Exterminate It! Antimalware

malpedia

Known threats:662,935 Last Update:December 11, 20:55

Testimonials

Matt,

Thanks so much for your help. For now, this seemed to have solved the problem and found all the infected files. I'll keep you updated, as I know this virus can be very hard to kill.

Thanks a million.

Jason

File: http_pstatic.kingtopdeals.com_0.localstorage-journal

Location of http_pstatic.kingtopdeals.com_0.localstorage-journal and Associated Malware

Check whether http_pstatic.kingtopdeals.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_pstatic.kingtopdeals.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Application Data\Opera Software\Opera Stable\Local Storage\http_pstatic.kingtopdeals.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\http_pstatic.kingtopdeals.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_pstatic.kingtopdeals.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_pstatic.kingtopdeals.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_pstatic.kingtopdeals.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\http_pstatic.kingtopdeals.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pstatic.kingtopdeals.com_0.localstorage-journal

If you find http_pstatic.kingtopdeals.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_pstatic.kingtopdeals.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_pstatic.kingtopdeals.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
36088CC0D4211AA5338D93C3C8C9E85CBF10Oct 22, 2015
3608AA350C9EC0673B49E945BEEB3DEBE491Nov 20, 2015
36089C5B2568F100EF17AB8085CBBD257559Nov 27, 2015
3608A40782DDD3D18730492D56B14F864264Dec 18, 2015
3608DAB6D96671A50FC9A13072F1B020F8D1Dec 19, 2015
3608AAC7586C4D6E91E2A32D3A6B28E0A61BDec 26, 2015
360847BEC018E48DD251A137497D04162C4EJan 12, 2016
36082B5FD8DE1EFE3954C3EA016F09A398EFJan 23, 2016
360818827DA6301745AC14977B5E1F9F2B8EFeb 4, 2016
3608EB7CA25B06F9344AC0B28A6EC95EAABEFeb 4, 2016
3608F2FB68A1C1EB9B5710088C74A6BD5A30Feb 16, 2016
36086A9869382A94FBB91A709516E7CCEB1CMar 10, 2016
3608E63E15F5185C61FBC9719998D7FDC33AMar 25, 2016
360847CDAB76E447A7FFE55497469F810CF5Apr 9, 2016
3608E157FB0EC553ACA6BEC4028FB51B69CEApr 11, 2016
36084A22F838CFA894EEDFB5E667AC16FEDCMay 7, 2016
3608BA4B3D7696294EAD1C59D04A04FF2D21May 7, 2016
3608919B70845C955E90850412FFA3D4CAACMay 19, 2016
36083D468B5B2C744A359E96710BFA03C4FFMay 20, 2016
3608B5CB253B3E6EF6B4FCF0B572A6705CCAMay 23, 2016
3608DB84AD1FF8FBFE09226258A1179C840EMay 24, 2016
3608B4586E7D686D2EC02263E8FC0DBF100DJun 2, 2016
3608F6A4B346FFF33AC48BE44DBF7FE7CBC9Jun 11, 2016
36085EB697B4F90470AFC2D6B5A8823711B0Jul 2, 2016
360814F3C24E52BE5B88CF12D688A4C7FE73Jul 22, 2016
3608F891596FD0D969C87E58E2A480BF0716Sep 1, 2016
3608047D948505BCF42252B152748B6A79B6Sep 7, 2016
360823866FD0955AAA5A60A4CAEC19EEC8B0Nov 5, 2016
3608541DA91D3C06E87AAF4AD58CE4B224E3Nov 15, 2016
36086AB37ABE341F7D2B6EA25A95FBD1D9BANov 16, 2016
3608660D4086EF12E0C356FB6A03116A2610Nov 25, 2016
3608A16F4CDEF69B1718E7A3A0028A024AC9Dec 17, 2016
3608A0405CF98BD9D3899A364BB2EDA19F44Dec 19, 2016
36080223375A258ADDB8A665A8015F30782DJan 15, 2017
3608A373E933313015BD7F3B026972F7D6DFFeb 15, 2017
3608521857AEEB60EF8F3A2B3E9D48099514Feb 26, 2017
36084BF41CE0744ECDD43C2C59D66650C154Mar 12, 2017
360877369AF83C9D36DC5B1B222E1A0E566DMar 21, 2017
36082026648DD9545349A8E2FCFBA6CFC9BAApr 14, 2017
360832EB141A22073DE4AEA6E5C04B223974Jun 3, 2017
3608B3A5A9A970A06536626638A7443A93B1Dec 15, 2015
36085CD7F90C77C6049785562F3A225C3DBBDec 18, 2015
3608F558B40DF607BE4DB39147082F573195Dec 20, 2015
360885D18CD34D741B25AD065F425089E511Dec 22, 2015
3608F0209CA19D29E58D503131A73E9AB6E6Dec 22, 2015
360875E2033E8506C6119C5078E92744B4F3Dec 28, 2015
36084863DC7571A7AF27F84A771D56824F09Dec 29, 2015
36088A263B3A7611610F632F5F889DB4FF25Dec 29, 2015
36089AEF221C5CB9F2412F5F27EE31DC4A68Jan 3, 2016
3608349183E7C2CEDF946844DA928B32A010Jan 3, 2016
3608ABB3CE57310F1D280D01A883962760DFJan 5, 2016
36086C70768ADD9757FBE9EC684A2B6F433DJan 7, 2016
56721AEE38E1AB3DAA11695CEF6BCEB4BD14Jan 24, 2016
