSize: 62
OperatingSystem: Win32
ArchivedFileName: FiveMReadyAccountTool/FiveMReadyAccountTool/config/settings.json
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
13
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs wscript.exe notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs rundll32.exe no specs wscript.exe winrar.exe no specs wscript.exe notepad++.exe no specs slui.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
516C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1268"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\names.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2600"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\FiveMReadyAccountTool_1.rarC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2652"C:\WINDOWS\System32\WScript.exe" C:\Users\admin\Desktop\run.vbsC:\Windows\System32\wscript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4560"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa2600.27149\run.vbs" C:\Windows\System32\wscript.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5604"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\run.vbs"C:\Program Files\Notepad++\notepad++.exeexplorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6268"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\requirements.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7404"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\domains.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7500"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\proxies.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
16 471
Read events
16 447
Write events
24
Delete events
0

Modification events

(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\FiveMReadyAccountTool_1.rar
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList
Operation:writeName:ArcSort
Value:
32
(PID) Process:(2600) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
Executable files
0
Suspicious files
1
Text files
23
Unknown types
0

Dropped files

PID
Process
Filename
Type
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\data\input\names.txttext
MD5:9D272AB27396FE2883B847F5F1545106
SHA256:041D98A0E2762BFF9837D32618240B5B697A682196561E74DCF48EAC5A2BD3AD
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\data\input\proxies.txttext
MD5:F9D421D2A7E993A77B51101497C77A62
SHA256:B97E305DD8A1D6E98E23478A631A2BA52B0EA5429D7FB79A2928318D591D9720
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\generator\proxy_manager.pytext
MD5:F2EA0D34740A8DDC54921AB1ADF7DCFD
SHA256:7C978298C1FE9EE9FAFC24EA02D35F1543258AC09336F949DC1D8DF832FC9285
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\generator\captcha_solver.pytext
MD5:E071F2CC86C1D15EAC0001DCF828D623
SHA256:D2725515B83E4FFF142E74CFC24A31D3F666C7243A8DE43560D8FED0A4663972
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\generator\main.pytext
MD5:FA7F4ACC2E6F4752E56158B7C7AB7002
SHA256:22C6E2FC0CAADFB4E44A8403F816904F824F3858620AA14882ED9EA153FAFC68
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\data\input\domains.txttext
MD5:7935F6EC503B6A29FB378B795D2FDBAE
SHA256:21030A4CC1F47AEF230D9526999347C0844A004FA932D918983A3159E6146B49
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\requirements.txttext
MD5:D8A0C3255D36904FDCCB2FE8C9750BA2
SHA256:56CC23949FF9C56A631264826AF39F2B425448EBBB7F3A53D656C54B7901C78E
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\generator\rockstar_creator.pytext
MD5:BEB27CE43DEEF9999402631D677595D1
SHA256:386ADBD7A6B5387330EAB4A7B1FF8AD7FC5303125FD1C27CBC0AF7B0D2270779
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\generator\phone_verify.pytext
MD5:89D37335876AAC08FF3327967DC41A54
SHA256:B00653728B7AC6270E4602B16280BF810CB8D39BFC0E8F3995F6D5EAA8705CDD
7996WinRAR.exeC:\Users\admin\Desktop\FiveMReadyAccountTool_1\FiveMReadyAccountTool\FiveMReadyAccountTool\generator\mail_handler.pytext
MD5:AB512E36C66F38D074268C19D79DFDF3
SHA256:911844322D450499E2381AFAA53E35329350238A25FB93BA8CFE0AEB72DF6361
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
22
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
401
3.124.100.143:443
https://ameh1.netlify.app/files/C-F/final.bat
unknown
html
3.47 Kb
malicious
5216
RUXIMICS.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5216
RUXIMICS.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
401
3.124.100.143:443
https://ameh1.netlify.app/files/C-F/final.bat
unknown
html
3.47 Kb
malicious
5496
MoUsoCoreWorker.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
GET
401
3.75.10.80:443
https://ameh1.netlify.app/files/C-F/final.bat
unknown
html
3.47 Kb
malicious
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5216
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5216
RUXIMICS.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
2652
wscript.exe
3.124.100.143:443
ameh1.netlify.app
AMAZON-02
DE
malicious
5216
RUXIMICS.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
ameh1.netlify.app
  • 3.124.100.143
  • 3.75.10.80
malicious
www.microsoft.com
  • 2.23.181.156
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 13.89.179.8
whitelisted

Threats

No threats detected
No debug info