Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


Hello, I wanted to say thanks for the time you guys spent on getting that Vundo trojan off my computer.

Thanks again, I am highly recommending your software to friends and partners because of the extra effort I know you went to.

Michael M.

File: chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage

Location of chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage and Associated Malware

Check whether chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage

If you find chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage File^

File SizeFile Md5Last Seen
11264C2660D1A2BFC2C3014FF15EF7FFBC570May 21, 2014
143369A40BFD369C3ECEE7D9DB7050F0CE0DCJun 5, 2014
8192283DA01188520DEC99281BD3C2A3FDB0Jun 8, 2014
15360703D2F3C671E9081A11C5107BBC39142Jun 23, 2014
9216939AB96EC5F70AF47DD6BD154474535CJul 6, 2014
17408BD8167C3A26A6EB0C04117B532AC7DD4Jul 8, 2014
204806F1B04A71193C9B93AACF1897DA8A5E7Jul 13, 2014
25600579416AE98602F2748E27917ABDF38B1Jul 17, 2014
49152EC7631ADE150B853F268221AA06BF3D5Jul 29, 2014
49152081C34F7F520DE1450C9CE4488E74E73Jul 30, 2014
225287CA15F48100498CFADACD4536A5C7DD6Aug 21, 2014
184329FDF7A075CAE1E25F0AFFA7FB950D417Sep 5, 2014
1331285AC83F6D08BE7C6D9C31BF551A8D5FCSep 12, 2014
21504FB061A90514393458FA2E401C659E293Sep 16, 2014
27648CE4F25FD970F29749426694C0F3BEC17Oct 6, 2014
153608C15036060C93ABE7251EC87E70B5B24Oct 14, 2014
13312E3B2E47345D1B8BF605B92AD1858F2B9Oct 20, 2014
20480B791BBB9887EF71CE3EAF3ABEF5ADC91Oct 23, 2014
13312BA15595E139E3F72289BD09A049AD55COct 30, 2014
174085B13DC3BFAA2F62E9FB2BC5BEB274844Nov 5, 2014
12288F9D708337D6734027692FE626534D44ENov 6, 2014
163846E301B1AD0268D9CD3A23EAB7FE61EF7Nov 6, 2014
23552DD7D3334B7C30F2A13109A55FAD1753CNov 9, 2014
16384C560FA86A4BFACD416270DB81DF9B05CJan 9, 2015
2969608C80084A4655146D08D73B77485E0E0Mar 11, 2015
1431552530525B599E5EE29FCA56CD04C3E1A98Apr 2, 2015
107520958E3D955899A56AB352626B42BD2199Apr 17, 2015
102400D72B10F272DC459321998EEC0FA2D513Jun 10, 2015
3041281525671103E35943C37D9C82A47D7CB5Jul 27, 2015
26624696F6F338D7BC05A3ADFEAF5E7AA6F49Aug 21, 2015
47923227FB23C535DD2794C1975EF4C4B9140FOct 18, 2015
430085EF8160BCB3C75E3632273F19D1CF0E8Nov 27, 2015
1054728110405303DAA87578BC33A16AABD361Dec 13, 2015
45260815E74A3B953EC4265746F5C082D7C869Dec 16, 2015
1376256257E4DE198F670D815E97E32FEF97D41Mar 3, 2016
106496B1E40EB6EC088CFCAE60B3F20F220C07Apr 16, 2016
148480102D4020BA17360804FB1F53E7D2ABD7Jun 9, 2016
288768DEA6E43F95F1D520A10233400D30C11CJun 21, 2016
215042C051085BF138408ABA5A02779DC0C6CJul 25, 2016
28672DC619BE94DE598E4B870826C9523CC45Sep 2, 2016
10547260F8E4DE7CE1AEBEC48F371E162CDA5DSep 24, 2016
917504A28DF260176A2136087A8C266E9EBA3FSep 25, 2016
65536F5AA96515C22CD52FAA223C46AA06251Sep 27, 2016
18432D2D4F35D311A82FADD53083CD6558394Nov 10, 2016
216064779F77AFAA55F2FB923029A59DEBB82BDec 7, 2016
1146883D4A498FFCA4F292CA8A949991F9F678Jan 15, 2017
262144ABA42B30E5101E426E1090DA84750F20May 21, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage^

  1. To enable deleting the chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage. The name of the first found registry value referencing chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of chrome-extension_blgkblimeaijgefaoiedchmmemmikpdg_0.localstorage and Associated Malware.