Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:October 27, 11:19

Testimonials

Thank you for the note. I have been a TrendMicro client for the last few years and was impressed with the speed of Exterminate It’s scan. I appreciate the efforts to help rid my system of Vundo, the commitment to stand behind your guarantee (unfortunately that is a rarity these days) and the customer service you have offered. I wish you and the company the best.

Barry B.

File: http_www.v9.com_0.localstorage-journal

Location of http_www.v9.com_0.localstorage-journal and Associated Malware

Check whether http_www.v9.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_www.v9.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_www.v9.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_www.v9.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.v9.com_0.localstorage-journal

If you find http_www.v9.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_www.v9.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_www.v9.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
36084CDE4C0558C097FB5618F0BC5B13824DMay 19, 2014
360819D75BC389E20DEA35F09BC1A9D95B94Jun 5, 2014
3608FD341C421689D27071B52FEE105B926BJun 12, 2014
3608343999F81AE26DED9F94985A1D75592AJun 12, 2014
3608DBA97D1948A6A8E16786BEE5CAC6A37BJun 12, 2014
36082B6B0DF5D04053AE7CB419CFF1EDD2D7Jun 22, 2014
360888B7836CDF2D6C7074210423EA0673CAJun 29, 2014
3608852F28E2982B73F3947EB93BCFF4B6E4Jun 29, 2014
3608AEA57596A24B504BB45A2D07BE1511DAJul 1, 2014
3608A6CF95EFEB2C9E4559F6EE4558C5FA7BJul 6, 2014
36088540CD1D61192B52CD970395C8CF2332Jul 8, 2014
360834ED9EA1C5B5EA11605D43C0A13017CBJul 10, 2014
3608A3F94717C5623F6EF0794477AA683AFEJul 13, 2014
36085DAE9DAFEF31DC8893B7B5E1A90B7718Jul 26, 2014
3608F459E649D8F3103023F5A7C0402813F2Jul 26, 2014
36081828EEA9E36564DEB267F18426E872DAJul 28, 2014
3608A2C1ECF6CCB8898CE2638E547FE2D4B6Aug 3, 2014
7736724917C9367A7D0B11A160ED1D6DC3FBAug 9, 2014
3608CD5CB9C37E6A4F4044F405E51EAB8F0DAug 11, 2014
6704D5B68091B81106F9003293796D8D78D1Aug 19, 2014
3608686677D52E27453A039A074113935336Aug 21, 2014
56728C855B5653B2F59C5D0145D5D75A7680Aug 21, 2014
36089B28A48BB697F3BFCBD712C096D1A1C0Aug 22, 2014
3608E8DAE8C067528C443F9298CBFAF6EABBAug 27, 2014
360889E55BFA546B8B25615051D50F1A73B6Aug 29, 2014
360838B90C8A78C77A0DBE2A5A1E183317BEAug 30, 2014
360860A3C7E3115F3929F2C83351F393AAEDSep 7, 2014
773631BA63DB51FEAD1D74BEB606E7DDB908Sep 14, 2014
36085E386B09CDC37B77B44FED595C4E05B4Sep 17, 2014
11864BB397461B7CE8F2506AC99319E10DA8ESep 22, 2014
3608D1CA37F05009050E871367183A2C0298Sep 22, 2014
36084D71606554F075500E9C8AE519637EDBOct 16, 2014
36088E68E0242EF396DCC71C84AAE4AFA6F5Oct 17, 2014
163845BC41DCD0B7D1573542FDF37762CB8C1Oct 20, 2014
56729AD54F85C3B580A95375E4C5C2E696EEOct 27, 2014
360827664E607255331D4ED06BE974CB5E5ENov 3, 2014
36080DA9FA7D7F3495D274DFD6D2786811CANov 3, 2014
36086A32947494F636A66DEE7214AB6EC6AANov 5, 2014
5672D2AE5558A543047C489B5E7D6092C6EDNov 5, 2014
36084FCCBC42509D010062F304A8FE9A28CANov 9, 2014
3608D39AF41FB82018F01FE95DDECADEF24CNov 10, 2014
