Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:October 27, 11:19

Testimonials

I purchased Exterminate It! yesterday, as a last ditch effort from having to scratch load an XP Pro workstation, which was infected with the WOWfx Trojan.

In short, your product eliminated all malware on the system. It was the only commercially available product that not only detected the problems, but eliminated them.

For the record, I attempted using:

The registered versions of Spyware Doctor, XSoft Antispyware, CA Antispyware and the free version of Adaware, which all recognized, but failed to clean my system.

Outstanding product.

IT Manager
Southland Data Processing

Mark A. R.

File: Online Spyware Test.url

Location of Online Spyware Test.url and Associated Malware

Check whether Online Spyware Test.url is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific Online Spyware Test.url file locations:

  • C:\Documents And Settings\All Users\Start Menu\Online Spyware Test.url
  • C:\Documents And Settings\All Users\Application Data\desktop\Online Spyware Test.url
  • C:\Documents And Settings\All Users\Desktop\Online Spyware Test.url

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific Online Spyware Test.url file locations:

  • C:\ProgramData\Microsoft\Windows\Start Menu\Online Spyware Test.url
  • C:\ProgramData\desktop\Online Spyware Test.url
  • C:\Users\Public\Desktop\Online Spyware Test.url

If you find Online Spyware Test.url file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The Online Spyware Test.url file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of Online Spyware Test.url File^

