Exterminate It! Antimalware

malpedia

Known threats:700,086 Last Update:March 16, 12:51

Testimonials

In recent weeks, my computer has been infected with malware and adware that just would not quit. A*G G*****t failed to remove them. S****t just froze up. Another anti-virus program just sat there and looked at me. So I purchased Exterminate It! This was the only anti-virus program I could find that would recognize and remove particularly pesky viruses from my computer. But even more impressive, they allow subscribers to send in descriptions of new viruses they encounter, and they will design a way to remove the virus and send out to you an update. I submitted the description of a virus to them, and a couple of days later they sent to me an update that cleanly removed it. If you run into viruses that just won't quit, give this anti-virus program a try. It's cheap and removes the viruses that the other anti-virus programs can't touch for some reason.

Source

Brother Mel

File: SPYWARESTRIKER.EXE-140AD6F1.pf

Location of SPYWARESTRIKER.EXE-140AD6F1.pf and Associated Malware

Check whether SPYWARESTRIKER.EXE-140AD6F1.pf is present in the following locations:

SPYWARESTRIKER.EXE-140AD6F1.pf file locations that are Windows version independent:

  • C:\Windows\Prefetch\SPYWARESTRIKER.EXE-140AD6F1.pf

If you find SPYWARESTRIKER.EXE-140AD6F1.pf file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The SPYWARESTRIKER.EXE-140AD6F1.pf file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of SPYWARESTRIKER.EXE-140AD6F1.pf File^