567228DC1E87F341B2C9D6FAAB774F2FA117Nov 11, 2014
360824AB1FF6435F6C83461F717495215747Nov 12, 2014
4640E5F26D313DA333465593B43491C0DB69Nov 12, 2014
3608BDDCD61569C5493C5CEA1B9BD74FD85ANov 16, 2014
360885CE79765C078B621156A36EF509EDDEJan 17, 2015
149604CA90B3A850EABEF566EAFCBFE4817C8Jan 18, 2015
3608E7AC2B2BE92826E12F8C720B3A2114C7Jan 22, 2015
159923AA0EA63144724227B90ABF18C4200DAJan 24, 2015
36081AA0FAE8E1D91B724E6EC3CF02FF66EEFeb 1, 2015
1289652B94B0292D450A2ED2ACF59F586C5E6Feb 4, 2015
128968D747A4626163B3B544896EC06F9D594Feb 7, 2015
3608ABC5E6C5B977766EDFEA84ACB2AA596BFeb 11, 2015
12896663134A2B5CA9A73A38EA32393A170D8Mar 8, 2015
36083245B8580FCED61CA58A351DDE519C75Mar 15, 2015
36088F5079DE7DD04587E0230474A66ED7A3Apr 21, 2015
1392804AAE404A6357396767F2FBD642C0822Apr 25, 2015
3608CF709FB6C88274A3A2C626316F384BB7May 3, 2015
139283E03D4D6B4054E2244EAEF7E7D0997D6May 12, 2015
118643AE8746AF779C6403218618916C91F53May 13, 2015
3608DAD287D929E68B4C0E2E108235A95D43Jun 8, 2015
163847B1EE24E998F6FC512B2FA2C065156EAJun 9, 2015
10832E872F333C8FF870A8FF6BDB43C4DF694Jul 27, 2015
1083259F930DCF1C501B5C326591E138351E0Jul 30, 2015
11864BF59FA158300A98593552E8BB95BDDB9Aug 2, 2015
12896D6023FE1B3FE58BAA5C5E875D85A3B16Aug 14, 2015
1083251CFB7FE2DE940E1CB49FF08A4A640C3Aug 17, 2015
360830AAD10B18734461A595FBA5AFFDD665Aug 23, 2015
3608A80E20936199E4FB79A38C171F34B9CFAug 31, 2015
360815FF10300B0871EF5379E7FEB21B23FCNov 18, 2015
360832EE67767E6673751A77BF9ECDD69C54Dec 12, 2015
1638405E789E6E390A2BD430C80BC5159CA1CJan 1, 2016
128966CEDFE134A829A6D97D1F761254D0F5FJan 2, 2016
1289690BF7F2E1B78986E56588C507B9D10C6Feb 1, 2016
3608101F74C90F5619C6F82BE7B01C1FCF55Feb 15, 2016
3608F94751C4CAE29FDDF3B3E1BD8D930E89Feb 17, 2016
360830C3FB1A4619EDB8694359FBE5FE8942Mar 15, 2016
360800601D25A34E7F843D1F31035D7EE536Apr 28, 2016
3608E2FEAD564E3E29F38EC533DC03DF0B8CMay 13, 2016
10832891775478A01006F46F44F40DEFCC618May 24, 2016
12896A36ECC2F7DAFB977F731EAFFA17AA176May 27, 2016
1186443F5648AB5B171C2EFF0E145EA0FCB6FJun 5, 2016
3608C48DA77C2728DC9608FA47C12EAF06FFSep 27, 2016
360805445CE6215C3898E5F48535495B576FOct 17, 2016
36086F72FF2C4C22A35A75827E7C8640BC5CJan 11, 2017
36080114615512DE4C466E09533B6E1CBF2CJan 30, 2017
139280B02F7CEF876A94A30DE7ED323FEE7BFJun 26, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_www.v9.com_0.localstorage-journal^

  1. To enable deleting the http_www.v9.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_www.v9.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_www.v9.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_www.v9.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_www.v9.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_www.v9.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_www.v9.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_www.v9.com_0.localstorage-journal. The name of the first found registry value referencing http_www.v9.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_www.v9.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_www.v9.com_0.localstorage-journal and Associated Malware.