36080B38D71A1DBB98D8308841147BC73B84Jan 30, 2016
3608931A4D677B2F57CEED8D3E617B6E82EEFeb 1, 2016
36089B989294A5C6069196CA568D33EB1081Feb 8, 2016
3608C03405C06DC980F50206846B027BD83EFeb 10, 2016
36086D658FF6748D3184304A494F0D1FA3D9Mar 22, 2016
360841B62F09509DE07E26DE192E932C9420Mar 23, 2016
3608B586DCFE8F5131869956A49015C3FEB0Apr 5, 2016
3608EC3D1283B4A8FD1745BA06EF26CC5C9EApr 9, 2016
3608F9D9D2BEFC7CDFE28AA5122307E44015May 9, 2016
3608B5EA69457AED05D92DBBD30820AF4F86May 19, 2016
36086029DE52843BECC6033581804D580ED4May 24, 2016
360819A77DD73D72A976ED9C06CCD93B5502May 28, 2016
3608480AFD380127C0CA51EE529740262F60Jun 5, 2016
3608C213F5E9E2C83F8D0FE1B3D5A93D6FEFJun 8, 2016
3608C263D12778AE5B3F20054AD3946B0E44Jun 12, 2016
36083554791EFA07E7240042794EAA24CE61Jun 13, 2016
3608C9393FC040CFE899320E2A7D337A14F7Jun 18, 2016
3608FCF5CE13D244B2390248BE1EC68BB1EFJun 22, 2016
3608EF11B47EE5AECDC686067D08FF2AE1C1Jun 28, 2016
3608EF4A537D81237369BA03CC564F8A96FFJul 7, 2016
3608B35A9FCE76295CDB4365AFB358E91971Jul 11, 2016
36083C1864EDEEA2CA1F618AF634F7B35E43Jul 21, 2016
3608B8CCE0A5F741C6C13A671E00A4434E01Aug 29, 2016
36088336BE4F64C03FCD14C3BAAD98F7022AAug 29, 2016
36089C58452C3E661AAC51B7AAFBA9BE00F4Sep 4, 2016
3608C0B0EC4E272290CAF7D3430521AC8DE8Sep 20, 2016
360884B9D9FDC2073530E425562DE683FF83Sep 24, 2016
3608B287B9A12E7ACB6BF5C52B978D027DD1Sep 25, 2016
3608D91ED7A347F2F3199E98BD37B4234CEAOct 18, 2016
36087BFC8F5BCEB5A4C1D3C07A4356350EBCOct 23, 2016
36089832A3BE71C0E5CCD1939E5AFAB7A3B1Oct 23, 2016
3608B448DB55E60538C6FD56D442D432D202Oct 29, 2016
3608ACA7E96248E3C0A6E8B879B1C61EB6A7Nov 9, 2016
360895A7BCF1B7D88F206E375F709DC6131ADec 5, 2016
36081A9CFEBCCE4AE463CDF83AAD61E3950FDec 8, 2016
3608A70743BF019C85E6ADB4FFF4C7A64C9BDec 17, 2016
36080E52EE2981F1AEA286130D7B01B4BA17Dec 22, 2016
3608063751FF45DA3129A4BE27D0AB2D3898Jan 16, 2017
36082A3D8B3D09B13928683F1D44D430D955Feb 1, 2017
36080F9882B0AD38412A3F469C30656D67BEFeb 15, 2017
36086AA0C338C31A9FDF73555606F900EDEEFeb 17, 2017
36083970F1E6E7ECB6F7100D781952174B03Feb 23, 2017
3608AD792AB9C651D97F84858D5D7AF6AA8DFeb 27, 2017
3608219614F5E8BB8B0D7A2D265F357DF8DCMar 15, 2017
36083C5491354A1D660064CDB914E0BC2BDDMar 26, 2017
36080900F7C7571827EE8B199C2546415631Mar 31, 2017
360811B20DDE163F9FD9D255C9A3DDBE949BApr 20, 2017
3608ACBA7664B5FB8801E974E4A307AD8D48Apr 22, 2017
360844211E5F8F45B1EDCE5B0AE7CE0B8CBFApr 28, 2017
360882AB3706B76F7FD9FABB911A44AB0AD6May 6, 2017
360835A16FF340C8DC540326825468355ED1May 6, 2017
3608481D71EBDF485C0ECACF9F1F25E31D78May 18, 2017
3608A14D0254C03240B166AB02320E437A10May 31, 2017
3608035C510529F31128A8AE46F609BB7A9CJun 19, 2017
3608FF08BAC462A1BB516513FE5FEC86897FJan 30, 2016
67041421336E196D436FEE7C3F10269672D7Apr 11, 2016
3608946779C2F790C14BC1E5BA81D969D8EAMay 30, 2016
3608241EA8F492A973B782A9083D3EB27A31Aug 20, 2016
3608E21CD1447ADE9404F92841244114CA01Jan 5, 2017
3608C91734F839FA09E5B73029A2B6727740Mar 8, 2017
3608A3B3A879FE85564CE7A9A074B6A8931DMar 25, 2017
36080B7301AED716D8CFE856E04405FBFA74May 3, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_pstatic.kingtopdeals.com_0.localstorage-journal^

  1. To enable deleting the http_pstatic.kingtopdeals.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_pstatic.kingtopdeals.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_pstatic.kingtopdeals.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_pstatic.kingtopdeals.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_pstatic.kingtopdeals.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_pstatic.kingtopdeals.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_pstatic.kingtopdeals.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_pstatic.kingtopdeals.com_0.localstorage-journal. The name of the first found registry value referencing http_pstatic.kingtopdeals.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_pstatic.kingtopdeals.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_pstatic.kingtopdeals.com_0.localstorage-journal and Associated Malware.