Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:August 10, 12:54

Testimonials

Over the past six months I had a lot of trouble surfing the Internet and working on my PC. I tried different free and pay antivirus software, but they were all of little help. I scanned with Exterminate It! It turned out that my computer was infected by five different viruses and Trojans, and your tool found them all! Now my PC is perfectly fine. I am really impressed.

Exterminate It is also very simple to use, which is essential for computer novices like me. I like it so much that I recommend it to my family and friends.

Vale R.

File: http_app.pckeeper.com_0.localstorage

Location of http_app.pckeeper.com_0.localstorage and Associated Malware

Check whether http_app.pckeeper.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_app.pckeeper.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_app.pckeeper.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_app.pckeeper.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_app.pckeeper.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_app.pckeeper.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_app.pckeeper.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_app.pckeeper.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_app.pckeeper.com_0.localstorage

If you find http_app.pckeeper.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_app.pckeeper.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_app.pckeeper.com_0.localstorage File^

File SizeFile Md5Last Seen
3072224477C665D88A8177032B049445BA1FDec 19, 2015
3072083357E5C52D867289053D95C14C9A4CDec 22, 2015
3072805D323F54F1CAB3F57452B4BDA825C7Dec 22, 2015
7168350D039F44A23BA4D6FAABD3B2DE04EBDec 27, 2015
307229EEDF0751820AC35A4E15F6A4FF882EDec 27, 2015
30724C5CFA6ACB24C500682E8C2ABC082E30Dec 28, 2015
3072D7CDDE8585943FD61C247DF85524BC46Dec 30, 2015
6144AADF777811001B786DACE715B6E34765Dec 31, 2015
3072C14EAC081EAEE8C873CC2D0A4959703BJan 1, 2016
3072DCF2E8EEFF2D0FD96DB187417F1E1DDAJan 1, 2016
3072B9090FAD709F7594F3F94CC0614FBC79Jan 2, 2016
30720E4F8B15018CFBFA5CD1C1CEA0E49D64Jan 4, 2016
30728262352AD98A29A60B8C60C1658D1821Jan 4, 2016
30720CF6DE2B57881F0A9CAC0DCF2B3728E8Jan 4, 2016
307260475392754B694295A743DE5BA78E1BJan 6, 2016
3072EAF9565325949E27C7AAD2B14A00C837Jan 7, 2016
3072403E9CDBA8911B6CC205898EE3C56AFBJan 9, 2016
40969C2537F175C1F578A6CDC81F54A2F529Jan 11, 2016
3072C52CF5FC6A5148FC17E46884B760BB02Jan 11, 2016
3072A77345E17A59FAA9DADCF4A7956AAB1AJan 11, 2016
307234210C714005BAD38366511FA58FB989Jan 22, 2016
6144839A08147544CC532D4E2A7B6EA81B28Jan 23, 2016
30724DCF9521D9BBFE78DA13EC7E7C9466ACJan 23, 2016
30725DFD6048593A8CDD600D7966999F37F4Jan 25, 2016
30729F56E956C22054ED851CA085D91B8259Jan 25, 2016
3072CA1EE7A0DCAC0555A4EA8B274057E000Jan 30, 2016
3072633D52892E781E7EFE26728210E4D039Jan 31, 2016
6144750CACAA437B1B68F27297D2406D3DA7Jan 31, 2016
307228507EB89B1AC139132370B623827D29Feb 1, 2016
30729DB7AAAA7F47E14ED854FBB9545EFD2BFeb 2, 2016
4096E9F7EEE519E5C1631A09E7BA80FC98FCFeb 2, 2016
3072F21F6FD7578721A60393BAA863C19667Feb 4, 2016
30725BA90AEEF58FB0765382224068B2A89EFeb 4, 2016
307286EC819AE663318C48D4316B65AE2DA9Feb 8, 2016
3072D73F3C003E7E0F3B7E3D8BECFCDF42BBFeb 9, 2016
3072C20A6303826868697174510996925273Feb 9, 2016
3072632DEB748BD325146AEBEDFFC0334809Feb 10, 2016
30721392CB9A1A01B31B4DAA0A93DACC788EFeb 11, 2016
40960F27C5FFF4FFE2D50AC0494864298EE1Feb 14, 2016
30723512C52E59EE8146DA3655AA4E89B340Feb 15, 2016
30722D44144D608606987DFC342E3D5301F6Feb 16, 2016
3072DC5448389D1195CADA7C1DF2D07E5FC1Feb 17, 2016
30721E7DF27E382E91CF41B261C529172147Mar 7, 2016
4096680E909A09B0FD9ABE1AC2A1A1D47ED6Mar 12, 2016
30729F31AFD8F0D53A6D9E43098BA8F16443Mar 19, 2016
307249873E720B9DA30D1ACBAF0F682B53F9Mar 24, 2016
6144DA644676D4C745142C324095EBE3693DApr 2, 2016
1218561BFC2405E62FF8EF9F2CD30929A17644Apr 8, 2016
4096AC62DCD14627606A13085A8D1487BA08Apr 11, 2016
3072E7EC2427F26A625BC69E062EDC651299Apr 16, 2016
