Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


Every contact I have had with Exterminate It! team has been at the level of customer support that I expect or greater.

Arcelia T.

File: 6o4v7yr6ikfw18072u

Location of 6o4v7yr6ikfw18072u and Associated Malware

Check whether 6o4v7yr6ikfw18072u is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific 6o4v7yr6ikfw18072u file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\6o4v7yr6ikfw18072u
  • C:\Documents And Settings\USER_NAME\Templates\6o4v7yr6ikfw18072u
  • C:\Documents And Settings\USER_NAME\Local Settings\Temp\6o4v7yr6ikfw18072u

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific 6o4v7yr6ikfw18072u file locations:

  • C:\Users\USER_NAME\AppData\Local\6o4v7yr6ikfw18072u
  • C:\Users\USER_NAME\AppData\Roaming\Microsoft\Windows\Templates\6o4v7yr6ikfw18072u
  • C:\Users\USER_NAME\AppData\Local\Temp\6o4v7yr6ikfw18072u

If you find 6o4v7yr6ikfw18072u file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The 6o4v7yr6ikfw18072u file is associated with malware only if found in the locations listed above.


Different Variations of 6o4v7yr6ikfw18072u File^

File SizeFile Md5Last Seen
12412F849458BED7080CF64CA2B35FC0465DEJun 9, 2013
10048363D3D7C7FA3F5809CC0A583962D41CCJun 19, 2013
12888435D42B4CDF3328D3ECB23B03CDAEF83Jun 19, 2013
13186B318DF3C3F5A231D3C1FCC607562F93BJun 21, 2013
14343AB4A155DA82D5CEFB4617AFA8E61FA6Jun 23, 2013
10702E988B0AA9F9EC57F4C019662D3F85104Jun 23, 2013
8104B364EF0F2F4BE60B46C51E826A2B8BEEJun 28, 2013
1286A36C0294E57A80C598C845B17DA5E7E2Jul 14, 2013
141347F765DD6BB0A48221D2F7D6492468DF1Jul 16, 2013
129864A8FE166AFAE0056874F0C1ECD2CBAB7Jul 16, 2013
60584CF7645F604CF960259A803078F8D081Jul 28, 2013
11116A7EB383D714CC786308D0670EF24C9BCNov 3, 2013
8452D11E3BBFB938C070A121423CD662F26FAug 10, 2013
3776C604F147041A31C8CB6D5C5D69E435EAAug 11, 2013
982473D10615BFC01D3275D89F4F29EF26EDAug 22, 2013
106D029D0990F82CF5C762D876CD5B09D9Aug 22, 2013
9884DA71AA0D72157BF6A6718494BD0F8356Aug 24, 2013
11754BB8CDD572782DB7385219C5AA6ADD835Sep 20, 2013
11980D15847671A4633A7003E864BC2A85EA2Nov 28, 2013
11280D3D53554F31D0B61EA57658401AEDC3CDec 9, 2013
48723F873C1E99A28899B328F39D4F714F1BJan 19, 2014
1134606C17A9CB42C84D48086DEB654518A5DFeb 3, 2014
1104021322013CA2180A265DF461B4E3E6B2AFeb 4, 2014
8821E13A391C58A1E272D11E73F801D3CF9Feb 15, 2014
132964FB81E576C4A2BF15C10521BA9F4EAAAMar 6, 2014
1066CBA6E899016FF2FDEBF8AEA5030C86C9Mar 27, 2014
102829ED8C48A4741DB8EC671C1396E0CF8EBApr 4, 2014
1178DF1C6E67CC1DEA597FC2898B86425E69Apr 18, 2014
15944B8685702BC2965174453CE97C6B7D561May 3, 2014
3904B496FD40B73A8FE8A869159A3B0E5AE7May 21, 2014
133360C2EAE90BBA68EB31003E30A217ED6F4Jun 16, 2014
3242E98045D8E7F59AD34270656722E04F48Jun 28, 2014
12186C8D52E6FE144DBFB2D54533B81E47113Aug 30, 2014
16869393BD83FA787383B728F2EA33F8C9B0Sep 4, 2014
8380824D890FBC4CEA3C73DC97709BC67D97Oct 24, 2014
2894B75BF430DC2BCB64B7A5EDE46736C749Oct 30, 2014
11166D98BE144DABEBBF6809AEA1228CD0CC7Nov 11, 2014
9002309AF236D15E70527B51723E73D2A906Nov 12, 2014
78200BAF80324A93259DD79BA29AE5D16ACFJan 1, 2015
11829B9F60463B6B549A6092C185CE9BB5B6Aug 19, 2015
12224137F39A629A819EF40A923092391F16Oct 11, 2015
1022890261B07F4D4B5C9A54650CDAF7C6970Dec 15, 2015
1454DEAF23E3521E8BD6453DEA11A6C33270Dec 28, 2015
95189F5DEFDE9DD893927B8A9066872F0CD5Apr 20, 2016
11286E1ED40EC446F2DA96E08F187876D5FBBJul 2, 2016
48127C8CEDEAE1067EFC1E99102FFDDDF21CSep 25, 2016
145342C39B26D46E98E003054E73943E1C2C9Nov 23, 2016
101763A8052029A05D5AFF64DF22D948E4287Jun 24, 2013
11024EA401D91309DBD1F961E79E7C9694C4FJul 9, 2013
118584719FE695D0EF43813EE793BBE4D0ED9Aug 8, 2013
10974836190E862A30527383CA3B4AC68C569Nov 29, 2013
111682F789E67C2A573769973DC29C271A749Feb 4, 2014
66629FF8AD1DC5D53B36B4CC6FA19DF78881Jun 13, 2013
32880769A8AA1FD3C9F28535A0186F1A248DJul 4, 2013
153845E7ACBB52DF41948BB85BC5CA3858C5AJan 20, 2014
990480869CF71A48E0A4C7EAA4E3E588F537Jul 18, 2014

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove 6o4v7yr6ikfw18072u^

  1. To enable deleting the 6o4v7yr6ikfw18072u file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select 6o4v7yr6ikfw18072u and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of 6o4v7yr6ikfw18072u and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of 6o4v7yr6ikfw18072u and Associated Malware.
  6. Notes:

    • The deletion of 6o4v7yr6ikfw18072u will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of 6o4v7yr6ikfw18072u will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a 6o4v7yr6ikfw18072u malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type 6o4v7yr6ikfw18072u. The name of the first found registry value referencing 6o4v7yr6ikfw18072u is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to 6o4v7yr6ikfw18072u, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of 6o4v7yr6ikfw18072u and Associated Malware.