Exterminate It! Antimalware

malpedia

Known threats:687,615 Last Update:December 02, 10:02

Testimonials

I have had major computer issues in the last week. I was infected with the Darksma and Vundo downloader trojans. After researching the net for possible solutions, i found they are extremely difficult to remove. I tried a variety of spyware removal tools to no avail. To do it manually is near on impossible.
The symptoms are, computer runs slow, constant ad pop ups, hijacking of emails, theft of information and locking of a variety of functions.
I then found buried deep in a google search a link to Exterminate It. After reading it, I downloaded to do a free scan and a lot of stuff no other spyware had found showed up. So i went searching the locations and sure enough the files where there on my system. I tried removing them with no luck. So i spent the $25 usa to activate.
http://www.exterminate-it.com/
It removed all but 4. I was disappointed that the Trojans once again reloaded and my problems continued. So, i used the SUBMIT STATE service. I supplied all the info i could gather, pop up addys and what they were for , what others programs had found and Exterminate had missed etc. Within 24 hours i received and email telling me they had updated there system and to download it. I rescanned the system and it deleted all the previous locked files.
Darksma and Vundo downloader trojans have not done their re appearing act since and my comp is running normal again.

It's worth remembering the addy or downloading it to see what it finds. I had no problems doing so in anyway with this program. They done what they said they would on there web site in under the time frame.

Source

Administrator of Horse Racing Forums

File: http_search.conduit.com_0.localstorage-journal

Location of http_search.conduit.com_0.localstorage-journal and Associated Malware

Check whether http_search.conduit.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_search.conduit.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_search.conduit.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\http_search.conduit.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_search.conduit.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_search.conduit.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\http_search.conduit.com_0.localstorage-journal

