Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


I consider myself pretty good with a computer, but after 10 hours of trying to do this myself, the sysguard.exe whipped me. I couldn't find all the files and when I thought I had them all, they would replicate and play hide and go seek I have never endorsed a product in a comment, but if you want to rid yourself of this stuff, pay the $24.99 and download Exterminate-It It fixed my system in 5 minutes!

Mike T.

File: chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage

Location of chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage and Associated Malware

Check whether chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage

If you find chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage File^

File SizeFile Md5Last Seen
356352919F4E85162FC278EFF57280C88374BCJul 24, 2014
338944FE8F27A3CF863630B646F491B084EBFDJul 28, 2014
329728247534EB0AEDC84A1A61A3705EB805DBAug 2, 2014
231219262BCAD782952613BAB23BAAE9CBFE13AAug 12, 2014
87244845D8F70923241E28D6F9970D5DC539EEAug 16, 2014
8468480A5F0A5BD99870C914D04C041559F3FAAug 17, 2014
332800C88EC2883DD79AAF8F4DE62466058494Aug 20, 2014
857088992EC39F797B085DF69205EB7D60CC9DAug 24, 2014
12175361435E8ADF1C88E04979C5B5CD38FE178Aug 31, 2014
3042304EB557A752671BD84948400E7D8263B36Sep 3, 2014
858112CEB5F0055B3E3739ACB0EC48881BFCA1Sep 11, 2014
6144B4664DBFD7226CFEE5D3E4D949EEB0C7Sep 17, 2014
1289216478BD1B79D4CA0C29DF5EF50F341F0A1Sep 20, 2014
35328090F8469258BC35A2A0FECCE5E5FFE98DSep 20, 2014
847872C3727BDD7257C32AE3DADA28977C5593Oct 1, 2014
33280062628E3EC95B1DC0F6E5E579E1315AE3Oct 25, 2014
2867295352C21C43A70DA53F4CE67C864EE41Oct 31, 2014
1208320710CE78C2A9AD6239C3F088EF1F2949DNov 7, 2014
920576668C12991EC786F372D752644AC7D47DDec 28, 2014
1190912DF2C17E5E1F60E9A6EF090DB4973AD47Jan 15, 2015
8652806E8A54577716CC4DEBE7FE4B85212BB6Feb 21, 2015
83763281BA0D8188860DC9C0695D3CD660FA84Mar 21, 2015
380928057265979C4159AFFF8C89EEC46DD7D7DApr 6, 2015
1169408B965E63973F2C630ECC23237748E95D4May 5, 2015
8488963476F298414D5B58A3C8EDA633FF287CMay 7, 2015
33792057EA74FD8D9754E639D5E8666C705523Jun 27, 2015
34099266DEE9174DC23EC076E983E07835EF25Aug 24, 2015
1202176C9285A963B7068F1A6BB3C2A8F358551Sep 17, 2015
226918483B54AF38BD7B6836F305FA75B7EFBB7Sep 27, 2015
850944536090637A5FDE6E29400FD3E145B1BBOct 11, 2015
333824572D01129BB520D931B697C68CA584A2Oct 26, 2015
225289DD028B0E3D88B136D355E98775C5CA2Oct 27, 2015
352256B2958B84433C1303C47DD3315555EE2DDec 7, 2015
87756889C0E1CBDAA9F1C836952806184E4F90Jan 2, 2016
12216321C9902C61C709427D3C1906E3F039C30Jan 29, 2016
5257216DA335C93A1906B58E070FD4ABA24C0B1Feb 11, 2016
886784CD154E7C7D514DB78B42C79F8CF688F6Feb 28, 2016
1175552AFDD545846E042C4D72044ECABD1B737May 4, 2016
3389444AF7BD596D594FD1B79D299021762E1AJul 17, 2016
1711104E776550AA8B2456709E936C787F69A26Aug 8, 2016
4219904C2DF02B0F701BD71A55C159285482AB6Aug 26, 2016
1221632DA8F23CEE43334242447D7F2C9E3A2B5Dec 7, 2016
36352009618DA036170DA3F915899DEE1618C8Jan 10, 2017
34099236E4C7BA1608B9053EE3500A74C94AAFJun 6, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage^

  1. To enable deleting the chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage. The name of the first found registry value referencing chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of chrome-extension_ejpbbhjlbipncjklfjjaedaieimbmdda_0.localstorage and Associated Malware.