Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:August 10, 12:54

Testimonials

I have had major computer issues in the last week. I was infected with the Darksma and Vundo downloader trojans. After researching the net for possible solutions, i found they are extremely difficult to remove. I tried a variety of spyware removal tools to no avail. To do it manually is near on impossible.
The symptoms are, computer runs slow, constant ad pop ups, hijacking of emails, theft of information and locking of a variety of functions.
I then found buried deep in a google search a link to Exterminate It. After reading it, I downloaded to do a free scan and a lot of stuff no other spyware had found showed up. So i went searching the locations and sure enough the files where there on my system. I tried removing them with no luck. So i spent the $25 usa to activate.
http://www.exterminate-it.com/
It removed all but 4. I was disappointed that the Trojans once again reloaded and my problems continued. So, i used the SUBMIT STATE service. I supplied all the info i could gather, pop up addys and what they were for , what others programs had found and Exterminate had missed etc. Within 24 hours i received and email telling me they had updated there system and to download it. I rescanned the system and it deleted all the previous locked files.
Darksma and Vundo downloader trojans have not done their re appearing act since and my comp is running normal again.

It's worth remembering the addy or downloading it to see what it finds. I had no problems doing so in anyway with this program. They done what they said they would on there web site in under the time frame.

Source

Administrator of Horse Racing Forums

File: http_www.mystartsearch.com_0.localstorage-journal

Location of http_www.mystartsearch.com_0.localstorage-journal and Associated Malware

Check whether http_www.mystartsearch.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_www.mystartsearch.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_www.mystartsearch.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\http_www.mystartsearch.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Application Data\Opera Software\Opera Stable\Local Storage\http_www.mystartsearch.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_www.mystartsearch.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.mystartsearch.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\http_www.mystartsearch.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Roaming\Opera Software\Opera Stable\Local Storage\http_www.mystartsearch.com_0.localstorage-journal

