File name:

buff_for_post_2.zip

Full analysis: https://app.any.run/tasks/5256f3aa-efb6-4675-a856-810d6db71531
Verdict: Suspicious activity
Analysis date: July 23, 2025, 01:47:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

F21C0D98BCAE943569571ED6F8AC1F48

SHA1:

CC85DCDB28C983E7B11CDE1781267618D52E2B6B

SHA256:

8F851AF71079FFA30ACC64470F32A8B6F02712052E7CB88F4A6AD07CDDEEC7C8

SSDEEP:

49152:WzWdtPEIzPjPsJlvsHu1t/y5x0eV53L+1fbXtigwJQA0+GRwfCP6NG0AUpN6aKg3:WQtsIzdu1t/y5Z3b+lbZmQAxmwfG4G0x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Loads Python modules

      • python.exe (PID: 2000)
      • python.exe (PID: 3108)
      • python.exe (PID: 6288)
      • python.exe (PID: 5064)
      • python.exe (PID: 3740)
      • python.exe (PID: 7060)
      • python.exe (PID: 3540)
    • Executes application which crashes

      • overflow3.exe (PID: 6992)
      • overflow3.exe (PID: 3860)
      • overflow3.exe (PID: 2028)
      • overflow3.exe (PID: 3636)
  • INFO

    • Checks supported languages

      • overflow3.exe (PID: 368)
      • TextInputHost.exe (PID: 6096)
      • python.exe (PID: 2000)
      • python.exe (PID: 3108)
      • python.exe (PID: 6288)
      • python.exe (PID: 3740)
      • overflow3.exe (PID: 6992)
      • overflow3.exe (PID: 3860)
      • overflow3.exe (PID: 3636)
      • python.exe (PID: 7060)
      • python.exe (PID: 5064)
      • overflow3.exe (PID: 2028)
      • python.exe (PID: 3540)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 4352)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4352)
    • Manual execution by a user

      • overflow3.exe (PID: 368)
      • cmd.exe (PID: 6376)
      • notepad++.exe (PID: 5056)
    • Reads the computer name

      • TextInputHost.exe (PID: 6096)
    • Python executable

      • python.exe (PID: 2000)
      • python.exe (PID: 3108)
      • python.exe (PID: 6288)
      • python.exe (PID: 5064)
      • python.exe (PID: 3740)
      • python.exe (PID: 7060)
      • python.exe (PID: 3540)
    • Creates files or folders in the user directory

      • python.exe (PID: 2000)
      • WerFault.exe (PID: 1360)
      • WerFault.exe (PID: 432)
      • WerFault.exe (PID: 1924)
      • WerFault.exe (PID: 1416)
    • Reads the software policy settings

      • slui.exe (PID: 5260)
      • WerFault.exe (PID: 1360)
      • WerFault.exe (PID: 432)
      • WerFault.exe (PID: 1924)
      • WerFault.exe (PID: 1416)
    • Checks proxy server information

      • slui.exe (PID: 5260)
      • WerFault.exe (PID: 1360)
      • WerFault.exe (PID: 432)
      • WerFault.exe (PID: 1924)
      • WerFault.exe (PID: 1416)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0008
ZipCompression: Deflated
ZipModifyDate: 2025:07:21 17:31:50
ZipCRC: 0x4f94b716
ZipCompressedSize: 2390
ZipUncompressedSize: 9113
ZipFileName: buff_for_post_2.py
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
167
Monitored processes
23
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe overflow3.exe no specs conhost.exe no specs textinputhost.exe no specs slui.exe cmd.exe no specs conhost.exe no specs python.exe no specs python.exe no specs notepad++.exe python.exe no specs python.exe no specs overflow3.exe werfault.exe python.exe no specs overflow3.exe werfault.exe python.exe no specs overflow3.exe werfault.exe python.exe no specs overflow3.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
368"C:\Users\admin\Desktop\overflow3.exe" C:\Users\admin\Desktop\overflow3.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\overflow3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\desktop\libstdc++-6.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\desktop\libgcc_s_seh-1.dll
c:\users\admin\desktop\libwinpthread-1.dll
432C:\WINDOWS\system32\WerFault.exe -u -p 3860 -s 164C:\Windows\System32\WerFault.exe
overflow3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
1360C:\WINDOWS\system32\WerFault.exe -u -p 6992 -s 156C:\Windows\System32\WerFault.exe
overflow3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
1416C:\WINDOWS\system32\WerFault.exe -u -p 2028 -s 168C:\Windows\System32\WerFault.exe
overflow3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
1924C:\WINDOWS\system32\WerFault.exe -u -p 3636 -s 156C:\Windows\System32\WerFault.exe
overflow3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
2000pythonC:\Users\admin\AppData\Local\Programs\Python\Python314\python.execmd.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
MEDIUM
Description:
Python
Exit code:
0
Version:
3.14.0b1
Modules
Images
c:\users\admin\appdata\local\programs\python\python314\python.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\programs\python\python314\vcruntime140.dll
c:\users\admin\appdata\local\programs\python\python314\python314.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\version.dll
c:\windows\system32\rpcrt4.dll
2028C:/Users/admin/Desktop/overflow3.exeC:\Users\admin\Desktop\overflow3.exe
python.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225501
Modules
Images
c:\users\admin\desktop\overflow3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\desktop\libstdc++-6.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\desktop\libwinpthread-1.dll
c:\users\admin\desktop\libgcc_s_seh-1.dll
3108python buff_for_post_2.pyC:\Users\admin\AppData\Local\Programs\Python\Python314\python.execmd.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
MEDIUM
Description:
Python
Exit code:
1
Version:
3.14.0b1
Modules
Images
c:\users\admin\appdata\local\programs\python\python314\python.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\programs\python\python314\vcruntime140.dll
c:\users\admin\appdata\local\programs\python\python314\python314.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3540python buff_for_post_2.pyC:\Users\admin\AppData\Local\Programs\Python\Python314\python.execmd.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
MEDIUM
Description:
Python
Exit code:
0
Version:
3.14.0b1
Modules
Images
c:\users\admin\appdata\local\programs\python\python314\python.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\programs\python\python314\vcruntime140.dll
c:\users\admin\appdata\local\programs\python\python314\python314.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
3636C:/Users/admin/Desktop/overflow3.exeC:\Users\admin\Desktop\overflow3.exe
python.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225501
Modules
Images
c:\users\admin\desktop\overflow3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\desktop\libstdc++-6.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\desktop\libgcc_s_seh-1.dll
c:\users\admin\desktop\libwinpthread-1.dll
Total events
18 730
Read events
18 696
Write events
21
Delete events
13

