Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


It seems that the problem with UACd.sys virus has been solved by this program. So many thanks for creating this amazingly useful program.

Eva S.

File: http_cap1.conduit-apps.com_0.localstorage

Location of http_cap1.conduit-apps.com_0.localstorage and Associated Malware

Check whether http_cap1.conduit-apps.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_cap1.conduit-apps.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_cap1.conduit-apps.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_cap1.conduit-apps.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_cap1.conduit-apps.com_0.localstorage

If you find http_cap1.conduit-apps.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_cap1.conduit-apps.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_cap1.conduit-apps.com_0.localstorage File^

File SizeFile Md5Last Seen
215040A1F7B13264B0D35B439346373FEE900Sep 7, 2014
1843256A6234287A9B0432A9EDC284002D8B3Sep 8, 2014
163844C0C23ECF274F3782E21002CC5FEF583Sep 8, 2014
30728B4B5809EC8168F34EF76FD9BACB70D6Sep 8, 2014
21504C96415CE3BBBD987C45EA337D37D435ESep 12, 2014
307252C4E64B6398F763DFC5EEE4754E6F94Sep 15, 2014
409641CA5E6E68F42FE335FC0E101AE9D3FBSep 15, 2014
16384DA0917FA4244E3FCD887636BB7AAEAD9Sep 15, 2014
194567B67EEFD255A33C633CADC68E73172D9Sep 19, 2014
215048A7362B1E652E6C1CDEB42FB31BC2A92Sep 20, 2014
16384EF250A8CA75506EA0058A7953198FB2DSep 23, 2014
16384E114F70022D8ED672D84FED84C0D0724Oct 20, 2014
307227F27DE30AE1ECC0A3D868DD1C5CABC8Oct 21, 2014
409660DA58F527BBC9F20840505BA3B57543Oct 26, 2014
4096A51264703348B3815781FFADCFF4CB9COct 30, 2014
307227D8ABB7826C41CD446F61C9C05BC130Oct 30, 2014
215041E0E71AACDAFE2E72B5DD02A059FDC26Nov 3, 2014
19456C2A391270C3E26BCC007FD907EAEAC11Nov 5, 2014
1024006FC9737EB1D15BAC25C7AED2E0953FBNov 6, 2014
30726283ABB51BC80E9029D91B28AA1BF3D5Nov 9, 2014
5120C43574563387C73C77642DDA53BEC932Nov 10, 2014
3072006F71D043A4FA7638E8973965603EF0Nov 13, 2014
3072EFDD84DDE7CE02FE4D92D3BB15C9D9B6Nov 14, 2014
4096B042AE230E05D32368767DD79B2D261DJan 3, 2015
4096B554BE7EE7146ED9EE7CBD034FEF4392Jan 11, 2015
11264962E85E69A7D031F91FEFBFEA61E5D05Jan 25, 2015
4096046BCF9A58B5E253454C8D2CCAC5DAD8AFeb 11, 2015
12288B3ED7619ACFD78B42AAC264093CE7612Feb 20, 2015
25600F0FFE13B5D57F40721B514C1AABCC1BFMar 7, 2015
11264E0BCFBF5F90F62415A555D02CB9B4BEBMar 19, 2015
4096D741777187CB98258983AFAB92C79E17May 1, 2015
84992F2AA5FD28B5F0437DBD8F0CF0D75153DMay 3, 2015
30723811A0B57E0FF615925403AC6AB239F1May 3, 2015
3072080CE0EBB6A849744BBD1E105B7AF89CJul 2, 2015
16384ECB30A014A4B5320836C23A9358A2A34Aug 4, 2015
3072074278AF45DA1FB1DE0FA9E45D9001D6Aug 11, 2015
40963A391E0A403C72AFF8E8650CDCB0D4A4Aug 31, 2015
3072DEF097B0AE5B484AFC6CAD6714D8D1EASep 2, 2015
133122D31A76E15CFC188ED2D0C083C72FC01Sep 27, 2015
12288907B5411478D5765BFC13D2960414309Oct 1, 2015
163840A1BA528C9A95C83D1C86594C4088748AOct 8, 2015
3072C72203F98CDA7DD6AF0C59C9E6741B3FOct 29, 2015
21504702438199B802DCDA4C2B17210DE4700Dec 13, 2015
194568A1091D095A517EF454165583867D443Dec 19, 2015
4096EFF463AC5B6AAD477EB601F15244D051Dec 27, 2015
235529F2675613D617C7DBB51C78EDBDB3E39Jan 3, 2016
1310721CF84792EF61A116D140298BF09B4D3DJan 15, 2016
30726195638F0D24B651ED3F83CEFE5676A0Jan 17, 2016
122888A6EB34CE71F8B5F4EF9910F2728C4CAJan 27, 2016
11264E5F346D6E9FD86555B3CEE152B044726Feb 18, 2016
921692D6ABE814D4B6A23FE0CCB059542856Feb 22, 2016
215042910BF6E705FC9203F3E4A39A0E20D14Mar 14, 2016
84992F7B5F0A9868531AB06984645F0C06FFFApr 18, 2016
12288FAF406B6D0670119CC38154A02FFCC83Apr 20, 2016
30720E0D35F3A2433A00D695C4E909FA5EC9Apr 28, 2016
30724F0A7D9659029772E17AE81347AE2D26May 12, 2016
4096A90E6C94BF237EBFA54E3357FBA23B6AMay 18, 2016
6144E03661BC170AF59A7EC2602D2D145438Jun 4, 2016
409601642B2F91647C6C96781B0580B7A0ADJun 21, 2016
122888EA09376577A36842682722A6A1F60D9Jul 31, 2016
30721C409C1BB31C116D47FFFBE23449D8EBAug 10, 2016
16384BF5499995EDFB3E00D025F0F1FF4F6E1Aug 31, 2016
409628E55FDC7134D7108A8B42175D773EB6Oct 29, 2016
215043CD9193E773F831371D84CBA52C4C12CNov 27, 2016
9216CE5B87BA610854AB8D6A0658E18DAF1BDec 11, 2016
819246A8904416E738935E7366FE51FF882FJan 23, 2017
614415B5923EBAF85FDEE9464150AEE3D050May 21, 2017
40961DDD8340945175EB2944C6ECAE472909May 29, 2017
3072B8496FBEF3BF63411230317EA6E52FB9Jun 10, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_cap1.conduit-apps.com_0.localstorage^

  1. To enable deleting the http_cap1.conduit-apps.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_cap1.conduit-apps.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_cap1.conduit-apps.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_cap1.conduit-apps.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_cap1.conduit-apps.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_cap1.conduit-apps.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_cap1.conduit-apps.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_cap1.conduit-apps.com_0.localstorage. The name of the first found registry value referencing http_cap1.conduit-apps.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_cap1.conduit-apps.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_cap1.conduit-apps.com_0.localstorage and Associated Malware.