Exterminate It! Antimalware

malpedia

Known threats:687,615 Last Update:December 02, 10:02

Testimonials

A Big thanks to you people, who have developed this product. My Windows XP Media Center OS was infected with Win32.Renos, Backdoor, XPAntivirus, Xta.kill trojans, spyware as I use rapidshare links a lot. I have licensed McAfee, which is good for nothing and was unable to protect my laptop from these malwares. I tried trial version of Bit Defender, Sunbelt Spyware, Claim Win, A-Squared, but they were unable to do a complete detection and removal of malwares. Exterminate listed all the malwares and registry changes done by them, like task manager, registry edit was disabled. I bought a single PC license, activated, scanned my system thrice and my system is now free from all malwares and viruses and running absolutely fine. I still have to use Mcafee as I have a licensed version but buying Exterminate IT is a worth of £20 spent on it. I will recommend this to everyone who use P2P sites or rapidshare or torrents. Now, I dont have to worry about any malware as I have Exterminate in my system.

Rajkumar P.

File: http_fastcontent.conduit.com_0.localstorage-journal

Location of http_fastcontent.conduit.com_0.localstorage-journal and Associated Malware

Check whether http_fastcontent.conduit.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_fastcontent.conduit.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_fastcontent.conduit.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\http_fastcontent.conduit.com_0.localstorage-journal

