Exterminate It! Antimalware

malpedia

Known threats:676,455 Last Update:April 23, 08:06

Testimonials

Thank you for the note. I have been a TrendMicro client for the last few years and was impressed with the speed of Exterminate It’s scan. I appreciate the efforts to help rid my system of Vundo, the commitment to stand behind your guarantee (unfortunately that is a rarity these days) and the customer service you have offered. I wish you and the company the best.

Barry B.

File: chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage

Location of chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage and Associated Malware

Check whether chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\System Profile\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ghifackarapulyfinck\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData2\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default.old\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\System Profile\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ghifackarapulyfinck\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData2\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default.old\Local Storage\chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage

If you find chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage File^

File SizeFile Md5Last Seen
40960A21902DA26347672BB1EF92716D65C6EAug 6, 2016
409600472D0C2BE953B75D89A5CCB00BEA13CAug 12, 2016
409600D100D06250D5471B976E67D7AA79B17Aug 14, 2016
4096031740853BCA94E948D11183A3A5C8374Aug 17, 2016
4096005DC57F1CC2C853F8B6AC4115823CFF2Aug 17, 2016
40960CAB95AF1C2410D2651624B01C778F7F3Aug 31, 2016
40960C86E404A74A4106F871049E5A2715EAFSep 10, 2016
40960BD63B8B577F26F3FB9D44976BE925314Sep 12, 2016
40960FDA9C173BD01DEC1160EF9BA2E968B0CSep 15, 2016
40960260B14E2D149CAB930D75A53254D2F4DSep 18, 2016
409609732798D7DCCB0FAB6F68287C9BEEA6ESep 18, 2016
40960D927A116A76D732E7D5AA57BDB5B3BA8Sep 18, 2016
409608AC7805D73AC23080F9B23F6CB856A28Sep 20, 2016
40960BF50A438735E5C3A5DA88D495C0C56D3Sep 20, 2016
40960E47E7CA29BBB154002A0F374476645D6Sep 25, 2016
40960D6820DF86CCDBCE8BB29518B99DEAD91Sep 27, 2016
4096004F9287A2D5E0B0742C36FC1677CC0B4Sep 28, 2016
40960C6F54C631C3B149B4FE18F356AC35206Sep 29, 2016
4096068CBCB55A3AB5417276B072235FE4ADASep 29, 2016
491528ECB2E1A6EA364B509A335EC3E4F17B2Oct 9, 2016
40960208E902A3413316FE50C8A2F063E1F54Oct 18, 2016
40960516262ABEA057198345699F09B7F72A3Oct 25, 2016
40960D0FF9724AC235D7EB950C3D47215129AOct 25, 2016
409609338E362356B4617B19D2593063A9446Nov 11, 2016
409600749BB1DB5EAC2CFA4139B6C8B84DF3ANov 21, 2016
409608F5F8811C3E01F3747C2ED74DE3917F2Nov 25, 2016
40960E0459351E5694FFF8FC1CB8F8838995CDec 17, 2016
40960B4F6623CB6C42AD35775E12789A9404DDec 21, 2016
40960720870A1A0E7A293AAF44E9F3BB069ADJan 7, 2017
409607F7AFE52A4F3BB9DD9379B719FE939ACJan 15, 2017
409603D3EDAC26AAA6A5F8C7A3723D059F7B4Jan 16, 2017
40960BA9891DD17ED08FFBEEDC701D6D8D46DJan 18, 2017
40960CEADFA75A460B74CA63FA6A97C357370Jan 31, 2017
40960FF98C480C97EDDA3D15D6F14C5864320Feb 4, 2017
40960B35E4B4D9DCD43015FBE42597B71DE80Feb 6, 2017
40960B28BE921F48B9A3C0E2601B0A637A497Feb 8, 2017
491525E75F7C394225B08D672FEE900AFF9CFFeb 13, 2017
40960F4D068079D360F23A91C3FAB745F2C42Feb 16, 2017
409606E656822C0956EC35CA6327CD09AEA6BFeb 17, 2017
40960BD8B17DFB959FC73A76D5DB71AF9929AFeb 25, 2017
40960CC44EDDB7A67D00DAFBFA162196F1833Feb 25, 2017
4096027F8C483569D5864242C78DB2099B1FCMar 14, 2017
