Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


I purchased Exterminate It! yesterday, as a last ditch effort from having to scratch load an XP Pro workstation, which was infected with the WOWfx Trojan.

In short, your product eliminated all malware on the system. It was the only commercially available product that not only detected the problems, but eliminated them.

For the record, I attempted using:

The registered versions of Spyware Doctor, XSoft Antispyware, CA Antispyware and the free version of Adaware, which all recognized, but failed to clean my system.

Outstanding product.

IT Manager
Southland Data Processing

Mark A. R.

File: Empty.pif

Location of Empty.pif and Associated Malware

Check whether Empty.pif is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific Empty.pif file locations:

  • C:\Documents And Settings\USER_NAME\Start Menu\Programs\Startup\Empty.pif
  • C:\Documents And Settings\All Users\Start Menu\Programs\Startup\Empty.pif

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific Empty.pif file locations:

  • C:\Users\USER_NAME\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif
  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif

If you find Empty.pif file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The Empty.pif file is associated with malware only if found in the locations listed above.


Different Variations of Empty.pif File^

File SizeFile Md5Last Seen
4541741BC917A697AB13ECB4C97496300080BSep 12, 2014
4340358256B28851A289AE3BE0D78208BE33DSep 6, 2016
44435CD66B5C9BD6631EB67282F7F5ACDD849Oct 26, 2011
4441704549EF2239C3347CB749C64AEB0D0D1Aug 18, 2012
4269223561C28F612BE9B00DE7FFFEDF8BFF2Oct 23, 2012
45508E65B9179A1A18CA163BAEDC2BE3F158ANov 6, 2012
147958DF3E222A3B14872A1042E2401EC139C3Feb 12, 2013
42662C33EE5CB2BD796EDA0F0998104808241Feb 19, 2013
45558A3B495E183995E7148EDD3CF773EAFA2Oct 24, 2013
15974493AF17DA49887C8D70D114CAA405EED8Mar 8, 2014
453021C750E4F327E0050D4F5790FD882A436Apr 25, 2014
454932152217BD031166B0C969A8CD23ED41FMay 21, 2014
45435CD72FCB67E9D1110051F474416C424EFJun 11, 2014
42089053DD269A3ED1EF44F0AB04599D5DFFDOct 14, 2014
8192085FB1A07ADDEF7806B074DCDF6333C8BJan 12, 2015
4551262272024350B71C3F68F879E390F0153Apr 15, 2015
11059243A6CFD2799538FA01169031FE795930Aug 24, 2015
1198084B75519C49131C83438EFFD65406F043Oct 23, 2015
444014D8BE6230F978842C8456E349A2EBA2EOct 26, 2015
4262400424E87BF944D7513EAC1476F0EC1A1Feb 13, 2016
8192011C8A4A807073CCF7734288293C50407Apr 23, 2016
4273458073EFD92E92C1F1155ACC3282595C0Jun 7, 2016
426985A6CD4BDA85793BB752F48E1BAE17644Jun 15, 2016
40928C27EFAFAD30060E52770C4CDA28D3183Jun 20, 2016
426751F9F917AA1BB1F55CE56B19E233F5A48Jul 16, 2016
426759F472B33711035A5174F4F7F2EA5398FJul 26, 2016
90112339088AB45F15AC49A7DEA6157419B76Sep 6, 2016
42713DADB62781676F69CC258893669038113Dec 19, 2016
45336472243FEFAB9A8CE977599232F93426CJan 3, 2017
413855A1E3B99E00DD5DF99CC316ECFFF5FB9Jan 25, 2017
81920902792C0116ADF49F55F111E82C81DB0Jan 30, 2017
12697605A48C43CF4765AE0761A474129F11120Feb 6, 2017
81408F805F0C01AC686DB8D056888DABEB0F2Mar 3, 2017
491521FEC5082EAD8957F1CCB0168F2BB1C20Mar 9, 2017
45543A2AA4E162ED9AAD18BC10BF280C03D52Mar 21, 2017
42065C51A426D90AF0CDCB97C10BB4EA12696Apr 17, 2017
42655BA92D154C3BB3335DF6E6D5DA41A3373Apr 18, 2017
454562CA72990FE8F0C214603D138B51D217DMay 19, 2017
42687483FCF432217D71544246AA760D98CDCMay 20, 2017
44404C9B236A7C278EB1111C0067AA00B1279May 24, 2017
59392A51F6D9420CAAA88C6D39EA920F803DEMar 12, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove Empty.pif^

  1. To enable deleting the Empty.pif file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select Empty.pif and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of Empty.pif and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of Empty.pif and Associated Malware.
  6. Notes:

    • The deletion of Empty.pif will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of Empty.pif will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a Empty.pif malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type Empty.pif. The name of the first found registry value referencing Empty.pif is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to Empty.pif, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of Empty.pif and Associated Malware.