307229AEBC5272DAF773A48502FE780FD8A4Apr 24, 2016
5120BF5208E4AA9C1DEFCAE3C2BE0E1E0CB4Apr 26, 2016
3072075219F961AF762AAB2D5F6F859B7C37May 10, 2016
4096D26402180FF7291B635F28E11793F165May 14, 2016
30721355A0B00ED4C788E4287A53CC1A3D48May 21, 2016
307262BC445D88693F1B24AB0C5A5D3B5C43May 21, 2016
6144602EE6AB8E7B833D0F3904F16ECD7293May 27, 2016
3072782A287BB07786C587AE55BC05841E73May 28, 2016
7168F9BD5171312F5A0B473CA89D7B623F15Jun 11, 2016
307214A397708DAF6D069630679A85613FB4Jun 11, 2016
3072E3C839FCFCC13399544AC56C7355595AJun 15, 2016
3072922CD9048AA1EDCEC97425E6A0F4CCEAJun 15, 2016
3072F9B8A458C56EB7348A9A99E272C3B788Jun 20, 2016
30729F228FC62A2225986CFEE5979A53F118Jun 27, 2016
3072A9EBC1A949FBAACDC200895A8DF23E47Jul 9, 2016
3072CA21BA2CE56B15FF4DFAB047DBB97416Jul 10, 2016
6144B11F5133575EB81821EBC6F5A518E12CJul 17, 2016
30726BA720E9E7B3435B73015A12C3CCDAD2Jul 17, 2016
30726BAD1FF0FB7476CCC6D2FF1D48672B35Jul 25, 2016
30727230101110E86A97071E2C2ECC5B8ED8Jul 26, 2016
40966B0D728ECECD53FF16EB79F87BF4D259Jul 28, 2016
307245E31879BD90E236DCDEAD7A5FF5AD0AAug 4, 2016
30725F1303DEAD4AC795C5D8505CF4063FCCSep 11, 2016
3072D20F077C9F67C0F487379F2C8207C342Sep 14, 2016
30727A41C789896659B662920FEAC490D5B9Sep 14, 2016
3072E5715970C8DD388613B4CE0664099786Sep 16, 2016
3072575432282834C5C5795F619055F31354Sep 19, 2016
30726ACF671ABE79760F6AA8E28CE06A1918Sep 21, 2016
3072599B4849EDB37FA76DAAAEB9501A79CBSep 27, 2016
40967D8AEA5CA8C727C5810F77C8E5680984Sep 28, 2016
3072D67787FB33229B1097B6A2AAE6DD031BOct 25, 2016
3072B2B7097888804F9EF8A48E6F4D871626Oct 31, 2016
30720147113A1B6C6A29EDCBAFDACE42FA42Nov 21, 2016
3072D967A8DD1D1EDBDDA04B05CAB2C5517BNov 25, 2016
30725BEEF54BCB6EB4C1842F5D13E7FF366EDec 4, 2016
307250B0C1A8A0F062CC34CE89895E390A50Dec 12, 2016
3072CE57E547103242B8E26818B4F542513FDec 12, 2016
3072CCD327B8AC0B78C504D6FABEF84EF148Dec 17, 2016
3072A22557E6A986D35B82CFB83E4A29A8C6Jan 11, 2017
3072C218F112BED5943C24FA5D33E2C0F429Jan 16, 2017
3072E0209D0AEACDBA1BAA6D0F2957CA6A55Jan 29, 2017
307213361A8ED8AE30036911E04C22EFE8C1Jan 29, 2017
3072096296359DCD22F3668231DC83396BEEJan 30, 2017
307251656C58DAD6CCCA0826D3571A34D637Jan 30, 2017
30722E5E2F699A94C3ADADF0F6DEB7611466Feb 5, 2017
3072927EA749B81963D33B919907E272402BFeb 8, 2017
4096FE4D417C7D58E734621FA54861FFC54FFeb 24, 2017
716893D86A25166EBDD09C5B3CA74D54E6FAFeb 25, 2017
30728CBF5933E7B6F7FD2115C318489AF7DFMar 4, 2017
30721B384157DF003E9088BFEF28CCC3FC0CMar 13, 2017
3072EC174C57B78B6FCED0F138315282A598Mar 28, 2017
409652FC813D70B19B79FEA82F085403B79CApr 25, 2017
307204B624388FFBEFB54F221F6CE290ABA3May 7, 2017
3072278E8214575607F4460C9DDE77A0EB6EMay 11, 2017
3072477B7270353E2E5FDB6CB3DB3BA2BFCFMay 20, 2017
30722B28F06EA9BCEF6F8855427833080D75May 27, 2017
307251DAF9A86424AEC66C614B8F5B1D0D47May 31, 2017
30721CFA21858E4C327E19BD88EDCF5DC87BJun 3, 2017
3072A15D831A53CF0D8437F8B128CE89980BJun 7, 2017
4096176CF24CE5D195291C3865CB01CAB912Jun 9, 2017
3072CD11A96A9CC143898D581BB5361147DBJun 13, 2017
30729292F826F5C08813BFB26CC58715B5BEJun 26, 2017
3072DAFEB2AFEF0B5372CE17877418DDBF29Dec 20, 2017
3072699A2154C5641BF03F2B30FBA0880859Feb 20, 2019

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_app.pckeeper.com_0.localstorage^

  1. To enable deleting the http_app.pckeeper.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_app.pckeeper.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_app.pckeeper.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_app.pckeeper.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_app.pckeeper.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_app.pckeeper.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_app.pckeeper.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_app.pckeeper.com_0.localstorage. The name of the first found registry value referencing http_app.pckeeper.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_app.pckeeper.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_app.pckeeper.com_0.localstorage and Associated Malware.