Exterminate It! Antimalware

malpedia

Known threats:687,615 Last Update:December 02, 10:02

Testimonials

Dear Jean,

Thank you for your follow-up. I did indeed use the Submit State feature last night and this morning, your team sent me instructions to run an 'update' and then re-run Exterminate It! on the PC. I just finished that process and the new update wiped it out. I ran my regular anti-spy/anti-virus to double-check and it wasn't able to detect it either. I appreciate the support from both you and your team.

Linda D.

File: https_facebook.conduitapps.com_0.localstorage

Location of https_facebook.conduitapps.com_0.localstorage and Associated Malware

Check whether https_facebook.conduitapps.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific https_facebook.conduitapps.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\https_facebook.conduitapps.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific https_facebook.conduitapps.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_facebook.conduitapps.com_0.localstorage

If you find https_facebook.conduitapps.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The https_facebook.conduitapps.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of https_facebook.conduitapps.com_0.localstorage File^

File SizeFile Md5Last Seen
40960F1A62637EB0118500E3E68A19C1D838May 23, 2014
4096863838EC5749A761C9DA8060FABD19A6May 24, 2014
409612EBC94D70ECEB7CD338F346B2FAE1A6May 26, 2014
4096441236002D5715734105D489BE4BCDE5May 28, 2014
4096E96B26489DB65048D243FB44A23CE115May 29, 2014
4096A68B852DD1F526E64A51B5D409B0DC3EJun 6, 2014
40965CC072B176B30857F7FDFE3D1D43EEF2Jun 9, 2014
40966C001E4095B601CDF453D86C9A734602Jun 10, 2014
40960A7689B0453AF869A3FDDA982D51A3DCJun 11, 2014
40967100B60B029A52F374BD008336C16523Jun 26, 2014
51208CA8E11F9EDA38AA8720FA7C5BC5E313Jun 30, 2014
40969454A98F12432208272E59709266D454Jun 30, 2014
14336A840883AAE9FDFB6BF530D27474FBAAAJul 8, 2014
40961B8C039A92844C5ECC697EEAAFE9BE3BJul 11, 2014
133123049F0C366E0321EFD9746CF98188B52Jul 11, 2014
4096E3EA181C8E14AB711C9D7F359A4F2287Jul 13, 2014
4096375F007D05A5FA43E1ADC95F1702D780Jul 24, 2014
4096AC56474E26CB078F1D45AB837CB45270Jul 28, 2014
4096FABCF0C49DA62CC3D92B761796446824Aug 4, 2014
40960BAD7137B66AACEB41FB40FCDF8BC303Aug 6, 2014
166912521F77413D03E95A272B1C07160E86EFAug 6, 2014
15360702358715586F859C2C372566907FC59Aug 7, 2014
40966E053CEE78E68EDF61D3543034C50C1CAug 8, 2014
4096D657CF885F5CC71EBA61FEC56E2E1553Aug 12, 2014
4096F02B572FFF9C423279DAFCD5BA2AF278Aug 13, 2014
4096487A4249BA5ED4866E71866E4D813476Aug 15, 2014
4096F6CA6DC492DFB62FF6275C769E23A367Aug 16, 2014
409686E6977A93C89F5B0E6681BACBD1C943Aug 17, 2014
4096ADD5D0508A39A4863E1D0D40A48C3B48Aug 23, 2014
4096F7746D949DAC00DE3074C2E6FA6566CEAug 26, 2014
409631A9BA6DDF1530C476160A6B2007D476Aug 27, 2014
4096DD6AB2DFAC4095A00829829B2A8A560FAug 28, 2014
4096AF93FCFEE029F71A594F946D4F22DB5BSep 2, 2014
716800752C9A3A08EDF1AE82F0F212DA6638Sep 3, 2014
409664D23366F96FFAFF3583BF8930A429E7Sep 4, 2014
40967C7A576C33F095D4E0AB7394A8BB44DBSep 14, 2014
40964A2F64B37AA16E5FEDECB05F7C3690C2Sep 17, 2014
