Exterminate It! Antimalware

malpedia

Known threats:6,231,321 Last Update:October 24, 17:16

Testimonials

Hey Matt,

It worked! You guys are INCREDIBLE!! I cannot thank you enough. Best money I ever spent on a piece of software. My entire LIFE was on my PC and if it wasn't for Exterminate It! and the help from you, well to be blunt, I would of just been screwed! I pray that you guys will keep doin what your doin. This is not the first time I've had trouble with my pc and am sure it wont be my last. Every time I've ended up reformatting and losing everything, BUT NOT THIS TIME!! WOOHOO!! I will tell EVERYONE about your software and will be a customer for life!

THANK YOU AGAIN!!!

Erik R.

File: belt.ini

Location of belt.ini and Associated Malware

Check whether belt.ini is present in the following locations:

belt.ini file locations that are Windows version independent:

  • C:\Windows\belt.ini

Windows 2000, Windows XP, Windows Server 2003 specific belt.ini file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Temp\Belt.ini

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific belt.ini file locations:

  • C:\Users\USER_NAME\AppData\Local\Temp\Belt.ini

If you find belt.ini file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The belt.ini file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of belt.ini File^

File SizeFile Md5Last Seen
40159C9CC98A00A28111DFBE7D06BDB073DMay 18, 2010
4016C04AB2CB3994A3DD6D2E173ECEA066AJun 6, 2010
4004C571618F82AE5E3060B52C6E2586C23Jun 9, 2010
400C1C16E61351D110C538D375439E57762Jun 9, 2010
400EBE1D57ED2155C35387D61D989E0957EJun 16, 2010
400EA120831D3131832963FA690BCA9686BJun 19, 2010
40024BCA147399CE5804A410D7F695A11F5Jun 24, 2010
401EB28FAEE11871123EAE664CC280342C4Jun 27, 2010
399AC5C53FF19A089E17CB6EFD781BEF1CBJul 27, 2010
4006ED9A48F22A0C6D714A66CB9039C3DABJul 31, 2010
400064CB63AE5608238AAA2B8AB3D383312Aug 8, 2010
399F251549E5A7BA41EF284C5015C64FF71Aug 10, 2010
4004407FE514A4574BC71C4254AB5ED3B1FAug 15, 2010
40030E0EA68EB021A5E294AE17EFA3818EFSep 3, 2010
39943EBE921052200671E525A7C3FC7DF3ASep 4, 2010
400BE15A41684B08B97BD5DEA800AF7994ESep 16, 2010
315E959AC44B20F1AEA7D255073E673C6ADOct 1, 2010
4003BA233772D3CD369EF1FDFE1302E89B0Oct 13, 2010
3995F3D99D6069653188660E0BA3A6F35AAOct 16, 2010
39904ECD3AF2068D03BE30878FC935511EENov 1, 2010
40126C0AF186E615EA12A56254415E05645Nov 4, 2010
400E7A13D7B6FAF11F2FAAC4F64F06DB908Nov 12, 2010
400C3F616207F4DE23389407B45EDCD6609Nov 30, 2010
400DF589BBC517B0EE803C72215F0652196Dec 11, 2010
400523692F14DAA4B90B491753E80295696Dec 20, 2010
360FB5E38BB56BD6DE218AB145062B5E69DFeb 14, 2011
3994BA5EB208C0CE15EDDEF50DB52E9FB9FFeb 15, 2011
31579EE3400FEAF22B4292F6ABB445B1584Feb 27, 2011
2191606ECC830751FC6340C8AF358E72244Jun 10, 2011
3154EEE84E72831BD6433A8291BA0FEB9BFMar 21, 2011
399FB6620E983845557701DC1A88CB49762Apr 12, 2011
3996E2BD596929650921FA2F778144D4F24Apr 13, 2011
400475E1E01C8A3779A578B7648C8A2176BApr 19, 2011
399DD48A18B1A095B4A9FADD327FA8E8C41Apr 30, 2011
3999C62C3EA31D326A2E7C738EB57A75B19Jun 10, 2011
3999D91D5C6CC0250234293DE04599955E8Nov 23, 2011
399548A5CDEE15D0D90D136338311D04E92Feb 2, 2012
31513DFA29CE23CA823C3E6E51667CAF738Feb 7, 2012
39911FA1CD8180DAA6E85DF4C54D7E65BE1Jul 10, 2012
399762AAA9B5CAC664A4D8D85DC638EC1D3Jun 29, 2013
3987D4E0872FD16F4191C20C9ECC4421E4AJan 7, 2010
399DCE5A3D7280FCEADF29F8B0D4B5EF06EJan 7, 2010
398BEB32512C9E0BE9E633EDF5C88FA394BJan 9, 2010
4012926ECA20A8621FBA18EC6F430741E91Jan 18, 2010
399B570DAD78C2BF7726C0792D5FD4BE429Feb 11, 2010
400E41987ED0BB100537C3D7FF11F0D4DFCFeb 14, 2010
401C90C2AB467538A7E0097EAF159C14077Mar 8, 2010
40069222FA0827F7CB8AF2F7B1B5CB629E0Mar 10, 2010
40189CD7057CAC9534BAE193D66073EFE8EMar 30, 2010
4019959451F61A28856712FBDFDB02705F3Apr 25, 2010
400C59A168E9A76C0387EFB2ADA5865C174May 3, 2010

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove belt.ini^

  1. To enable deleting the belt.ini file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select belt.ini and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of belt.ini and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of belt.ini and Associated Malware.
  6. Notes:

    • The deletion of belt.ini will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of belt.ini will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a belt.ini malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type belt.ini. The name of the first found registry value referencing belt.ini is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to belt.ini, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of belt.ini and Associated Malware.