Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:October 27, 11:19

Testimonials

Hello, bought a license for your antivirus tool and I must say it was totally awesome! It cleaned TDSServ trojan which was a real pain in the ass for the last 8 months and it also found and killed Virtumonde together with all its files and a few other low level infections. I was already thinking about formatting and losing tons of information when I found your tool on the internet.

Thanks and please put this message where people can see it.

Andrei T.

File: http_cds.j4c2z9p8.hwcdn.net_0.localstorage

Location of http_cds.j4c2z9p8.hwcdn.net_0.localstorage and Associated Malware

Check whether http_cds.j4c2z9p8.hwcdn.net_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_cds.j4c2z9p8.hwcdn.net_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_cds.j4c2z9p8.hwcdn.net_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\http_cds.j4c2z9p8.hwcdn.net_0.localstorage
  • C:\Documents And Settings\USER_NAME\Application Data\Opera Software\Opera Stable\Local Storage\http_cds.j4c2z9p8.hwcdn.net_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_cds.j4c2z9p8.hwcdn.net_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_cds.j4c2z9p8.hwcdn.net_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\http_cds.j4c2z9p8.hwcdn.net_0.localstorage
  • C:\Users\USER_NAME\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_cds.j4c2z9p8.hwcdn.net_0.localstorage

If you find http_cds.j4c2z9p8.hwcdn.net_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_cds.j4c2z9p8.hwcdn.net_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_cds.j4c2z9p8.hwcdn.net_0.localstorage File^

