Exterminate It! Antimalware


Known threats:700,085 Last Update:August 24, 10:09


Hi, thanks for the upadte!! It did the trick!!! Must tell you that I have never been this kind of satisfyed with any buy as I am with the Ext.it!! Thaks and I will recomend it anytime, anywhere!!!!

Sincerely Paul


File: TDSStkdv.log

Location of TDSStkdv.log and Associated Malware

Check whether TDSStkdv.log is present in the following locations:

TDSStkdv.log file locations that are Windows version independent:

  • C:\Windows\System32\TDSStkdv.log

If you find TDSStkdv.log file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The TDSStkdv.log file is associated with malware only if found in the locations listed above.


Different Variations of TDSStkdv.log File^

File SizeFile Md5Last Seen
2539C6D4EC098A70314F89EA0A42CC3DACE7Dec 21, 2009
54408C1903D02D13A8D203C1E7E351539195Dec 22, 2009
69568B10FA83BE280C65ACA7FB83085DE58BDec 22, 2009
2955AA2762DB0147A2F76DE592AF4C64CFCBJan 3, 2010
3268483B18155E26C7C9C42FE325FA9BF69FJan 3, 2010
3154DEF43172F30959BD36F63A83E5C21516Jan 17, 2010
31494B118EC428ACC50B6F5244F39925E0DDJan 22, 2010
5727198B2AEAAC69B39BDD1FBC3A6149918AJan 27, 2010
4105C1AF8C894DDFCB472974538AFDD0D14FJan 30, 2010
39215DD8FEB18409ACF4BE8D1039C48E5FB4Feb 3, 2010
3300C790B84A99C17F842B095547B938520AFeb 4, 2010
4168A76289AC80563FBCC912BC9042D3A320Feb 6, 2010
157931E3FB7443E0F1B98FF0C8D7A1197FC33Feb 12, 2010
9562F87012CFA7C4009F09ECB4A4E13FB286Feb 17, 2010
2502AE029F94B1D912DEFBF1AB56FCC67601Mar 20, 2010
8517276A7EDA77FF73E6BCD9F613EF26C2D7Mar 24, 2010
2410C0415C210E7C3AF232D92183803C7073Mar 28, 2010
47982DDFDD6404C25BE321AA9798639AD385Apr 2, 2010
34405F15506392045673FB3197D88007277DMay 3, 2010
54582ECE89E6163A6F476A4BB469F7FABC05May 16, 2010
40600B9A00A2F7DE32EEF7F7ACA5E1738513May 25, 2010
22942F959AD9DC8B559F362E50B52FAF3440May 25, 2010
6182D6B95FCDFCA21AD0BDDE491B48C79107May 26, 2010
297053869DBFF8B073C825C3A59A5273BD74May 30, 2010
2253CAB1E4D6018C60469922E71C53A2158BJun 7, 2010
2571E77C4E6CED9ACA6A7E8E3CF80A11BE68Jun 11, 2010
3038611908D01AF4FCD2BA92E7F22B793294Jun 12, 2010
1142DF1801E7D4B2B5476416E8259EE254E6Jun 23, 2010
158355B10E6BB4BC9B5048A13BED72CE7F0D8Jun 30, 2010
218135973875E908614E43A8F31E4FA645FCJul 1, 2010
5757DD2C69CA911DA105E1C47EBC3EA2F1DBJul 4, 2010
3571CC54C497E90B4EE6C8A12EDF94B5741FJul 24, 2010
76763278E3D75AC41D1CFC09534DB06C380AAug 11, 2010
3846F6DD2F80D44B4F5A49D4D663AEADE541Aug 22, 2010
151245DB732E13CA2BC04D6684A6D95BA44F5Aug 24, 2010
3902D01CC6C11BFAC5DF86160236ACD6B5B5Sep 4, 2010
1942963EA4B240B6873C1D706876307762E6FSep 29, 2010
448912CABCDE34D1D8977DBD218C6533E0E3Oct 27, 2010
756696C1AEC4C6B74D4DF13900DA6999AE9EOct 27, 2010
3937B747B6D9EFC1E40D0409D4186C4887ADDec 2, 2010
52702A81C6FC8DB4EAB3FE36FA9B4A30CC0BDec 10, 2010
441623B3083643CBCC6BA8DF2659F2C034F4Dec 12, 2010
22843E4CB6211F9AF6FB2F8BCA7193BCC8BCJan 3, 2011
3378458952F0ADE37240EDE7453BC07D44A3Jan 24, 2011
3201F047511114EC1186FCB949AA6969B1A2Feb 5, 2011
29849A46005F8F86C823E490D04C719F2F61Feb 9, 2011
84607A68B1961294CD3012A876B382CAF99EFeb 17, 2011
544709FC1CF9980B85D58C18BC60E579404EFeb 17, 2011
3062B363D4DE6F8FA6AFDBD38989025D7090Mar 14, 2011
1163003B07128BE7D9A05B63562DFDD519348Mar 18, 2011
2635AEA6A96CCAED2B6B5A2E30244B4DBB4FMar 28, 2011
481825336A57D6B021530F4AFEE883DDB014May 19, 2011
56174612F05777C74681902CF5526AD780DFJun 27, 2011
4393B5BA89202012C3F25010241CFFC1AB6DJul 7, 2011
3312295493688D863870E6C9998701110F5EOct 14, 2011
28769C04759A4F29FA11B84DB0CA583AE2B0Nov 10, 2011
340088758259C8DE16089EFC2E6F7942B1F2Nov 16, 2011
538796343FFC41861018E307E9DB2CB2B14CNov 21, 2011
2586509E4970EF0C8670DDC51D4C9130D9A3Dec 16, 2011
7474383EF7DBDA30960CCA9F3AD3ACFFBCD8Feb 25, 2012
2215DEB34B321CCC069E3A5D69F123E32DF6Mar 1, 2012
3480B350E7F7C057A4FD0EF5112731D562C2Mar 22, 2012
30211459EA5B3D5197EF7AB6CE43B94B02C7Apr 22, 2012
4905C4A64604A4A67A103E334FD9B133E9A0Jun 26, 2012
39084B698605980C966EA655D58927AE932AJul 6, 2012

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove TDSStkdv.log^

  1. To enable deleting the TDSStkdv.log file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select TDSStkdv.log and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of TDSStkdv.log and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of TDSStkdv.log and Associated Malware.
  6. Notes:

    • The deletion of TDSStkdv.log will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of TDSStkdv.log will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a TDSStkdv.log malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type TDSStkdv.log. The name of the first found registry value referencing TDSStkdv.log is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to TDSStkdv.log, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of TDSStkdv.log and Associated Malware.