Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:November 20, 22:46

Testimonials

I consider myself pretty good with a computer, but after 10 hours of trying to do this myself, the sysguard.exe whipped me. I couldn't find all the files and when I thought I had them all, they would replicate and play hide and go seek I have never endorsed a product in a comment, but if you want to rid yourself of this stuff, pay the $24.99 and download Exterminate-It It fixed my system in 5 minutes!

Mike T.

File: INSTALL.LOG

Location of INSTALL.LOG and Associated Malware

Check whether INSTALL.LOG is present in the following locations:

INSTALL.LOG file locations that are Windows version independent:

  • C:\Program Files\themexp\Themexp.org File\INSTALL.LOG
  • C:\Windows\System32\install.log
  • C:\Program Files\UAB Optiva\Boss Eye DEMO\INSTALL.LOG
  • C:\Program Files\downloadmanager\install.log
  • C:\Program Files\bpk\install.log
  • C:\Program Files\Watchdog II Server\INSTALL.LOG

Windows 2000, Windows XP, Windows Server 2003 specific INSTALL.LOG file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\ssstbar\INSTALL.LOG

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific INSTALL.LOG file locations:

  • C:\Users\USER_NAME\AppData\Local\ssstbar\INSTALL.LOG

If you find INSTALL.LOG file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The INSTALL.LOG file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of INSTALL.LOG File^