If you find http_search.conduit.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_search.conduit.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_search.conduit.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
3608F6B0BD79742EE28D03AF4C720A3ACFC1May 14, 2014
6704D09118F88DCFF76399FF8F2D24CBDB8AMay 14, 2014
3608EDB15773602C8B14F3B8B91122D94946May 14, 2014
36084737954B0E736B2F44A98F5773A2871AMay 14, 2014
36085AF90A0B014EA0030212AE8BFB7288E7May 20, 2014
3608827FA9DC197FE8E1238AF0DA4A91FE79May 20, 2014
3608BF01FC94A54AE526CBB562CDC6E8749BMay 21, 2014
360801258DDC695807A1CAEABC1AC007C854May 27, 2014
3608A1E1B69EA3C8A38E00BF8CC3F77392E6May 27, 2014
3608A9062F981AF88B7DDC3CBD65783E4E68May 27, 2014
36089B32F4902C060C37C693CD8E93A3A293May 27, 2014
108322CF12DE7551BFF3142D8E75CEDE2E39BMay 27, 2014
36082E724994B66709145BC4C79DBD737C88Jun 6, 2014
36080CDF6108EA01E8589B9A25DCAE94D77DJun 9, 2014
3608651A249369D80294037673C2D5A3EBCDJun 9, 2014
670428CE742F491CE8A623AF990A835BC813Jun 9, 2014
3608713A3786357B63B2D6C4DEB8B5254398Jun 12, 2014
360841B65781C0FFDFB05762DCEBED93A08CJun 13, 2014
36086FBAE76F15E404C6F9554FF11E0A47E0Jun 13, 2014
3608A139D2FB1AF79F9F37F3CF807CE40514Jun 13, 2014
36088F214107EF6466916698EE93AAC70DD2Jun 21, 2014
36087C3C7BA32DB9BE06DF75E9621DD0B909Jun 21, 2014
360890C38C35998E6F99D93C94062C8D5472Jun 23, 2014
3608C6FC75DF311734DCFF7236014D427FC9Jun 24, 2014
3608A9376BA46EA5FCB7141AC1D7D88DE128Jun 26, 2014
36083A6DA266BC1A9AC7C7F4460C3C47BED9Jun 26, 2014
11864E8F09E52F793D4271E9A93F834EE4CEEJun 27, 2014
360835AB5E1648466BDE6C901C92C8CF8E85Jun 28, 2014
360837C41B30F4CF98D8F1B06F4CE5D8A02EJun 28, 2014
36083C3E5BEEA77DCAACE9E4F2FD7DBC8922Jun 30, 2014
3608FE484A51D0DA9F8C9503D0F753350C80Jun 30, 2014
36083F3A1BD9A2DE4BDEA2613507AF602CB2Jul 1, 2014
6704A0771C7C111F1B67DE39E896F9146350Jul 7, 2014
3608F2394EED52DA70F63ACF24AD73FBFC64Jul 8, 2014
36089821A7D18C09638F9FCCE465A7CD74C0Jul 9, 2014
3608D2546500BC2281A381305E71B48A14C1Jul 11, 2014
360821689DD120A06E2E5EAAD7106281631BJul 11, 2014
36086F3A875A67C4BABE845F20A9559D2D6BJul 12, 2014
36083E9EBC1816BD3A0F109B03E7D78C61CCJul 12, 2014
3608E61C1A276414A5D97AA5BB1ED040D901Jul 17, 2014
36080D176AC3E3C062F0A60DBAC71F60DD54Jul 19, 2014
3608D4B38EC6A1569FA8BAE836D983EED011Jul 25, 2014
16384AA46B2C1F5D8876DC94D02514939E427Jul 27, 2014
36088EC6457814AC6EA1ECAB31FBB008BEDAJul 29, 2014
360800BED24314F875CC14AA2177081DA7F7Jul 29, 2014
5672C20E80CD19891316F04E5D824DB80C53Jul 30, 2014
3608FAC4508DA1509F237B2F785C8DB97807Jul 31, 2014
360823D1F4DCDCA0F68D5B6387C06CBD2405Aug 1, 2014
3608CF6CC1630565EAF193B0E5BE58E3496FAug 4, 2014
36082B0D5802B41465665100C3367B8C27DBAug 4, 2014
3608E639200A0A341685D8D223D004C90889Aug 5, 2014
36084C22D3CDDBC38C32A1F1C0A804913ED8Aug 5, 2014
360823D357DD8985F46E921CAD947322850FAug 6, 2014
360813A90286CC4AE4FDD825587BDD04BBA6Aug 6, 2014
773663F006F6882866BAB23B821827719CE5Aug 7, 2014
3608CB88DDF3E5C0B2A32911A8285156DFE7Aug 7, 2014
3608DFC256FAAF7EF97F970DF9D55C585748Aug 9, 2014
3608305E0E43F827B024AA69CBC3A7832B11Aug 9, 2014
1638416291086677F1DD9FAD6CD42E1C0F1C1Aug 11, 2014
36085852FAF1F0C1672D9C7BEB2616F72DC8Aug 12, 2014
3608BCF5A425F5AAA1C31226582E4A704F9CAug 13, 2014
36084F468C98FD4A828E25FAEDD3B623E08EAug 17, 2014
876858D4A17502F955F1D929FAE3D6F61F27Aug 17, 2014
360853E41202D6E82F942BCC59D9E663D154Aug 19, 2014
163844A0CD21B3924FF441AA947F12CD59824Aug 19, 2014
16384BE74865502DE22EC80DCBEFD3F76C917Aug 23, 2014
36084E227619D3ADB80A5A3E16D934032380Aug 24, 2014
360852B39AC6BD7675213E9FF60581F582FDAug 24, 2014
3608CF53557E134584EA34BC47820393E98CAug 27, 2014
3608E8A4BA63FDD72126C2F387C9819F4F53Aug 30, 2014
36089361AC7FAEAFFECB69D5C55EE84CA2CASep 2, 2014
360805AE7480BF9F3DD59427BE6A7C22FB50Sep 7, 2014
360838386201D017606E43D403DEEC96CB74Sep 7, 2014
3608D2FFC7CC7274F015279D73B6F8A32368Sep 8, 2014
3608C3EA915CED4A1F83516F6643AB3AA6ADSep 8, 2014
360808227AEAD7CB9151CD1E3802DAFAFC98Sep 13, 2014
3608B64349255899167FECEB86E88E676533Sep 14, 2014
36087E00B61DD548FFCCB520D45091357A59Sep 16, 2014
3608274F60B6367C7174A1AF20E468E66C7DSep 16, 2014
3608BD74CE839085D50B680CCD0B6A83BDC7Sep 19, 2014
3608D9225FEF428FCF26DC4BD15D24B377EFSep 22, 2014
36087D4266288BBB7A8648AE90606A0326F6Sep 22, 2014
36087923285CB4CF04AE99AAA96869DFBA6COct 16, 2014
3608DC679DC4D93704BC885D716F0906FED5Oct 19, 2014
36085C5312B5704D1D42987C16AD97E25025Oct 21, 2014
36081F4A5E7A50B000B7CE85B48F7AE1B855Oct 22, 2014
36085C9DF904BBAAF58259476230C65BA992Oct 27, 2014
360893D04111660E6BB7E277E81D2BE02517Oct 29, 2014
3608329380F335DCEDF095CC01410948DE7ENov 1, 2014
36087BAB83A3EB2D1AF762F6910D9ED8612ENov 3, 2014
36080C5DFEE4C3C1EA6DE18511A112FEC6E1Nov 5, 2014
3608BC0A2E6507BA82FCD7655BEDBA8ECED9Nov 6, 2014
360846298E5A936C0106BC179301D71AE516Nov 9, 2014
3608284911122C301D2B31BAA0E10E30764FNov 11, 2014
3608CE64C3669DE9AE78E36ACCAC3A62CCB8Nov 11, 2014
3608A4DAE8C93611D08DF52ED8642FBA2DBDNov 12, 2014
360818B6B24DE6904CFF4DBFCC4A5AD4AD85Nov 14, 2014
3608AD94F4C6B67361B3474DB3767B657085Jan 1, 2015
360883D7684C3B2150298B31B9D8345D01A4Jan 3, 2015
3608E5CD85AE01EA206074B3D7A0576470BFJan 15, 2015
11864598F271497405B7755854EB5546181C9Jan 18, 2015
1083256ED241E7D40E0FEA914C03B633684FBJan 25, 2015
8768DB01CCBF4C80582E684BA0F427D2C623Feb 2, 2015
3608E4AB63A8802C2F316EEEB1CB5C6201E7Feb 5, 2015
3608FB3874E963B2C487B045C226FBF51997Feb 6, 2015
36085D83013E31D5A9EF9C54E04E898E8AB2Feb 7, 2015
108322720070DF074C8948653B77684C08CA7Feb 27, 2015
3608BA88FBB3ABDC704D34D7E4B45A9461CCMar 7, 2015
36088BD29F8461393A3EE0A9F9623E2094C1Mar 25, 2015
16384292196527A35E5C22A155939957B5A9FApr 20, 2015
360838C2877505B98431651EF97AC25EDE20Apr 28, 2015
6704740C1F08B2C96BEC0F197F2153A097C5May 1, 2015
36088A6ED06005E21700D5587BA1428A5A60May 13, 2015
36088D91315D698CDC5B3E25157FBD98A0ECMay 16, 2015
36080C515E421A6BA840C705EDFFF1981A51Jun 14, 2015
3608B1EE595C059D1E0C7433AFA01703752AJun 20, 2015
56720ED8A022C34E919EE1555F1730638494Jun 27, 2015
36080483C59F8DD709ACB47F814CA6D3AD4CJun 29, 2015
56726E224574C07B8F500F76BAC99413E76EJul 3, 2015
360840F050E04DEDCCA0DF49AFCE4A78D6F7Jul 14, 2015
3608AD27BC24E60ADD79E2D79B378B5706D5Jul 17, 2015
36083DE105E6CC1C954450802769D07E3F6EAug 3, 2015
1638485FAB1A3157F686B3D6769A88055B1EDAug 16, 2015
9800AC7725F7525980B9984BB4B15904945BAug 25, 2015
36084C5142BFAF75D0CAE1DAACFAD8361F75Aug 30, 2015
360823C7D41104DBFAD5D64CF181CECAF337Sep 8, 2015
980084FB39AD4F9B8B767209A8E67642552DSep 17, 2015
36084DD25AC62F4845F089CCF125F19054ADSep 29, 2015
3608FA89234B049BF2EF9C97D2A42A5219E8Oct 10, 2015
3608BA5C2C13B232D02F56F5450691B2A017Oct 15, 2015
3608314EDEACE5C34CA958286655BB104E65Oct 22, 2015
87680BA8511C323AF759B24E6BED0859AD1BOct 22, 2015
46402F4BEC7DE248C75DDB1DBA2F415D426FNov 8, 2015
3608C4934D8B601E972807484DC1A8EB2900Dec 19, 2015
360846412E5B28F6BAB7FBB6764AA5425F9DDec 20, 2015
1186447950A39DAB7A984B6A943A1B9D0D073Jan 3, 2016
360834C6383CABAD74B021454E4E8EE16812Jan 15, 2016
360882D32D2992B5308625DD9327E91E5906Jan 19, 2016
87689CBFC0B186B9B1586D498C5142BE83B7Jan 24, 2016
6704C81BDB7F80F2767D7C00812C96803D94Jan 29, 2016
6704533F347C6287128EE5B780EC6DFCF04DFeb 3, 2016
36080303B94C1DDE2FCCEF0100CC16084CA4Feb 18, 2016
3608E896853860C6ABEA0337BE3C4A26C7B0Feb 23, 2016
360871646462955A68DE1E4ABE81D4B823D0Apr 16, 2016
36088A0D6340A246B301F548F3E7F1AA63ADMay 7, 2016
3608CF7C03C2682C50A4F5C383AAAEC0BD0EMay 10, 2016
3608BA5EB488CB5072381654D7F25F12AD8CMay 14, 2016
36080BCFC90DAE749ECC6C5155BA47B40279May 27, 2016
360856BE378539ADB4F140B42928683B4E89Jun 3, 2016
1638451A6044780479601AE467874B0879DABJun 8, 2016
3608DA157C3F7D9D21AA521C0DA7FB384318Jun 21, 2016
16384D88F4150CB52173BB9C534E4B253BB3EJun 24, 2016
3608FDEAA90FC0E108AB3DC574F47DB44B0EJul 13, 2016
12896AB5021A72D5B2843E9307137B14E194AJul 31, 2016
3608155994D6B430AE674A117818D4DF9FD7Aug 9, 2016
360814C4616FBB2A6C4FBA57FD46D2966FFDSep 1, 2016
36084216CB6FE68061CDAAF4AB54DE17DEF5Sep 26, 2016
3608C778EF28E7D76F163D08C27370B53A22Sep 30, 2016
3608EC868E5EF62CD9D0EF15B67FA2C64789Oct 7, 2016
36085AADFF7FA3CBDBB8B015B062135037E9Oct 10, 2016
360835EFA08B42ADB912596E7CAC1EDFE9C3Nov 3, 2016
4640FE2920B89A45AD31112F076CA3801E00Nov 3, 2016
980012F54B71E80AEC0B34127558AC54E534Nov 15, 2016
3608CC1B08133528081981FF5E461E569E92Nov 27, 2016
3608D2739E1FEE18FE5E7D6E82A144138707Dec 22, 2016
464039227AA8B079BC33B56A48E9C98F5E88Jan 10, 2017
360812D9216712A15B7B619370F1581725BEFeb 3, 2017
6704DE46AB380716239A94D20B2CAC080B3FFeb 17, 2017
36082A9363CF06B8ED9C7F46D2D5FB99E650Mar 5, 2017
360821598A281B88FE7B7FD6DA7CC7AE8F48Mar 21, 2017
12896D6B0CE4C3E90DF60A9E615B50AE13DFDApr 2, 2017
3608AE25457FFFE22A1A6E1A6305A89F07F9Apr 14, 2017
3608C000D4A44FB159B74F11BB5D6B342EACMay 10, 2017
3608EA802FDFEFA95DACDC4A41CDFA5EA759Mar 22, 2016
360886E4D6C31D7A3101CE0EA9A165315DF1Sep 17, 2016

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_search.conduit.com_0.localstorage-journal^

  1. To enable deleting the http_search.conduit.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_search.conduit.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_search.conduit.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_search.conduit.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_search.conduit.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_search.conduit.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_search.conduit.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_search.conduit.com_0.localstorage-journal. The name of the first found registry value referencing http_search.conduit.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_search.conduit.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_search.conduit.com_0.localstorage-journal and Associated Malware.