Modification events

(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Microsoft.WindowsTerminalCanary_latest_x64.zip
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\innounp050.rar
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\lessmsi.zip
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\buff_for_post_2.zip
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(4352) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
8
Suspicious files
44
Text files
16
Unknown types
10

Dropped files

PID
Process
Filename
Type
4352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4352.8283\libgcc_s_seh-1.dllexecutable
MD5:06B05F2D35E1D0851387D6DA6B282E96
SHA256:34D768D97CA0CF5F6701DA069313038B315C6CDFFA5F987975C92163453551E9
4352WinRAR.exeC:\Users\admin\AppData\Local\Temp\buff_for_post_2\libstdc++-6.dllexecutable
MD5:A62E154AA5B69446CD31BAE1A0B4043E
SHA256:9EDEFCE2889BE24C986C376F3FFCFEF652A70C12885558668872FE8272E07069
2000python.exeC:\Users\admin\AppData\Local\Programs\Python\Python314\Lib\_pyrepl\__pycache__\commands.cpython-314.pyc.1415611593424binary
MD5:3D946600F8BC4C1D43609C19E489466E
SHA256:98F4FB80CB3AACFD6E1E3A0770D1CA3EB6CF0A9D2AC497FDA4948F7F5B997C42
4352WinRAR.exeC:\Users\admin\AppData\Local\Temp\buff_for_post_2\libgcc_s_seh-1.dllexecutable
MD5:06B05F2D35E1D0851387D6DA6B282E96
SHA256:34D768D97CA0CF5F6701DA069313038B315C6CDFFA5F987975C92163453551E9
2000python.exeC:\Users\admin\AppData\Local\Programs\Python\Python314\Lib\_pyrepl\__pycache__\trace.cpython-314.pycbinary
MD5:288247AB1FFBF4B5B3336092552526A9
SHA256:2E1F6AA94230F955F13FBC097F35CEECA67AE0FDEF792B6930098ADC5C2C5CCD
4352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4352.8283\buff_for_post_2.pytext
MD5:52134A18719439634459990FF4BFFB71
SHA256:A7BAA54485D04C2EAB2C7733FBE2866FBCF7760C486CB5102CAC729BC87442BE
4352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4352.8283\libstdc++-6.dllexecutable
MD5:A62E154AA5B69446CD31BAE1A0B4043E
SHA256:9EDEFCE2889BE24C986C376F3FFCFEF652A70C12885558668872FE8272E07069
2000python.exeC:\Users\admin\AppData\Local\Programs\Python\Python314\Lib\_pyrepl\__pycache__\__init__.cpython-314.pyc.1415611583488binary
MD5:D257BFA8BE162615217F9AE5946F6BFC
SHA256:20B59C75AAA0C39D1B03163F1885BAE98B8099435DFFF7FE73F9317CAAA278E0
4352WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4352.8283\overflow3.exeexecutable
MD5:01ADB253FCCC5EA236AF07086C9D2BA9
SHA256:C50E4B2628F561605DF0A2B82E2A81EFA720F89C69C15BC0E0A9F6CCEA3FB6C3
2000python.exeC:\Users\admin\AppData\Local\Programs\Python\Python314\Lib\__pycache__\rlcompleter.cpython-314.pycbinary
MD5:8E2DA7EE6A418CCD2AA8C42D852ABFDE
SHA256:03B499BC85A09A04BF6BAB9D8FBF38989338035BC00C91083151E7B2A4AEC7B0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
53
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7072
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6284
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6284
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3556
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3556
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5332
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5332
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
2936
svchost.exe
GET
200
72.246.169.163:80
http://x1.c.lencr.org/
unknown
whitelisted
1360
WerFault.exe
GET
200
23.55.110.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1360
WerFault.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6284
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4664
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
564
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5332
SearchApp.exe
92.123.104.32:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
7072
svchost.exe
40.126.31.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7072
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
6284
svchost.exe
20.44.239.154:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
2788
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.44.239.154
whitelisted
www.bing.com
  • 92.123.104.32
  • 92.123.104.34
  • 2.16.241.218
  • 2.16.241.201
whitelisted
google.com
  • 172.217.18.14
whitelisted
login.live.com
  • 40.126.31.0
  • 40.126.31.128
  • 20.190.159.23
  • 20.190.159.131
  • 40.126.31.69
  • 20.190.159.73
  • 40.126.31.131
  • 40.126.31.3
  • 20.190.160.5
  • 20.190.160.132
  • 20.190.160.67
  • 40.126.32.68
  • 20.190.160.128
  • 40.126.32.138
  • 20.190.160.65
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.14
  • 23.55.110.193
  • 23.55.110.211
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 74.178.76.128
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: error while getting certificate informations
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe