Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:July 17, 22:52

Testimonials

Hi!
I just wanted to thank you. My computer was frozen last night thanks to an online Easter card that was sent to me via the funcards site. I couldn't do anything but open windows.
I tried to open the exterminate it program that I purchased last year but the funcards site was blocking it, too!
I decided to purchase a new year of service (knowing my current one is going to expire sometime this month). It took two hours of searching, but exterminate it fixed my computer last night.
I have no idea how you all do it, but I would be lost without your service.
Thank you!!!

Valerie

File: software.url

Location of software.url and Associated Malware

Check whether software.url is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific software.url file locations:

  • C:\Documents And Settings\USER_NAME\Favorites\computers\software.url
  • C:\Documents And Settings\USER_NAME\Favorites\ computers and tech\software.url

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific software.url file locations:

  • C:\Users\USER_NAME\Favorites\computers\software.url
  • C:\Users\USER_NAME\Favorites\ computers and tech\software.url

If you find software.url file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The software.url file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of software.url File^

File SizeFile Md5Last Seen
140D69F27C07BC55E3FACB7E85E027ECE54Jun 13, 2010
8452E88DCCBB44A8B82108B352CA99EE31Jul 11, 2010
801A9BBAE8A286992BCA25DB22F735CA7ASep 17, 2010
1888F2F89618AA8C6648BD6701E72E48A94Sep 27, 2010
2504D2F620DEBD9846C0B7064C753E4A655Oct 3, 2010
172CC37726BDDC956E50D5AA29EE68EB7A1Nov 18, 2010
106F6C0351C394ED225C25140A15B1BAB11Dec 1, 2010
125FEDF98E37DBF71970A080B27918B0904Aug 6, 2011
80AE09DF9498EFD9CD9B7E585B9DA9F55BMar 13, 2012
1885163B986C493F2F868323B8A3D05412BMay 30, 2012
1700B43AD31D0E5D9C457110D4AF474B617Dec 15, 2013
125ED04F16708C554482BF584C21C970487Sep 3, 2014
382E9739417669D95C0DC1A59E396C6FDB2Sep 29, 2014
757E97CD9B0984D106CA51A91AFFAF1E42FNov 13, 2014
804D8E35FEB0F82C2BED90686A44E2092AMar 12, 2015
22610C99F081643D1C0ACDBF13BE6A55CDCJan 16, 2016
7653562F93890DAD4FF9800A1024908F10Jun 29, 2010
5589C7896FEDA74CDF7F8C36F4546CCA2DAug 10, 2010
839D595FEAA06DA762D4557D8F6E0C2807Aug 13, 2010
54DEA7BFE49927756FFDB415C59C69A3F1Aug 30, 2010
55CFC98E989CE3B11C22311B721D4E727EJan 31, 2011
51C5164499CF26E40E25C124C3065925F6Mar 17, 2011
77B26D669F0C7FDFE2EDA3237F9C897F46Oct 14, 2011
74B11D46C0217D695C4B773932C4825FA5Aug 17, 2012
53E3B829AC0C0469F22688E93C197F1D17Sep 11, 2012
5142497031617369CCD8A7EA7A9EE8C354Apr 19, 2013
844DB50467A2F43E6575C37FC2D58812A7Jan 9, 2010
739CAFF12318122980421ED0E1D10CD798Apr 20, 2010

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove software.url^

  1. To enable deleting the software.url file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select software.url and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of software.url and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of software.url and Associated Malware.
  6. Notes:

    • The deletion of software.url will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of software.url will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a software.url malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type software.url. The name of the first found registry value referencing software.url is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to software.url, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of software.url and Associated Malware.