Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


Just purchased Exterminate It to remove Fake Screensaver and Richvideocodec, within minutes solved a problem I have been agonising over for days, saved my computer and sanity with minimum expense and fuss, thanks for a great product.

Craig H.

File: Program

Location of Program and Associated Malware

Check whether Program is present in the following locations:

Program file locations that are Windows version independent:

  • C:\Program

If you find Program file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The Program file is associated with malware only if found in the locations listed above.


Different Variations of Program File^

File SizeFile Md5Last Seen
1007AA8A7B60C604B81C0D86B7FB62B4557BApr 25, 2010
141FEA3504733AF914161747A0557A3C0A0May 19, 2010
1708001EC5D61ACD9315DA68E72A2B237BA55B9Jul 1, 2010
18905C9FC3AEB422FE554BF2583195625D50Jul 22, 2010
471C63BCC2C70C901151084374779C685DAug 2, 2010
890430B324F8D3A48403A189624C3585C312Aug 29, 2010
12288EA104712B119C293CF2398FA43F14795Aug 31, 2010
67A7861F20DA2290C9685BB413D40E3EFCSep 3, 2010
357C9FC2528CF785C916EF17BC5EA4337F6Sep 15, 2010
113608234ECF5F842B12F2D2274B849B5F5CF08Oct 26, 2010
38939085BFB33F67BBEC1D08CF795A571698ANov 4, 2010
711238230522C28644907CE3B184564FAA4Nov 5, 2010
357E6A0D16509326FAFEA291146B1DABEDec 2, 2010
363016D1C2EDA792E1E3DD4D28A6642C7F69BCDec 6, 2010
2192F273AAD797C09FDE024A4628678B08AADec 6, 2010
52721245F50EF9D9B43E87CEAAF1FA35D5B203Dec 22, 2010
34423E2DF76D3A7D97B91B2C8648BF855A32Mar 12, 2011
2011BCC35201330A383E36174DD6DE380D3Mar 13, 2011
597839E0879B49C2DB07C6CED7F581851A2Mar 17, 2011
399736276AC7BAE1F596A3A1D4B6D43AEF099CApr 6, 2011
67F15DA135116134F7A717130BB736F747Apr 27, 2011
868FFC59350A8D8F2B385EBF5504C4AC8BAApr 29, 2011
146347AB7D2040008228868AF1EF692041E3May 2, 2011
86763856B933CF75FA9C727C9779791CD06F2EMay 10, 2011
5563066D25B6414A651A2230641D630175C961Jun 4, 2011
54659630CB753FE19FB4F1971D2F960941437Jul 2, 2011
20480056220F2FF8AD140BAD9A6B084C6E7905Jul 17, 2011
22196229DFF92DE2B929BD1B805E7FC0EEFD6Jul 25, 2011
6680966EDD9F842CF5EFF333C8AD5AB9CAD66Aug 21, 2011
1391546A0D627721AA296E39CE121B40A6B0BDOct 18, 2011
6223D3CAD6E51ABFB87DC95AA7AC7B2525Nov 11, 2011
3249FE4B63E9B8A9432E57C97DA40247D1Dec 2, 2011
76732748F85A48A527D32B682FA5704D39DEEDec 20, 2011
96F2B9B5DACF6A8F5142E4C4345B4B8C7DSep 7, 2016
9607003D16594A004F618E6719C65AF226Jun 16, 2015
1572F7A6B7344791A1EC03BFAD92F2EC86FMar 14, 2012
1165CFB8B8C2971C78279A6EA068D7D48F49Jun 28, 2012
7606E84ADA4472623E30C7BEEE2FC0C6480Feb 20, 2013
4357EA51D36DB059CBC669B397E52EA658Feb 21, 2013
2097152EFB25AB255B95AA26A35A9BBB46A0740Sep 25, 2014
8730725F358CEBAAB88088B03C00D09A1A4C68Apr 21, 2016
2572951549D6FCB3669627A995B18B1540488Nov 28, 2016
77602B56A041D6E6B947ED83B27304568FFeb 9, 2017
100836B89C48D886C813A798258BAA6FB9AApr 27, 2017
411E50065913EEC984940219381675DFCD2Jan 12, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove Program^

  1. To enable deleting the Program file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select Program and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of Program and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of Program and Associated Malware.
  6. Notes:

    • The deletion of Program will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of Program will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a Program malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type Program. The name of the first found registry value referencing Program is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to Program, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of Program and Associated Malware.