Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:August 10, 12:54

Testimonials

exterminate it remove the agent.nbo files without restart. i let it scan again, nothing found! great job!

now i surf since 5 minutes, no popups, it looks like the problem is solved!

big thanks to you and your team, you are the only company that give me response and realy help to remove this bad worm/malware!

i will place now links to our network to your homepage and email my friends and business partners that they know that there is a realy good company with a great tool and good programmers.

thanks.

regards,

m. s.

File: chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage

Location of chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage and Associated Malware

Check whether chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage

If you find chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage File^

File SizeFile Md5Last Seen
7168999D16903B4EE6877D405D2A6387B555Sep 19, 2015
7168EDBCE3EAD672FA98E774E2CF0DB3A733Sep 20, 2015
71684B16D7731058EF8D87983F56CE2B9F9FSep 25, 2015
71686026003F0474EEB92C6AE0FCC47A36E5Sep 27, 2015
71680EEB7816292A9411EFFF033B4861F1A5Nov 3, 2015
7168C0CA552868FF13008AF570E15285BB09Nov 6, 2015
7168CF7036E78F04A06A52CF4E6692B4A765Nov 22, 2015
7168560B2CCFD9F99E4C581ADA37C35AAF1DNov 29, 2015
71682FCE76E60F7FC5098D782EE291F2D027Dec 10, 2015
7168498DED1DF1299D164759D6BF7B9ACC5ADec 10, 2015
7168BC5F97E9266EAB281096FE9BDB211BFADec 14, 2015
716888378C4ECADCA3B4FA3563B89A9C8DA9Dec 15, 2015
7168C74B2780127C828FD47A25271130F8AADec 21, 2015
7168CB1E9FC40A19CF437EEFBCF43EAA5DD9Dec 27, 2015
7168CBF493D74C315FC421B3083E0990B621Dec 27, 2015
7168F5E60CCF98AB018AAC4CEBD4B7FA72FCDec 28, 2015
71680C3A47BF5EE01DAC9F1F47D6E6718C8CDec 30, 2015
7168D3785F7E53D9FF96690D79387A4A29D9Jan 2, 2016
716865C7ED8E95AF1E943E7D6B6074FCA5B0Jan 2, 2016
71680BC15A49BC32072152845FEA19A3E9EDJan 4, 2016
7168BB7B5183D7D69CABD8508FB76441BE2BJan 4, 2016
7168D4245888D5807F84C405A3C65B88F64FJan 5, 2016
7168ECB63EE592A3A378F8A1F75AA205408EJan 8, 2016
716809C1575239151400A1BAD109829B4823Jan 9, 2016
71686E800D9BADFA7001B012C2640C1F3AB3Jan 21, 2016
716862C406AC23C8EEE04095F75D49A5986BJan 25, 2016
7168F4E4DB19232FB84E5370EF558A3A9A5EJan 25, 2016
7168176FB9D6F3690D6D2B53BEE5B5B7A54CJan 26, 2016
7168C80979F5677525FA9B9B2CF93780FE8DFeb 1, 2016
7168D291360D0C259D17A62FCDFBBFA58A0CFeb 1, 2016
71681F01D44BCB6C1E9DC7E632F3B3601CE7Feb 4, 2016
71681F870096D6E737AAAF8F26B02A51B1AEMar 14, 2016
7168D073EC4631647C2DBC23039672791221Feb 2, 2016
7168F8F42D818FE33B9C611617997C98700BFeb 5, 2016
7168DA98198E8DFC61F12191859E68625EC7Feb 6, 2016
71681111291EC045ECFE4E8C8CD32CF179E5Feb 12, 2016
7168764F06C977A5D974FE7C5011809B7457Feb 12, 2016
71687DDBD38DE80585ECF55BF07000E56A47Feb 13, 2016
