Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:November 20, 22:46

Testimonials

I managed to get my main PC infected by the Koobface virus. I put up with it's constant interruptions as it presented me with the fake virus screens offering to correct the problems for me. This continued for a couple of days. I ran both SUPERAntiSpyware and Malwarebyte's Anti-Malware several times and neither of them cleaned my PC of this irritating virus. Then I found your Exterminate It! product and decided to give it a chance to succeed where my other attempts had failed.
I was blown away by the speed your scan runs, and once it identified the virus, I would have been crazy not to buy the product and let it really exterminate my pc of this virus.
I'm very pleased with your software and I'm so thankful I found it. You've saved me hours of time, effort and frustation.

There are so many companies offering software that promises to clean viruses, but I'm thrilled to find one that actually keeps it's promise.

Thank you!

Sheila M.

File: pidloc.txt

Location of pidloc.txt and Associated Malware

Check whether pidloc.txt is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific pidloc.txt file locations:

  • C:\Documents And Settings\USER_NAME\Application Data\pidloc.txt

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific pidloc.txt file locations:

  • C:\Users\USER_NAME\AppData\Roaming\pidloc.txt

If you find pidloc.txt file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The pidloc.txt file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of pidloc.txt File^

File SizeFile Md5Last Seen
468134A43A9CBE70A304C5CB4AEBE0F385Aug 8, 2014
54623E289AD73C2B43C9B3A4AEBD9AC786Sep 15, 2014
56CDD5581748545B36F465E648576213ADSep 18, 2014
507E13B7548797DE3DFA71480BA64F2F19Nov 22, 2014
135E3F663D6D4682B92BCCE68F0DB352421Dec 10, 2014
47AAE4D69392A572C89F8C78B618EA8BF9Feb 1, 2015
646A82BC7A46DEBCA84F42D2F2E88C7DA9Mar 22, 2015
522ABD0060FC64E19ACF81671B4659C815Apr 14, 2015
40D4769AC544A98FC9A75907136A2E02BAMay 19, 2015
531855FC20A5C6A7A526B76223E0549664Jul 15, 2015
51DDB1D5EC23F0529E62A4F310E11A542EJul 28, 2015
49ADAFF63A90278536855A6509CC2BF981Aug 10, 2015
697DFEDE22D364CBC14D17E901FA2CCD6CSep 8, 2015
46D72F1CB4A547F7C7D4B0C1617615B4D5Oct 13, 2015
668FD75F0AF4294C422924E73FB3AE82B7Dec 3, 2015
6137939E0195AB14364496EA735C0849D2Dec 24, 2015
57D685103573539B7E9FDBF5F1D7DD96CEJan 28, 2016
53193F0865831D2F60D089740F6FBF4ED1Feb 4, 2016
53A3FE4F22BAE4585ACD04BF7C667373CDFeb 11, 2016
52278EBAD8834E9C9F51DF6098D86876E5Feb 16, 2016
459EAFFC11777A12DE33DDFB13B763F531Apr 2, 2016
62865CB8939436FF454A250F58CE239EA6Apr 27, 2016
29B1223183EF9089228754BB2B9C9FE6E1May 3, 2016
21FDC0A50ACBEDFE53065ACC7FAE44CBCEMay 19, 2016
53C1801B080315F7CDD8757E143EBA614EMay 28, 2016
36CC804E7F858BC7199BE02E412039797BMay 28, 2016
572C5E020CD109A74BCB37888684C48530May 28, 2016
7030C1C1C051DB7E78798F9E88F8D1AE98Jun 17, 2016
48D04695A7E0AE65AD7E5122E014EFE307Jun 20, 2016
57833E42F4C22485E5E5FE62BE8E940EF6Jul 3, 2016
505426CA23E733FFCB110D74095A63CE71Jul 8, 2016
48E9FCF0B0C516B422E6B0974040C347D7Jul 17, 2016
50E9BB86ACB9AEC0FAB0219D3408DBA09EJul 18, 2016
50888F9BB3639F302ECE84EE8CD65D34C2Jul 21, 2016
48C2357F235556CDB8E9F4F4A60524803EAug 10, 2016
47AD6B51BC964948C088F1DA60A3918A3EAug 26, 2016
953D091859CC9951242D8701B5BFB6B93DAug 28, 2016
470D7DB7FF842F89A36B58FA2541DE2A6CSep 11, 2016
63B1C8397F46B796ADA96735CE567B3460Sep 22, 2016
32D4A94C422E759B0EE00C49E7122917EASep 29, 2016
335F75F99C86D9F85EA0112DB3A4F8AA46Oct 11, 2016
5708E799E8E9B4FDA648F2500A40A11933Oct 20, 2016
491DE94E70E5E5A609548CB3008D53D605Nov 19, 2016
4439D7149BB0F4A6531E498F90C06D4BF4Nov 22, 2016
481070E70353939E2EB81BE4F1BA51AAA5Dec 3, 2016
46B4FD7BA56A46B6FEF1B40AF999F98CC0Dec 7, 2016
48AE02F82A80731D0FE80A9C1FFBE08A4EDec 11, 2016
49FFFC8A16E8325B7F5ABEACA892802A6BDec 17, 2016
52E3CB5746BBB3EA1A1ED476B9EC8880CBDec 17, 2016
67070ADB43D085D7691E913127B6E4C7B7Dec 24, 2016
40480E4AA3BCC8D78D8958603E9248F5DFJan 3, 2017
43A05061F417C65FD6A484FE1DD036BBBEJan 23, 2017
56EFD1636CFC3CC38FD7BABAE5CAC9EDE0Jan 23, 2017
57F859597A3CA35E4E362A90A9FB61EBD2Mar 5, 2017
5330015126506367B9A8B81A223038E210Mar 5, 2017
49E9FAEE87A060C806E7234779CFF7B480Mar 11, 2017
522A23A5577977728B6CF1FD272D483166Apr 4, 2017
17086D6EA268DCE372858495E6E7026B86CApr 5, 2017
480DCB568AEEEE4BD7BCF7EFE1F26CC7DBApr 14, 2017
75D55121A58D5AF5515B18B99455A62985Apr 20, 2017
50CD90113CCEF54327B56F878521839D80May 3, 2017
48B88D52EA1BB385495FEF63DCF98C11A9May 10, 2017
103264A7C3A656AC970D7350791777CC6A8May 17, 2017
64AC77B1BC72CBE6E7A46A19D4DA38559AMay 23, 2017
6542EBE8B792A53CB3B123CEB4DF229066May 24, 2017
51655F3447954D1640C91BEC8D9F78386CJun 10, 2017
596157FF940CA733162D87F2550F3422C4Jun 17, 2017
336658386FFEEDB0F906FB933068E4D036Jun 17, 2017
49D78D622FB99B74744344A54F4072F378Jun 26, 2017
630B6A02A35CCDBE28EB9E9D40D532BF78Jul 14, 2016

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove pidloc.txt^

  1. To enable deleting the pidloc.txt file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select pidloc.txt and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of pidloc.txt and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of pidloc.txt and Associated Malware.
  6. Notes:

    • The deletion of pidloc.txt will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of pidloc.txt will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a pidloc.txt malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type pidloc.txt. The name of the first found registry value referencing pidloc.txt is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to pidloc.txt, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of pidloc.txt and Associated Malware.