Exterminate It! Antimalware

malpedia

Known threats:700,086 Last Update:March 16, 12:51

Testimonials

It seems that the problem with UACd.sys virus has been solved by this program. So many thanks for creating this amazingly useful program.

Eva S.

File: gatorpdpsetup.log

Location of gatorpdpsetup.log and Associated Malware

Check whether gatorpdpsetup.log is present in the following locations:

gatorpdpsetup.log file locations that are Windows version independent:

  • C:\Windows\gatorpdpsetup.log

If you find gatorpdpsetup.log file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The gatorpdpsetup.log file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of gatorpdpsetup.log File^

File SizeFile Md5Last Seen
2138237A2B684F241AB146B2052D0C03607B3May 17, 2010
19292ABD734C968D4088D312663E0840AE680May 26, 2010
24599EF509237B566AFAAEB5F286778E74AJun 12, 2010
1951257CCA47CC1008CF632B26ED42B163966Jun 18, 2010
246194B4CDFEF82C8B4B29DCECE37A4099BC1Jun 18, 2010
192653482A8FC396474314D2CC1963D10A5ADJun 21, 2010
18441FDFD1D67C8FFB1BAB29825D1E5E37580Jun 29, 2010
2163944DA3EAF035AC7EB6940607FE7602F34Jul 7, 2010
188373F3EA340A4A27F09398032F114BF170AJul 27, 2010
21845B1D16C1C27AAF14CE643219E32DA7192Aug 5, 2010
17491B3EBA9EF33640C1A31062F058E40757AAug 17, 2010
21799FF461A890B74AB2A33B46F37E341FC7CAug 21, 2010
254853468FB04704FD858B033B7BEA0ED4864Aug 31, 2010
24315AC2F5A81941728E85AA9315CCDE4E98CSep 8, 2010
21820540298D49FA85B97931CDA7B67CB8272Sep 16, 2010
190222B68211D1E89E71915F1F5B941E836A1Oct 3, 2010
21734758C2052D21997A1D76D7D7200C3DD4DOct 13, 2010
207284932C104335B7AB40422593697BA6F31Nov 4, 2010
229964F874DB1207CD46C5ACAFBC3E9EED9F6Nov 9, 2010
1836215D4AEE8D7660A2A1A52B9D29A4694C8Nov 28, 2010
205439EB640A7B4666B0558BE01CCDC49BD47Dec 2, 2010
18921F1AE055C8A8A859A6C64B5027E36BAD9Dec 6, 2010
1916888F190775309135F73D6E0FE6ADC601BDec 19, 2010
2476676AD1B8F5A6FB3278235A5EEBFA3BC58Dec 20, 2010
21303BB5F8E42B66066A14AB3A3DBC714B0BBDec 24, 2010
194341432928430C6104E22A579F1EF50ABC9Dec 30, 2010
250A0456B84E9149531A5B54B5D2E601E31Feb 3, 2011
249426B9D722479D14C59B3BA10B8DEB53199Feb 26, 2011
8223F3964A01593D9FEEC8B13FDC024D8483Mar 17, 2011
218348604DC56F4AA0952F83AC1B6731CA71CMar 27, 2011
1648005FB98CD375181D62701C7362565BB21Apr 6, 2011
188404CFF913574F729B2CCA866E8D6C53B75Apr 12, 2011
19097F72FE679E800DC01417B1D6D33F29CD8Apr 14, 2011
25113AD38E0175A79246768E807F2828E78DEMay 1, 2011
1930448E7F8BFC1A9022C6FF1228706B70B7DJun 10, 2011
1798033932B85D842E26445C203130FDB95E7Jun 10, 2011
20534BCF4D3C1534D09FBFFFDC587797B7505Jun 12, 2011
23043BCEA013BCACADE5DE73142A583C1035FJun 26, 2011
199562D8AEFDBB12A601A4CDE94A6D517B8E3Jul 14, 2011
215118AA3ED124DF6D452763A0E860082B7D8Aug 16, 2011
18723E4E2E04FBE07AA3CEE744906E439D968Aug 27, 2011
187436A333F739CF71D22B088D95E9B3ED5ADOct 26, 2011
245F8D71E1FBEA477951995CC7F18B9FB01Nov 15, 2011
2469D6A5E0A0171CD4424504837E8B72CD8Mar 11, 2012
18278068CE39434EEA1ACA757414BA2811136Sep 11, 2012
247EE02EEFB24DEFE9637BAA0EA1F3F15E6Feb 3, 2013
19015BE7B910DDF321110730FC78E2CBFC470Mar 3, 2013
1998375C068AAF504A854E18B7E3DA58928D9Apr 30, 2013
190666ADF4B8A70C8601825F3406424DB69FBOct 9, 2013
17804DA3B3613089624DC7998E07690B66D31Oct 9, 2014
24614AB7A53AD1B36EB3A51C6CB489ABF7DDec 12, 2016
202923C0B2E7A1C5DD160570DC1F753ADC7E8Dec 28, 2009
180434357CA30B03876F9BA13BB17E632D8E9Jan 6, 2010
2101634AEBDDEBF5A251FD5882157B0CD7ECEJan 9, 2010
2452E203AAA3AFE0F6FFF11330FEFF1CEA9Feb 25, 2010
20496DC3068CE5F163737B1C1990BF19C8D8EMar 6, 2010
201478DD6ABFA45C366D6A8DCB44F3910201FMar 9, 2010
246660492BA588CF0F864B93AA1A2CCAEBBMar 24, 2010
205886C2F6D87470BC0A37744DCC93E96849BApr 3, 2010
18251BE1B564A100FE540E79532459DCA9563Apr 24, 2010

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove gatorpdpsetup.log^

  1. To enable deleting the gatorpdpsetup.log file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select gatorpdpsetup.log and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of gatorpdpsetup.log and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of gatorpdpsetup.log and Associated Malware.
  6. Notes:

    • The deletion of gatorpdpsetup.log will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of gatorpdpsetup.log will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a gatorpdpsetup.log malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type gatorpdpsetup.log. The name of the first found registry value referencing gatorpdpsetup.log is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to gatorpdpsetup.log, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of gatorpdpsetup.log and Associated Malware.