7168662108CB139DB12176BF3FD787B73EE1Feb 17, 2016
7168B9609DFB8E8EC64D4B7D53AB5E2E395DFeb 17, 2016
7168E2A502FD98B667DC03B7C23C114E48CDFeb 27, 2016
71680535DD22ACED60B43D40498CE0B511FEMar 20, 2016
7168A8EC49E9B26D1E095FE311C5514A6874Mar 21, 2016
71685B0A6A114113222B4D6FCDACB9C2074BMar 29, 2016
71682CAF7A1EB6B31506E3C1B2E3CFED2298Mar 30, 2016
7168FC2FB04B9225837890237A953F7C9BB6Apr 3, 2016
3072970B799316BE80C94CA2E6326C2D2A9CApr 15, 2016
71684EFB4CB3C1B1610C3D2C8873DB565EA7May 9, 2016
716874C885CBEA71172754480B4EF24DC6ECMay 13, 2016
716883C8F65E23B7385BDB78323AAB59648AMay 14, 2016
71687B5663ACB2CCB002AFAAA1C54C258C5AMay 20, 2016
71680C3BFF8D4619E47766A1E42E445CC8EEMay 28, 2016
71683E586C8027667CE393C3351B28C16725May 30, 2016
7168EEBB1163A8D0F88C09211B52A4F2B635Jun 12, 2016
7168FD9652F4771809BAB3852401930FFFB5Jun 15, 2016
7168286F1A4232ACDED9D16938E37F7F65A2Jun 16, 2016
71682B2B73D091654EBF3D6EC2EDCB145B87Jun 22, 2016
716881A7D0B6D833DCB91FAAEAAE8F9300B2Jul 5, 2016
71687054D82DC80855CC39C6E1906091D13DJul 11, 2016
7168F675A57264440E915B87F34F9DDA0E36Jul 12, 2016
71689D984450473C13A2EBE57F0105E40649Jul 19, 2016
7168078501513F3678BB3B142AD7D9D09A5BJul 20, 2016
7168E72B045E1351EBDAD98E57FD50EFBCDEJul 26, 2016
71685A8A4429A04F6FE8EC0008C62E2F9EC0Jul 29, 2016
7168F8226C474C27CC43824DEB8B8271A33BAug 5, 2016
716834180D8EA3BB9CC329863D9D8E53CD4AAug 11, 2016
7168642837E9413C83D0BF4B8E4A8BCA7B39Aug 22, 2016
7168C1877093086E7345CEE871A3E872F87EAug 25, 2016
7168961DABEFC62BBFEE27D96390B836308BSep 13, 2016
7168BEC573FD2EBB4C79D22B8482B872072ASep 24, 2016
71683FA4BA607ACF4696777470F39C4BE6EBSep 28, 2016
71684F0753B56B2B2C05038DC794C847F39DOct 10, 2016
7168000DF8B2A1BDA41EC61CD19B3E763271Oct 18, 2016
71689DB34D59F984EB0C0880C9542B837DB9Oct 22, 2016
7168A7D25575ACBEB82356EA175E46CF313AOct 23, 2016
7168697BC3CE88B3AC234DAF8524D5E09EE2Nov 9, 2016
7168E05B3E13B7AD71D2AC54E81DED49A2DCNov 19, 2016
716879F72CD57ED043BDF078F50762C75777Dec 1, 2016
71684F371B7B741161D6A8733ADAC4191A84Dec 11, 2016
71684AE7B6E6F1F06ADDA2EF7CA911B14FE8Jan 5, 2017
71687B41123C4A701F3093D82B0E4809D882Jan 27, 2017
71680A50466940A337BAEFC0EB75BDE3B8AFJan 30, 2017
7168A9DBE00AE3EECE5842749E1077312B11Feb 20, 2017
7168D2300C44DA757E675848D41268BA4F2BFeb 27, 2017
716857A29978E167A01DC80306F898040D4DMar 11, 2017
7168BB95E8B271508E18F06A3567AFA3B32AMar 21, 2017
71681EB56822C8D50EBE21F7DAA33819808FApr 26, 2017
71687DBB4A11CA3B1B9A8F8DED621BEF151FJun 1, 2017
7168C63C14F9195F56A2EB369E6B901420A3Jun 6, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage^

  1. To enable deleting the chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage. The name of the first found registry value referencing chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of chrome-extension_ljibkigjccbegnbeojkoafejpoiachej_0.localstorage and Associated Malware.