Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


I managed to get my main PC infected by the Koobface virus. I put up with it's constant interruptions as it presented me with the fake virus screens offering to correct the problems for me. This continued for a couple of days. I ran both SUPERAntiSpyware and Malwarebyte's Anti-Malware several times and neither of them cleaned my PC of this irritating virus. Then I found your Exterminate It! product and decided to give it a chance to succeed where my other attempts had failed.
I was blown away by the speed your scan runs, and once it identified the virus, I would have been crazy not to buy the product and let it really exterminate my pc of this virus.
I'm very pleased with your software and I'm so thankful I found it. You've saved me hours of time, effort and frustation.

There are so many companies offering software that promises to clean viruses, but I'm thrilled to find one that actually keeps it's promise.

Thank you!

Sheila M.

File: D.tmp

Location of D.tmp and Associated Malware

Check whether D.tmp is present in the following locations:

D.tmp file locations that are Windows version independent:

  • C:\D.tmp
  • C:\Windows\System32\D.tmp

Windows 2000, Windows XP, Windows Server 2003 specific D.tmp file locations:

  • C:\Documents And Settings\USER_NAME\Application Data\D.tmp
  • C:\Documents And Settings\USER_NAME\Local Settings\Temp\D.tmp

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific D.tmp file locations:

  • C:\Users\USER_NAME\AppData\Roaming\D.tmp
  • C:\Users\USER_NAME\AppData\Local\Temp\D.tmp

If you find D.tmp file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The D.tmp file is associated with malware only if found in the locations listed above.


Different Variations of D.tmp File^

File SizeFile Md5Last Seen
74188892A0F5C84AD644BFEEAD0983AAA2F242Feb 25, 2010
1154048490C5488EADBD4F48A060CB251E1CD71Oct 5, 2010
97792963DCE6B8E5FE5641719516A54374DB8Aug 11, 2010
94208CE2A2A5A6F1E7A5D6FA31F5277EAB9ABFeb 2, 2011
179712C24293A45279CC71D3175A6FC42262EEOct 18, 2011
1342177369CFEE507E85843FAAA09C75E7102DA38Dec 25, 2011
5FDA44910DEB1A460BE4AC5D56D61D837Dec 27, 2011
299008FD330C3F75B9BC4AA5048728826CC15CDec 28, 2011
1127920D1C8B9E42452525DDF9D397E571D7FC4Jan 15, 2012
335520A609875FD882A3218A063B2C6DCE3238Jan 16, 2012
311456105951E65B0D37D08C8FAD0CB14165ADJan 17, 2012
328864E88845D0C9876EDC2C85DB6782EE74B0Jan 17, 2012
3288642A19B1E9B41413DD2C80F29D3B91850AJan 18, 2012
3288648400840121404A15C923ED4ECBB9DB84Jan 19, 2012
3288649E388307DFCEAB604F275A972E06BBCDJan 19, 2012
31145648138899CAD6D658A97E74C8E8D8B35CJan 19, 2012
64094BA1F3A397580C14E683D5F673F576A63Jan 20, 2012
311456B31E0BF14066C741F8CB836973434949Jan 23, 2012
3112484D0171412E8B1A027A12991432CEBD11Jan 23, 2012
5067541EBEF6E4F6C3AAB955A2E5C16D8F8Jan 23, 2012
32118475F9CE47499B40966C7F106E52DE69CDJan 23, 2012
3288641BB1849185BD9DBEDAF8D4BDD596DE67Jan 23, 2012
1261568F664F5FBC0ECB36D5D0477C0311DA148Jan 23, 2012
32118466A413DDA28745E09380BF73E7C03D45Jan 24, 2012
3288642FFF00BDD4C6E590467689F1B13F1518Jan 25, 2012
3211842DA73A0F1C7C595EE319958CFB976755Jan 25, 2012
1310727E77F15120EC7764B055E9C515907F12Jan 26, 2012
3114565CD86FAE5DB870FFA89834A0693C940CJan 27, 2012
3114562C490344DD93745D1FB6518B4F1973B2Jan 30, 2012
121618970CEFDC524785CA4DF48FAC11686AAJan 30, 2012
311248EE91D9228D93A2D652F1CAA83C830F3DJan 31, 2012
3114561F0D63186E07F46D7CECEC0E3B3E3170Feb 2, 2012
11279929CA3AA75D4556FC8194BE497AF7B4A44Feb 13, 2012
16384679672A5004E0AF50529F33DB5469699Mar 8, 2012
32118473D4DEA1A876F78FEB83862D514BFE63Mar 21, 2012
321184E2E12F557BB0939780367B7F391DF216Mar 29, 2012
328864C191C6DFCF8D26B433706FDB62CF8F9CApr 2, 2012
311456A685099306FBA154C00F46DBF16DCD6AApr 18, 2012
321184619A47E51054656A6EAF15D79F09F2ADApr 23, 2012
335520800FDD15433774EA83A91EF0A701C0CBApr 29, 2012
335520B56FCAB54DD0D558B2FD86D502FE380CMay 23, 2012
321184000E45AE435C146C5B58272F352D87D4Jul 18, 2012
328864A69B66B847BCA675E934F2E5EA554591Oct 3, 2012
335520D5F72E03EDF8BDEA4847D693237330C7Oct 30, 2012
11287819E56F9CB9EA8D2BB6BA3CAEA4FCA52DDec 14, 2012
3355200BE701E7E6CFA74E9A1DDC4A4876C2D1Jan 8, 2013
311456CF6E2C2B79A9F3E7762FAACD53E98457Nov 13, 2013

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove D.tmp^

  1. To enable deleting the D.tmp file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select D.tmp and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of D.tmp and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of D.tmp and Associated Malware.
  6. Notes:

    • The deletion of D.tmp will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of D.tmp will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a D.tmp malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type D.tmp. The name of the first found registry value referencing D.tmp is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to D.tmp, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of D.tmp and Associated Malware.