Exterminate It! Antimalware

malpedia

Known threats:687,615 Last Update:December 02, 10:02

Testimonials

Dear Matt and Exterminate it,

Thank you so much. This seems to have fixed the problem. Wow. That virus was in there pretty deep. A*G didn't even identify it. S****t would just freeze up when I tried to run it. But the update from Exterminate It, removed it.

Again, thanks.

Kind Regards,
Rev. Mel C. Montgomery

Brother Mel

File: http_pconverter.dl.myway.com_0.localstorage

Location of http_pconverter.dl.myway.com_0.localstorage and Associated Malware

Check whether http_pconverter.dl.myway.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_pconverter.dl.myway.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 5\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\tazoygroulychabch\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_pconverter.dl.myway.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_pconverter.dl.myway.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 5\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\tazoygroulychabch\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_pconverter.dl.myway.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_pconverter.dl.myway.com_0.localstorage

If you find http_pconverter.dl.myway.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_pconverter.dl.myway.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_pconverter.dl.myway.com_0.localstorage File^

File SizeFile Md5Last Seen
51202CE4ACE7CEBE812F96C0B348F2A89FDBJun 30, 2015
5120C5732AE6D655C9AF44CDE6579B38F55EAug 11, 2015
5120168C07D4C3EA03DB15B67BD04D0B5CEFSep 4, 2015
5120823BC669FA64A905A744AF907E95EBE2Sep 8, 2015
512002A38EAE2651A4F4A9E18A1821CE6A08Sep 21, 2015
5120718CF29743659408F5FDC06FF97C32B5Sep 26, 2015
512038A2B1A0EF52CD1232ED9EF53680A076Oct 11, 2015
5120BAA79BB35462EEE7BA454EB7DCECFDECNov 20, 2015
5120CEE2C4B918DCBDCA0345860A4410EFEBNov 27, 2015
5120FEE6756EE9F665364E88F38FFFB1F14DDec 8, 2015
5120485E8785BEA154CCF57B91B9835A0AF1Dec 18, 2015
512002EFD64B5262C03A5BD54883339CB844Dec 24, 2015
51208E305D1D993088624C9717D662626D96Dec 27, 2015
5120FE6B183BF70F86A9ADEDD26FAB3ABB11Jan 3, 2016
512010819A81841C879F322E55270BC7D0A7Jan 8, 2016
5120CF0B5284B68FD25276E1C6DEEBF0C6A2Jan 11, 2016
5120F96ACE1227C319A015E8C2F1AE7DBF82Jan 12, 2016
5120A394CFA0A2E0A84BEE732C55E67CCF28Jan 13, 2016
5120163A146F259D9A00618DF427D9F081ADJan 24, 2016
51205675F92CDEFA55D94A289E15E27E0F67Jan 25, 2016
5120329267E3E7E5C8C1020E4C31326FB4F7Jan 30, 2016
5120E654988651FF0ABF13ACB761B4DA2D38Feb 1, 2016
5120F78421395EFC16D21AFD2CB518D2C499Feb 1, 2016
51202B41918C99B10E1EA75E756E4BFD4651Feb 4, 2016
5120C88995D10338942E189FDBF044CF196EFeb 4, 2016
512025E6CF508CE84139A55AFAAD61DD1AFBFeb 9, 2016
5120E81D67A06A22751862108D57196849D0Feb 12, 2016
51207F50B9E16AF50410BE40C991F35E9767Feb 14, 2016
5120BDD6B80A23CB2B3B862B61A42C211E94Feb 15, 2016
5120A44F080F2563A1A8A0B74799EDA3C12CFeb 16, 2016
512084458E47BBAD0E4A2BAEB82B9A94D60CFeb 18, 2016
5120B725AB4E8DAC47A17E949C6FCBF214C7Feb 25, 2016
