Exterminate It! Antimalware

malpedia

Known threats:6,772,762 Last Update:December 19, 09:37

Testimonials

Matt,

Thanks so much for your help. For now, this seemed to have solved the problem and found all the infected files. I'll keep you updated, as I know this virus can be very hard to kill.

Thanks a million.

Jason

File: dsfsds.bat

Location of dsfsds.bat and Associated Malware

Check whether dsfsds.bat is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific dsfsds.bat file locations:

  • C:\Documents And Settings\USER_NAME\Application Data\dsfsds.bat

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific dsfsds.bat file locations:

  • C:\Users\USER_NAME\AppData\Roaming\dsfsds.bat

If you find dsfsds.bat file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The dsfsds.bat file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of dsfsds.bat File^

File SizeFile Md5Last Seen
168D7DFFE46E78FBA1FE87A7A14BB1B2CE4Oct 14, 2010
14050F8E431DB5CF122F3F1588250000DFAOct 14, 2010
154A82AD8899AB0EB6F20540C84AE7CE18COct 14, 2010
160FB03ACF835D4D6BD1868A8DF801CE9DEOct 14, 2010
142D925F5279FA579EFAA1F05BE99B57F76Oct 14, 2010
15946F24E4C2EF980240A7F2C481B43B338Oct 15, 2010
201255823BBCE3C580C06D374E601C132DFOct 16, 2010
26742E958601D898FB6F1C484A225DEEAF5Oct 16, 2010
166337F351DDE09E0791076E77C44033B80Oct 16, 2010
129C50440CD268505F463070559BE57BC52Oct 17, 2010
2632D0BE3BC751661BEE0941B72A96EEF0COct 17, 2010
2867E04A5D29644C49DBD51382DA5F441BAOct 17, 2010
146B56EBFF60B297BABDF63A1717379AB56Oct 18, 2010
140BDDF3A5F76CD163F230A91A92C5A36B4Oct 19, 2010
142A1BBD9E606A68A12447AA4E8040EB856Oct 19, 2010
1104B14C32B203BB9001B7582A909A8AFD2Oct 19, 2010
1643FA78071DA2F42002AEA014FE84D5F33Oct 20, 2010
1345AE6D588752F8EC4B95B2EBF41D5B643Oct 20, 2010
145E97D882168AA0309E49CDED1B824512BOct 21, 2010
170895C277EA6164FC73FA7A78E5D95CB47Oct 21, 2010
146F4AD771B0DE9FF9517BBB4A45FBA7493Oct 21, 2010
164760E4697553909A73C7EA0CC6B28B780Oct 24, 2010
1661266047C4ABCA7D5065913E9F587159DOct 25, 2010
164EEC7B4925F1F8FECB5DD9AF442F68C54Oct 25, 2010
2698B39D8D3D70B7E5FD344911C736747EBNov 1, 2010
162B6B361A547DFA1E04D94CCFD051F105ANov 7, 2010
30427796B8A88DB675CF636C8E78E4081ADNov 8, 2010
16236DB8E8BDA3327A7D55531D04A59754ENov 12, 2010
143D3187CB8E349E85B880DFA4E4F164778Nov 13, 2010
176598205BA848868FDFEC9E0C49E86FC65Nov 18, 2010
172E49258233C386BC63AAEAF87D9F52E76Dec 1, 2010
262201A66B023C05A0A5DFD0CA860FA0A28Dec 1, 2010
173971713DA74FBAFCF00F3DE55746D6B45Dec 15, 2010
162C03C9845882232A3ADC7280A4A9A0AA6Dec 22, 2010
1764A6A76A0BA0C370BD4C2D4A07802A597Jan 1, 2011
3285CA2A7DADB2654D3C15C87E028A4242EJan 6, 2011
286DD4DC87507943602FB62589B91650933Jan 10, 2011
14242530720591BD632A94180F6A7E4F0C2Jan 22, 2011
3080F25856D34198EC23B076F4522116A76Jan 23, 2011
170B885367B8E4CBF35F428CD1B5882E476Jan 24, 2011
162B5369D09436BF4A1DDF6AD34884A3324Jan 27, 2011
145C63D7A0FA6482BB6782DA6FE3F2DBF57Feb 7, 2011
152616BCE8E5202FD8AA79435E453CD11A9Feb 15, 2011
27481019AB3104A609AC613518D8E030BB9Feb 18, 2011
1597E51BE4B45B0693105CF89A88EF6C591Mar 4, 2011
168376D1869EDC5064FBA5EB047BE4952BDMar 29, 2011
163C7748DE0E7A034DFF49A7ABE7A4AF1B5May 1, 2011
1510984C53EDE2DF19327FD17226E3BD23BMay 6, 2011
14885B8E5DD16F3584D9BC415AECF566338May 14, 2011
261E8D9F20A90B4345CCDD08B955C3E6BCAJun 11, 2011
145C3315C2714C3E5DF4A47279449CC99C5Jun 12, 2011
1560AD2AFD5C67123C6CA4C2D8B8862BB36Nov 1, 2011
174DBE33F5721325C95856392492A6EF811Dec 17, 2011
31817BCFFD4A3330341B69C981ED51C9401Jan 7, 2012
1385C97486FBEA80A24F213965E3C30DC61Feb 2, 2012
164B5F81EADADA44D2ABC63577881B61109Feb 18, 2012
16680A511BA2C14CB6AE7641AA9B19D88A9May 3, 2012
16640C26574E26CFEEBBFAE5B74DE1EC627Jul 12, 2012
155D9062A1F73A38D5500DA369A95CD0F51Aug 30, 2012
14045057A2C87A09361D7AE128AD1011AEADec 31, 2012
3009B10B49E4FD33C0A9501F34E6B1B5D51Jan 14, 2013
166C4B0FB7755B7D6398336523A3BBBC707Mar 18, 2013
148DAD689E47CE25BBDFBA8C3A692F91C71Oct 1, 2013
1686F0E8F9CE0A1F8C8767AF084833DA7F6Nov 29, 2013

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove dsfsds.bat^

  1. To enable deleting the dsfsds.bat file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select dsfsds.bat and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of dsfsds.bat and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of dsfsds.bat and Associated Malware.
  6. Notes:

    • The deletion of dsfsds.bat will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of dsfsds.bat will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a dsfsds.bat malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type dsfsds.bat. The name of the first found registry value referencing dsfsds.bat is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to dsfsds.bat, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of dsfsds.bat and Associated Malware.