If you find http_www.mystartsearch.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_www.mystartsearch.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_www.mystartsearch.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
36087C9BC34EBCDC23645E612C6BD446026FJan 9, 2015
3608E266736475F0EE6FDA1A8C8F82C49581Jan 13, 2015
149604A2C5B5496B87084148C20020AA1E99BJan 24, 2015
139289495503ED23305CD202D148A8C27058AJan 30, 2015
15992BD76227E57E66EEB3C3454B6F9BC815AFeb 1, 2015
139289D747E9606AC0FFC7CC9F5F0FC4D9E1BFeb 16, 2015
14960734F018CD06B60634A9F4142F40DC73EFeb 18, 2015
36084673B266366DC82CD133876F6E4863E2Feb 21, 2015
36085BC5E8467A58A62CE749433C653B70C2Mar 11, 2015
3608F8A9F045CC5368FF21302EEF7D2A2D33Mar 26, 2015
11864797E8CB9F11D3B0CCB4839ADCDA1E51DMar 26, 2015
13928DFFB4873C0569A5CBAD113A47B65E57CApr 1, 2015
36083330FD2CAC78528635E756484B83B294Apr 1, 2015
128960B180CBA79E5B85635982E6BA59810DAApr 3, 2015
3608A75F5C3B8F00035C72DAB1A9EDEACFFCApr 18, 2015
16384C5CFE22B966E99F2198649498CD1CFBFApr 25, 2015
128960DE9022091A4AC7972FB6438D13BD2F9Apr 25, 2015
10832993B1161C678D978292F0905F5D74B65May 5, 2015
3608878728E30D09253FADAD044E22C120F7May 7, 2015
1186420E9EC2B5B671619C3FA39058D78359EMay 7, 2015
12896A8DACD3884D5CD3C1986C55F165F7202May 10, 2015
14960E71B223114C2530AD671529C846B2D1EMay 11, 2015
10832A5AF11A125E15F7BACF94B27BD710604May 23, 2015
128963C9BDBD2655668D339F449700DB6331CMay 23, 2015
1289606C96186AF816B2A8FD373B6848EB02EMay 23, 2015
13928E13B0E8A88DB30B42B27385C7FF4B89FMay 25, 2015
36089824431F8F41B3B59349B0216AD69A0CJun 25, 2015
1186401E89DD5ACED320C32FCE4671F34CED2Jun 25, 2015
3608F74E467F7BF973611AE9B1F4E0F71E6DJun 28, 2015
16384EBFE5B919D93EC5C53FC1FE45AD52E21Jul 2, 2015
16384A1401AEE15242AA722DE209C945D3C4DJul 2, 2015
159927AA2922FD0147D07847E09B1297BA609Jul 2, 2015
12896E68D68CFA6FCC47A4C0E3F2978A56702Jul 16, 2015
11864E42F4C2D060CF23880E2A6B73ACFD32AJul 22, 2015
1638406C082FB0853C896A9B670401863CB1EAug 6, 2015
1638457A668F326AF142E76D637F0DBE72A15Aug 6, 2015
360820785F7535BB33F71CD2C4E1A151CBCDAug 7, 2015
11864AAE8BC12412F9B05F0C38388FF43ACEDAug 22, 2015
16384AAD3D150094E748C2995885CDE92061CAug 23, 2015
1638476B4BEBA81C6100857C23772BCEBFD94Aug 27, 2015
3608F0CB81A64B8335C29580A692B2820334Aug 31, 2015
360810A0F9B8A351DA4DF1E960C085B4A5A2Sep 6, 2015
3608CA08F8F78629798725C5230BA0A77F14Sep 14, 2015
128967B48B816A7C9E9766DB482047171547DSep 16, 2015
16384723115AE5228315E3680098AAF343B86Sep 23, 2015
139289EFD77D7C70848CFC338E984A1D42D4ESep 26, 2015
118644700D1A79C8ECB7F5EDFE1774A023A25Oct 1, 2015
11864071C73AA22184FFB0837D12AEF4113A0Oct 4, 2015
3608E3F3F809B944ABA4D1FEAA699A97C065Oct 5, 2015
139281D6DDBFE822978F1D38F77BFACE375E9Oct 7, 2015
11864418B92B1D2F23BEEB7308ABEE2821966Oct 7, 2015
163843447135DF99603372A00357019F2A660Oct 16, 2015
36088C8C41140A9B0121BCA28BA3433EDFE9Nov 18, 2015
36082E3BEC7B29333D5AD400573B2D4D75D5Nov 27, 2015
13928928B98A60A5A6224BBBDA17496B9BC1CNov 29, 2015
3608181A8F71CB4FB1EA0E42179C19F2F42BDec 12, 2015
1289631D5FCC0A5161398CB620479521066E9Dec 18, 2015
12896F7E1763203B6A0F2DE6CF3998742EA2ADec 23, 2015
149609DD4F91654AB79541485F795126A544ADec 26, 2015
3608CBB2B71C536708B74AD7ADBF0C8A0625Dec 29, 2015
13928235FBA8F51687E7F16E513B894DF53D8Jan 7, 2016
3608D51CD4E679372BAFEEF4A2518A14D020Jan 22, 2016
11864E444D19B1057FB0F0B569DAB1D34282BJan 31, 2016
163847B3F4C79C6EAA3E01446E9AE314A40D5Feb 15, 2016
13928B4728D0B94B0B3E16E0F66944D1A1436Feb 16, 2016
128964641907421CA06C693F1BE7D180268F9Mar 14, 2016
13928698F92438AC64D43F45590C97CDBABC8Mar 21, 2016
1638496912F302DE22137BA31C33ED67B2ACBApr 5, 2016
11864F05B84D5E511931E69AEA160DFE5CD7EMay 15, 2016
16384EAEB55C80FAE35FDB6D79282565179B3May 18, 2016
128961ED53D43E8E745F44FA8399C960729ADMay 18, 2016
