Exterminate It! Antimalware

malpedia

Known threats:695,275 Last Update:March 17, 11:57

Testimonials

WOW!

Real people who answer queries within an hour!

Please don't get bought out by some large, impersonal company. Your customer service is amazing.

I am recommending your product to everyone I meet.

Ainsley

File: chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage

Location of chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage and Associated Malware

Check whether chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage

If you find chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage File^

File SizeFile Md5Last Seen
419840E50662081C69F7167A15BA608AFAFDCEAug 12, 2015
479232BD7C88DD55AB71120B0D7CE2F9982266Nov 21, 2015
807936E0E2BC6417C39508ACD8FEB3F7D229E0Nov 24, 2015
379904509A2BA1BC040CC336C9CEECD35512A5Feb 18, 2016
99020837D240C97E66579ABD78B2026973218EApr 16, 2016
7864321838C12D65B4CC066C0FAC45732141D4May 10, 2016
31744BDDB2DCEF40AF4D22D762CD8E01E67EEJun 15, 2016
53248BC643A75D1849EE7419B2D1EF77E1F82Jul 23, 2016
753664818997A1028A58E1D4AE08B09231E92FAug 10, 2016
1105920CE532AD831FDA92C05C01ADF28E3E76Oct 14, 2016
256001D84F6BC69A95BDA7366F2238D93EA0DNov 7, 2016
18432D006B8A1A438E34CBBF670130B773252Nov 9, 2016
18432444A8D3F99A9A525C0CE406AB38FF421Nov 14, 2016
18432A2FB0F5A5AFE5F55881D95F16334660FNov 22, 2016
24576E5A75891D7564D1275D7805B5CAE0952Dec 1, 2016
18432E2F4504EA07ED344A68EE0ED806F512EDec 2, 2016
532488850C9CD4D359F9EDCFD72A6170FE429Jan 6, 2017
25600F820DDE37DAC3C576ED2C36FB74A94B7Jan 12, 2017
18432308CEA027B51CD208861491604D2B982Feb 3, 2017
15360ECF1B38A1D1EFA7316188B18EEF467A1Mar 14, 2017
15360EE3F31DBC873BE7A77FF25F92824FC6CMar 19, 2017
153600FDAF2ACA47E117FCBF3C9EB8BC5F98CMar 23, 2017
15360970F58E9B3B4212BDF06CBD0BAF87259Mar 26, 2017
276488EDDED083147F38D282D80E569239E39Mar 26, 2017
15360A133011B08A14B0B29C128A95254A2BBMar 29, 2017
16384428A6E248D22143268454603BC5BF449Mar 29, 2017
286726F130BAD678C058E5FD6533327D95C3CMar 30, 2017
245769BB3D5A7B9195E7530B2AE00F594500EMar 30, 2017
153608BC33E88E508F5FA9A1353D23F9C717BMar 31, 2017
15360B7F602838A8ACF9B42944A71517B8642Apr 2, 2017
153608EAC87D55B15E538F66BCC91EEB47895Apr 3, 2017
1536089AFCB65813236CC5A6CBC1E46964DF6Apr 10, 2017
15360DC89251D14EDF44A6981A8077789D3BBApr 11, 2017
16384B4C07E5F1AFE7E5477D4B3D8F4DAE949Apr 14, 2017
153607B4398D34ECBC2F1EB4D0A52AC0A14EDApr 16, 2017
15360023295785AB6A0B57F3DD31E8A8CA10BApr 18, 2017
1536067F1FC6A6066578F4E4A0CF81AFB7470Apr 30, 2017
15360FBA2AB8B9CC3A7B402FE8408A121BAC1May 1, 2017
153604D40FBA9263C505019CF524928613EF8May 10, 2017
153607508E549ADE5D9C54BA091D91C7F79C9May 11, 2017
153605ECE3E23DA6726A92801B222774E9334May 12, 2017
15360F7EBA7012747E9B8B98EF659EFF1EE4EMay 13, 2017
15360AD17FEC8739A54B825D4638C227020EDMay 15, 2017
16384B65F07678AF87CB1AFDA1A27FA22F06FMay 17, 2017
15360BC67FBF8916170BEE4060440D7D28493May 19, 2017
3829768D49F422616A4A7967BEF1A95007E913May 29, 2017
16384743D1BCBF138544DBD9945DC0B68D7F4Jun 13, 2017
153608CF298BD7A44DC6BC8106FF32BB478F8Jun 19, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage^

  1. To enable deleting the chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage. The name of the first found registry value referencing chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of chrome-extension_hjfmdccpchjbocfcmenkfmkcbmoldfee_0.localstorage and Associated Malware.