Exterminate It! Antimalware


Known threats:700,086 Last Update:March 16, 12:51


Thank you for your excellent program and your even more excellent support in helping me rid my computer of some nasty malware.

Even though problem took a while to uncover, It was a pleasure to work with you. I felt as though you were right there with me with timely and personal support. I was really impressed.

Great job! I will certainly recommend Exterminate It to others.

Thanks again,

Howard B.


Location of DECRYPT_INSTRUCTION.TXT and Associated Malware

Check whether DECRYPT_INSTRUCTION.TXT is present in the following locations:

DECRYPT_INSTRUCTION.TXT file locations that are Windows version independent:


Windows 2000, Windows XP, Windows Server 2003 specific DECRYPT_INSTRUCTION.TXT file locations:

  • C:\Documents And Settings\USER_NAME\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific DECRYPT_INSTRUCTION.TXT file locations:

  • C:\Users\USER_NAME\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT

If you find DECRYPT_INSTRUCTION.TXT file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The DECRYPT_INSTRUCTION.TXT file is associated with malware only if found in the locations listed above.


Different Variations of DECRYPT_INSTRUCTION.TXT File^

File SizeFile Md5Last Seen
4144CFD5F445D5A2BD9072AB6D4555183D5FAug 15, 2014
413226AFB68CD499899BCBB7620B8673DC4CAug 26, 2014
413263BFC8146C9D97C09B68C3022A34E480Sep 4, 2014
41323972EDE057F83D36B675ABB51B693ABFSep 9, 2014
413443392504C0851C2B235A68EE5B249FFESep 19, 2014
413402B06C807A344D708BC959879C086870Sep 21, 2014
41543323834F6DCA8D47502C29BE48A10E09Sep 24, 2014
420062E5C7FB7AB3EE22005D810D70C95A22Oct 20, 2014
42167180A0CC25C7344390970FDF980B446BOct 26, 2014
4224DB68AEB456545A0947BB03B91A81AD32Oct 31, 2014
420813C9413DC3DE2CE3D64EE48039744A57Nov 3, 2014
423877156AAFE2FF0815AA0F060EBE4574DANov 9, 2014
4214C9312ACC985BFF531736B24446CF336CNov 10, 2014
4226E1B055595AE831E6BB51573A2AC91D49Nov 11, 2014
421422A53F12A839B9D7B2C6EA624BF2DBE3Nov 11, 2014
42082C66453D164535443CF01035104324F6Nov 14, 2014
421087CFE43306EFF250F0832354BF4BA970Nov 15, 2014
4062156CF500DB90983FC4EFB648514A6E07Nov 24, 2014
42089BDFFB6333AFEC8DCED8C5AE614571DENov 26, 2014
42141A973A7F32F9DDE32362481030144302Feb 27, 2015
4210EDD1CCC7BD5EE8AD48DBD8EC5EFAB398May 3, 2015
406446D457CC9573BCDBB141ECDE112C6608Sep 7, 2015
40805CD312D8F3F9A5A453926737507EDC4ESep 13, 2015
414408C65531898D496519F43B19E1467F74Aug 22, 2014
4166F3ECE98479A53DDBBB5CD28C3568D9B2Oct 15, 2014
42264DD491761D29876E30A4000A5526B914Oct 30, 2014
42166A804E89D38A028492930554B82D3117Nov 11, 2014
4212A64CB960189B10DDFAD39682395E8B85Nov 13, 2014
4216772CD70BB4885BD2BD295C424366CE0DNov 14, 2014
41301A532ED158B4CB0680DC95DFE9591952Mar 7, 2015
4214DF6B4A44FCD4285479C0847C05E38208Jul 7, 2015

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.


  1. To enable deleting the DECRYPT_INSTRUCTION.TXT file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select DECRYPT_INSTRUCTION.TXT and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of DECRYPT_INSTRUCTION.TXT and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of DECRYPT_INSTRUCTION.TXT and Associated Malware.
  6. Notes:

    • The deletion of DECRYPT_INSTRUCTION.TXT will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of DECRYPT_INSTRUCTION.TXT will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a DECRYPT_INSTRUCTION.TXT malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type DECRYPT_INSTRUCTION.TXT. The name of the first found registry value referencing DECRYPT_INSTRUCTION.TXT is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to DECRYPT_INSTRUCTION.TXT, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of DECRYPT_INSTRUCTION.TXT and Associated Malware.