Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:October 27, 11:19

Testimonials

Just want to say that apparently your Exterminate It has worked like a charm. I was infected with a most troublesome Malware Trojan that kept replicating every time McAfee found, blocked and removed it... most annoying for several days... until Mr. Google led me to your door. What a God send!

With thanks,

Tom S.

File: https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal

Location of https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal and Associated Malware

Check whether https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Application Data\Opera Software\Opera Stable\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Roaming\Opera Software\Opera Stable\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal

If you find https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal File^

File SizeFile Md5Last Seen
67048383CB25D9C51726CA99721E0BB42A5EFeb 2, 2016
5672D2A4513ECCF34D7B37D7D488EAD4AFC3Feb 2, 2016
36088E2E94D9BF19ED50FE109753E18E02DCFeb 2, 2016
360832BD3ACE6968C9CAC940DE7788C66D8FFeb 3, 2016
3608F0A072C14679D20FB3F603CC9FFA88FFFeb 12, 2016
7736A4D6BE0796432EA48F6A20C1C5C406D2Feb 14, 2016
56726F5BDFE5BDA8EDAB95C9B699B7B4C3AEMar 17, 2016
3608DBFD2EA71A708CD3D1DCB4EF994EFF8FMar 23, 2016
36082E2155B63D7B9BD95E2531B74F6C22A7Mar 30, 2016
14960EF5D3D484D3FF758F81F4BE0B5BB42F6Apr 6, 2016
12896197C22C1A9AA348B161A2CC52E6D67C3Apr 17, 2016
36089DEE01333F0023B0360E8D33B0FF3FA7Apr 17, 2016
11864C9C6C025084969830E0836592D48D4E3Apr 23, 2016
360854B01E815D419C377FCABBD35215C10EApr 24, 2016
360820A21F5F60B728A82368072B1D63538CApr 30, 2016
13928DDCFC812A7E5298F14F36DBB5658353FMay 8, 2016
8768C48F470986FE18AE1018F3DEEAACAF8EMay 14, 2016
980094FC59DCB8675EBA9C317D9E725961B7May 16, 2016
36089D9A2158A10783F35EAD6574D68ACED5May 19, 2016
360814B0FA60A659B27368484206C3D06FDBMay 20, 2016
159921A429184001345F14A4FFB15B871FDABMay 22, 2016
3608090C72A416B65618292FADE22F0CD894May 23, 2016
5672F2A3A5ECAB08C295BC427D217644983CMay 23, 2016
36080EB3B714E867E991AFAF1B4D0AE65269May 24, 2016
3608D2463758E5B2FCD674B339AA438BD5FAMay 24, 2016
108321BB7D9DEE098FBCB3FD69F0230F4D0F1May 29, 2016
77363EF8978C96C1A8B0272AB02E20D5DB41Jun 1, 2016
876863A12E9D7EA9A884D2CF1F0C0AB8967AJun 2, 2016
3608757354C2B6A02FBD720E273774D97DC6Jun 9, 2016
8768A482F54FBCDB261B12CF1C42328F893FJun 10, 2016
670478261C1A75A0B1A806E9F5C9A47744C1Jun 14, 2016
3608201B4F48409B9F6E902887FA198F224CJun 24, 2016
3608E6E65087A6AE7A27C1C878FD779B9852Jun 27, 2016
118643B216B7DAC50FE688279AEB57B52CD22Jun 27, 2016
4640593367657C93BE3B4BC89284B5E96932Jul 1, 2016
10832BEC14FEA155A22AEE4CDA756B84FA96FJul 3, 2016
3608581FB8E4C0B2721127CAD4232E2908D1Jul 12, 2016
56729203BF66AFD760336391D504FC93B66FJul 19, 2016
