Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:July 17, 22:52

Testimonials

Having wasted better part of a day on a Vundo infection, which none of the antivirus/antispyware solutions I normally use came even close to handling (one of them actually compounded the problem due to a partial fix, causing all browsers to seemingly lose connectivity after a few seconds), Exterminate It! fixed it in a single pass and one restart.

Nothing short of perfect. A few dollars very well spent. Thanks again!

Laura G.

File: chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage

Location of chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage and Associated Malware

Check whether chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage

If you find chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage File^

File SizeFile Md5Last Seen
7168840869D45F03DD00B5104B965B45807AMay 29, 2014
163843022A5676AB34EE6156EC1596875707DMay 29, 2014
23552C913346AB762B4DCB0772087C0676D50Jun 4, 2014
1638476C6797C428F45E3C187FEEDAB46C1DAJun 4, 2014
13312FF32DC48071A72A7B45B892BFD63319BJun 6, 2014
8192E96A27DC7F7202AC7E5D29510B49BE1EJun 6, 2014
5120EDC7FADECDFCD33E6F3AF7A53E45BFC0Jun 7, 2014
716852F574C54056000EB1FC4524B912A6FEJun 9, 2014
71684DB5521E09CAE262AE0510D0564C03A9Jun 9, 2014
71683134480929ADE27B7502BAC33130BCACJun 9, 2014
71683A85192EF868E32919AB0C70AA1E7F98Jun 9, 2014
71687F1A51BAAA5A3D112962E9249DD0A62EJun 9, 2014
11264349E83B73BDA265A36466588659485BBJun 10, 2014
16384E3DE38E7350C645069B8601F2EADCA3AJun 10, 2014
15360D9155B484FECA10BF965BF5195E16A6AJun 11, 2014
61446160B99B743F09EE82163883EAA1FB1EJun 11, 2014
1331219A7BFAA063283D71F796ACDB6C83C0DJun 13, 2014
512061675E08A4F5DBFB2BDF525E698F7D0BJun 13, 2014
716890FE2AA098D61CC5B063AD8B0EF1FB9CJun 14, 2014
71688D6FED2A639DEF92709ECD602E12083CJun 14, 2014
7168D5A9514D796352B46E31BBA1AFD1CEFCJun 15, 2014
7168A1B1178D9C882FC6635CE6BD44DB3BC9Jun 16, 2014
716890A28A17B1322D5746336F1758ACEE28Jun 24, 2014
71689834C39654F03DB4BBF074F8F45DDB02Jun 25, 2014
716808024FE4F74EF6097C69D61D67B1F106Jun 26, 2014
12288C0AC3D40CE765AD349385E1667876DC4Jun 29, 2014
102407F33CBA91B2FF10AD920BCEC7035BE40Jul 1, 2014
71680615AF2362687DB0DDE2F9AF76B1AB9DJul 1, 2014
22528672828599ABDAC073886FDFAF7E1E859Jul 2, 2014
112641F4113736A9DC2C38C6E20531C2D662DJul 2, 2014
7168DE5F41CEB998507E225CD9D371801451Jul 4, 2014
1433688F924B659407641CF4FC677FEA02EFFJul 5, 2014
7168236096BA583FEEE7C3B135CA0AFCE5CAJul 6, 2014
7168CCABB468223BC1D1156A3422A9461513Jul 9, 2014
9216288822CD8E773A3D07E1BCDEB62B2CD9Jul 11, 2014
716838AFD4F80EE822703B2FDF5124598FC8Jul 11, 2014
71687778DF8A2A931CE0D12F4C1FEABDAB46Jul 11, 2014
8192E136C2EE5F5493387CB3244013DF951BJul 12, 2014
16384863CB4DD99736EE529E6A713C7B66A5FJul 12, 2014
5120944CA65E6E5B7E2C85588E6C5118C984Jul 29, 2014
1126423E3A7C924506F7C12D791BEDCFB0B3DAug 3, 2014
122884D05131D2545FED2D1E5DA00C4621152Aug 5, 2014
1945661CB506BEE45EC6822236614A1E100B1Aug 6, 2014
23552EB5319207A820E2D970E460F3FE9F7BAAug 6, 2014
81921DA7A40013A16C2F485AC27DEC0F7E4EAug 10, 2014
51204E56823ABC050C47C00F8E03080E37C3Aug 11, 2014
7168589B311AF33B284B44957A68CD7D123AAug 13, 2014
512061681A1D57CDC331CD2CCF1C1C83C108Aug 13, 2014
716875604498238E27840915453054E0F0A4Aug 17, 2014