4096B19C6140331C1F40208F5F8727C471C7Sep 29, 2014
409692E44EA254C0F923EAAD54A71E84E8C7Oct 17, 2014
40964D7EDB8D590768660D0637D55011182DOct 23, 2014
409635ACEA9FD0FFE59C18817607374AC202Oct 31, 2014
1536067E08DBAB84D6AA51B20995A5563A0A5Nov 1, 2014
40965BFEC3E5F54567A53AD3A923E64E29A8Nov 1, 2014
4096D6FDA1BA23AF607627B3A85BBF604446Nov 3, 2014
71681E1103B32C85AC4CD942DFB676BF46BENov 5, 2014
4096B6C61345E3FAE08C108BB0D35C383DF9Nov 12, 2014
40964FD95BDA1BB9B7833D886F3F217265C2Nov 26, 2014
71681149ECE2D602715E042C5E7BEE5818C1Dec 12, 2014
4096CD423A053531A79E0CBCCF72024FE7A8Jan 4, 2015
409631E6FFFF67300D4B167876FCED081764Jan 6, 2015
7168D48FED5D06F99B133250613A815798E6Jan 24, 2015
40960FCC70D5C2E74F8392D701A8EBBB7E3EFeb 4, 2015
4096ADA63583BAD68763657E9AFCE35D2F79Mar 18, 2015
4096079309190702147E1F9778B94A22CC87Mar 26, 2015
40967246CCD8E90CB06C6982CB1208B6F2D1Apr 20, 2015
40963978D89443E666B6755CE20901F8B4DAMay 1, 2015
11264C1378F412D51A42BBC0B292F262CA2BCMay 9, 2015
7168706AC5A38BF53887433D2743B80723F8Jul 14, 2015
40962271F1117DB33211F599900195699CB7Jul 23, 2015
17408594043A6F89B8C613FF73476FA71BE0ESep 27, 2015
40966A2240A99856E71B52621B86C8679A5COct 1, 2015
40967C9432F3EC054FD3F9E97C6A7120C889Oct 10, 2015
10240A7F4D9C9A47FC7D7D942AB657A2D57CCOct 22, 2015
4096891D0E88CEBB4815D2659E679955C30COct 25, 2015
7168E850878731A65DADFCA43EFBC5A698FFFeb 3, 2016
40966BF978F8A3B0B5D2F8E0DE51B43BDA8DFeb 4, 2016
4096049EA850E14828103E00901BC4C93301Feb 15, 2016
4096F7681E3F6BAC6F1F971B750D6F5A7319Feb 18, 2016
13312C0B205C2CF0537B51E91B9888E075B48Mar 20, 2016
40967014BA70C7D053E893BFF2157BA16657Mar 23, 2016
4096252ED5FCD20AD593A71CA2C3B96B6D37Apr 26, 2016
716892835AE0A0EC50546EA488E15F988175Jun 24, 2016
4096FC1D23C2336D0F3BA4B58A369AFA397DJul 27, 2016
4096CC8008EBBB0A78785545DC87A0985A04Aug 24, 2016
4096748F9A1D234CE5AB2A69FA28F104AD00Nov 15, 2016
4096C2244CFA28C406F6F31F66A67809C526Jan 26, 2017
4096924110B582B0CED65EF86A83109E3277Feb 17, 2017
409692A3A90A5623A82CCDD553FF5A203872Apr 2, 2017
40968F2B43928C846BCFA4C480C6287DD71DMay 6, 2017
11264C1F72A0814C05A51B25FF0BE782F36CCJun 20, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove https_facebook.conduitapps.com_0.localstorage^

  1. To enable deleting the https_facebook.conduitapps.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select https_facebook.conduitapps.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of https_facebook.conduitapps.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of https_facebook.conduitapps.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of https_facebook.conduitapps.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of https_facebook.conduitapps.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a https_facebook.conduitapps.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type https_facebook.conduitapps.com_0.localstorage. The name of the first found registry value referencing https_facebook.conduitapps.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to https_facebook.conduitapps.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of https_facebook.conduitapps.com_0.localstorage and Associated Malware.