Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:November 20, 22:46

Testimonials

I consider myself pretty good with a computer, but after 10 hours of trying to do this myself, the sysguard.exe whipped me. I couldn't find all the files and when I thought I had them all, they would replicate and play hide and go seek I have never endorsed a product in a comment, but if you want to rid yourself of this stuff, pay the $24.99 and download Exterminate-It It fixed my system in 5 minutes!

Mike T.

File: http_www.v9.com_0.localstorage

Location of http_www.v9.com_0.localstorage and Associated Malware

Check whether http_www.v9.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_www.v9.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_www.v9.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_www.v9.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.v9.com_0.localstorage

If you find http_www.v9.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_www.v9.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_www.v9.com_0.localstorage File^

File SizeFile Md5Last Seen
30728BDFD6CA8D360FD2584F46E1AE14DCC2May 19, 2014
3072FCA18C0EC035CB49ECDAAB3168EF0AD8Jun 5, 2014
30727162B406F85404A48D143CA426DC95E5Jun 12, 2014
30726B2EEF62AA10D33B38D912CB6223A71DJun 12, 2014
30721F3B51513B6076D6B1C6E739DC7C1681Jun 12, 2014
3072C271343C8A4ECCC4C58424836095A884Jun 29, 2014
3072DC785C32B2FB13C00B84BBFB220E4C69Jun 29, 2014
307237C175E22AB52FAD1FC1FED9C11A5089Jun 30, 2014
3072E01B71D1874F23833402398360CE7A75Jun 30, 2014
30729A3514171387210B83DBDE0914F2EC23Jul 6, 2014
614421EC82CE8BD4F92C48550254950CCC65Jul 7, 2014
30727E8899C6C2AF7478BB7B15523F83E569Jul 8, 2014
30723D81FC6DFD278A34D492CAD1735D2754Jul 10, 2014
30720D1A89BCF722F28966B68EBDB6CCEE9EJul 26, 2014
307282206A3818A850C444CE1DA9B8D526BCJul 26, 2014
3072560319A1813AD35F32E519850F356CAAJul 28, 2014
30726F7298B34202232438405216CADCDE75Aug 3, 2014
71686F30B298D2098FBC5C29E3AE35728AD3Aug 9, 2014
307236BCA9466BEF42E6E3F49CF7B197E9D9Aug 11, 2014
30720C11E76767A41D947A75E1D979DF486CAug 17, 2014
7168B26A7EB5AE956F87F54B49EA66672706Aug 19, 2014
6144430EE3B73E613736B34B7A734963E09DAug 21, 2014
30728046BF357E94C3D71C9244D087837344Aug 21, 2014
3072D915074505CDEEAF5827E76D839366DCAug 22, 2014
30728331E275D0BFF272ED20E0135C83B838Aug 27, 2014
307277AD0F590957C13FFACE7606C9D640B7Aug 29, 2014
307211FCABF165C20D85041F87AAF76F7963Aug 30, 2014
30726911739153CA7D448B78EB8AF9FBE339Sep 2, 2014
40968CE32F57746021A8724394CE2323F61ASep 7, 2014
7168B5C62CF714995881E5D795C396F8209ESep 14, 2014
30729A57A4E30C8623DE78F903D2EB18F084Sep 17, 2014
3072B653E5D0919F9E956644FEBF5437B956Sep 22, 2014
11264C38AC43C8D5CB5B28168A8C338E1A3C2Sep 22, 2014
30726C035ECBDC951CDCBC8EB6107B2D5E11Oct 16, 2014
3072A4DF16DECCBD1A110050321EC44AF314Oct 17, 2014
2764862E6A5A333D6D4BBE2C1FFCD06723DA8Oct 20, 2014
716800C478F87947BB6857581C51AF3867F9Oct 27, 2014
307271D95F49D0FB13E09740C3F86F5A2C7BNov 3, 2014
30722A3F190690AE6B926BC597CEAB2C25D0Nov 3, 2014
614456EEF745E1232D313FFB6E88EE176390Nov 5, 2014
30727D2E66667B8B3723BBFB16058C1C2284Nov 5, 2014
307261558B2FF69F8BB002E1E684116BD7D0Nov 9, 2014
3072C9F64FA3993013E303818AE18D84EB11Nov 10, 2014
716846DBD88AD603601BC1912EABE9CB2EEDNov 11, 2014
3072B255D04EBF162C94A8E8D6D001E3E782Nov 12, 2014
5120E903CC9795E5A6D3D63FA270F5D9069CNov 12, 2014
30726C97A60B77387A317BC0E55B9D84710ANov 16, 2014
3072D328C64007662129FAF60BBB7036CC7DJan 17, 2015
143362C749875A34E8AF501ACA40B36466883Jan 18, 2015
3072D6F85848ED584B1D9B7CF94C2AEE117FJan 22, 2015
15360BA9E1E5531716185162445AD5E467C55Jan 24, 2015
14336DECE696B46BB667162603D6EF55DF222Feb 1, 2015
1228850111D18A5C76C75EBE16C11DBD9A3EFFeb 4, 2015
1228800D8C66CACD6491262A2312D17332A77Feb 7, 2015
10240E2686C984BFCD2A0DE38BAF73CFAD019Feb 11, 2015
12288F002B205C205C0E10BEFCE180B3069F4Mar 8, 2015
3072AFE90CA2C2992FE1804077DCB1B3E5DFMar 15, 2015
11264037707CC2E4D3F0F6087EBE76D8FB673Apr 21, 2015
102409D8AFC16A727D7125F0C11326C1037B6May 3, 2015
