Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:October 27, 11:19

Testimonials

Having wasted better part of a day on a Vundo infection, which none of the antivirus/antispyware solutions I normally use came even close to handling (one of them actually compounded the problem due to a partial fix, causing all browsers to seemingly lose connectivity after a few seconds), Exterminate It! fixed it in a single pass and one restart.

Nothing short of perfect. A few dollars very well spent. Thanks again!

Laura G.

File: Run Virus Scan.url

Location of Run Virus Scan.url and Associated Malware

Check whether Run Virus Scan.url is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific Run Virus Scan.url file locations:

  • C:\Documents And Settings\All Users\Start Menu\Run Virus Scan.url
  • C:\Documents And Settings\All Users\Desktop\Run Virus Scan.url
  • C:\Documents And Settings\All Users\Start Menu\Programs\Accessories\System Tools\Run Virus Scan.url
  • C:\Documents And Settings\USER_NAME\Favorites\Run Virus Scan.url

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific Run Virus Scan.url file locations:

  • C:\ProgramData\Microsoft\Windows\Start Menu\Run Virus Scan.url
  • C:\Users\Public\Desktop\Run Virus Scan.url
  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Run Virus Scan.url
  • C:\Users\USER_NAME\Favorites\Run Virus Scan.url

If you find Run Virus Scan.url file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The Run Virus Scan.url file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of Run Virus Scan.url File^