4096037AE8404ACD82DA380D177026044E3A0Mar 14, 2017
3072EF7ED051AA861F87D8B16A74F259CBCFMar 16, 2017
40960AB976D74BB60FDAAA57AE03A2702EE9FMar 21, 2017
40960F45FF81CF8AB3E43E9EFF14D5447350FMar 22, 2017
40960AB893875D697A3145AF5EED5309BEE26Jan 23, 2018
40960FE6448ED8914CAA2F0A33A2F33E5F26BMar 24, 2017
40960CF768BC01574E91DB356414B005D9E79Mar 25, 2017
40960EF1B838E317CDC055B32DC6114225A6CMar 27, 2017
40960CC8436C34411820FBE9FBA87A8571594Mar 27, 2017
40960AF5C29ADC27D49A680EAA13F4D7CC985Mar 29, 2017
40960CD248718BE000AEA832F578D118B3920Mar 29, 2017
40960EB49475F354E7E74013B4AAB2198E555Mar 31, 2017
409601762E5EF874FDA9AF770C3FC4039C67CApr 1, 2017
409607AE4D57ACADBB9047E77CA92A594D296Apr 5, 2017
40960380269DF80A7DD6D042A4C3AD3163760Apr 10, 2017
4096071899D68B016CCD24F1F8044516C4ED9Apr 13, 2017
4096092894FEDD0CE655D43C834611F3C3C2CApr 17, 2017
40960CE84F8BBFDFE46159C02BCE6202E1FA0Apr 27, 2017
40960AB1FA6EAE55367036108DD6223AC97E4Apr 30, 2017
409602CF442BF5C8FE250B34A6058C0BC2EBFMay 11, 2017
409600CD2EE87F6A68508111B7B1AED2DF017May 13, 2017
40960D3659249CC025FDAA9FDF4A49A75BA61May 14, 2017
409601715AF215D520B7DFF1AD5131F119210May 31, 2017
4096058294D526A9A89F7E7E6EAD0076B426FJun 2, 2017
3072529847A64F7089C83580742006FCC472Jun 17, 2017
40960733B11B832B9F5CCEAEB313275E167A4Sep 27, 2016
40960F7C59576B38565DD0AA97862C24CD7B2Jan 6, 2017
40960F376A7CF64098C86E06FC0CA31CE6D60Jan 12, 2017
409603D2F1708FD68F4BAE56A776BE3D48F94Mar 15, 2017
4096064EFC3AD4FA827CC59398B37E786C5B0Mar 25, 2017
40960ED708CF44BB1F07DCB6E06CE207DBC25Mar 30, 2017
40960C116D0512B45A2EA6EF449AF2F0F786FApr 8, 2017
40960C6AD3D327F056910B1453FA28D85B93AMay 7, 2017
49152C2287CEEBFB00B65CDCA24103BE37CD8Nov 11, 2016
40960C7DD631CBFA9BE4081FB8887D42C47F6Nov 11, 2016
40960686F7AE39F1E4C240810EA950BA20360Dec 5, 2016
4096021790B404D27468BB070C73499022922Dec 20, 2016
40960C7ABF63F1D78E4D429BC800A80A064B6Jan 14, 2017
4096002AD60702FC653D2743709525ECA2B8FJan 26, 2017
4096098A329E0D201DF947236C2CD2DA04EBFFeb 12, 2017
3072CFDF33A4DF5126D5DB9698A501629977Feb 17, 2017
30729E561C58836959317DAE61866D146FF0Feb 19, 2017
409605CE73261F421047FA471475E53A758C3Feb 21, 2017
409605BC3A2FCDE31553099684B06D6E006AEFeb 25, 2017
3072D47C68F4E6946A0CC555EE107A1C1496Feb 26, 2017
4096076C6BD6A21812C68860590662A668B31Feb 26, 2017
40960A7EF9EA0D8BED0DE5D2A425A4F34FB1DMar 11, 2017
40960C5F094A262ADF75005BBA35392C57580Mar 13, 2017
409608944A11F89A882860D5EF41A5B6B20A3Mar 24, 2017
4096001F5032711A076DE19EBD66745925F44Mar 25, 2017
409601AD082B3471141367A88D7F2A7A38780Mar 25, 2017
409605ACD6F6DF358B18EC1531D1D53B92C85Mar 29, 2017
40960800A848361722EB1A1A544AA7363ACFBApr 4, 2017
40960E9927A6A37D136816E30BCE44176E747Apr 5, 2017
409604E0682A2F38429AABB50AA06EDEE9DD5Apr 8, 2017
40960FF3CE5E8AEDB9A84A50A0A2F1A1C43CBApr 27, 2017
409608120E25F7D7F6319B63E3B3A7FFB8350Apr 30, 2017
40960E939E888AB3E9D5EC1FD107BBF39085BMay 9, 2017
409605CC626A15596CB28A74CBBD2226E3839May 11, 2017
409608ABA4448B876CF38CB28C2E2C1B08345May 29, 2017
40960CCA0DD94A0BF9F939FF749696AEE8ACCJan 24, 2017
409604C384DAB3A9AC9F0D014AFA80A559CA1Dec 23, 2017
4096008B5369CE041410C139CF1014828E079Dec 29, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage^

  1. To enable deleting the chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage. The name of the first found registry value referencing chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of chrome-extension_feeilhmlfcpfchpbgoknoeefdkbgionj_0.localstorage and Associated Malware.