Exterminate It! Antimalware

malpedia

Known threats:687,615 Last Update:December 02, 10:02

Testimonials

Thank you so much for developing such a wonderful product. I tried everything: PC Tools, McAffee, and the list goes on but nothing worked to remove a whopping 706 infections including backdoors like exterminate it did. I will recommend this product gladly to everyone I know.

Austin J.

File: http_fastcontent.conduit.com_0.localstorage

Location of http_fastcontent.conduit.com_0.localstorage and Associated Malware

Check whether http_fastcontent.conduit.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_fastcontent.conduit.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_fastcontent.conduit.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage

If you find http_fastcontent.conduit.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_fastcontent.conduit.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_fastcontent.conduit.com_0.localstorage File^

File SizeFile Md5Last Seen
3072582E20CEEC81A852327119219ADCE499May 19, 2014
6144B75F34F6A1A9C026D4247390D0929BDCMay 20, 2014
28672505DE7834A75B913AF10BE32A1FF0997May 20, 2014
3072C2FB6F5E3372EF699BDEBEDF01164CFDMay 20, 2014
512023E47AC56004A16BC08084A7DF169FBDMay 21, 2014
307231F40F6709D60DE553AD6E00148C7CC8May 27, 2014
3072FC81DE6F74F2DDB10369D3F5A878EC63May 28, 2014
30725A072313283DBA74BECCD395159D774FMay 28, 2014
11264D05F05023705C06DDE9D64E89CDD5FE5May 29, 2014
52224A5BB9565392092125E76C7634EDFBF48Jun 3, 2014
307259A75B189C03CA3EDD903C0F1C380213Jun 4, 2014
55296D99F17ECDA6F3F4CC6E65930036E0EB7Jun 9, 2014
30723B695ED0C9E4DEF42B17E9067C472F20Jun 10, 2014
10240DB969A3EAE34A761623C1870317E0468Jun 12, 2014
5120FA6B20DB641272C7944452288B851D53Jun 14, 2014
3072D21F799F54F18D1ACAA9A50856F28251Jun 14, 2014
51202CA79D058ABBC628E398B2A8B22D4639Jun 23, 2014
1126480CECCD665D88B112113734B6645B9BDJun 23, 2014
3072400A94DED24F1729C3A6CB75F5BFE4A7Jun 26, 2014
30728149990DE1F603253E70830E0838D5B3Jun 26, 2014
3072A807AB36CCF995792C7705C9AFB6E578Jun 27, 2014
307234607A565761511F180B95172FEB3205Jun 27, 2014
3072C0DFE3F0D809ACB81F6C97E12CECF9D8Jun 30, 2014
11264A50209C1671CE1529CFD8F5FEFA5DA6FJul 2, 2014
133124C2E1CB734F5DCB01EF5F1B15F36D0ABJul 4, 2014
3072833A09E447B6E567A9BBCF2CC6E582E5Jul 8, 2014
9216B1DAB046F55B7D7735780C4502972BB1Jul 9, 2014
61448B998E566CADF4236ECA42FF43196B99Jul 10, 2014
27648AC51F7DF95FBA5D476FA653E8AA90867Jul 11, 2014
819287F20B36122961C8F72BFBFEB0BFD286Jul 12, 2014
17408CF9A50A25F46306A5C220C0BF1639C01Jul 12, 2014
30722A7056EA50EF8D1CD7C88D59F17BDF2EJul 12, 2014
102409BFAA8C58B7D2CBD6ABB696BE25440C4Jul 13, 2014
30723CB6ADB259E1F53D4086C383BDCF999CJul 17, 2014
317445669539E823E59FF27BD115E32AD11FEJul 27, 2014
9216C85E4D49B10BDBD44BE1DB3298A1E658Jul 28, 2014
8192615E8F7C3472CD8973869FD513CC67C1Jul 29, 2014
307279C3FA526F2371A81B2EF32A4FBA17FEJul 29, 2014
3072E527B3D292A776E421B0C6D5BDB55F70Aug 2, 2014
1331218C16D75B7065650B82BCF3F3E16DE18Aug 5, 2014
57344FCC29AC30EFCB3076603638C63489DDCAug 6, 2014
512008AF2EB11D3D5D13895787E4CD92B4D15Aug 7, 2014
102400D7B77A3598DCDA91B8D1B70D7D3A47FAug 7, 2014
6144EA92EFF64A57015B8C1CE6C64B88677EAug 12, 2014
30722999C29B386D3B662AEAE5B2C8209D73Aug 15, 2014
3072E0CBBD565000EF194ECE23AE228CF782Aug 17, 2014
35840DE2805938B31AB87778F00814F4E087AAug 18, 2014
153603B2379174AD0F20028DCC026DE22B3B9Aug 18, 2014
29696E058425BED1A9C11997FDE4B6FA54E79Aug 23, 2014
8192485056E6AC2CC69AC1AEEC79DBDB714EAug 26, 2014
10240A4D9FD9A14C4C23EC8508B9F637786E8Aug 28, 2014
29696B246BD242EA793CA58018F453EE75ABDAug 28, 2014
17408DDB4E24AB3A101230A8C5A2CBB8ECCEEAug 29, 2014
245765EBC836F2D0B9FDC1A38BBAB62499A27Sep 7, 2014
921613A9948CFC641EE09AA43FE4C8A04700Sep 7, 2014
30720F8B68C76A0E01345473B12EF199A451ESep 12, 2014
1228847ED2792D505E7CCCF2B571E93484C57Sep 14, 2014
51204B38CCE00740318C8B159E3BC443B5E8Sep 15, 2014
30726103923390F6D29911355C54DA4BFA1FSep 19, 2014
92168F8378034582D04C4EB003B678DE221ESep 23, 2014
92163DC4234357C6AA5F4740934E88E052D2Oct 17, 2014
25600DA30FB85297B3426788228BED944C9B1Oct 29, 2014
9216E7A3FCA5ED18B8721A3190E77B94C93ENov 3, 2014
6144C77FA851669C90E425E732EBFD368BF0Nov 3, 2014
13312B4208AE55C36EF992E0D87477ED1CDF5Nov 5, 2014
30725B1A151F01EFF0A10967A3422A873B6CNov 11, 2014
1024032947E6195FA464715522A2690A1D1E9Nov 12, 2014
34816B0123082EB3E5F723D8D98B01B760848Jan 3, 2015
9216DEAA81A134ACE2FA2ACA76F3B2B4012CJan 11, 2015
153600F79E205FA5CD149357AD42EBBC81A82Jan 24, 2015
72704EC56590F6CF5DD28FBB0F000EB81F510Mar 7, 2015
28672E975B474515BE5FDDF1FEFD1D5D2FE01Apr 15, 2015
26624EF3C48C6535164493AC02ABAAC077A16Apr 15, 2015
18432D3779BFAB89E12B312A6C210E1C6DECBApr 17, 2015
34816A64D2E51CE514AE9862EA94F756BEE40May 1, 2015
30721E21C69DE6014046C7FA3E87F40CB5ECAug 30, 2015
28672626F2E716212606D4020903EDE60C09CSep 29, 2015
2867208A3A97261548B2879256960A16F73A6Oct 15, 2015
317446217165C5C30798199AD6762C5CE2DACOct 23, 2015
34816CAACE8EE4482E77D28A856822FB6B659Dec 13, 2015
26624E782D0CAB459A1BD67FA2E80658CB510Dec 19, 2015
9216787561215BD42DBBC29CB989BF006BB3Jan 15, 2016
34816F89C222F92F3828E78DE17C96A373C1BFeb 15, 2016
11264616F95CF7590990022EAAB3A58015473Feb 18, 2016
133124167BBC5045A56C8B4181FBCA11E966FMar 6, 2016
19456CCDB468A95FB55E7E3E40FC7FDA851C4Mar 23, 2016
1228800FCDDC8AD0AEDD401670048C54F0FCEApr 3, 2016
3686421E3AD98AD3C1380BA58F2B168BF0E31Sep 1, 2016
112647F0037CED676DE1E2908DBB4CB8A62DDSep 15, 2016
112645432439E4BCD472C6FBACA6013389BFAOct 7, 2016
153604914B3590E9CB8BE50135C9E4C6A1A39Nov 3, 2016
8192207E0DBAEF0C21DB5E6F018A92D1938BDec 10, 2016
3072F166F9B93EE9D762D8937B191AE8F3B6Dec 22, 2016
19456AF1FDC2A1E97076BCC9FA221DD83CFD2Jan 2, 2017
10240C9359FF808339EE7B304DBABE3E2D44BJan 2, 2017
28672CD6B3EEF6D55C6B4BA92FF9DADF6808EJan 23, 2017
30726F72100FD6BB3F18D0824E531994F9E6Feb 2, 2017
30727A74DF3EE5A6B2BF8262785E0D9147D6Apr 14, 2017
1024060E55A328057FB87C3838465517A2820May 31, 2017
317440888DBF4615467242BCEF9D345C04414Mar 22, 2016

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_fastcontent.conduit.com_0.localstorage^

  1. To enable deleting the http_fastcontent.conduit.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_fastcontent.conduit.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_fastcontent.conduit.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_fastcontent.conduit.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_fastcontent.conduit.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_fastcontent.conduit.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_fastcontent.conduit.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_fastcontent.conduit.com_0.localstorage. The name of the first found registry value referencing http_fastcontent.conduit.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_fastcontent.conduit.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_fastcontent.conduit.com_0.localstorage and Associated Malware.