13312C4961D973BEAB712D3B62273A29C2161May 12, 2015
112642FC543A925EF646ED06BC729D6809735May 13, 2015
13312C8FEC158851FD527A1C83C43C2196B64Jun 8, 2015
41984C890DBB43B28B6A37166BE28EEC180BEJun 9, 2015
10240FFAC0C888351F012864B2E528481C7A9Jul 27, 2015
10240BAE859AE05A30DDA3863DEC680B2B6CBJul 30, 2015
21504BC9427699765360C10D1CD1D5B6EEC8BAug 2, 2015
12288C2B87454285C00EAACB405A763C10FA2Aug 14, 2015
1126488D5E265856AC9530FDB5DDFDAA5F501Aug 17, 2015
9216D4FDA826B8B89D1F428A180BB65A306EAug 23, 2015
1638439CFCF1065EF733FD2E2E6CB9B738949Aug 31, 2015
13312D0A78A656BA7E82DB8199B218DF33078Sep 8, 2015
1126488C606793A46E5344CF0161E30B386FDSep 13, 2015
1740869E162E75A3B8F17DDA53D74324B3BFASep 17, 2015
114688F23866E0D223012ED2C403B1BC5074C3Sep 26, 2015
35840CA6E7B3856D6F01A98205C9DF3D22ACFOct 23, 2015
31744A3D027ED69831F07A181C5E02F09ACEENov 8, 2015
163842A59B0445FFF73083D0CB84E8C1ECA8ANov 8, 2015
133123CEBB68997BD4D18AF87314FF5F0856ANov 8, 2015
112646D2ADE2B6FB42926C2FC973EA6E7C697Nov 15, 2015
1638495034806C292B700DBFB58D31DB1E6A3Nov 22, 2015
19456E6A98A613E79C1B4A5E3F57605ED5405Nov 26, 2015
256007528C4204EBC4D3F525E8C8EEDC32FC0Dec 10, 2015
1024001221204787359E0E4B6175713E971D5Dec 14, 2015
12288DAFEEF081B20EF6486F64D05A8CA84A1Dec 27, 2015
34816687814BCEA687952756DE30D42A4AB9FDec 30, 2015
2764864C361FAF805AB3D3536571166D080D5Dec 30, 2015
481285DE167A05742E7052A8E5A97C86470C1Dec 30, 2015
430089F8D3A855F71B3B54751740565B6C1BFJan 1, 2016
122886208EDA3D1365D9579520A36090D756AJan 2, 2016
177152B7D44BFEA3425F15FCCB088FDB5F4259Jan 23, 2016
256004787401D7287C88C64599BD178FFFF35Jan 23, 2016
13312E5F264A1EB18E102161875B07DB53A5CJan 29, 2016
1228806FD726E5CAA8427BC164F938CF97E78Feb 1, 2016
29696E6121E14BE7EED26CBFA8AEA2339DB9DFeb 3, 2016
145408B54DFBAE02B25A7C5886AC5A29082B0DFeb 12, 2016
15360490EAF54FF43B9C5E4D1ED3ED1F05FE3Feb 14, 2016
3072F8660E7B66D0EBDD5570C4E4CE7BD30AFeb 15, 2016
1228854B345378948CF0D542EB0075C89FE9FFeb 17, 2016
112643A27A2393055981C460E4C75AB512758Mar 15, 2016
12288ED80070390D814CF9D089614F314810FMar 20, 2016
122886526E561E5A291F7CE43DEE983BB8729Apr 23, 2016
102409609060547A0934928730A4E385BC01AApr 28, 2016
92160A055502BAEAF7E2CA703C3321F9BE51May 13, 2016
61440AFB24BD34106C24C95C3806F3AD1E935May 22, 2016
1433640BE4D32241BCBBC2BEA98118A794E23May 24, 2016
81924BAD0EEA5D8F1F1DCA0A30345B6E7389May 26, 2016
122887B4F9E030F134BC65918DEFFD64ACE05May 27, 2016
15360E9A5CAAA69D1C5D866F4CCE82633D646May 29, 2016
256000DA89F46812504A0CB983EC23E935151Jun 5, 2016
17408959354A4CF68D6148F22C81C3DC13643Jun 29, 2016
1228809770E279BAB625C8987C5773F547363Jul 2, 2016
174086B9A13302D98646626888FF4A2A8B900Jul 18, 2016
1126446A921BA8E4600E247F53F7A4AA56AC3Aug 13, 2016
122881EAC3CEEA047B12CF1AF148400EC8D07Sep 27, 2016
440326198154F15EF2E35076F98C6623E4881Oct 31, 2016
307223A1B2003883426383BA5F8E1B9DC281Nov 16, 2016
30722366831B55474114F5EAC44113E24FEBNov 20, 2016
522246DF25EDBB2B62A2BAFCBB30C14D7DEDADec 6, 2016
6144765E21395C3B66CE4B49CB657884B8C0Dec 22, 2016
11264DA7DEE47D7E6DD88B4DFDAA31E0AC7D4Jan 11, 2017
307276B77FF2E2612D6B00973455D428C343Jan 30, 2017
24576F2375666E19FE8300F6E31AE4818783BFeb 20, 2017
143362421EC43B10B01C2C56884A118CD941CApr 2, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_www.v9.com_0.localstorage^

  1. To enable deleting the http_www.v9.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_www.v9.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_www.v9.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_www.v9.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_www.v9.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_www.v9.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_www.v9.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_www.v9.com_0.localstorage. The name of the first found registry value referencing http_www.v9.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_www.v9.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_www.v9.com_0.localstorage and Associated Malware.