Exterminate It! Antimalware

malpedia

Known threats:6,393,916 Last Update:November 21, 14:34

Testimonials

A lot of the smart viruses and Trojan horses today try really hard and prevent you form going to the main anti-virus and cleanup sort of product including microsoft own tools. They actually block your access to those sites.

A couple of weeks ago my wife's laptop got totally infected (she must be browsing porn) and I ended up finding a little known program that did most of the clean up and then followed up with Microsoft tools that are available on their site and successfully cleaned everything with the exception of one item i had to get rid of manually.

Name of the product is Exterminate it. Worked pretty well.

Source

Spoonshadows

File: asdsada.bat

Location of asdsada.bat and Associated Malware

Check whether asdsada.bat is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific asdsada.bat file locations:

  • C:\Documents And Settings\USER_NAME\Application Data\asdsada.bat

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific asdsada.bat file locations:

  • C:\Users\USER_NAME\AppData\Roaming\asdsada.bat

If you find asdsada.bat file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The asdsada.bat file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of asdsada.bat File^

File SizeFile Md5Last Seen
1656AAC7299FF2FEBD9B9E49DE3B11A9AE0Oct 12, 2010
167F5DAB7347406A7C4F5520CF751CC4A2AOct 12, 2010
161B1C60BBC0D165CECB716956C82BB5D8AOct 12, 2010
1579DE44C96D4CE20521385C738B48796D5Oct 12, 2010
171B350F2A33263B8D0E03010E52F2FFFE2Oct 12, 2010
263F850EAE652138162E124479CB0F6961BOct 14, 2010
27341373591F67160E36825809EBAC76490Oct 14, 2010
1597468817FBF70DB959D8FEC110A511F52Oct 14, 2010
137D7E8E757C79F39BDBDB209196BBEFFF8Oct 14, 2010
1559977639653F12216A033CDB1470C386EOct 14, 2010
153D35972F584928AA3B78F77F5796F7223Oct 16, 2010
139C2E6D20C562CED214A65F9B78A96FEE7Oct 17, 2010
15113C87F886790AE3C49E78305BD33F6A3Oct 18, 2010
149DB8728E3EF848E0F376638B6DCA539A1Oct 18, 2010
2555AAE1B19D4B57B6BA3FCEC2FFC8100CAOct 19, 2010
1272D1DF4C3EE0CD78FD445118D9F1ED96DOct 19, 2010
16386E60DD6124FE3E8B16B7B7DB50D5CAEOct 21, 2010
3072A36BC1C7928A04D907B37AA0D3D91E7Oct 22, 2010
2398ED86F61AB8DAFED4D5B3AC56C4E82D9Oct 22, 2010
2096C4CF1D7A17B545A1E30A71892FC1BC3Oct 22, 2010
271C748045A2BDCD2D1750A44E44C51FFE6Oct 22, 2010
157A886C113426351A3FB7B551FD58D146AOct 26, 2010
16542785261D4C24E16C8100618DF31B805Oct 29, 2010
131F0994FA1B7203C3151ED18FD72CC51D9Oct 30, 2010
265BF3BA444DCC97663F8DF942F9997138DOct 31, 2010
26102DE4DDD7039EF28932BFB53FB66C718Nov 1, 2010
131640A24FDCF7A019CD4E323ACC9E7EDA3Nov 3, 2010
135C8C1343450FC5A234CD5A9C90C9FBC74Nov 3, 2010
2852CBBEEA8FF1B40AC799E8915F9413E21Nov 4, 2010
279C207F8456B9BE345B8BE7AEB6B4A357DNov 9, 2010
2735ADC46B9C24F1DCB4C3E0610E41AEBE7Nov 9, 2010
277B66CBB4CDBDE88852E47FD854F56858BNov 11, 2010
18774600757236D6B344B2E6218E0835A3ANov 11, 2010
135726090FC03331E1E7C5DF91ED808EB27Nov 15, 2010
261AEA6356827D320E5DB9D4EB30BD33CBENov 17, 2010
1412598F43BD41D5B6158EA700033C507D1Nov 17, 2010
13579450E0ADAC996D8A9D3398EB67469EDNov 20, 2010
165A448ADA4BFC94A6A57CA1D2DFD2C56F0Nov 22, 2010
1613F4DD77F39A283819CF22C428532B693Nov 26, 2010
133AAF6B67C7188C4608135A25E5C89DC27Dec 1, 2010
30125E10F63559692186AC2C97341ADF01BDec 2, 2010
16526C72A1B951C56C8982C66054F5BB480Dec 3, 2010
137DF923BF4ACD03A7279992FA717982501Dec 8, 2010
16341328F9DD0EC65A7036A9E5906AF65B1Dec 9, 2010