5120719E590EE73772D71981242534F792C8Feb 29, 2016
5120B7548C78AB76C8F250E7245AB431F575Mar 9, 2016
512000A9ACBC2F11360200056661D4DA4909Mar 13, 2016
5120E7B17F1A0831C68F2F4B2FB950E05102Mar 20, 2016
512025D7C341C8F0E4121575471D8118A14FMar 20, 2016
5120B9765282A0610E7CA37CB5A7E492B137Apr 3, 2016
51204260133910CBEF7C6F7C406026A06856Apr 20, 2016
5120E5567D68E03805CFBFBE86B0DD70AEC0Apr 20, 2016
512096982B79A3CA17490B2AF8A2B3B753FDApr 20, 2016
51204E2C5E768D84EBC9A202D4C557A26C5BApr 24, 2016
512027DD23940014E19E682E4C0FC56F944BMay 1, 2016
51207FE08EC21AF53CA3AB6BFBE7F101906CMay 14, 2016
61444C8F2E015E0EF223567ADC5814B276B5May 19, 2016
6144E144CAB13E760253885D19EDE82A2D70May 19, 2016
5120C80CA7BB5B2CA6CE0245CFF4FC847708May 24, 2016
51200B899402CA2EF05FB9DB02E6F1034D40May 26, 2016
6144276F9C08774B3B96D67A4B7192127208Jun 3, 2016
5120836593007E4FA62C81928C47EF97F010Jun 6, 2016
5120ABDE0FE21D1CC8A9AE1AD71A12A0D1DEJun 11, 2016
61446A9EF703E0A7A33270A484C85CCE6263Jun 14, 2016
61446656A36ED03E64F3AF05EC595CD6A576Jun 15, 2016
51206771E88148ED4A58856B225099BAD129Jun 16, 2016
61442F8D0FBC367D709453E73867EEF66A47Jun 16, 2016
51206B306E53FB587AFC1C7AEF832726E5E5Jun 21, 2016
5120B4E8892120FADE7B2E84FBF218BE315CJun 26, 2016
61444E95BDCCB28513733A314B04DAD87A2AJun 30, 2016
512063A9B073D6196C755628E89EB7605344Jul 13, 2016
51207122300FE089967550B838F3BDD3AF84Jul 17, 2016
5120A7EE12FF82D4CA65044F2106F5BF24DEJul 21, 2016
5120D83A6165AED7E38CFC2C1B94D4EF179BJul 24, 2016
5120CA80C6EAAD13EA9EDE8EB29C848CB4E2Jul 26, 2016
51204F9AAE42A4D54DB18F7C24420AC0FEA1Jul 30, 2016
512065593BFEE3AB5B5C6E2CD8F34DF3072AAug 14, 2016
61448AD246FC8A8770CBDEB120544FC9CC0CAug 25, 2016
5120EBC426B994AB6BC35F8CBB8C8600218FSep 9, 2016
51207B01C5B2F8E1EE2CFACAB10A9B82B24ASep 13, 2016
51209A7B692283B3224A4DFE5236DF73D6F9Sep 14, 2016
5120A11ADA2987FC5D16621182AE8B885CE0Sep 18, 2016
5120EE4E8CA7E8C8A5F6FB763EFFC0BB168BSep 29, 2016
61449B450A321805274CA94259473C1E762DOct 3, 2016
6144993737D58CB667158F2B6947857A222BOct 8, 2016
51200C53CBB43570EA007802D589EE592AB2Oct 20, 2016
61448DF0CC3D4AEF3B08592D4EB10EC0E191Oct 29, 2016
5120A698E1DB674693B59AB761C9DC74C46CNov 8, 2016
6144E4257F831986565267261E39956D87AENov 15, 2016
6144B10FB8856D8B37CAD2DB10CCC79BC661Nov 18, 2016
5120C7136DB05A9378931EB4CB1F7C4D4ABDDec 3, 2016
512041046DF34DFBE9BC4E1507C7811EAC89Dec 7, 2016
512042B7DBA53DF903416F08F9F1C941AE64Dec 7, 2016
5120FC6F70A3381D425B082E1A269AB7974CDec 12, 2016
5120657EB8831B8631AA367448A0AE93CB37Dec 12, 2016
5120CDB937FA2759BEBAAEC895F3D1DF25A1Dec 13, 2016
51200FA2850199DB7978B440B2DD62EA99FCDec 13, 2016
614411381CC5D34069DA06C6D44EBEE669E0Dec 20, 2016
61445BB7DDF87B19618ADE153D798CAA7753Jan 5, 2017
6144128B674F01456953BA9C9D1DA48E6CCFJan 6, 2017
61440C03B78E7F1E4E12449158734E383BD6Jan 12, 2017
61446A4A288A31F93BA522743F9819777184Jan 16, 2017
5120604F634E3841398F9A312C7A6124A7F4Jan 29, 2017
6144984F29C880198A8B8ABF6D48029A1E8FJan 31, 2017
61447EE8638C3B6AF4DAB2AB618ED6E87140Feb 1, 2017
614407156EEE1BDAB1BE9C39C37D2E063662Feb 1, 2017
