Exterminate It! Antimalware

malpedia

Known threats:661,734 Last Update:November 22, 21:37

Testimonials

Hi Jean,

all done. I presume it went smoothly as the computer has not disintegrated into a pile of twinkling dust.

Very many thanks for you help and patience at Exterminate-it. When I contacted Exterminate-it and loaded down your software I was on to my third antispyware company to solve a problem. Two companies had refunded subscription fees to my credit card rather than persevere to fix the problem.

Your team has guided me through the problem. My system has continued to operate through the whole procedure and you have been endearing patient with an old computer geek.

Keep up the excellent work,

D.

File: SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}

Location of SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} and Associated Malware

Check whether SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} is present in the following locations:

SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} file locations that are Windows version independent:

  • C:\Windows\Installer\SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}

If you find SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} File^

File SizeFile Md5Last Seen
20480BF619F6F5C7B1956D1A160974A31D026Apr 21, 2017
20480D28D0D11CE9E4060F0B2E598E0D3D90FApr 24, 2017
20480F867BC8C14CDB34E08B492D854B919C7Apr 24, 2017
204805BF438A1DC40B4EC3DEF10478E4B6EA3Apr 25, 2017
204809F2E4F416BEB9CFBA5FF09E176888D2FApr 26, 2017
20480EBCAE0A9065B2F733F2AB05953ADE5EDApr 27, 2017
204802CA6466EB0366966EC4F5972A7C0DCA8Apr 28, 2017
204807D60217121CB44104DF05B5ECC288840Apr 29, 2017
2048039C4FEE7F152FF8B9D2F0CD20F446D4EApr 29, 2017
2048031110C21F1A328DC8D1D730DFDCC45F9Apr 29, 2017
20480BBFCACFBF2E6FCC978D0B04AD54989E7Apr 30, 2017
204807C9A132B726467E81BD6A93CC088ED28May 2, 2017
20480BCA8ECAECAB73461DA1DEF014A470F89May 3, 2017
2048034A87E0CB0699E108A0D92684C3AB5A6May 3, 2017
20480E0B18A047C7E958F1F848F22C46D921FMay 3, 2017
204809B679B735FE8001FA8C24A27E0D632ECMay 4, 2017
20480F8BBAF97421AABEFD659514497B098DDMay 5, 2017
20480481E24AE32744716F86A7939C55067ECMay 5, 2017
204801E001D9E5F496D428EEE0F1AA5476CDFMay 5, 2017
204804602FF5E05B9CE43D6CD3500BAA4D090May 6, 2017
204809720049D83913B85A9DD8CD8C4DA46C4May 6, 2017
20480DFC8C6AFBFF0D01057C1F0A1D3EEC14BMay 7, 2017
204808E8CE03CB8D2B743B50383EA8DC18F2BMay 7, 2017
2048017FD5C35F95ED6827DA8A68EFEDBE01EMay 8, 2017
20480FB763C01A910E091299B797127F3D287May 9, 2017
20480520D7F7E11A047A8E63A049BEB6ACEB1May 9, 2017
2048013B1F4A641D6D9DC5ABECF6141E52849May 10, 2017
20480BE71218509239EA5CC14C13CC8F13895May 10, 2017
20480180897303E8F63ADAE3BC4A81A6C183FMay 10, 2017
20480540359572942B4C6F4B8553B062E4F17May 11, 2017
491522BFD0B6719F4B64F1AB0DF42611627B6May 11, 2017
204807666D4B559BB1B78AF152C973CA46040May 12, 2017
20480798BFC2181D457363B5190BF417C9B4AMay 12, 2017
20480E17FC9DD00BF1943F183BE989CF4EB1AMay 12, 2017
20480F2D0F2C012A71A1C5A839F84E8CC2F82May 13, 2017
20480132F854BB5E79B0CA5A6E16408D0BBB6May 15, 2017
20480D12576D3B1BCA4D1444ACAE8838CF3E4May 15, 2017
204806D611122E3ABDCA1AD8B80653D4B631BMay 16, 2017
204801424B7C4A5202CC346A1B7FD7745A2DCMay 16, 2017
20480BE8F082EA16EA62E5F2A388B1038947DMay 17, 2017
204808E05EC113434838EC93D8BC7446D3C86May 17, 2017
20480BD244C675F13FF07FB2FA38E60C2A946May 18, 2017
204806BE156330B54E92314AC14024B671E5DMay 19, 2017
20480293A2424D65D41F347B5C8E0C69CCD8FMay 20, 2017
20480BBE7EA709BEE5758BD5BAB49F04A5003May 21, 2017
2048093F3BDC9F7C307A4080AE712894C3099May 22, 2017
20480D9E4B1A58570415231054C4D29B9604BMay 23, 2017
204801365B07E685A33C9D94D10C935BE7B68May 23, 2017
20480C0EE44126CC2CB0E03513E4130D70FCFMay 23, 2017
2048016BA2C276BBB6FB8AB8A328F2BCE7212May 24, 2017
20480E60B99BBBA186CA4F5584977584A5EEAMay 25, 2017
204800D7E2F39E4BF0821807B61EB441EC7CAMay 31, 2017
20480296539A7D29385F602B6CCCB18DDAA41Jun 2, 2017
2048087B93D7BDDCFA777F9FDAF8B1C084D08Jun 3, 2017
20480AB1086E4801B9784A9D02E09A96FDFD1Jun 4, 2017
2048027FCC3555BEFF784251F00F0652B1CE3Jun 5, 2017
20480634F3BEA547491077EEFA7C213210C88Jun 6, 2017
2048083E340A6382C5C4C522F58246FB4630BJun 7, 2017
20480BB4315447FD95F4F0E56B40B55952AAAJun 7, 2017
20480F9BD6C17DBD25D243861854A7BCBBF7CJun 8, 2017
20480364A591B1B2AD99D7AB5528C7404FAABJun 9, 2017
20480F39A4AC16884F924415724CFB669A933Jun 15, 2017
20480709268E63271BB175CE6F39823AC2C7EJun 15, 2017
2048008CA8259AADA0DED5E3A32DD3C35DF93Jun 16, 2017
20480A3961125DBAF465563FDB3139AACFE5DJun 18, 2017
20480096A0357DE8580927A610ED8791D6E64Jun 19, 2017
20480C56266DE77C4A3F3045E8C570F59E5CEJun 19, 2017
20480126FCDA6B3F378BABA5FDD9E5F20F0CCJun 23, 2017
2048052B392457F84BE2DFE7314DA32D2C780Jun 23, 2017
2048072238CE1E110CBE48B0E9507623E95A2Jun 25, 2017
20480EB8F2EA7F97D6BC11F48CFC5E45FF7D5Jun 26, 2017
20480C9ADDE741EC105E83CB60F3B1C364921Jun 27, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}^

  1. To enable deleting the SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} and Associated Malware.
  6. Notes:

    • The deletion of SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}. The name of the first found registry value referencing SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of SourceHash{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1} and Associated Malware.