If you find http_fastcontent.conduit.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_fastcontent.conduit.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_fastcontent.conduit.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
36084719E42BAFB92A20083BA978A953DCDDMay 19, 2014
67047A01C50E97BAC0F7CE6EB8B84650E69FMay 20, 2014
16384CF06797BF68564DDCFA0599645E5F807May 20, 2014
3608FAA6E17FE6109642D5E73B4DD7C5D472May 20, 2014
567287D0CF1C83675094481A549A98BC047EMay 21, 2014
3608C119BA646FFC444E8F763E8806C4096FMay 27, 2014
3608C557C9B0711547FA3DE5008945757B04May 28, 2014
3608D4B54E34B23F93F95579B5D9E3FD7743May 28, 2014
118648DF205FFD2046751414CDF9F01FB3903May 29, 2014
163845DB2953E205CA362973E8DB96FEA9486Jun 3, 2014
3608E93B66366DCA268AEF70311BBD6F9CAEJun 4, 2014
16384BF2707FC7D52A5CCED9E278D5E00634EJun 9, 2014
360837EB6F351D24854D0433B1C3928D7071Jun 10, 2014
10832998647EC28972078E8486ECC356FD321Jun 12, 2014
5672E5117244E7616860EA823F9AACF00759Jun 14, 2014
3608771338386C5B4699F789E466D47152B9Jun 14, 2014
10832FE3F4F6064E965FA567C81C659C65574Jun 23, 2014
56726F581EC6DC0FB35CF491206282F6BDB2Jun 23, 2014
360835F79D0F205D9EEBEC605619659F5269Jun 26, 2014
36089AA3993BF975821F6C8DA48ABA037681Jun 26, 2014
3608CC3E2FCB2B5331ED55B4AE17E336F713Jun 27, 2014
36084269084701B6ED8902AD298413DEF437Jun 27, 2014
36082BBDA000EC80FBF6A3CE605DCB35EB7AJun 30, 2014
118640E62291D5394EDA7212189400D056831Jul 2, 2014
139289F2B8DD0E189234BC01921E676746D63Jul 4, 2014
360866B624AE8BF14AF919E4F28C7144DD3BJul 8, 2014
5672C4031A8A2146E06DF45AFC0953212C2BJul 9, 2014
6704302645BED119A2A98AA51CA5D2FAD2BEJul 10, 2014
16384674F4C0DA75DC482E3173F821613D714Jul 11, 2014
8768CB4E9B57C70AB46A2897623EC2EDAF83Jul 12, 2014
16384921BA0AE7CC46FE3EEF8B9090894EDB0Jul 12, 2014
36085A6E370E913C972FF2ACE708C500982DJul 12, 2014
980011A35B24886927F10BD6659D86E9A506Jul 13, 2014
3608CEEF4F6AC6CCD544C8C604B1FF04A6C5Jul 17, 2014
3608A540E146D6D3F2D4B7C670382859727DJul 25, 2014
16384657AD0A5C9EF06FC780708156AF607E8Jul 27, 2014
6704FBF9AF50227AB2E14EABD90C88BC926CJul 28, 2014
36081A11D63A3EF4F42099DF5D31E633B0A0Jul 29, 2014
567243E91DCE9306F4727494C9F8052FCAACJul 29, 2014
149604E8ED1C45C572632300EEBE06CBB39D1Jul 31, 2014
3608A296D7DE0A09A4CB36318C5C0AC265C3Aug 2, 2014
4640175CBDF53F7222A9BFEBB304233C4E22Aug 5, 2014
16384C5917B35F34C8400253B8FCF36C06AAAAug 6, 2014
16384A154403BF48E55A33948813C9ADA97D1Aug 7, 2014
87680FB61F47BB25A8AC9DFA2C2F876C145EAug 7, 2014
56729BCE30C19D7D86A33DD5AD53EE02F982Aug 12, 2014
3608A3017994600095C7CB49AAA86FD61314Aug 15, 2014
3608184A604626E07F4FDAE2E1460F5B994AAug 17, 2014
16384FC4964D74AE97BF83DA35746434998DFAug 18, 2014
139289BC491721AD8DAE197C3BE6972254D16Aug 18, 2014
163846EE914FD1CFF2222BA228B8E040E2062Aug 23, 2014
87683482D515BEE72FCAA0D0524379F04452Aug 26, 2014
8768634234282DA233803B63A618A7581B7FAug 28, 2014
163845F7F3623BE8100DCE0A7805AE661C575Aug 28, 2014
5672366EAC7440D06D429D2367AB9A9A1EC7Sep 7, 2014
16384C98E9557F44495E16029AFA88448DBB2Sep 7, 2014
16384F50FF9A4F7E890453A5E78EB3332DC9ASep 12, 2014
128968F358739F2C23B3C77679D23DF15C27BSep 14, 2014
56720FBD90128DCF2DB147166C7E264ECE58Sep 15, 2014
36084BE03046B7A153009517F65E63765CFBSep 19, 2014
98003B952C5381E9716D4D0283918B98286ESep 23, 2014
56729497359DAD3EDF0FE1BCDA261507D1EBOct 17, 2014
163849A3BBCDF849673BCB49864ED738378C3Oct 29, 2014
6704A9353D693663C21760CAF38ECD31418BNov 3, 2014
98009CDB92C773B4F56A418AFA95CBCAD94DNov 3, 2014
139284A2CEDEFE8E52E3513A55AB106255D7FNov 5, 2014
3608383B9B4532D219843A1DB781746D4E0DNov 11, 2014
7736C1B146B0F1FDB9DB6B7A0EA25AB90EADNov 12, 2014
36087BF4FD07566B4D3A02A41CAAB313E46BNov 14, 2014
163841E8647E207EBDF469AED4393BF04F1D9Jan 3, 2015
9800B0E9B6E00178BDCC8E97F6584B41DD42Jan 11, 2015
159920BD6923F1E3CD2E81F1DD44AF0D54882Jan 24, 2015
163845E58B9D5B7F99F4759397787602F726EMar 7, 2015
16384B504A81F0F95E58FCF51C62916A4D270Apr 15, 2015
163840957B36EF55C3647C2EF472C512298FBApr 15, 2015
163847B6C80709B7BDFADF78FC2666D92F3FCApr 17, 2015
16384AE4C559BD9D54DDF756A83C8004F5026May 1, 2015
3608FB7C1121A4E050D6C55EEE6731B02C22Aug 30, 2015
163845A05FCE56F35815DC5286202321E7764Sep 29, 2015
1638427FFBB24A10AF9C00E44D94DF1CAA4B6Oct 15, 2015
163844626D75AB002AB7659F4D089822037F0Oct 23, 2015
980004A8D9C1C5FDC89E525DA61E5D7D6D19Nov 24, 2015
16384C1236BCC59AD8E9EC30DB6059FE51BECDec 13, 2015
16384E99EB85E5D3B9D37947A606D9344D13BDec 19, 2015
98009A71252E080B5787FBB39EA876AFCBAEJan 15, 2016
1638404CA481DA61A31631A285904DE1FFD43Feb 15, 2016
11864E0675C68E00577BF1335715F209093D5Feb 18, 2016
12896B47B177F1E9F78CD6EFF4B2CD4372DC4Mar 6, 2016
1638489FA4D537C65D95B242F37DACEC155FBMar 23, 2016
1289646DCD063A4E874D1353E48034322F9F5Apr 3, 2016
163847B543F727FADE9BC44514D3CB88E9356Sep 1, 2016
118641CE5CC0F059D1390D4E3825558A58749Oct 7, 2016
1599209B49F5169E0CCE6BAF80598A271502CNov 3, 2016
56727669B2D1E85D37820332BE7BEC00C43BDec 10, 2016
360891519733CFCE1B45FE1334B9F5DC678ADec 22, 2016
98008B3E5D546356650D81310D510886C64EJan 2, 2017
16384D873F24DF2DBDED595FA1B3CE6111F76Jan 23, 2017
128960093C6C33DCCC31E2B61B228FB7635D1Feb 27, 2017
3608B9C82446E07F68FBE81F75E92C14763BApr 14, 2017
6704B0CBB77397396DC1B71EF4D8598C5797May 31, 2017
16384AE3E4614D98AA60E28A3920CF21EF261Mar 22, 2016

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_fastcontent.conduit.com_0.localstorage-journal^

  1. To enable deleting the http_fastcontent.conduit.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_fastcontent.conduit.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_fastcontent.conduit.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_fastcontent.conduit.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_fastcontent.conduit.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_fastcontent.conduit.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_fastcontent.conduit.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_fastcontent.conduit.com_0.localstorage-journal. The name of the first found registry value referencing http_fastcontent.conduit.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_fastcontent.conduit.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_fastcontent.conduit.com_0.localstorage-journal and Associated Malware.