Exterminate It! Antimalware

malpedia

Known threats:698,172 Last Update:April 28, 11:39

Testimonials

After days of searching on the net for a solution to my probelm and reading how much of a problem it was to fix and trying a number of other programs. I got now where. I found a link to Exterminate It somewhere buried deep in a google search. That was my lucky day. The update you done seems to have solved all the problems and all this in under 24 hours. Thank you, i was considering reformatting and you save me the trouble of doing so.

I will reccommend your service to anyone i know and you can be assured of my support in the future. i know where to go first if in trouble again. Job well done and thanks again.

M. B.

File: base64.tmp

Location of base64.tmp and Associated Malware

Check whether base64.tmp is present in the following locations:

base64.tmp file locations that are Windows version independent:

  • C:\Windows\base64.tmp

If you find base64.tmp file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The base64.tmp file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of base64.tmp File^

File SizeFile Md5Last Seen
4096B0A194A79E3B01491C0EBC1E1F1AF285Dec 17, 2009
40968F46D8A23147B04A193B90788C565F4CDec 17, 2009
40966D47069C07EB06CE5B617EF2E47ECE7BDec 17, 2009
40967B0AB4AC3DBA42351F886F7D7C46B672Jan 5, 2010
40962367AF013089F69D7ADA5A93517B8D22Jan 12, 2010
40968BFC0CDDB4CB425ED1B956A0842842EAJan 16, 2010
4096E26257B975BDE6F04E62D138A6ACD870Jan 23, 2010
4096D96047D712DCC715778F6CDDD1CCEAAFFeb 5, 2010
409651CAE03A8ADEE8B7AD784FAEB162F8A9Feb 18, 2010
40967C730DC135B8282A30F4EA795606E083Feb 27, 2010
4096AA72721B9086F4F2EBCD1081B21E19A1Mar 12, 2010
4096C9FF971F110D2993A4A716C5378D9D91Mar 17, 2010
40969564DC4490BF515D86AEF7A63D7C4F0DMar 20, 2010
40962D946AA68F0FBBB6F79C68EF650B8A01Mar 25, 2010
4096D6F29FF2311C155BD76E90439ED88621Apr 2, 2010
4096BCB92E1BA84CFEBC0B98AD4101410EE4Apr 5, 2010
40962ECE98EDCADF4F0997298E9B2D8C5D65Apr 9, 2010
409680E1FE50D0CA62A356668C22C2030935Apr 15, 2010
40966235D5D2146300992C64EFC0455638E0Apr 23, 2010
40963B5F0BA533064A392BB1314ADD9AB053Apr 30, 2010
4096F3E2B763E052FA422CD54946789A7132May 1, 2010
40960F325A536ED1E5DEC03C89DC1994D500May 2, 2010
40965DE9C7BBBE98A13D2B10332D56D6C835May 6, 2010
4096FF5E27D55D0CBFA127D1D3355AA66D5CMay 8, 2010
4096B923F37CF20B28AB486001318E162B03May 11, 2010
4096BED91E76E8A87BDBFCF509CAC299DE02May 29, 2010
40963B3BE0D61E96660C639F77D3EB015508May 30, 2010
4096337CEFB02239453AADDD0181AA00B52EMay 30, 2010
409690FCDDF9B02E61645174FBD2A6A635BAJun 3, 2010
4096AC7FDD7B20A4B6759CA859D93492DBD5Jun 7, 2010
40964E9B857EEB5B2447496A704D87B6322CJun 12, 2010
409636191C7726960CFD8CD4A8FA0EC2BCDFJun 15, 2010
40962847C30CA252CED5842DE0EE6AFA5FA0Jun 29, 2010
409689C529B657EBEEE875025E0368C42534Jul 13, 2010
4096B3597669E41A96B0A910C04A8F630EFBJul 14, 2010
409651209D20873A7AEB26C1C320E1E3CDFCJul 16, 2010
4096DD9F550444B1652EE5C3810C056FDBADJul 22, 2010
4096EA1F6AAA44EEC954C6B25C5921F690E2Jul 27, 2010
4096B4EACC5B06AB375ADC21FD1BE633B778Jul 31, 2010
4096DCFDD3CF6F04C297CE0E754CC0D62580Jul 31, 2010
4096562BA3E916A0A5D484D823E084205102Aug 3, 2010
40960338F7539D026755A9CCD379119FD7F6Aug 3, 2010
409638A00E0E0E29C42332F78B83C6AA4B60Aug 17, 2010
4096DB64839B7E9963B6FD4FF3B4A5AEBB31Aug 18, 2010
4096AE3CE741C442E36F38CD8CD185E110E6Aug 20, 2010
409613E56DB30A87BA5B03722178D4BE89D5Sep 7, 2010
409635F623A421EDC783796E2DA9EB589A80Sep 7, 2010
409658CF30EF2B654A1A5A32040B8513BB0DSep 15, 2010
409636F433C59BADB92F3ACF4ACC9199B33FSep 30, 2010
4096ACDE2EA1C7799D570B037518B1D99970Oct 12, 2010
