Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


Every contact I have had with Exterminate It! team has been at the level of customer support that I expect or greater.

Arcelia T.

File: pctskbr4.vbs

Location of pctskbr4.vbs and Associated Malware

Check whether pctskbr4.vbs is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific pctskbr4.vbs file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Temp\pctskbr4.vbs
  • C:\Documents And Settings\USER_NAME\Local Settings\Temp\2\pctskbr4.vbs

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific pctskbr4.vbs file locations:

  • C:\Users\USER_NAME\AppData\Local\Temp\pctskbr4.vbs
  • C:\Users\USER_NAME\AppData\Local\Temp\2\pctskbr4.vbs

If you find pctskbr4.vbs file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The pctskbr4.vbs file is associated with malware only if found in the locations listed above.


Different Variations of pctskbr4.vbs File^

File SizeFile Md5Last Seen
792D2C696C1FECD236F061AAB5846A036B0Jan 22, 2016
80912CF78055F762FAF8D3A651F17A2364BJan 31, 2016
802AEB69766AF2BCAD1163190AD685BD040Feb 16, 2016
808CF0198ABFC92EDB2E68E90DA96A3048EApr 5, 2016
80593222F00B3E83390C6346B929997CCD7Apr 6, 2016
802AD68A48CB33A774D93B2D2518539F4BDApr 24, 2016
80108CA4866E1FFF292A416DA11FC74889DMay 2, 2016
803DA68B73D89150AD8DF334B76AD687C8DMay 22, 2016
798F18AC49B4675811F0981EB35368DEDB8May 24, 2016
802E6C2C52DCA7ECEE5AB641DDFE2267CE1May 29, 2016
80193B043EEDB199A4FABD2F06D3334FCA3Jun 6, 2016
803673807F28490442FA38FF8A1E833AF85Jun 18, 2016
800D50592BA8DA0F6A32477E6278ED6CCEFJun 18, 2016
801F20515F507658F4859FBA41BD971B3C3Jun 24, 2016
801A772470F3A00357D0947F4FA259A3DF8Jun 24, 2016
798C76889A5FEE3EF680D35A28CF6D1CB86Jul 10, 2016
79977603AA56FAE171B41AF21A525DF89DCJul 11, 2016
8100DF138F53C52376F3C764476856772E6Jul 14, 2016
800E12EFBE5B4D33AABA7F207F2CA57BBA5Jul 29, 2016
7881DDB10351C2C8BDCEFB5B29FE144080BAug 6, 2016
8035B1B67E8FE8E10DA2AC0398254E80E3AAug 6, 2016
801C4DE7EF667A2A079F9D3B7310BDDD6F7Aug 14, 2016
801F21820484BBB409C601AF7BD58181419Aug 20, 2016
79931A40EC85229FA0B43E66DB7E68C4247Sep 7, 2016
8014879D8532794A3849D2341DEC6C29821Sep 13, 2016
80887EE4384D62C5C54A2D73AC6926FF846Sep 29, 2016
805A0F5D52A027D84B17FCB3BEABABF4FB9Sep 30, 2016
7933E3D5718127471B232C4B37D8DAAE392Oct 24, 2016
8119E29F1E590D156D8B208B8BDC326D238Oct 24, 2016
8066128071ACF9FEBB4BA3D1B567820B19DNov 2, 2016
8093E4DF3F51C370288B8973A70008C9C3ENov 6, 2016
8002D5E37847304C319F0AC8FBEB0F6933CNov 11, 2016
8158C9D6C3C4FB84120D3DE13E4B542FD58Nov 11, 2016
813576430440A46199A1E0E3FE86C3B281CNov 18, 2016
81112C4C41CE47B447874E8D7204A62D0FDNov 18, 2016
808698603A4E7315506B8102D9D53DBC41CDec 6, 2016
803DBEA3C4A99DDAFD6438FBBBC5584E64ADec 17, 2016
808FCA4A5BEA56BD152C512787C2B41A3B5Dec 17, 2016
8011524A13A7C9D1527DCD6F7A457C23541Jan 9, 2017
8095A59E083D8560F173DB59ED5A4B18CCEJan 28, 2017
8089AFBA94552A568DFCD4BF82639742529Jan 30, 2017
8126358D0A7E8FA441DF8DF9D1235DD5AE4Feb 4, 2017
8037582EFB05142A877945C725937783B24Feb 16, 2017
800730468EBD61828842AC56EFD3DA92170Feb 26, 2017
8014657DD497008DB8333F337BBCA7F6C0DMar 1, 2017
81141EAACFFC1AC87A33ED2D546BAE70C66Mar 10, 2017
8023DEF5EE8DB265443EA0FB6E12ACA559DMar 11, 2017
814F1F734B0B776ADC46EE08F3DD5863BF2Mar 29, 2017
81236D214149285AC2E559705EA88B532FAApr 5, 2017
8087E4F7F78EC443FDA887845A36077E2F1Apr 6, 2017
804BDF1B3A71B206CEEE757FA8B623C0264Apr 26, 2017
8174FB0D466BCE4AE755F0BC3DA97E3AF26Apr 30, 2017
8094A4814576AF88F9D2D7C26148B485720May 5, 2017
809DFB072D85DDC7083E24FC8A03FCE748BMay 9, 2017
809DBF529A7914AC3A346F53B004ABC722BMay 28, 2017
810D436ADA362FBFC3A99527D16DB28BA73May 28, 2017
80259514009332989AE207BCD27AF3B0D9CMay 30, 2017
848D9C4DCF923778B5B86AE146ACFFB337CJul 12, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove pctskbr4.vbs^

  1. To enable deleting the pctskbr4.vbs file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select pctskbr4.vbs and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of pctskbr4.vbs and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of pctskbr4.vbs and Associated Malware.
  6. Notes:

    • The deletion of pctskbr4.vbs will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of pctskbr4.vbs will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a pctskbr4.vbs malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type pctskbr4.vbs. The name of the first found registry value referencing pctskbr4.vbs is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to pctskbr4.vbs, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of pctskbr4.vbs and Associated Malware.