Exterminate It! Antimalware


Known threats:646,014 Last Update:September 20, 08:14


Hello, I wanted to say thanks for the time you guys spent on getting that Vundo trojan off my computer.

Thanks again, I am highly recommending your software to friends and partners because of the extra effort I know you went to.

Michael M.

File: log.txt

Location of log.txt and Associated Malware

Check whether log.txt is present in the following locations:

log.txt file locations that are Windows version independent:

  • C:\Windows\System32\log.txt

Windows 2000, Windows XP, Windows Server 2003 specific log.txt file locations:

  • C:\Documents And Settings\USER_NAME\Desktop\log.txt
  • C:\Documents And Settings\USER_NAME\Application Data\NetMon\log.txt
  • C:\Documents And Settings\USER_NAME\Application Data\WeatherDPA\Weather\log.txt
  • C:\Documents And Settings\USER_NAME\Local Settings\WeatherDPA\Weather\log.txt

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific log.txt file locations:

  • C:\Users\USER_NAME\Desktop\log.txt
  • C:\Users\USER_NAME\AppData\Roaming\NetMon\log.txt
  • C:\Users\USER_NAME\AppData\Roaming\WeatherDPA\Weather\log.txt
  • [%LOCAL_SETTINGS%]\WeatherDPA\Weather\log.txt

If you find log.txt file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The log.txt file is associated with malware only if found in the locations listed above.


Different Variations of log.txt File^

File SizeFile Md5Last Seen
4579326496A35169ABAF18A679ECA5418091BCJun 27, 2010
437765C8213906A1E426DC2EAD2ADD4A385FJan 27, 2011
248CE5C079DA64BE0C9BC9B568CD6B7CA31Jun 1, 2011
12404F6A2C94CED720C18E1390A07D021E0AFeb 26, 2012
27666168F7EAF0210F38609CE41DFB0D5F459Jul 8, 2010
508846C04ABC49FDED3B199CA5C2F580C375Sep 4, 2010
3551A952556DAFE4ECDB9E9407212B9AEE1CMay 22, 2012
1096ACC1692F7D736072DFA66DD17864E6Sep 12, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove log.txt^

  1. To enable deleting the log.txt file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select log.txt and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of log.txt and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of log.txt and Associated Malware.
  6. Notes:

    • The deletion of log.txt will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of log.txt will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a log.txt malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type log.txt. The name of the first found registry value referencing log.txt is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to log.txt, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of log.txt and Associated Malware.