| File name: | yt-dlp.exe |
| Full analysis: | https://app.any.run/tasks/78e00a29-259f-4db6-ae1b-95582f7c9502 |
| Verdict: | Malicious activity |
| Analysis date: | July 14, 2024, 05:43:47 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows |
| MD5: | 6B7779A473CEF0FE7E5C757DA49B0EDB |
| SHA1: | 926351B36890E4D55AE64A8ED96A41D1499CA8CF |
| SHA256: | 8AFEC9F5366DA9035EC78FCCA25A42926E4675D0C6459C252EC63A3BE04CF6F1 |
| SSDEEP: | 196608:ten5+zylgy9j54iEkaAPmfadLvVEUJyl421pM:mEUj39tPmELvVEUkM |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:07:09 01:53:06+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Large address aware, No debug |
| PEType: | PE32+ |
| LinkerVersion: | 2.42 |
| CodeSize: | 90112 |
| InitializedDataSize: | 179200 |
| UninitializedDataSize: | 8192 |
| EntryPoint: | 0x13f0 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 2024.7.9.0 |
| ProductVersionNumber: | 2024.7.9.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| Comments: | yt-dlp Command Line Interface |
| CompanyName: | https://github.com/yt-dlp |
| FileDescription: | yt-dlp |
| FileVersion: | 2024.07.09 |
| InternalName: | yt-dlp |
| LegalCopyright: | pukkandan.ytdlp@gmail.com | UNLICENSE |
| OriginalFileName: | yt-dlp.exe |
| ProductName: | yt-dlp |
| ProductVersion: | 2024.07.09 on Python 3.8.10 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1292 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\System32\cmd.exe | — | yt-dlp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1644 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\System32\cmd.exe | — | yt-dlp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2848 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\System32\cmd.exe | — | yt-dlp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3628 | "C:\Users\admin\Desktop\yt-dlp.exe" | C:\Users\admin\Desktop\yt-dlp.exe | yt-dlp.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 5584 | "C:\Users\admin\Desktop\yt-dlp.exe" | C:\Users\admin\Desktop\yt-dlp.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 5652 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | yt-dlp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_Salsa20.pyd | executable | |
MD5:14A20ED2868F5B3D7DCFEF9363CB1F32 | SHA256:A072631CD1757D5147B5E403D6A96EF94217568D1DC1AE5C67A1892FBF61409E | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_ARC4.pyd | executable | |
MD5:85F144F57905F68ECBF14552BAB2F070 | SHA256:28696C8881D9C9272DE4E54ABE6760CD4C6CB22AD7E3FEABAF6FF313EC9A9EAF | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_aesni.pyd | executable | |
MD5:A914F3D22DA22F099CB0FBFBBB75DDBF | SHA256:4B4DBF841EC939EF9CC4B4F1B1BA436941A3F2AF2F4E34F82C568DFC09BA0358 | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_ocb.pyd | executable | |
MD5:D5DB7192A65D096433F5F3608E5AD922 | SHA256:FAB286E26160820167D427A4AAB14BE4C23883C543E2B0C353F931C89CEA3638 | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_arc2.pyd | executable | |
MD5:9F1A2A9D731E7755EE93C82C91FA5FE2 | SHA256:17F3EAF463868B015583BD611BE5251E36AAB616522FF4072011B3D72F6F552F | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_cbc.pyd | executable | |
MD5:6840F030DF557B08363C3E96F5DF3387 | SHA256:B7160ED222D56925E5B2E247F0070D5D997701E8E239EC7F80BCE21D14FA5816 | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_cfb.pyd | executable | |
MD5:7256877DD2B76D8C6D6910808222ACD8 | SHA256:DBF703293CFF0446DFD15BBAEDA52FB044F56A353DDA3BECA9AADD8A959C5798 | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_ctr.pyd | executable | |
MD5:B063D73E5AA501060C303CAFBC72DAD3 | SHA256:98BACA99834DE65FC29EFA930CD9DBA8DA233B4CFDFC4AB792E1871649B2FE5C | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_eksblowfish.pyd | executable | |
MD5:E7826C066423284539BD1F1E99BA0CC6 | SHA256:0E18B7C2686BB954A8EE310DD5FDB76D00AC078A12D883028BFFC336E8606DA2 | |||
| 5584 | yt-dlp.exe | C:\Users\admin\AppData\Local\Temp\_MEI55842\Cryptodome\Cipher\_raw_des3.pyd | executable | |
MD5:BA5BA714AEBFD8130EB6E0983FBAE20B | SHA256:861167DFEB390261E538D635EAD213E81C1166D8D85A496774FBF2EBFF5A4332 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2060 | svchost.exe | GET | 200 | 23.216.77.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3828 | RUXIMICS.exe | GET | 200 | 23.216.77.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
444 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
444 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.189.173.12:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | binary | 9 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2060 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3828 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
444 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3828 | RUXIMICS.exe | 23.216.77.19:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
2060 | svchost.exe | 23.216.77.19:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
444 | MoUsoCoreWorker.exe | 23.216.77.19:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
444 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |