Exterminate It! Antimalware

malpedia

Known threats:692,355 Last Update:February 10, 12:46

Testimonials

Thank you for the note. I have been a TrendMicro client for the last few years and was impressed with the speed of Exterminate It’s scan. I appreciate the efforts to help rid my system of Vundo, the commitment to stand behind your guarantee (unfortunately that is a rarity these days) and the customer service you have offered. I wish you and the company the best.

Barry B.

File: http_search.fulltabsearch.com_0.localstorage

Location of http_search.fulltabsearch.com_0.localstorage and Associated Malware

Check whether http_search.fulltabsearch.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_search.fulltabsearch.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\cerloryatilutaincerges\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_search.fulltabsearch.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_search.fulltabsearch.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\cerloryatilutaincerges\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_search.fulltabsearch.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_search.fulltabsearch.com_0.localstorage

If you find http_search.fulltabsearch.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_search.fulltabsearch.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_search.fulltabsearch.com_0.localstorage File^

File SizeFile Md5Last Seen
3072D270821FBE81C0659BC2413769F6B1A4Mar 8, 2017
3072BD6FBF9626894EAA28159EF483AD1752Mar 14, 2017
3072DD53413D05E24D2C056E0C730747DA18Mar 14, 2017
30723E80790EBB7C4B1E0F2DB55019F3AE5AMar 14, 2017
30723AB815BCAEE16556D05B3B02DF0223CBMar 16, 2017
307204AF517AEC35858014A68F2C2A6792CCMar 16, 2017
30724F9A0D2AF3A72F4EBB088F16CCF0BEC8Mar 17, 2017
30724192A58B5A1CA61853BF6DB9F8F8534FMar 18, 2017
3072FD39DBF29AA6A9830A29DFDF029B9D95Mar 19, 2017
30729B811EC497FA0F213B284CB0E1CF03AFMar 21, 2017
3072DC66287C195C5E71DE2E67CB53D1107EMar 21, 2017
30725F9B473358A9C0E780EED1CA72B31E53Mar 21, 2017
30723636239A7C3AA49C7D85681409DC8592Mar 22, 2017
30722437B84DF2B8C1A303C8AA29BA0397C9Mar 22, 2017
3072A36F6BAD03A4FED5DDE8DF75D23FB69FMar 23, 2017
307210D253FF22747D6394305C9302773F4AMar 26, 2017
30722D719E741648589EBF09137D8E6C5E6BMar 26, 2017
3072AA01F9F3B39924C7A19235AF5931B1D0Mar 26, 2017
3072B576DE25BDB8E76CE6AE4B39DB41A291Mar 27, 2017
3072B6E3EC6720843A3F79BFFB5755118549Mar 28, 2017
3072E7F790A4E126078255ECE5436FC325C8Mar 28, 2017
3072FCA538B898241CAEF69BFBBF0A265FE4Mar 28, 2017
3072F78A98FA3E90B35293F5C5114E1377E6Mar 29, 2017
307276BD4F3263AA91983AD5D808D8D2E161Mar 29, 2017
307247A75E70C9F95A4796C3352FDA3FBD29Mar 30, 2017
307294BD7C954461FA835649A9EC5956A916Mar 30, 2017
3072F53ACB491987EA941CF47F50A8468AF3Mar 30, 2017
3072E9AAD2A7E2DD19DC8772BDCB3CD81A15Mar 30, 2017
307258AC8AE5DEE9D8B492B9ECCACCF9DC94Apr 1, 2017
3072D3F8CFF4FD332DC3EE7AF6BD50132D76Apr 1, 2017
3072B560F455CDD53C1F91B537591138DEF3Apr 1, 2017
3072785570B6B764F61CC7CA72BE805DA060Apr 1, 2017
30727A03243EBCF1B75F1600A63C1A774DA5Apr 2, 2017
3072B9E207B439C57D86C2C0B99E174D80F9Apr 2, 2017
30721A9EF6D3D8CD57EF09DE917D487F169FApr 4, 2017
30722EA3DE221DE1CD9C1149BC26784DB13FApr 4, 2017
30722A2ED6AE935181BAEAFFF84F066A0EE6Apr 5, 2017
3072B2E969448A586799A88EE4F870EDB8F0Apr 5, 2017
30728B8CAA079CC46F03FE586E9286730D56Apr 6, 2017
307286F5582DFA34F002C96C5256DF2AC757Apr 6, 2017
3072848F3B1094840041CDBB3252F5773B42Apr 9, 2017
307286F6888A3C9BAD69F918598974ED287EApr 10, 2017
30728ED1829E6F993838220DB356A68B9DFDApr 11, 2017
3072888EFA85EA491D6AE21CDEA3E932855BApr 11, 2017
30729332FEA4C0B6F55BBCA67FAB552A34CBApr 11, 2017
30725B18F4D6316C9902EBDAE8FEB8054676Apr 13, 2017
30721551C15F6B47244559FB0BE2F24FA158Apr 13, 2017
30729A1D337F9079424B659793CE36BBF03DApr 14, 2017
30723DCC54336474E549A32FADAE91C6F7B5Apr 16, 2017
307265A4F74C79BC049CBC5B12C40A500D52Apr 17, 2017
3072F5168B41628E6C1BEFF3A995A7DFD352Apr 17, 2017
3072A674122E8204B6B640602996B2245476Apr 18, 2017
3072CDD72AAA35C31AD1BB5EDD604D6502A2Apr 21, 2017
307200F1AE1C6A09104057C05D9ECFD55395Apr 21, 2017
3072012A50E563490AC8F9A1E046146D8690Apr 22, 2017
307240DF0C00B5E79D67A4461CA22ADF25ADApr 22, 2017
3072B02C0D01912902489AA46FAB9FAECA0BApr 25, 2017
30725680CC0A93913336B3B6D749658A8363Apr 25, 2017
3072552001F79E00D06A76A44A7B67C97430Apr 26, 2017
3072EA6F541E555135092776B20DE75AAE9EApr 26, 2017
30726B0606539E997262B38513CF8AE5D7CAApr 27, 2017
30722EE6288180A2B8977F1185253DBC9458Apr 29, 2017
3072BDE7963B41F27B4BFEC946288E29452EApr 30, 2017
307283133328CA74652DB33E28B9C84071E9Apr 30, 2017
307227BD837B67B83ED37FBBB5B6E63D59FBMay 1, 2017
3072F4FF94659B02F00AA1A32AAA40C9E053May 2, 2017
3072BDCF09289E6BF889ED456D67BBE3D918May 3, 2017
3072BD42EDDFA0501B3AD0127D3B7609401AMay 3, 2017
30723F18496D9A2F8ED802B8F06707CDEA1AMay 4, 2017
30727470E8F37EA9E7D0217979E1A8A8BA3AMay 5, 2017
30724F65E4CC6615A5268E5003313244F3A1May 5, 2017
307258961CAD48DE597D503342D198F7B858May 6, 2017
30720880FF1419C1D4A77F0C065A690A306DMay 6, 2017
3072F11932FD739CF56488ABE1AC129BD872May 7, 2017
3072007370F016120FE6E3046A2AAD63DA4EMay 8, 2017
307259FFB80C96DB3D6E675D50F0E8D98771May 8, 2017
3072251CDED63C85286714D446C2EA9045CCMay 9, 2017
307213BFD101530222116D418CC2069F34E7May 11, 2017
3072FBF73E3374497BE73E68DC3A8424A155May 11, 2017
307226109842EDD7ACD7E2F2C42EC8666DC0May 11, 2017
307211D6F0C1199CDC2AB52C0A776335FF98May 12, 2017
3072FF002AAD486A7AC4CAF4E5BEE6F3A3BEMay 13, 2017
30728425C2510FDEAD4CEEDC20B9585F5D62May 13, 2017
307214DB0BDC69893487C672972D42A1A30FMay 16, 2017
307269E9126D08DB50413DDEDCDF9ED2957BMay 16, 2017
3072642E4888210349185C60FE520768B364May 17, 2017
307271152BB068EEFEADD5DF907D8E87436BMay 18, 2017
30725B39E993E65C5AD8F76DAB8F19A23926May 18, 2017
3072122829F5D07294B8B5571134325FBB5DMay 18, 2017
30727B4A01EDCF5D670FAFF19BABE3F56AE7May 19, 2017
3072DEB466214848F52BEAE75CA6E2BDB12DMay 19, 2017
3072C48627F07F080D5069C643A49E989E8EMay 20, 2017
3072FA73BA2A043EF9E003D93A4243B89670May 21, 2017
3072A188A49786EC4C9FD784F82E09435B47May 22, 2017
30723ACC0A28864C60526B437F317C498BA0May 22, 2017
30729A5093A2EE3254ADDE723855167534DBMay 23, 2017
30727402CA32603C6A085A991A414CC49A08May 23, 2017
3072429B689AE00AFEC5B2352EAF38A0B9B9May 23, 2017
3072E5548E8E6E9DFAE614A31D7E98FBF308May 23, 2017
30721552097EF2224945D37C135B10D3693CMay 24, 2017
3072341AFAED479E2C16D6388E46197ECEFFMay 25, 2017
3072476E3E2EB07FD5BD95C84D647BC7DA2AMay 30, 2017
3072488E396F9E8A3563EB7F53EF5379FEF9Jun 5, 2017
3072F19C694C0E9375A1ED86C71865320D34Jun 6, 2017
30726DC75C2C5AE6AFCDB6CF720984CA523CJun 6, 2017
307288BCB6B053A339EC2220268ECABC1A0CJun 7, 2017
3072DBB26A3DE07B21588A660D4A99958510Jun 8, 2017
3072C9D8E1D93BAAFA12A0ECB54F605D5166Jun 8, 2017
3072289040C811CE282F488FC28AF3FC8329Jun 9, 2017
3072BE7FA7C2FF10578CBDB0C55C974A6E17Jun 12, 2017
307250F38C98D37D6B01F682693934C0DE39Jun 15, 2017
30723E1EAEEC40F4BDF19084D55D472DEC43Jun 16, 2017
307289C80F90818869180BE1F01E711F656FJun 17, 2017
30721F6D7FC13D49393A6CFB86298112EE4FJun 18, 2017
30721D9D4C11308B49A70D49C951610C938AJun 18, 2017
30720490B6BD71BB6B4FCDF2685BABE637CCJun 19, 2017
3072D3823282EED2B19D985AB76EBE4CCBEBJun 19, 2017
307203506AA46F61E3FDA714867DAE78AF55Jun 22, 2017
3072A08A515DA09C01CB7854E2FF485F9E7AJun 25, 2017
307227A52AA75F14319E75B8E52BEFCF1145Jun 26, 2017
3072B10D11510B4A23B8E7D56224804EDD70Jun 26, 2017
3072C559421F2966301B4F517960402D3F53Jun 26, 2017
3072F341BCFDCA07A35E00ADC8C4A3C7FEA9Nov 5, 2017
3072BB25E0B628972C3374C68C5BAC540ADBNov 9, 2017
30725B0C31344FCA08062868F9F939540B11Jul 29, 2018
30724D6715C0673F8B8353FAD8360DA680B9Sep 29, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_search.fulltabsearch.com_0.localstorage^

  1. To enable deleting the http_search.fulltabsearch.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_search.fulltabsearch.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_search.fulltabsearch.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_search.fulltabsearch.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_search.fulltabsearch.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_search.fulltabsearch.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_search.fulltabsearch.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_search.fulltabsearch.com_0.localstorage. The name of the first found registry value referencing http_search.fulltabsearch.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_search.fulltabsearch.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_search.fulltabsearch.com_0.localstorage and Associated Malware.