1536085FBC5B5D4A5A11675DF344FA5DC597BAug 17, 2014
50176FFD3FFA9AD3855C107C5403DF4D602C0Aug 19, 2014
71681D0A667A62F673D90A70F3F89F130007Aug 26, 2014
19456E0A0D17474F03F873C1C8CFC1BB029A3Aug 26, 2014
92160C09940DD2BE46690FAF8D4B82B8C9ABAug 30, 2014
143361F0EE75C7E726D20364644E4C1CAB653Sep 2, 2014
716833C264C6F3965D4DA3A3D5E5813AB531Sep 2, 2014
3072D3A59E730D955205EDFC90B6FCE5ECAASep 7, 2014
71685A5658BCA75C22CAE45A1C21D33244EASep 7, 2014
71684EDBCA3E1315264599AA11FB4DE409C4Sep 11, 2014
7168BB4C89EAA5565A53056662DB6EF4CDACSep 18, 2014
194566B26D9E85B4DD9104E3208284440BE48Sep 18, 2014
92167EF1CA77AC810DC476EC10B979182535Oct 15, 2014
716826C6921CA8F7597C78AD53BE60861819Oct 19, 2014
11264F26C808EDEDFAC46EF750F00BCD75071Oct 26, 2014
122887D11D2DADAF49213B96B854ACE1B9091Oct 26, 2014
22528EC9EA1980B6EA7104BFB59FDF5FC0E31Oct 29, 2014
1740805DCEE359F4D9E6D9EACC5509C650884Oct 31, 2014
14336F066B43985C5C525F0DFB29AFA9F8F2ENov 3, 2014
15360F8B02DC0E3B2E10953D2D93469AC2150Nov 7, 2014
5120EA3C95ED9E5A6747806CC27DF042AA61Nov 9, 2014
71687C669C8207BF4D528D5FCA8A4A773E36Nov 10, 2014
819265759010B8218B721D28D952667CEBFENov 11, 2014
3072C89907B75EA8B8319BD14DB79787768DNov 11, 2014
71680D388B07D3613A827614FA9B4365CBFDNov 13, 2014
112648804DD6369CC262F2880F4912F643B96Dec 17, 2014
51204118191D2D2A833FC88166A311B79636Jan 16, 2015
3072EF1EB99249A60673E21D632AC6D9385AFeb 22, 2015
11264F61C4BDB66EA67789BFDFFCB9326B7E1Mar 13, 2015
1024007281059561C396DE97B9E425C68AFF4Mar 30, 2015
71686C763AE6BC46962087A0DA75E1D9BC6DJun 13, 2015
8192312B4857D47BCE4A5EA769CA110722D5Jun 16, 2015
153607C2C816C815889E0526D50155AC6AF30Aug 21, 2015
11264C02024AA4CE6784A2C11BB106F8C3AA8Aug 29, 2015
13312FE03E5DE7CA649B867BB3741514AE353Sep 10, 2015
19456FF3BBC5411266D82A3923A67D1EA4AC6Sep 16, 2015
225283364DBFC0B46E472C42D74A320641784Oct 4, 2015
9216D8A60C794F569C5BCDB321A8FC5AAA45Nov 19, 2015
71689764EA24E8BB1C0FCF591316C40AF1AEDec 6, 2015
9216F0F20B65F5538485950B90F79DD41119Jan 22, 2016
1740817935314D7FCD9884744BC621F316B11Jan 31, 2016
174087AFF83D6C782830B9ED77F09B4912776Feb 1, 2016
14336561E019A5162A75131C202244625864CFeb 3, 2016
716849F3AD1BC2949375270AD05C1AF3D2C4May 15, 2016
71683289D88483241B400DC1B854395B24D1May 18, 2016
102403B57E91D6F4744B29C68CDA807B08B64Aug 15, 2016
30723F5218253F2468DE80D7763D73891D15Sep 6, 2016
92163A40DCFC180E3D895E5BA68CFF9D429DSep 23, 2016
133124E18270CCD9AC608BBB9E9C516DEB15BOct 29, 2016
92165D2432D118B5C2C58C4DAE128C00CEF8Nov 13, 2016
716849073D014DAA13BFCEA9D4B1E32EA7E9Dec 13, 2016
30729A211396BA61C2B54117CFEB29C5BD0FDec 18, 2016
16384C98203A88EA64CBB26A128A3B44627DAJan 5, 2017
15360D4E0961B074645BCCD2D6D21CA97455EJan 28, 2017
307203E70EFEE3DC2A1FC4D0344260ECFCCAEFeb 27, 2017
819280147199F6402C487ABBC114F38B4821Mar 2, 2017
2150405D8B8F617D221CA7D05D407913DDE7FMar 16, 2017
17408A924F9FB27D70276EC51AD4C9A748BD8Apr 11, 2017
15360D9D09AE9F27C4F75B2DADABAE1571418Apr 25, 2017
38912875C2431975FF59DF6C06AC45CB35081Jun 17, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage^

  1. To enable deleting the chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage. The name of the first found registry value referencing chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage and Associated Malware.