File SizeFile Md5Last Seen
68114DE301CA603909E48F2B8C0A7E3C6E2AEDec 19, 2009
728287ABC8F5971335D28814A9FC0F60D3929Dec 23, 2009
63660DE3FBA99354D1A6664BB123E58C54860Dec 23, 2009
35252FC5F4797D0277096A2371A8380EC54C4Dec 23, 2009
74560305BE3E88B6A7B6A7DD1650B2D26DBC1Dec 24, 2009
669084D6234C14D9975E726692116D5A6A6E5Dec 26, 2009
686621965B284D59FABD1C43ED95D417D26E3Dec 28, 2009
6517837B2F16132DB2B63EAC2B5B59ACA0674Dec 29, 2009
63218EF8BE1D4753BB7691CE69960D4A03AA0Jan 3, 2010
637125E29E647B967BC522A69EB5B3ADB75C6Jan 4, 2010
6298085557916C1686A53EDE8D317F4DC6D4DJan 5, 2010
64572572B7C8D65006022AC93EA04B2B3627CJan 7, 2010
67126999AF44AD0BEB8DA051DBA42940D228DJan 8, 2010
67312AFB274BFD9E18DB46BC0FE4161649754Jan 9, 2010
666583B02A04D378D5BA7AC9D6763A81E8630Jan 9, 2010
66444559579FD141A40EC41EF659905EFDA16Jan 12, 2010
66966E38373391313D3391B8BAC566C951D65Jan 16, 2010
6872007922E2A9123F2EFB9D4F8BBAABCBFCEJan 18, 2010
688049511D0EFCE5159E551EF2C8B6155AB15Jan 18, 2010
73684A8EAAF44BB37A96B52D7048AFED8A0FBJan 18, 2010
70302CECB064B36E9132FD7600CBC6DF491E5Jan 20, 2010
726501315986E76A4D16BE1AEF0D0955BF7EDJan 21, 2010
62052387E354EB77874737D1C42F95FB8CB23Jan 23, 2010
647945790A4D856C9C1E4FBBAEDB95A5ED586Jan 25, 2010
722104F566181BDED7C008A4CF739EBC14A9BJan 27, 2010
74984240AE3BECB8C93EF104955297C752203Jan 28, 2010
57790B827D30A90BE46C0A12A7ADDA47F8F28Jan 29, 2010
92798BDFBD1CF44B093E1804109EC03B21A46Feb 3, 2010
70384620B1537C0D64EE4AF58C727DA9F9819Feb 4, 2010
68318131AA68B81741F60023442F99BAD7128Feb 5, 2010
68834065352CC92BB716F5F129852022EA368Feb 8, 2010
685164DB2B556E142E1279F5571D3EDC0B466Feb 8, 2010
67742A201DCB2FD86D678AE67C53BEEA57B67Feb 13, 2010
65084C7CE9F8F0C18BA43A851C0413CF23C99Feb 16, 2010
615461240B130AE54B32DCD8B8A97AAA63D6FFeb 17, 2010
6903264C84EE26F20FCAC734D23BBA32A59F7Feb 18, 2010
65126AF93D430826601A36F44AFEFA9E49A41Feb 21, 2010
65416548F1B7CC689B0E2ED5749FB857D3D9FFeb 21, 2010
657988F50D03588B0890D12C5EA8C3B13D270Feb 23, 2010
64108FF982B673C3D9B8309D9C3FB22200A38Feb 25, 2010
605180700599BEAD0399EEA5BF50D2FBAE1A9Feb 27, 2010
613089A0F942EA3AA988D19C44410181628AFMar 2, 2010
62382C19E2EBEF68E4739BCD2185DB0B7BCCFMar 2, 2010
639081C2F23C573F310A1F82C2BBC73B33EFBMar 3, 2010
703609788DF7E46E78E74F968A22739BFFA15Mar 4, 2010
70988C054408261C0CB63781DAB091934FA50Mar 6, 2010
722085D5C191BC5BFFF146EB25CC78D7D558CMar 7, 2010
703227F3703D3AB249FFB2A804C49D38E509FMar 8, 2010
66176478CE92988C659317C21217E93679FB6Mar 10, 2010
657367F9873FA720BFFB0568EE9EFD0E7B2C5Mar 13, 2010
66722F09FBC118496EC19758E942D1AC00B25Mar 13, 2010
688487B2F2AA1811F2AD3526D0D8BA9E2054CMar 14, 2010
622126447CD00F1D06E5C5439F81D6DFE5457Mar 16, 2010
68594F0F808BB6B25D55BD3F8076086E54754Mar 17, 2010
6645086AD5FCC385624921A7C2F341D740914Mar 21, 2010
69454D444271A286E4BD725067678A1644166Mar 22, 2010
68612C5DDB11DE4D9AAFECB9F2589F6097AFDMar 26, 2010
6968069DA61B0DE8597DC5AEDE55DA76928ADMar 28, 2010
626022C72451750C0C47EB78C01A5E862762AMar 29, 2010
66672E3688C241F5F9ABA9D28C4401EA03000Mar 29, 2010
7269258CE2EB2D38341400CFB33688B69AE4EMar 29, 2010
706668129EFD8A8FBF9F375A6D08FAD33B800Apr 1, 2010
4114497BCFB3152BEA4CE8E57347033ED7A4AApr 5, 2010
68308B6D66E361A31BBFCB5BC34426C92CD30Apr 7, 2010
67892B6885659B7DDFD55EFA6D6EE4B263097Apr 7, 2010
67066BFF41C5207F97B89C79C84538B52ABFEApr 9, 2010
6415013B11F3AD480010E68FD8E64D9DC403AApr 10, 2010
63752F2D5E52FFA6B4B2193673572DB3E9B7DApr 10, 2010
644245E86318D231D256761DABEEA3A9875AAApr 12, 2010
63322F124498A1B45558186BEDEAC02F671C6Apr 13, 2010
601485F388551331BC5F99101B36816EDBF7AApr 16, 2010
614003C6D9412FF8A44E67EAECDFE20306403Apr 17, 2010
60662B24308B3D6480C641673F080A6A7EE77Apr 17, 2010
6295029BE82A2940B43B38490EEEF1A44235FApr 23, 2010
6222223784D608E6DA2B66E004FCCC29D628BApr 25, 2010
6205662026F0E7D83076423FE62708A3702A4Apr 26, 2010
6604887E1EB02276D369A47E04AD3D9D0E5FFApr 29, 2010
664888F4C0BFF8B1400D3D9BFACAEB5D393D9May 1, 2010
61364C7A6CFB819E32E957502B2A66898E95BMay 6, 2010
304945D626CBF3B320141694B9132DDD72B34May 6, 2010
60574E98ABFE63921B0D3D32FD5BE52ED52BCMay 7, 2010
621083E4D51FBE3270ED490F7A23908A01E02May 10, 2010
602621AF3D6ADDDA458A1ADFA4168A03EC288May 10, 2010
65318D2832BA7B61D1458E6C0054ACFA1F4B6May 16, 2010
62200E1BC47A63EC85A4BBD2083C776F0F6E5May 16, 2010
66288D1F6E9EA946393859E6ACDE079B5B98EMay 18, 2010
6656019A434500441077CBCB05C70210505CCMay 21, 2010
658328D5FE42A1C64D70F3609B8AFBB2B8D59May 22, 2010
323880E0A158948BC14E28BF198F1F8A6B652Aug 14, 2010
2554434626C6B13A9D9295B8D662BE901F065Jan 14, 2011
356448B3B029E511BE43017F31223DA7E16C4Feb 3, 2012

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove SPYWARESTRIKER.EXE-140AD6F1.pf^

  1. To enable deleting the SPYWARESTRIKER.EXE-140AD6F1.pf file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select SPYWARESTRIKER.EXE-140AD6F1.pf and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of SPYWARESTRIKER.EXE-140AD6F1.pf and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of SPYWARESTRIKER.EXE-140AD6F1.pf and Associated Malware.
  6. Notes:

    • The deletion of SPYWARESTRIKER.EXE-140AD6F1.pf will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of SPYWARESTRIKER.EXE-140AD6F1.pf will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a SPYWARESTRIKER.EXE-140AD6F1.pf malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type SPYWARESTRIKER.EXE-140AD6F1.pf. The name of the first found registry value referencing SPYWARESTRIKER.EXE-140AD6F1.pf is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to SPYWARESTRIKER.EXE-140AD6F1.pf, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of SPYWARESTRIKER.EXE-140AD6F1.pf and Associated Malware.