File SizeFile Md5Last Seen
13105C5DB50A9C806AEFC571BCC334858D5Dec 19, 2009
132C09807FDA46D5CEA004A5CE7A7DAADD4Jan 22, 2010
13104781C3160AE4CE7EA3F5A20A87DB24CJan 28, 2010
1317DD2D7A7862DF45FE9D8A16A2E73CF34Mar 2, 2010
13143A831E55BC342299AD568CB0206CE65Jul 22, 2010
131C19FD64F0FFA87493A8463D40B630DDFJul 31, 2010
132638FE15E67E662688C8343DE7CA065D8Aug 22, 2010
132C62CC6D685C3873224F8AD25485DD61CAug 30, 2010
131CB75656BA07A1F31E687CEE01FA1EBD7Oct 21, 2010
131F509AF29DDBC330C6BACEDADD6E4EBC1Sep 25, 2011
132A2AF8CBABD2F5313E16FDD0544A14947Oct 15, 2011
132E9B56158F094E574DAF1429FE2F34724Feb 17, 2012
13163777EBD16C759E1528F2FE2C18458D9May 7, 2012
13962E22ACCEE907193E0ECA46C9BF34502Aug 8, 2012
130C73D21CBB08870A32C054B775235241EOct 25, 2012
13115330CBAABE5BF599AEF0441CE985F9CDec 19, 2009
13109A94F5ECB8F0EB02B9E02F6F13C8BF6Dec 30, 2009
132D06A42CFD4C4ADEFD45A6B9E6BBF41BCJan 5, 2010
132F7D8FC96B746CC939828145105948B3AJan 22, 2010
131B2C980C2483242A0B65979AF9B0D0802Jan 28, 2010
1313059411542E51166281B4D7F6CF6CC47Feb 14, 2010
1324F5C86FAEEA12B7337F9BDE06BE2578BFeb 16, 2010
132A696E5F9535860CB55691A80A8A25D43Apr 13, 2010
13187FE940307D088A6FA35B53C27AD6369Jul 22, 2010
131494374536017FED0BD87FC48F96F1141Jul 31, 2010
13277388701CCC5C3F57B17FFB5D6CD9775Aug 17, 2010
1329A838661D592A1B6D817CD86FA014718Aug 22, 2010
13270B663A214D43DC0AC044C30B039A44CAug 30, 2010
132742F10A01518071B7F64A16AF530CC25Sep 13, 2010
131EB0A4467F19C67F17D10640E679C793EOct 21, 2010
13144A37A8784870957471B01A8B0478849Nov 16, 2010
128A69D966347E3467D9D0FAA13696392E1Nov 19, 2010
1283DCE8E93B352AC966120B5047D40DC17Dec 10, 2010
132DC2130E40084966983C0916CE6434C4BJan 11, 2011
131D22A67D4CB59E894EC1F396840A19718Jan 25, 2011
1314A5C9190E6591D67208B44661EF908F7Feb 1, 2011
1312A55E4D83CB2FAB5877DA6E5280E57F1Apr 16, 2011
130085EA095CC1FF21F38899FD747E11938Jul 19, 2011
194597C6E87E93E07E7EC8B54ED3CB9DFC5Sep 26, 2011
1324C34DB322F02CAF889E4909B98A968D1Oct 15, 2011
132A7068EC5175B65B71AE4E91CD06C8295Oct 30, 2011
1311A6F64CD4687310BA6946EFB5EE39512Nov 19, 2011
1312C3D9E3CAAE950CE94F65471B9B59086Dec 14, 2011
132C6FEE6A57EC0D3AAB5E87D92B0451E4DFeb 17, 2012
13380FC1144E8CF595BE7165E48A0155537Mar 8, 2012
130CFBB7AFFF3B03FA46D64D34DF7BCD15AOct 25, 2012
131194CEB0D9A56B81E5071AD490E7C289AJan 11, 2017
707D46D1C922838990CE2C49219A818501Feb 17, 2010
1319D017D6D6EF7807A6A03806429E728A3Dec 19, 2009
1329C6CB199719998E609B5EB12CFE05FE5Dec 22, 2009
1318D6A3336674297134C21F1B5999C022ADec 30, 2009
1976742847CC053D81F466EB2323E760AF9Jan 2, 2010
1329425072A128ED60524CA698176C8C096Jan 5, 2010
128B3405596BE5AAA28E31A0BDAF720CEA7Jan 15, 2010
132FA57D241ED365025BFA77FA40075C46AJan 22, 2010
1310B01034E1F9AD5BB2F77C65A882C49F3Feb 4, 2010
1312C1C5D91970BBD1315DAD9DB1C9A73C4Feb 17, 2010
1762851D52EE555357C81F302F5BE6ADF6CFeb 17, 2010
137E33DEBF058724928AF06793B9F3BE9C2Feb 22, 2010
20195F03368E135E56EB790FE3AE022BFD2Mar 20, 2010
1328CA961884106F51635C190132F7E55A6Apr 13, 2010
676A8B1B8EC723199255E0DAB7094361ABMay 30, 2010
131ECEAD2D33B674E150DFDB97E2C73643DJul 31, 2010
132E84F6F9E72EA44207F4AA231158E42D8Aug 17, 2010
132E29BFB911302A92D582B96FC6536A99EAug 19, 2010
1387428BB5C3A1690694E828931BF1CADEBAug 27, 2010
132DE33B98E8FA4156A8FD268C276631051Sep 2, 2010
1385C7C27F822548A7EC3B6370440D11BE2Nov 9, 2010
1289FFFE94D706591C3EF27FA19171D33E5Nov 19, 2010
19892001FA9BDCE70DEE872554417301EC8Nov 21, 2010
13229A97DF2F05338848F70FC4D3E112EB6Nov 28, 2010
131EA84919FDE8D952FC9E603C3EFEC0596Dec 8, 2010
129F2FDE617D08C014AFB7749016055F8E4Dec 21, 2010
1326DCB2DCDB7A8263AF7892B4C3AD39BDAJan 28, 2011
131C05C59A7B74FC4D98D0305AAB0051BC1Feb 1, 2011
132E775F182691E07BE402AA670B061497CFeb 24, 2011
131799D3166F523826EB55E8515FD8D29E9Mar 6, 2011
128F280FCDF0D1AABB0C38861F0C728033ASep 6, 2011
19577EB173C9BFB35384BAFB83F7E843B54Oct 15, 2011
1326882558E1FAB05EF97298C0205802AD9Oct 23, 2011
132FC619B087793D99F408489E0F587233FOct 30, 2011
131561B223FB482C8AEF468807386846971Nov 19, 2011
138B1EA8C2C580AEF690AF7427BDE6EC526Dec 4, 2011
1316DDE8CEC432F03D56B6724F4C15101DDDec 14, 2011
13224B5F4158082B12BDBBB9045D49FF621Feb 17, 2012
13978EE5C465D944D91042B507B30E544ABAug 8, 2012
177F0B19EB24F03EA8C403DE7E70DF5C119Oct 8, 2012
1750FA5A27CB40D2B41FAB89CEF6E5F17C0Oct 25, 2012
195C5041E8CD73867249DED8C79AFACE390Nov 26, 2012
1327678B709259B51F426B4E758111BEA38Jan 5, 2013
17724ADDDEF8737D3F8533DEFB9B6989C15Feb 1, 2013
131DA63F955153B2827D2BB4AD20E4EEEA4Feb 21, 2014

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove Run Virus Scan.url^

  1. To enable deleting the Run Virus Scan.url file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select Run Virus Scan.url and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of Run Virus Scan.url and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of Run Virus Scan.url and Associated Malware.
  6. Notes:

    • The deletion of Run Virus Scan.url will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of Run Virus Scan.url will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a Run Virus Scan.url malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type Run Virus Scan.url. The name of the first found registry value referencing Run Virus Scan.url is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to Run Virus Scan.url, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of Run Virus Scan.url and Associated Malware.