4096DBBAD369649D1CE1DC3233AD9FC049DCOct 24, 2010
409679C443A3AAC27FF0D9D17AF60CFC1A22Oct 25, 2010
4096F309C3F024D63A6D9AD9C931A99BBE1EOct 27, 2010
4096F327C9D64AD6DE7F4E60D079A87A7EEDOct 31, 2010
409676FE974F3AF7C8755B6C9472FE0766A8Nov 7, 2010
40968F7FFC9DEE06C2150A32D21A68ECA14ENov 17, 2010
4096985CB3F95F6240A5588BF21DD5148C6ENov 28, 2010
40960848F3BDAD7BB6B0F77A9B1218CEDEC1Dec 9, 2010
4096DCBDE21CE0694423A11AB8E0C76A4D82Dec 23, 2010
40962449ECF38F1A756117388397FB1A1FCDDec 28, 2010
40963A6C7213728C5C450A60B207C84405BEJan 3, 2011
40965ABE0A3236749920E838E7F039CE9BE1Jan 9, 2011
409625AAAF587BCD306E4F643BD45D22DC2EJan 12, 2011
4096FB0C00F4EE9F29764F7741070CD63026Jan 24, 2011
4096521F641F585608D479ACF6CD64466FBCFeb 6, 2011
409688846009C33417E9E6A1AE1FFFF69766Mar 19, 2011
4096D28FE4A173D681EB1AC0C42105C4F292Apr 8, 2011
409616DDA850A4713F47FA5C384E39E7392EApr 18, 2011
409668E039848953D79254EA9A05A7C968BAApr 25, 2011
40963F0AC3E3ED3A6C197C0F6A6E019C1A10May 8, 2011
40962279566D2F18B96EB32ED5648E8A1673Jul 16, 2011
409689DD72CB5AF8207BD7CC29EDEF7E5177Jul 25, 2011
4096CAA7DADEEF878DF76D807C5A6953A793Sep 30, 2011
409672A81B0AA497399A6AD967ADF4F653F4Oct 9, 2011
4096CF5E4922033B9E0623604B31B1678AB5Nov 1, 2011
4096C68C1B702566FD77FABADB8DB5214620Dec 8, 2011
40965F09A814145FDF59145512D38EC8BC8FJan 13, 2012
4096DB1B97CDCE6B3AF8134019AE487E3B83Feb 26, 2012
40969D1A085E1AA4DF6844B66786CB4ED7B3Mar 4, 2012
4096FBF25C88D0BD26D38A74961420F974C2Mar 30, 2012
4096DC0E87DD792F6E4EF01BE081C947DB99Oct 31, 2012
40965814526D611FA0B17622022CB6A10986Mar 25, 2013
409603C0E273573ECB16BFE2CFDA78367674Jan 27, 2014
4096B8A5F918727170D79E23D545D87BDEEDMay 11, 2010
4096AC279EC57400367D02BE6B97F9933A2BMay 27, 2010
40965AA9A1411A19E7CAD28701D1D7D8C496Jun 23, 2010
409668B85494AE84A32CA880FA0D443B1589Jun 27, 2010
409658999A0BB3746592F0711A1EC78B2F50Aug 4, 2010
40960ED21323A8DEDFBF3244A3A4CE544D46Aug 11, 2010
409607ABBE6098675E2AAA26BC35E5E7D509Aug 13, 2010
4096992E9194BCDF5ED26D8A768F091FAE52Sep 4, 2010
4096635F98A7041F5B7CA49713DDA54646EFSep 11, 2010
4096C920D2F874DAD4281DA8EE46C746C7CDSep 28, 2010
4096C6ED494A16D2D923C161E7F4E8BFB7A5Nov 25, 2010
4096B429740C3C2685B576EA287401584F02Dec 1, 2010
49824C9E30BCDE4CA8B552162E011AE0468BCJan 12, 2011
40965950FE840847E6E65E4B9C3309FF5BD8Feb 11, 2011
40963831666412EF11A7FF4FBE4EC6A733B2Feb 18, 2011
38386F71EB25685B1C3D83C114F467F309715Apr 1, 2011
4096F59F01134A09AF19C83E8706D8394D34Apr 19, 2011
4096E9775C22887014B4338D88D72E987571Apr 28, 2011
40968F6F242DAB192B8FD289AC6C7EFDCDDAAug 12, 2011
40520FD423C9A5BE3ECD2BCCFC5685D32577CNov 27, 2011
409611321836C21A31A2311C07A6813FDEC6Dec 28, 2011
409640A5B16CA28B3E3F9D0D41AA569EAB4FJan 22, 2012
4096271267362E73D09BB2A39E3B879BD2E6Jun 6, 2012
4096D77D7565026D4BC643F1EB2E507EEB71Mar 8, 2013

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove base64.tmp^

  1. To enable deleting the base64.tmp file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select base64.tmp and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of base64.tmp and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of base64.tmp and Associated Malware.
  6. Notes:

    • The deletion of base64.tmp will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of base64.tmp will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a base64.tmp malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type base64.tmp. The name of the first found registry value referencing base64.tmp is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to base64.tmp, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of base64.tmp and Associated Malware.