Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


Hi, thanks for the upadte!! It did the trick!!! Must tell you that I have never been this kind of satisfyed with any buy as I am with the Ext.it!! Thaks and I will recomend it anytime, anywhere!!!!

Sincerely Paul


File: https_middlerush-a.akamaihd.net_0.localstorage

Location of https_middlerush-a.akamaihd.net_0.localstorage and Associated Malware

Check whether https_middlerush-a.akamaihd.net_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific https_middlerush-a.akamaihd.net_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\https_middlerush-a.akamaihd.net_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\https_middlerush-a.akamaihd.net_0.localstorage
  • C:\Documents And Settings\USER_NAME\Application Data\Opera Software\Opera Stable\Local Storage\https_middlerush-a.akamaihd.net_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific https_middlerush-a.akamaihd.net_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_middlerush-a.akamaihd.net_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\https_middlerush-a.akamaihd.net_0.localstorage
  • C:\Users\USER_NAME\AppData\Roaming\Opera Software\Opera Stable\Local Storage\https_middlerush-a.akamaihd.net_0.localstorage

If you find https_middlerush-a.akamaihd.net_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The https_middlerush-a.akamaihd.net_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of https_middlerush-a.akamaihd.net_0.localstorage File^

File SizeFile Md5Last Seen
3973126D50C72E1BA8CFBC6F40F00F93947A5BNov 23, 2015
394240C5D3D133194BB24DB4E5256BB0CFEEB2Dec 18, 2015
4116481974A55F125815E4E8564095433C6172Dec 21, 2015
397312B1A31CA133B9299BF12B381D1003B371Dec 25, 2015
399360BE7714F4443D8CB3D3883DF9B811C567Dec 28, 2015
402432CE4E8EB604F08D75B0681C41A6D4D975Dec 28, 2015
3952644EB89919A636FB692A1C73CDAD91885CDec 31, 2015
395264051487A0F6058E30181E9C2C7B7A374CJan 2, 2016
397312C34C0A5F6FCBD99B4BC01140A14C60BDJan 2, 2016
3072AFFDA57EA3E25382038C903C9235FFABJan 4, 2016
3072608D63FA7128F177150B2503BABD558BJan 4, 2016
4126725D2E04D8E9ED783D5E921C8856A843B7Jan 9, 2016
3072D1D3A79F34F1B94EBE11EF1E241ADC79Jan 11, 2016
398336CB5484B879E7990A1666368B4551FB20Jan 11, 2016
395264AFA81D09739256C130639535B1925788Jan 18, 2016
39526438B38CA2A8A8821F7C6FE9969B070E5AFeb 2, 2016
3962886B53EFD4277DC6FDBD867481F0F84EC7Feb 11, 2016
396288EA2640261BF6B182F00D5C3A8510D14DFeb 11, 2016
392192D0BB9A45F340464B2F9D5A3DBB46E42CFeb 11, 2016
407552169678348BF8EA5088D025A3518BE4EBApr 8, 2016
3952642F1C18A59CEE96ED13878E6DA6385410Apr 20, 2016
4587520F25A045F19FD8BAD8F21194B7B7D7D3Apr 30, 2016
396288EEF96CB98E6967602850C636CA7B99EBOct 20, 2016
49152049E77CD9F45199BF842C9B18880941BCJan 18, 2017
390144FEC45E3113E9D1ACBCDD3498A1A2E384May 15, 2017
395264556E79F099C6D7237A607934460D8FA1Jan 2, 2016
3962885691000C9DE144F373E43D2B460DFD5EJan 7, 2016
3932163A3A98E72B67635A4DEDC6706077562EJan 11, 2016
41164852E7EE4F3734C06E1550CA95C026073BJan 13, 2016
3901443C4A3511B05F2ECBD2B03A6C351A893AJan 25, 2016
307207D1CE1E077F609DB41D39D0C2226765Feb 9, 2016
307270AE5D06C7C71CF54C60D859C883630BFeb 17, 2016
30721197F0D5469E4D02DFA7DC7EC8D1D67CFeb 29, 2016
3973129EE14FF7BC002ADE8CA8CEDE6CAD443EApr 8, 2016
393216B5ECA716ECF8B323B61124BFCAB09A46May 12, 2016
415744B8CB9B30694A74144B3369C5C073EC4AMay 13, 2016
391168BCAF07BF35D8E34ACAD4944933AECDE0Dec 23, 2016
394240D186F1C75C1E01DC7AA7B590AD85A77CJan 27, 2017
39014454927D63C9920DE07CFEB71440BDAFC2Mar 23, 2017
393216F2D1CF853B70266D2A37C705F16DA243Apr 26, 2017
3952648A1DE7B94EB99B68B12C6B4BCEBE6167Dec 25, 2015
30727F4C58DED01A569C78B4BA01E43933DDJan 11, 2016
391168A68DE2EA7A54E1A1B3833E920522E8CCJan 25, 2016
4567044CE4D129B1DFEA567A0CD19CB395E342Jul 30, 2016
523264B9650F318B152A998F5523E173ADFF1BApr 26, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove https_middlerush-a.akamaihd.net_0.localstorage^

  1. To enable deleting the https_middlerush-a.akamaihd.net_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select https_middlerush-a.akamaihd.net_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of https_middlerush-a.akamaihd.net_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of https_middlerush-a.akamaihd.net_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of https_middlerush-a.akamaihd.net_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of https_middlerush-a.akamaihd.net_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a https_middlerush-a.akamaihd.net_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type https_middlerush-a.akamaihd.net_0.localstorage. The name of the first found registry value referencing https_middlerush-a.akamaihd.net_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to https_middlerush-a.akamaihd.net_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of https_middlerush-a.akamaihd.net_0.localstorage and Associated Malware.