1591BCE583B198D2EAD8F2161EFB8467DBCDec 12, 2010
281460DF2C7D4378086F1188BA443BBB8A9Dec 12, 2010
15570C2875BC087DE296500101B8627E1DADec 14, 2010
263DDCDADCA7D40A19AC69BE8DD8E183BAADec 15, 2010
265E00DE94A9BD2FD0E13A409107F1BA46CDec 28, 2010
157DDED22283607242F1DD03FFDDFCCCD0CJan 10, 2011
1371135E286FB5224EF530F4CE0EC4A2835Jan 10, 2011
139437672AF6D47E9332886738ADE1C89E6Jan 13, 2011
16186A01EDB412CC4B58777BC111EC63044Jan 15, 2011
275838C2501E57240CCBE9F5DEA1F3179A6Jan 20, 2011
135D06429756F52CE704F32AB6B30E6CEE3Feb 1, 2011
115CB65F711FBFD20A2507100A4A567DD2DFeb 7, 2011
14553ECAAE8BF51997905F1DF0B0C71712DFeb 13, 2011
13775444748033E5A44F5C93FC42E11964BFeb 15, 2011
137530F5019A0DDCA2934760D3F61DBDF52Feb 22, 2011
155588C83A676241CFBFD32460192DA1F2CFeb 27, 2011
147ABFE4B04BB5F52BDC4191FA4B37FF90CMar 20, 2011
2574ED3D9B85C49C3F8091650E06D9A0488Apr 4, 2011
26510B324056B19DA9113FBCF3824DBC757Apr 11, 2011
1554179C97FA8EA20AB957FC3F288967226Apr 19, 2011
141EB6EF00E7A71062682E07233ED436E3EApr 21, 2011
161D016C0D2AE58458AC5B0D9BD01BBF694Apr 22, 2011
127B941EA941533BA0C96090E7839D50149May 1, 2011
273D8F69D99E9E8A7BEBC817DD295BD20D5May 29, 2011
275088782209572019C39132976D7858304May 31, 2011
267D1EE3EDF7E79099BC3AF0BE36F3CAE27Jun 17, 2011
2952F86AFF06B9EA60EE3D3DA8ACB7720A7Jun 23, 2011
343A72485F328B44CD6939CE37F1DF17F14Aug 10, 2011
169531759B5134E2B7A121BB9627B76686FAug 31, 2011
13172D8C72AD4E33E519BDEBB8EDA2E7867Sep 10, 2011
2634B24FAD7366A96BF07701DA3176AE15DOct 18, 2011
1671E7108E3186AED980D1BD64521B7A3A8Oct 26, 2011
1378A8B5D691CB0C5F962FC65D6101F5F2FOct 27, 2011
269B595B2F27392805647519F9C1337E336Oct 27, 2011
133CAD6EF4F603414B5FA70EC19BA893043Nov 10, 2011
1639CABA71413FA047379021EB7DEEAF1FFNov 23, 2011
133C402B94D912C56C7A7CB181951E0077BNov 28, 2011
129EFB7C3899E40EF312E021365ED899120Dec 6, 2011
327BDEB4197FD54D2146B38B399F281431DJan 9, 2012
1573A24A2F90A88AFA3B74F738F9D5DF95BJan 30, 2012
2650B8E19B8FFDA1679560EBCE7201F2B93Feb 6, 2012
1670A41A5CAE94BAA2B36E6845BF4FD821BMar 9, 2012
279E990E6E4C683596C37D03BEFC031535AMar 19, 2012
2834C1254FDA385CA357FC48995F61A3EB4Mar 29, 2012
163229EBEA3A89C4AC9975D4DA1FC3C8B01Apr 9, 2012
271739497D70DB1DED52EBB3DD4D9CD4543Apr 21, 2012
161890A3C56A009FA651CA9E3B74AB13E6FMay 3, 2012
267A644748E128957B9EB140E38EA441AB2Aug 6, 2012
13346AA51DB8799B12BDE5F0D1615FC3439Sep 5, 2012
289E3031B952AED8BA49C62650C06DAF9C6Sep 26, 2012
26755DDEB6D0D06E4EE2477967B485A5FDEOct 8, 2012
285AC0F0F0960FDC6D5FBB4EBA0D988A7AAApr 2, 2013
1336177D7C3C6F04AFA4410D4CBD82EE4FAMay 6, 2013
15965BCA9C1EA20E80233AC2FAC79D1E036Dec 20, 2013

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove asdsada.bat^

  1. To enable deleting the asdsada.bat file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select asdsada.bat and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of asdsada.bat and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of asdsada.bat and Associated Malware.
  6. Notes:

    • The deletion of asdsada.bat will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of asdsada.bat will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a asdsada.bat malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type asdsada.bat. The name of the first found registry value referencing asdsada.bat is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to asdsada.bat, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of asdsada.bat and Associated Malware.