File SizeFile Md5Last Seen
520B6BD6E201EB78091A4FB7BEC1FA74C28Jun 2, 2010
5202BCEE5326FC41E4B0FE5B702E9AF6D71Jun 29, 2010
52005272034EFB5AD2361328D32AB0354B0Jul 5, 2010
520152A1681A95C26E54CAF9505ADB7DE08Jul 7, 2010
52046A4079804CB5B74F815ADBDC977D6A8Aug 2, 2010
520CB8AD9AC2684E693ADB05CD29E37B63DAug 15, 2010
52043E334979B3E59C13A3C4A7AC9C4961EAug 17, 2010
5201114A555FE12481158DCF5EA8C366879Aug 22, 2010
520593EE312AB4AABC8C47F7FC67CB92364Sep 14, 2010
5202AABD7920039FEE21CBB5FF25B2D4887Sep 15, 2010
5201E8A5C915738705756DDC908C2EE7A51Oct 14, 2010
520CD8E8568394B2F9912BF7B80741670FFNov 2, 2010
5204EA45DE529387053BBC2C718F1925E4FNov 4, 2010
520EFA53064045A615A891AE05B3F4CCE23Nov 4, 2010
5207A81FB8A87F080C60BCE8C70357F7013Nov 6, 2010
5201F47366C1D4D44E4828EA81977254305Nov 24, 2010
520F00E386E8D0C5DE5B233D4D2636DE609Nov 28, 2010
5202369D2B049CA16219B16DEAC176BB399Jan 24, 2011
5209948F2686264D024DB292CFC19B1F64FFeb 9, 2011
520ED296F5681DED5CE10182BCE3A07A577Feb 28, 2011
520E8EF47D15C7EAAE17793E7FF03D0DAF5Mar 18, 2011
52054D7D0D403023683C19BE67B29AD45F5Apr 13, 2011
5202CD804DF891E6DE3C099AAB5CF805C3EMay 3, 2011
5208EAAEA694FEE0F9718F945E53E1109EAMay 18, 2011
520CD8B837256EC4894D83A261068265F0FMay 18, 2011
5201962EE740F2E5B9BCAB3A7D57C380634May 24, 2011
520B10A668326656D22162233C498F3A939Jun 24, 2011
520892DC2E027738C82A9437A3DCB91E307Jul 18, 2011
5202F74BA1D4F2ADE398DE5E572D73E45ACAug 18, 2011
5209425DD61D1B90C5F6F165F2923CC4B32Aug 27, 2011
520544297FAACFAA33C3FD7244F494BCF9ASep 22, 2011
520B1DCF30E1C42DA9A52B01474707EA6D3Sep 28, 2011
52032D164751D4ABD90F9A0D3A192719243Nov 9, 2011
520E3B3DA0A25AA8D082A1BECC68A5967C4Dec 6, 2011
520F578F4920A34C74C707917DA9E09A4D7Dec 10, 2011
5200B9A9777D246B1A030E0652AF81ED016Dec 11, 2011
52044C58F5D5829FF89BCDD9F049BAA4289Dec 19, 2011
520B09EF97A55111FFAB513660FF248ABB2Jan 21, 2012
5207252E5F7A20CD25695B144566487BAD5Mar 22, 2012
5204B15D94E60A4B7CE8E9483078D8A0C8EApr 2, 2012
5205F5D102DFB2763CC2BC7F795DB491FA8May 18, 2012
520A83C58887145BCDEFCC498567F0A0229Jun 6, 2012
520A31B65E26D81F6C298BCE484B4AF2F66Jul 17, 2012
520EC21316C17EC58E58B2235E0936E6A96Oct 31, 2012
52038105A9E8D513BCEE61FA785B44E0E23Dec 9, 2012
520BA312CC889D5567F6C8C73ECD5604657Dec 23, 2012
520AE04F2E86B1F3D9EA84461E95921090DApr 3, 2013
520137D4D8CFCDA153891A196ED341EEBA0Jul 17, 2013
52006F4C4816F0FEE83FB4867D0919CB6E8Jul 28, 2013
5204CEFFB9E3CD442B98DCC68EDE4D955BDOct 2, 2014
520C8C7E988CC4540BBDAE93EF6084AEE72Jun 24, 2015
5203BF03E4D555ED2062075085B980A4E27Sep 6, 2015
520EF30AAAFD4C63F670D8DDF4F30CAAC86Dec 16, 2015
5207C9E748369D9EFEB3E835FC805B2D82BFeb 6, 2016
520AC0C9A32CE13F68B63295723FFB025BAMar 18, 2016
520DAB4E4E3CA63EACDB55F9C5C470B17B8Mar 19, 2016
520CA0CA2931729B77CD78B6F3E67BFD9E0May 16, 2016
5202B05F341823D7FF47EF6BE27C2FBAAA3Jan 2, 2017
520F56242269C73A751C9AE7183972E77DBMar 29, 2017
39427AA1CCCB7F85B4DA32E0E8B51AC4465BMay 18, 2010
90302AC81E8382DE160F8C725D8597B1F075Jul 21, 2010
7235F157B06050DA7CBBE25E1574CD373390Aug 16, 2010
1870CB3A42C63541038A42C0456329C15B19Aug 17, 2010
2419721EFBF9AAF8D0DFAF112035D15A7C29Aug 27, 2010
25349471FDCB60C792A660319D30076095FF1Sep 12, 2010
22685187479E36EA624F6AC5DA2358DCB7BCOct 7, 2010
1830B7D5B042556A179326BA29D3142EF2F9Nov 15, 2010
36717775816A87CFBDC1D9C09CDBA4FD933ENov 12, 2011
34589B25E887FB0EF93A1E0181FBB1ABD42FMay 9, 2010
3464B15CFCEAF71BE660A975693555F16E1CMay 29, 2010
35942E9B379E7272BC16CEE0B24AD102BAA0Jun 15, 2010
3609D9ED1C519D7C01E638BA1FD3F49302D5Jul 28, 2010
6926E9B097D8BDFB150DDD9EA748466E9819Aug 1, 2010
693033E665875A67615E2B361EA240C0C198Aug 21, 2010
692493797F4FDE3776FC9589A500E95EACB0Nov 12, 2010
69041630C273E62231E753E229BB55D96C10Nov 23, 2010
34611CD11B8CF649AED54E3E5F89D8E17577Dec 19, 2010
3451EDAC4FBC7B1297ACA0129C06130AC72AJan 22, 2011
359579BEDE5D2049A2ABC948634AAB1AFCF5Feb 20, 2011
38082C259A231BD33CA9DD2814E7856B7703Mar 31, 2011
3462C3E4624AA8E8CFF676DAFBE6A8830DE9Jul 13, 2011
3600CE14C7980F04CE0D9FE87645D9243A63Aug 13, 2011
3325A2CC69061F0D3166AD1589E6FCEEF887Apr 2, 2012
520A466CC3D4E46E83F3A74773207B89948Feb 18, 2010
520B81E037FEF211F4002B9C836F4299B5FFeb 18, 2010
520D42B7AFF47C45875EEEEFD720655E246Mar 15, 2010
5209F614A31D07E924CA7979DC7FBECDCEDApr 14, 2010
4740DC46A6B4F3F8E43049C9471CF502F5ABDec 17, 2009
199981DA77434FE8BF582B1AE6966A6DB4C87Dec 24, 2009
57935E8817E8CCE2C53BB5A6E5CD1FE19844Dec 31, 2009
13397BA0233101567B952FDA720F46D55CA2FJan 9, 2010
3404CB74B774B67F69088891F8DC3281274BFeb 4, 2010
20825C306B0E3968F6362F6095927DB000E3Apr 4, 2010
5897D95FAF696CEEA3191D2F1B4A310C122BApr 5, 2010

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove INSTALL.LOG^

  1. To enable deleting the INSTALL.LOG file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select INSTALL.LOG and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of INSTALL.LOG and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of INSTALL.LOG and Associated Malware.
  6. Notes:

    • The deletion of INSTALL.LOG will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of INSTALL.LOG will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a INSTALL.LOG malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type INSTALL.LOG. The name of the first found registry value referencing INSTALL.LOG is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to INSTALL.LOG, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of INSTALL.LOG and Associated Malware.