Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:August 10, 12:54

Testimonials

Over the past six months I had a lot of trouble surfing the Internet and working on my PC. I tried different free and pay antivirus software, but they were all of little help. I scanned with Exterminate It! It turned out that my computer was infected by five different viruses and Trojans, and your tool found them all! Now my PC is perfectly fine. I am really impressed.

Exterminate It is also very simple to use, which is essential for computer novices like me. I like it so much that I recommend it to my family and friends.

Vale R.

File: ((Mutex)).cfg

Location of ((Mutex)).cfg and Associated Malware

Check whether ((Mutex)).cfg is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific ((Mutex)).cfg file locations:

  • C:\Documents And Settings\USER_NAME\Application Data\Microsoft\Windows\((Mutex)).cfg

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific ((Mutex)).cfg file locations:

  • C:\Users\USER_NAME\AppData\Roaming\Microsoft\Windows\((Mutex)).cfg

If you find ((Mutex)).cfg file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The ((Mutex)).cfg file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of ((Mutex)).cfg File^

File SizeFile Md5Last Seen
1484625FF0E20E09164D15120267799C2FC8Dec 22, 2012
148435DC006372F9E71DE0A8DE5963A560C0Dec 29, 2012
20325CBB885DC777E0CC2A086D87378B1991Feb 9, 2013
20328D8E5BD6D5E6260AFCF3D5558D3B3BF8Mar 9, 2013
203255A131FE5456DCE3429C3E3D5DD4B095Mar 10, 2013
2032A9D7F851A27AD716FC5840DD398996E9Mar 18, 2013
15169C7DAD790E95ACDA677B3D4333AD4E1CApr 4, 2013
20324BD0ABAED933AED2AA4C8D3F222B925BApr 19, 2013
1484138D86FD10CA7C37EB41F4579BDD1336Apr 23, 2013
2032B6457E1716AEF301C49C4E83872C9109May 31, 2013
2032679AA7ABAC4F3D0B8D6CFA77E0F21BD5Jun 3, 2013
2032D3A289F66FF3CE3D22A27FC81BE65C2AJun 5, 2013
148425BF38F8C2FD6E27E648B1FDC6103EF9Jul 9, 2014
1484377D5A576A0DBC0897EA532E33BFDC4BAug 3, 2014
148491A87C50BA7E5EB3AECC16B3FCB9F2C0Aug 25, 2014
20321ACA2F6A45B8E3E03E4995996850267FSep 7, 2014
2032B1B765CD9112649E93BAAB57529B9144Mar 10, 2015
203290E50A8A679A74408836462642343ABBMar 24, 2015
2088C24C20935BA0760FDD1E68F2D4262002Sep 1, 2015
1484F058FDD3F52291753BA18AB0B753D56BDec 18, 2015
14842F915A734A53B3E76265E9CAB9F0B1CBFeb 16, 2016
2032A611DD6B0DED125DBFFF1FC88C5C1B06Apr 10, 2016
20885EDA4EE2684D96CF757DCA319508ED43Apr 29, 2016
2032385156B0E6A3935890DF0C2ED943B92DJun 9, 2016
20889231817249170527D6003406A0C7CD4BAug 13, 2016
1484EC413D416D09F52E21D09B33F1BCC38BSep 14, 2016
2032590B7CBF10E8AB378C0E62EA8BCFA2EEOct 31, 2016
2032B3769D851736A76C259B48B75B21C727Nov 21, 2016
1484CFA2D491B50DAEC59819E33AE44E5974Jan 31, 2017
1484E9F3F2B19E5BA65752B488DD3F3CDE44Mar 28, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove ((Mutex)).cfg^

  1. To enable deleting the ((Mutex)).cfg file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select ((Mutex)).cfg and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of ((Mutex)).cfg and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of ((Mutex)).cfg and Associated Malware.
  6. Notes:

    • The deletion of ((Mutex)).cfg will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of ((Mutex)).cfg will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a ((Mutex)).cfg malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type ((Mutex)).cfg. The name of the first found registry value referencing ((Mutex)).cfg is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to ((Mutex)).cfg, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of ((Mutex)).cfg and Associated Malware.