File SizeFile Md5Last Seen
13133E527899E6A0C500107B237B99FA555Dec 19, 2009
1315A58DBE19282850953323B63A6E49559Dec 23, 2009
1269FF7BEB4C539B0A3E8C894B80DB1EDABDec 27, 2009
14116330332E48DCB2D31EC741D8215640BJan 7, 2010
13136D9E700478B8B4F9C85D0EBA47E108EJan 11, 2010
129312533E225685465DFB9EE97D0F3CD21Jan 11, 2010
1301642B3E7C3CF6D536F439319622EF70CJan 13, 2010
130BB3039E639A56A11047F0EBE7CF1D76FJan 14, 2010
1294F804BF60B578351084022D63750573FJan 20, 2010
132DA212E47EC8B28B2B34A7603ADE9773EJan 22, 2010
1312E91E093AB26A4AF567E8B73E7556E04Jan 28, 2010
1309C527CD43DCE6DD9961890435836C2CEJan 28, 2010
1269415FDA7E04E13525C1F99F67A62CA52Feb 1, 2010
1340F8F6249480319AFD2C321A55BEF8678Feb 5, 2010
127053F80B361BA588B66236C6EBB25E534Feb 6, 2010
130F4949BA3032E7A5477050C288201468CFeb 16, 2010
126AA96400F253ED28A0E576D4308D1CBC0Feb 22, 2010
13032DBB50F8A5604232604E06F8A0CC7BBFeb 26, 2010
125ACF4BA2456382B6E02A7C3761872F4C9Feb 26, 2010
12564EFAE2EC4BD7B208C686340876ACA96Feb 28, 2010
13118DA2932357964374E7F0BD217EF49DAMar 2, 2010
1300966315FA6D961BBA5FA343D91D13207Mar 6, 2010
130FB74E3372C72A4D15465A8E0C486D614Mar 13, 2010
129E82860586B02B5D1ABD1F90B078C5C20Mar 15, 2010
1303287D40BFF72D1785D54C2942292B40BMar 15, 2010
13424D15D8EF4AEA77158BD754790D84879Mar 20, 2010
1229AF7F7CEC7DA675C92B1C28E42369503Mar 23, 2010
125B1CF39559DE5DED966208E1A514CC341Mar 26, 2010
131E3DFD03D01BB8239E56C1BA536D61937Mar 27, 2010
13171DC5A8B1E7D60BC9FA4797BC7DAE4AAMar 30, 2010
126AC80A219BD621E6C7BEF4C3D6CAEE7C4Apr 3, 2010
1358586DF5F9898CD99CA6DB01599E1EF18Apr 3, 2010
130B93D9B41ABD4AB965EA782B4BE302A12Apr 16, 2010
1257474572CCB31B95E10B68022DC401898Apr 21, 2010
131D6C48D04896374D712FC34A8FCA6D7BAApr 25, 2010
1305466B5B7FAF0101F2DADDDD824B91BCCMay 5, 2010
126BE4191F4C26941E7B7487F7CDA497C8AMay 22, 2010
130F0F9EB0D2D6CD3060C05B82E61F020ADMay 22, 2010
1315E5649CC89B344EBA168A5F27F5AD735Jun 7, 2010
127ECA27580A54269F18712F2C3AD9BF0C6Jun 10, 2010
12203B05045473995C34C397DEE3A9D9AFAJun 15, 2010
136FF07918CCAA223FF7C1C8A129CE627E9Jun 17, 2010
1306F37CBDFF6FE662F90F03993D6382E24Jul 10, 2010
129FFC079928AF94C854E525CCFDDEAE7E8Jul 26, 2010
1318E8DFA23A6C3383A2EB86DF4FE9DF6D7Jul 31, 2010
129AE859CA1839D82757A256007AF988FF5Aug 3, 2010
125EBF594A4506BCF6D7DE62DC4C834AD2AAug 10, 2010
1350DF9CACED963A2B5FA7D2511F6740F1CAug 11, 2010
129DE78C9540D5002DF37BBD0298BC983DEAug 16, 2010
1316CFF21EAFA03B5BBC9215E9014817F3CAug 20, 2010
12502040BDC3D500F5AD6024B4196D64194Aug 26, 2010
1344C154B6A2EDDD2D70D25A9010B5E80FAAug 28, 2010
12593B16BCC4944FABB83309FF32FF15A9FAug 28, 2010
125BF394924ADFB3CF4AA0DAF56CA96BD49Sep 8, 2010
1301CDFE4CFDE4119ED547497385AA6E0D4Sep 16, 2010
130EE804D8FE64826F495C7C343E68E06DAOct 1, 2010
130A5787ACEAFDE87F10008FAC659250C8EOct 8, 2010
13127E9C4BD5E7ADE0D4C1FD0CC9ADBF865Oct 10, 2010
1312E3BE3EF90E70D237677EFA1342885F5Oct 17, 2010
12811B25FC0C9C2D5E7F04D26FED3F29DE3Oct 18, 2010
131BCCCA18F8EA4849821C8ECC35AEB55A9Oct 20, 2010
13128D7BA3FB7EB039E8AB876475FA0C9BCOct 21, 2010
129EE5DB7747696936BE148AEBFFA9EC1C0Oct 29, 2010
1269790165B1DAB9ABA02613E2B2F42E6AAOct 29, 2010
1304262F204AAF94EB5E027FB479F364103Nov 3, 2010
135BBE2DEBF70AC414CFF10CA0E69BC2A05Nov 25, 2010
129228CB86895216435B294EA309B4B214DDec 6, 2010
1348BF803E8F65001EED6AB288B6C0BDB0EDec 14, 2010
1308898B75F91FBBD5DDA0AB9C079FBC57CDec 14, 2010