61443740602D02BB8017040DC8EE6271DD93Feb 2, 2017
614464FEE3A5F199A2FB73EE3F7AFA103E26Feb 6, 2017
512010F27D9A791A78AE6324F15D1AC7BDA1Feb 11, 2017
51201203EB6B7D1325402DDBCB4E2E796F59Feb 11, 2017
6144F80EB0C5AFA6E30B6ECE6EB548C87DBEFeb 12, 2017
6144E3044DB19A06AE1EB15C1AD4A397224EFeb 16, 2017
716861403495C2E3B5396A09F1BAD51F7E3AFeb 18, 2017
716883F75538E9B17270ECF3209BE8652ECDFeb 19, 2017
614496CAE86AFCB0D8BB7E127333EA5E2929Feb 19, 2017
5120CC1F80E3F26689B9979EC457A08694E5Feb 23, 2017
5120E37DAFB301B75173E1AD6FD25338A4B9Feb 23, 2017
5120BB6603ABACA31905EE1740097375C357Mar 2, 2017
512002008860A5459A59E75D0FA135B79D2EMar 17, 2017
6144366DB0CCB93F2DD1B20AE90F8B94D2B4Mar 20, 2017
6144E4EDFB0E8DF53E24B10324C5DE14C783Mar 20, 2017
6144476BA79349CDD2A74EE7DA227FC039DDMar 22, 2017
61447AB30E271DA6C42D39D1B14AA76D04C8Mar 23, 2017
7168587F99659979EDDFC380071600F729FBMar 26, 2017
6144B27A086A0F2B2A6CEE590A9F64C5FA45Mar 27, 2017
61447DADC9E2DDDC1CFC69073F249037F82BApr 2, 2017
5120D037784289F751E5E31BD5807925A985Apr 9, 2017
5120942ABB07CE90E7424DE1202EB0704852Apr 13, 2017
61443CDE7B78AED3B478B775B7186DCEED04Apr 18, 2017
614419CCE4BE4CA48B972870733218CA4352Apr 21, 2017
6144E1F1BE0CEA4D9964A0267A3C939848BAApr 22, 2017
6144A9E0623C611D3B674BA6C433D9A31699Apr 22, 2017
6144970F060489FB2D58AA2EBF306E187CACApr 27, 2017
6144CCD4C1A7D69C92794B6E8AEBBEC72172May 4, 2017
6144EB4E3E223C5480266110E0D2BF724178May 5, 2017
614406F2ADBFD5A6DB6AE05E8212B9F9508CMay 6, 2017
51207E0854DE9BEDA767537133701F95900CMay 7, 2017
61445667925DCA62834064AEC33076DB09C2May 17, 2017
61443C47750CAAF3249602BC795CE317AEFDJun 7, 2017
6144ABB43F873528A63BD223C863CD71F661Jun 12, 2017
61443736030FF4B1C9D8CF8F7929FFAE9C37Jun 13, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 15, 2017
61441D57CEB2280A95EB4C9FDE82958F39C9Jun 16, 2017
307286162ECB111B44323696E3A1378413E1Oct 8, 2017
6144776C53D0BC8262554533413575E3249EOct 8, 2017
51203CC27107EF6334153653155556D695A0Jan 7, 2018
1228833D0CAC56068CD4FDBC49A9E80D02B84Jun 23, 2018
12288281980B134294721687A883F873D1044Nov 1, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_pconverter.dl.myway.com_0.localstorage^

  1. To enable deleting the http_pconverter.dl.myway.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_pconverter.dl.myway.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_pconverter.dl.myway.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_pconverter.dl.myway.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_pconverter.dl.myway.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_pconverter.dl.myway.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_pconverter.dl.myway.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_pconverter.dl.myway.com_0.localstorage. The name of the first found registry value referencing http_pconverter.dl.myway.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_pconverter.dl.myway.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_pconverter.dl.myway.com_0.localstorage and Associated Malware.