File SizeFile Md5Last Seen
3072027BA4F8B1B25BE1C06A0AD3A22E860FFeb 2, 2016
307275A3B15AF20F0FE0530F2B4A1FF24A78Feb 4, 2016
307268FEF18D245030931D5BAF30E4FFBB23Feb 4, 2016
307209F4B81F6E5D31A87F2D03713CBE4CA3Feb 6, 2016
30725247733EC4AF311B19FBABE4B44AA6A8Feb 9, 2016
3072A6F8DD7D46D32AF52460CF356D5AE7E5Feb 12, 2016
3072D3413ECDE55A2DE96908FE0D967351D2Feb 13, 2016
307212E558E8B223D207A9135717B214AABEFeb 13, 2016
307210B570FD9CD85526ACB07C5860F47E2EFeb 14, 2016
30725693223826193F6CDB74EB4C0D5CF92EFeb 16, 2016
3072C1939DA78A8CAB57501F82F395059506Feb 16, 2016
30726E0BCA4EC34A3F8A81EAA50CEA95A55CFeb 22, 2016
30720DD67A1337926BA35657E2EF2A667252Feb 27, 2016
307286ED37116F16359625A35EBB8E6784AEMar 2, 2016
3072374F78E49EF6A5B6822534B7977D106BMar 7, 2016
30729019D982E432EBDAC836CA1255034C6DOct 24, 2016
3072567FEFC6B6A4AE60EB8F2E4EFC9E19DDMar 19, 2016
3072469B431E5503CC97EE00986F9066299DMar 23, 2016
3072DF0BC1BD0C6B4115A4BB6E30A00540D3Apr 21, 2016
3072A08273C94DCF868DDD870F0D85C2BA1AMay 8, 2016
30724E08E65F5D2601D0540EB823C85F8AE1May 9, 2016
3072DE74F573625F03AF7C47A7BFD532EEBFMay 13, 2016
30721B05BDF1C854875E3AC4FC20AD1D831EMay 15, 2016
3072EF2A7B48DD5F969689C017EEFF730C43May 15, 2016
3072CA14CE426757906F80F50666BA9E4C46May 30, 2016
30724B8F1635FE63253D52E92024A4939E7DJun 2, 2016
30728370499CCCA1B9FE672B9AD111D9DA73Jun 2, 2016
3072785D71EF00457C8849706C9DFC7A1ACAJun 3, 2016
3072FCC3F6BA1E97BCD01C101631540C5FD3Jun 3, 2016
307260C0C290229BE5B6F4FFA043A845C3F5Jun 7, 2016
30727AC050DF709E2FE69CBABD71AB45F1ABJun 8, 2016
30725AD42085760C4091701BD735FE055F3BJun 11, 2016
30725E7FDADB37798358738233CE6BD4A0B4Jun 12, 2016
3072CDBF70E358E5655B17438B65185FBE92Jun 24, 2016
307265C596B6B4BAE058092A5F93BAC13F1FJun 27, 2016
307268E8A78DF44C55BDE6D5E0087D07DF12Jul 3, 2016
307299A667AC404DDB8D44AA0BFED4F7166CJul 12, 2016
3072383FF8B47AE5BA4CD686BA30EA6006E7Jul 14, 2016
3072338A60C456FCDE16C11BC5A1A1477A98Jul 19, 2016
307207B4963C26ECDD34857A0746C39F9EFDJul 24, 2016
3072B059BCA5544DC2404D3F581EF987331AJul 31, 2016
307214545FF2C7A61DF8A3704BC5F9DCB349Aug 31, 2016
3072FED77F600601BF8579A18A8A4E78A9FBSep 8, 2016
3072887CACF65A78CF0DDFAAAE42B3E63B6ASep 20, 2016
3072F6E204EBF40C5D046C93AA776F2490E7Sep 22, 2016
3072D06EBB6131E0A327AE0BF5F17205489COct 6, 2016
30725E24E03F2F7A2A6C2518F84B909F3C13Oct 18, 2016
30726839F91E6B7D7DF58897694E686FE81ANov 12, 2016
3072B3D5A2E208DA0D43D8373C779947F4CBNov 19, 2016
307228DD904FBFCF084CFA78EBD911016E4FNov 19, 2016
30723635568B9DB08B409D6A53BFE459917DNov 28, 2016
30726180349907E77838C927912D6602BBF5Dec 10, 2016
3072973E512B9738179AFAB083EB0D6CB441Jan 5, 2017
30728DC1E8BEFA33E65847BF9D2DC84CFA7DJan 6, 2017
3072629E1F894FC7056E3C61B74E353C5D22Jan 18, 2017
3072B84B4EE6665F79C4437697A5AD2748DFJan 21, 2017
3072DF27465EAEC429E7C5B5671DCA4EB202Jan 30, 2017
307280909E07D8D87DB982E3DA6D5B085777Jan 30, 2017
3072DA83019546E722ADBB4DF06001D5EE85Apr 2, 2017
307270BD5C6C0B99691C8CFD244C7D7C1F15Apr 24, 2017
3072C2A0F68808C744BA10FB0B3165AD5A61May 19, 2017
307219EFA5225995293C3D760338217CDC1AMay 21, 2017
30725CE6F71E510B3C9F29449DD3598E9037Feb 11, 2016
30720244FF3909BB4FBEA8067F4A50E7C431Feb 14, 2016
3072FEF8489FED55294E4D5E348075EF801BFeb 16, 2016
30720D114FD3B03E379602BF3A69A62D5F24Mar 3, 2016
30721719C433381CED64B5E29BA938E8A995Apr 2, 2016
3072B6146471C9006F1F6756E1F704458896Apr 21, 2016
3072DC8F521FCC19EB0653063E6DC8351497May 29, 2016
30723B149E46D7EB26D2826E58F6B1777796Jun 3, 2016
3072F2621B4F0047143090C910726076B5C7Jun 7, 2016
30721EB47BBA9B1D0058EDDB2BC9F26F9128Jun 16, 2016
3072A633E246B028877D0F573B3892D0A12BSep 17, 2016
30728359ADADCECAEB48F2BA66285B3A7994Oct 18, 2016
307259D8266BE506FF6F7A9EAA3124789D58Nov 2, 2016
3072FAA92EE60075EC25784729F85D5F10C9Nov 28, 2016
30721B15E65737EEF39C3BD8402EAC392B9BJan 9, 2017
3072A7E66CA078F4043FC7EF294A86903961Mar 12, 2017
3072B3B9BDCCE0EA1D2C141701B97DEECC26Apr 2, 2017
307249695AE21DF41A7DC0B4D4B5E1044090Feb 7, 2016
3072D92D9FE9F3E9CBBA840AC73AA9B26E0CFeb 20, 2016
30720183CF115D55B80CF2150398EDF72EC5Mar 15, 2016
30721C460B0E0E95A9CE6C63CEE7D30B32B5Apr 18, 2016
3072B41FA4A1286FF9B4B0C8D71C61876ED7May 17, 2016
307250F7D7BEA6E8921CF006D95E86E690DDJun 2, 2016
3072C45D3D4AFC7A9FE5C1F924C66D8B5E42Jul 16, 2016
3072256EB6319219F3FB45D3169B0F1244E3Sep 13, 2016
307260ACC860F0C8E1EB3B80912BA80C0B04Sep 28, 2016
3072365754FA479F8EE03F9E298633E820A9Nov 2, 2016
3072F9818B0833302468EB8552672B304B0ANov 19, 2016
30724ECF7540D67DCFA9ED60F2CA1D0821B5Jan 16, 2017
3072966426A0BF21CB2FA237896973F98AD4Feb 8, 2017
3072560F075222716DE075F021103ACDE420Feb 14, 2017
3072E961BBC907CD86FFB97017DB4B2341F6May 20, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_cds.j4c2z9p8.hwcdn.net_0.localstorage^

  1. To enable deleting the http_cds.j4c2z9p8.hwcdn.net_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_cds.j4c2z9p8.hwcdn.net_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_cds.j4c2z9p8.hwcdn.net_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_cds.j4c2z9p8.hwcdn.net_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_cds.j4c2z9p8.hwcdn.net_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_cds.j4c2z9p8.hwcdn.net_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_cds.j4c2z9p8.hwcdn.net_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_cds.j4c2z9p8.hwcdn.net_0.localstorage. The name of the first found registry value referencing http_cds.j4c2z9p8.hwcdn.net_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_cds.j4c2z9p8.hwcdn.net_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_cds.j4c2z9p8.hwcdn.net_0.localstorage and Associated Malware.