159922F519FDDDE7E14F8E41069319586C238May 28, 2016
163846FE908ABD94BA39FB23C4D82AEEC25CDMay 30, 2016
11864DC09E3DADB50FD4B656661E416EF2423Jun 5, 2016
159924C959B1CEFC6DB6A2ACE99B5D4BA8D8FJun 10, 2016
163843F0BF130FB3E2AD0C1CFA80560434A25Jun 27, 2016
10832598016B89FCBBCE57B301C0CC5FF7C4FJun 30, 2016
118640B9B9E13B6CD637152E95CC3157112D3Sep 7, 2016
3608BA5E1D298E4827CF7C1B1A37EAF4E2ACSep 24, 2016
163844DB5CC10486A15E5F7BC228E31880A27Oct 10, 2016
139289A5931653DEA9AAAE681998E415F01CDOct 22, 2016
14960238241EEE4DA74BCA9D6809B320BF2DEOct 25, 2016
16384D575994EC45F6B264963BE9507949DA4Nov 12, 2016
12896442C2E8F68DAF6E35C0AB3C34CEBC341Dec 3, 2016
36083E0A35B0FF4C1F244F7F61143635CA7ADec 12, 2016
163846B4383E60FDF1037C93A2D6631B6A4A8Dec 12, 2016
1083216D0533146A2D4DECB27568DE226E9F7Dec 31, 2016
36084C8DCBDF1E1643483B8A921A88270A83Jan 5, 2017
1496021ABCFB620CDBFDA06CAE45D7F92F84CJan 8, 2017
360804D40BA13318F5F0E3D60F4C13561562Jan 28, 2017
36085B4ED7CABE6BE9929679A844EB699C71Feb 8, 2017
128961BA7ADFCFAED62DD56C4B79AA6D10E53Feb 21, 2017
16384ED7194254A91F2FEE7F88EA7BBFA3CE8Mar 9, 2017
1638474836ED057BB54024117AEA2F35F5100Mar 15, 2017
163848F54E6C0EA3E0F8442F9C3FA87135BC5Mar 16, 2017
3608CA278A04C91D891118F796CD62C8ED4DApr 1, 2017
360892E393A6EA998D836C22CBD01D994578Apr 9, 2017
163848789117BB43258ED33573EC27E57F41EApr 29, 2017
3608DF0A1E8F998DCFB7B19037B7231EEC5AMay 5, 2017
16384DBB54ACBDB2B08279B6A4ADAD8A62822May 23, 2017
12896FA8BAE6491C2AFFA88326168EBBE43A5May 24, 2017
1638476D82874592C425F3D231F378D8742EAJun 5, 2017
3608E2897F955EB0331D9B5060D3287DA673Oct 7, 2015
36085A410A1E6A116344F865A9DB0C65AE13Oct 12, 2015
360882487C39B37F13729F21BEB1C1968ADCNov 1, 2015
3608340BE36649DFB4B14508F7F3BE436411Dec 9, 2015
163842D24B89EBB058BBC1D39776A5C1EC1A2Dec 28, 2015
128968FBA5B39FE226754E97F7139B85CAE04Jan 13, 2016
16384486F9B9DB81DFEF79E2B5D00ABD745D1Feb 5, 2016
360857E1B2EAB69A2BC23DC3C658623D85A7Feb 10, 2016
1289696E4F63659F90BAD7BD57D9F663B1073Mar 30, 2016
13928A150444F6B7546D9F5E9B4BE9169AD64May 6, 2016
360865A3C7B8CF5AACF6A499B0D2BDFDC5A0May 22, 2016
16384AE14318454FED65F3B22E406904FE040May 23, 2016
128961FE51335CFC6B96EC6AA812A9273DE17Jun 3, 2016
360886A4404BD28C32A2E595ED084AF3E234Jun 28, 2016
139287517F554DBC08A25D206F072E6BFE31CNov 7, 2016
1186487A0546A85C47EDFC0ABBDB397AEBD1CNov 20, 2016
13928133937036CD341235059CE6FB32DBFAADec 1, 2016
3608DCF16CCAE3E207C186254397F6B98E57Feb 16, 2017
3608A4EA1A92DDBD2818C33A6E67F6F1A9C0Mar 12, 2017
3608D313BFDF56FA7706384A166D753D7FC1May 27, 2017
163844E0D458D639CE6F1077E9921959957F0Dec 10, 2015
3608B8CEB69D80F68E3AAB72C7D79EABDBC2Jan 19, 2016
3608654DBF7923E3AF85F526C631847B0807Jul 14, 2016
163849192F571247E5D2DA5A864AC01353CA9Aug 12, 2016
1289628609AE9C5FB5C31DA94D6E0ACB148F6Aug 15, 2016
12896443E4FB264F275786A74195F7ECB7A4AMar 24, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_www.mystartsearch.com_0.localstorage-journal^

  1. To enable deleting the http_www.mystartsearch.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_www.mystartsearch.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_www.mystartsearch.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_www.mystartsearch.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_www.mystartsearch.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_www.mystartsearch.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_www.mystartsearch.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_www.mystartsearch.com_0.localstorage-journal. The name of the first found registry value referencing http_www.mystartsearch.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_www.mystartsearch.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_www.mystartsearch.com_0.localstorage-journal and Associated Malware.