How to remove yt-dlp_x86.exe

yt-dlp_x86.exe

The module yt-dlp_x86.exe has been detected as General Threat

yt-dlp_x86.exe

yt-dlp_x86.exe is a Windows file recorded in the ThreatInfo database. It is associated with yt-dlp_x86. The reported company name is https://github.com/yt-dlp. The current detection status is General Threat, based on the latest analysis from 2023-04-30 23:41:19 (3 years ago).

If yt-dlp_x86.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as General Threat.

Product Name: yt-dlp_x86
Company Name: https://github.com/yt-dlp
MD5: 4e3769c9c31cd21b58ef4e684a33285f
Size: 10 MB
First Published: 2022-09-28 23:07:03 (3 years ago)
Latest Published: 2023-04-30 23:41:19 (3 years ago)
Status: General Threat (on last analysis)
Analysis Date: 2023-04-30 23:41:19 (3 years ago)
%programfiles%\allavsoft
%localappdata%\centbrowser\user data
%programfiles%\allavsoft

ThreatInfo has observed yt-dlp_x86.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

33.3%
33.3%
33.3%

The strongest geographic signal for this file is Brazil with 33.3% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 66.7%
Windows 7 33.3%

The most common operating system signal for yt-dlp_x86.exe is Windows 10 with 66.7% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

yt-dlp_x86.exe is identified as pe for 32 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x000014c0

PE Sections:

Name Size of data MD5
.text 87552 6f1e99ca0818653e96af60ad03c4817a
.data 512 3000c1847fbc76ebda748a13af7ec89f
.rdata 24064 083d77cbfdaebbc09ab4c6424126ac7b
/4 15872 7fe64f2e8d8a1202c54f3a23a33ee5e3
.bss 0 d41d8cd98f00b204e9800998ecf8427e
.idata 3584 c6ccdc33f1126dd228be0707dcf4386f
.CRT 512 1662c81795ccd5dcdc27ef29dd2aa9e9
.tls 512 bf619eac0cdf3f68d496ea9344137e8b
.rsrc 44032 febb7dda22f8bbf59037af96af5877bf
.reloc 3584 d94a372f0ccbfba1cc4ffc130929f4e3

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information:

Download GridinSoft Anti-Malware - Removal tool for yt-dlp_x86.exe