14197EA4EFE3533D9DA1C7CAC6CF6390A63Dec 22, 2010
130E40F9EDBE0A2D1AE09243FD5157E7A32Jan 6, 2011
1309A1DF6D34C8B5F43CAB83EFB0A39AA88Feb 3, 2011
12587439D25E8951E4A484C61274958E676Feb 15, 2011
129397BA4B3CA4E1469AE79D5067CB1224EMar 21, 2011
1300E2C48F1A2265AF0AF39D093160E2619Mar 25, 2011
1320F229EA0334B96FA12DFA28AD5C9EE37Apr 2, 2011
13051739186E9D811B5C2EB184A3C88F653Apr 3, 2011
131E4C13E39E0D8EE4B0BA08EEE2700F121Apr 3, 2011
1241560468B08AE75C30F054E94DD4E4915Apr 15, 2011
1292C2292B923E28F0C1DE8F04F8EF72A7AMay 12, 2011
13059F7475606EC5F9C64DB0C19932D0BCAJun 7, 2011
1343DF1CA281CF734496F2D57B18229F470Jul 4, 2011
129529263456F948344E019E85D8A283A83Jul 7, 2011
129898599CC5D4769FDEC01B744F787455DJul 26, 2011
13045F563D42EE7A7183F7D90C962729934Aug 4, 2011
125B981E2727EF721D2185766A7DB6F5513Aug 21, 2011
134A5FC15F2D0EDEDB59D9AF1333D6C05ECAug 22, 2011
1281E0A8C1A18329B8F74EE3436B7FBC655Aug 27, 2011
126B43BBDA77A61AB87DD2E162C749B6DC4Aug 31, 2011
1255B42789CE304A014826EBCBB322D40D7Sep 11, 2011
131ED2033026A40B90D6498ABF168BCEF3ESep 25, 2011
1326C727EBEE74E7D00F9FC5D90A09B2122Oct 15, 2011
131C304C644BB6C9B95ABE07D22EBDEAF17Oct 17, 2011
1353808F74D183206BB6B170D4B016ED67CDec 30, 2011
123A7F92B395B111FF380EEBDD135B6EB3AJan 8, 2012
132D99A688CCA001101207110DD9C7D7F6BFeb 17, 2012
1294D661F0181628ECA5133330FD5A0A7ACMar 8, 2012
13874D63EC772767757880020483EC78DD7Mar 13, 2012
1307F5C6C8D931FBB12F4B0136B6BFBD217Apr 18, 2012
131761B7687A507455C4B73FB6DA8462943May 7, 2012
130A2F0C2578B80B59BF0E6AFB5C7442398Jun 5, 2012
1308F1506E8FA9A8C69512BA28D20BA001FJun 16, 2012
139B51A589E15C2E28AE06467628242F0E0Aug 8, 2012
1308DCF67338830231B4C67A60814DA19B5Aug 15, 2012
1309393BC5D63318DF96C04E450741727ADOct 25, 2012
129D8C4D965360EBDB682DFE1F2A0100D97Oct 31, 2012
135C19769998624CDAC1A3B54688A9D0A00Apr 21, 2013
130431E36AB92EF355CE73A2B1CCAEBCDC4Aug 22, 2013
129D2A495E95268242BE756F5D98FC05E76Aug 23, 2016
13069833741969EE01BDDC5094239E0CEE3Jan 13, 2010
12951E267F9460219D306D798C15A03154AJan 20, 2010
70313088E6FB5EDD1CAB1F3CE156C2B3BCFeb 17, 2010
1307197A21C673364737BA0DC77C7D60916Mar 6, 2010
125FB58A3C70FF65DF330C24203C837C9AEMar 26, 2010
1303AF5A3FFE8A42F90E49E04F52067B4D4Jul 10, 2010
131438E91D31AB43AFE82E5288CEE2CA033Aug 20, 2010
1318F063E8CCB86C881895952B7F850D787Apr 3, 2011
129D3A85FDBC3D46B7733B5AAB9DEF0B5B3Mar 8, 2012

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove Online Spyware Test.url^

  1. To enable deleting the Online Spyware Test.url file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select Online Spyware Test.url and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of Online Spyware Test.url and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of Online Spyware Test.url and Associated Malware.
  6. Notes:

    • The deletion of Online Spyware Test.url will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of Online Spyware Test.url will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a Online Spyware Test.url malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type Online Spyware Test.url. The name of the first found registry value referencing Online Spyware Test.url is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to Online Spyware Test.url, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of Online Spyware Test.url and Associated Malware.