Exterminate It! Antimalware


Known threats:699,742 Last Update:November 20, 22:46


Hi, thanks for the upadte!! It did the trick!!! Must tell you that I have never been this kind of satisfyed with any buy as I am with the Ext.it!! Thaks and I will recomend it anytime, anywhere!!!!

Sincerely Paul


File: http_allin1convert.dl.myway.com_0.localstorage

Location of http_allin1convert.dl.myway.com_0.localstorage and Associated Malware

Check whether http_allin1convert.dl.myway.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_allin1convert.dl.myway.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_allin1convert.dl.myway.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_allin1convert.dl.myway.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_allin1convert.dl.myway.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_allin1convert.dl.myway.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_allin1convert.dl.myway.com_0.localstorage

If you find http_allin1convert.dl.myway.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_allin1convert.dl.myway.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_allin1convert.dl.myway.com_0.localstorage File^

File SizeFile Md5Last Seen
5120DF443DBEFB0D0C172BBE3F4A59500E91May 6, 2015
5120D59B60133E76514EF2F821CAB7692258Jun 3, 2015
51207EFE7FC528C86C27A71001DDE71FFAF1Jun 12, 2015
5120AC0F0D99245B31D9E1D7A79D87437057Jun 30, 2015
5120F7F082C7ABC0E7996F327901D94BC243Aug 2, 2015
5120C20E4DBAC88ABDFFFC5D2CB2F962C583Aug 15, 2015
3072A3E0BE22465BD7EBECAD87629F5B3376Sep 30, 2015
51206EAEF2E3CE57DECB83F28E7DEF03C861Oct 18, 2015
5120A9EE7E3C45AC505EAB2305D94F208788Nov 20, 2015
6144F0ADCF388178FA0EAA57C20D0CB0F796Dec 12, 2015
5120A94A34B05B6AADAC7EBB63A3C0D1ADE1Dec 27, 2015
3072DD725C05640F4D2FDFBCEC50B149D5C8Jan 8, 2016
5120321D5EA4B3F46F8DC86E340CBB2D31B9Jan 17, 2016
51206A05113F260EB9B671AC1CDE8D16558EFeb 2, 2016
51204CC530D0CFCCA6BFF4E85AE4F560654FFeb 16, 2016
512029127E579B29E7F20BC6D31BA93DF90AFeb 16, 2016
5120307A05EEC888D1195A93E96CCB5BC1C5Feb 16, 2016
3072AD027DCD6F7FC50E38B2E70160B23C77Mar 10, 2016
5120E9A074BFFDB61E068BDE500735CB27D6Mar 15, 2016
5120E362E5F6EB3FF0028E93A12E7B3F2241Apr 12, 2016
51207E4AD261119D6BC9BF60CAD2BFAE3B18May 6, 2016
51205E6EFBC43702DA0C006573EEEC38E81BMay 10, 2016
5120EFBB3DB398602A73B38D8A85EAFE19D2May 20, 2016
51204C31AB427683566DF99BEFF02F3D698CMay 31, 2016
51206E2F1478B64173B302F7DC6598193EE0Jun 12, 2016
5120A7BF797EE2BB9C01B298D63D673EE2EDJun 14, 2016
6144616DA8801585A77B8435D6B6172010C4Jun 23, 2016
409658222225603832ADBC1B33CBB2B6D5F2Jun 23, 2016
51204D6309B1F260C10ECA976357E17F927BJun 28, 2016
51208898B2C181B95BF52E61BEAD56136079Jul 11, 2016
6144FEE7B459C5351D5E7A9E37A22F861309Aug 18, 2016
5120C945433D912150EDE82229A87A9AFBD8Sep 29, 2016
5120114DD9CD0E38B5DA93228C167D1B09F6Oct 3, 2016
512045B507C2BC7AFCBB6C78310D36B35049Oct 17, 2016
5120B1928867E8387DEC4DD517E218E1A3DBNov 18, 2016
51208B4A31B53C6EF91B83ECFB0F295BCB46Dec 4, 2016
71685A478B0DA0ABF8218046AF9D7D519832Dec 15, 2016
6144DD60F1400639164424EE67A6F7EE5023Dec 19, 2016
3072F05BE4161FF6708301189D04F12964A0Dec 21, 2016
5120D57BAC05D88C1A3ACFDC82C4F2AE3895Dec 30, 2016
614467CDDF18490D8A86DBE3315320D00C90Jan 17, 2017
51201B7AFF7CE8A156A78671F4495D1416F5Jan 20, 2017
6144D622102A4201602BD1CF41CE2B290C48Feb 28, 2017
8192BB70F2A8E8DA04F02B4449C4EC174F9DMar 12, 2017
512082B6B0CE3697B28EE14675CA3548209DApr 4, 2017
5120566B3D3A15E7FAD3C0940C05106DBBB8Apr 13, 2017
5120706C950B9E9D795F6977F74579195707Apr 28, 2017
6144111F42BF3563F7A6B09C537A25CD7254Jun 25, 2017
6144A2F34FA4B855DBDB594F5963B43C385FDec 8, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_allin1convert.dl.myway.com_0.localstorage^

  1. To enable deleting the http_allin1convert.dl.myway.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_allin1convert.dl.myway.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_allin1convert.dl.myway.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_allin1convert.dl.myway.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_allin1convert.dl.myway.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_allin1convert.dl.myway.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_allin1convert.dl.myway.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_allin1convert.dl.myway.com_0.localstorage. The name of the first found registry value referencing http_allin1convert.dl.myway.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_allin1convert.dl.myway.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_allin1convert.dl.myway.com_0.localstorage and Associated Malware.