File name:

yt-dlp.exe

Full analysis: https://app.any.run/tasks/94801634-2beb-49c0-a52b-b3288d76b81f
Verdict: Malicious activity
Analysis date: March 21, 2025, 16:39:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
pyinstaller
crypto-regex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 11 sections
MD5:

E6BC2DDF35144E539018AF3F9CEBF8B9

SHA1:

95C2EDBF02EE93A13BE839636E3DDA89D781EAE5

SHA256:

F019E18F367037B7DB10DE4D6ABBFC483AC045A34F70A6ACF36801E81B4739E2

SSDEEP:

196608:Tw8/n7/qAgy9j54sYCZ3pIwfg499UMqP7dscEBk:MI+Mj9bISg4fqP75EO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • yt-dlp.exe (PID: 7748)
    • Application launched itself

      • yt-dlp.exe (PID: 7748)
    • Process drops python dynamic module

      • yt-dlp.exe (PID: 7748)
    • Executable content was dropped or overwritten

      • yt-dlp.exe (PID: 7748)
    • The process drops C-runtime libraries

      • yt-dlp.exe (PID: 7748)
    • Starts CMD.EXE for commands execution

      • yt-dlp.exe (PID: 7884)
    • Found regular expressions for crypto-addresses (YARA)

      • yt-dlp.exe (PID: 7884)
    • Loads Python modules

      • yt-dlp.exe (PID: 7884)
  • INFO

    • Reads the computer name

      • yt-dlp.exe (PID: 7748)
    • The sample compiled with english language support

      • yt-dlp.exe (PID: 7748)
    • Create files in a temporary directory

      • yt-dlp.exe (PID: 7748)
    • Checks supported languages

      • yt-dlp.exe (PID: 7884)
      • yt-dlp.exe (PID: 7748)
    • Reads the software policy settings

      • slui.exe (PID: 1056)
    • Reads the machine GUID from the registry

      • yt-dlp.exe (PID: 7884)
    • Checks operating system version

      • yt-dlp.exe (PID: 7884)
    • PyInstaller has been detected (YARA)

      • yt-dlp.exe (PID: 7748)
      • yt-dlp.exe (PID: 7884)
    • Checks proxy server information

      • slui.exe (PID: 1056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:02:19 02:43:54+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.43
CodeSize: 91136
InitializedDataSize: 179712
UninitializedDataSize: 16384
EntryPoint: 0x13e0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
FileVersionNumber: 2025.2.19.0
ProductVersionNumber: 2025.2.19.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: yt-dlp Command Line Interface
CompanyName: https://github.com/yt-dlp
FileDescription: yt-dlp
FileVersion: 2025.02.19
InternalName: yt-dlp
LegalCopyright: pukkandan.ytdlp@gmail.com | UNLICENSE
OriginalFileName: yt-dlp.exe
ProductName: yt-dlp
ProductVersion: 2025.02.19 on Python 3.10.11
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start yt-dlp.exe conhost.exe no specs yt-dlp.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1056C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7748"C:\Users\admin\AppData\Local\Temp\yt-dlp.exe" C:\Users\admin\AppData\Local\Temp\yt-dlp.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\yt-dlp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7756\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeyt-dlp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7884"C:\Users\admin\AppData\Local\Temp\yt-dlp.exe" C:\Users\admin\AppData\Local\Temp\yt-dlp.exeyt-dlp.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\yt-dlp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7984C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeyt-dlp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
8004C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeyt-dlp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
8092C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exeyt-dlp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
Total events
738
Read events
738
Write events
0
Delete events
0

Modification events

No data
Executable files
116
Suspicious files
1
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_raw_cast.pydexecutable
MD5:AC98B10064264B49DE13F66E60CD47B5
SHA256:8621AC7A3E09367BB0C529FDD3D178F20EDFA193FE0D19A02DE424A6BBA45229
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_raw_aesni.pydexecutable
MD5:973F11DE023C9337F35F9BB55C6154A6
SHA256:483758336267F8842F5432BB83300EA0FCB49C4E0B29962CBD7F27B1C3DFC56A
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_ARC4.pydexecutable
MD5:F3A0DEF1BA9F7CF5DA771F5E7C29CA3F
SHA256:362C42BD62E5751E9B647BD575D483CC510DC862AB6098E6893EDCF3F44A567E
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_chacha20.pydexecutable
MD5:0BE007DD183DAF0F4B65E73CF19EA139
SHA256:F6308DACB781C99D3B962451FC681973808792936690AF6AA7FA5B6DF40F4EAF
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_Salsa20.pydexecutable
MD5:2CE3043D6FBD62BCBE6948A1E6A789F0
SHA256:C5A4AC8202A0211163938B6306E3A678CC461ED8E283F4C4601748D2E50783A3
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_raw_aes.pydexecutable
MD5:E306365BDC8D15B2F477E5AF252D0B59
SHA256:2DCAC73EA3240A008D115BAC0EA4D7C65C8162676AB30BCAF7527C22B98B4929
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_raw_arc2.pydexecutable
MD5:31F8353B80EA438AA705A7986DF24ED3
SHA256:89A51C145166DD24CF83D358ADE292B23F20B94BE783D5FE33A9DA2D7F2C14EB
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_raw_ctr.pydexecutable
MD5:F3CFD044825E9C08CE37A8034E2ED786
SHA256:BCBE37F565B91A127E40634DB8E7E1B8B1CE3E1344F3FA082496B93D75435B80
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_raw_blowfish.pydexecutable
MD5:F86637FA9E2246C36B6FFB90CA83E66C
SHA256:933330BD2D55DE985B45BDD12B99291B4507C830CD6CC9E917CEDD1E49E878EC
7748yt-dlp.exeC:\Users\admin\AppData\Local\Temp\_MEI77482\Cryptodome\Cipher\_raw_eksblowfish.pydexecutable
MD5:257E449799177D7F43EB1B8ED6180C1C
SHA256:8425C2E412045DA204419B41D80D6538636F13FD187F7F8A259F29F5380A2536
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7832
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7556
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7556
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3768
RUXIMICS.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7832
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7832
backgroundTaskHost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
login.live.com
  • 20.190.160.64
  • 20.190.160.128
  • 40.126.32.136
  • 20.190.160.2
  • 40.126.32.76
  • 40.126.32.140
  • 20.190.160.130
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info