360822DE13CCF99AA4FE6DFFE0B2A4D82C10Jul 23, 2016
56724221144B9F0A4DB1C1F32A25D188CB85Aug 4, 2016
360841710FC7E5915D185753F59CC8563DD1Aug 6, 2016
14960A1BB3332BCFA3FC286A7A1881D1E56F3Aug 12, 2016
16384E881E9C44A3B37AC6775AEB796096543Aug 17, 2016
3608D72CFE5DFBE95123250E2D455BAC3822Aug 30, 2016
876837B76D0166843A09A54F6C0DA62721E7Sep 11, 2016
163843C1FF5A5F6EE6D4D95570BC12319B559Sep 17, 2016
56724CA8B22F0DCFE9411D0F0E7D8E63F0D2Sep 20, 2016
36089714883D0A0EAD5D978EEE36C1EE9630Sep 21, 2016
56727E88B0F40885FA40E62991DEC814B4A9Sep 25, 2016
10832A459CE8C76967861234DD6EC1186E3F2Sep 29, 2016
36083F3796734DDC6CFA4AC01EF7BACB1081Oct 11, 2016
118647C5E527DA93BACF504FAE9F1DBB5F43COct 25, 2016
3608BBD6379947771A66403669B3D585A23CNov 1, 2016
670482E9F12AE4C416D14537454DD886F147Nov 1, 2016
12896494F6BFAA3674D8A73AC2A4CEC8F106CNov 3, 2016
67047800D8E2A9E8B9C3268E3C7FE2FDB18CNov 8, 2016
4640D4355D5C6AB31573647A78B4D6FC0CACNov 29, 2016
1186497BCE8ADB3C9ABF76D5C5462B3ADBA9FDec 3, 2016
980000DE26D2E8322DA9C34D425413B81292Dec 8, 2016
163848DD228F7D8B92FADA9C2BB596046D1E5Dec 12, 2016
360818219B1608765BDFB25F6562AB6FFA43Dec 16, 2016
360833AF4842F077EA32ED80BDAAEEADA2FCDec 17, 2016
512A12B51D15E22F184ADCC24F075A0D7CCDec 18, 2016
77369628518C399C10E81018C523E9EB94CEDec 21, 2016
3608A3966FBF76173E4B747B15831A9CB780Dec 22, 2016
3608293E05AB4BC7F4141CB9C6E7F8E32BF9Jan 4, 2017
3608E886B0504C4CA8C473CF9EAD25B04832Jan 6, 2017
67041DA7E3F3D617781AE6C3B0FC7C4FD30BJan 16, 2017
3608EB8C7793A4BEF0A855D01DB17174B90DJan 23, 2017
16384800241CECE01AED209A24645FC7D5C3CJan 30, 2017
98000A4CAB3C4CEC113FEFBC65C2C0F7809DJan 30, 2017
3608B1D5A6875E1761CA080D917877CF4820Feb 1, 2017
360822C254A6BEEC346657D8CA9AA4F70003Feb 15, 2017
7736C1E773DDFFE62E15D55FF59A13404BA6Feb 16, 2017
3608DAC7D873171A6DCB97958ED7473CD9A9Feb 24, 2017
6704EA69FD39A3C8637788536CEDB8B1E39BFeb 26, 2017
46406CB2473EF20D5A43EF972D07A06B24DEMar 13, 2017
7736F245CAED8CA3CE2D49B047B101DA8BEAMar 17, 2017
5672470D55AE1648D97B6266796CDF7BDD0CMar 24, 2017
163849CCF80F8F4AFF5584CF1C8E7E0835037Mar 28, 2017
163841F9840DB62F6846C8A8D87DD91099328Apr 6, 2017
16384DFB0F6A862B342B243DB285C132E7223Apr 7, 2017
3608E7020897E8AF68AF959F8AF1255684CBApr 10, 2017
3608CFC38A17C80B4B4D996E7A59CFE093E0Apr 22, 2017
6704E0002362FFA8CDF3A0CB90E87A15CED3Apr 28, 2017
36086C13FEEC08641701301A65E22D4F608EApr 29, 2017
773654B74FA32E2E0A4F9D8ECFACE7843EFBMay 5, 2017
3608EE214EF80CDB07B263A8EA1FA04BB407May 8, 2017
360835D352A754ECA4E83501EFC5B92B3D31May 21, 2017
3608A36F392E7660A73A6D54A27DFC963DBDJun 3, 2017
4640D085BEDDC59D4C53B15ECA6CC122C4E8Jun 5, 2017
3608C9BC2F3F6D94B5F4E73816064C930F95Jun 7, 2017
36080A09D07C8EC78017BF330E77C9971EB7Jun 12, 2017
4640C660BA6E6C0BBD8781621B094D096D6AJun 17, 2017
36088843A2618CF910F4E671CD26329555D7Feb 4, 2016
567222335369CAFB5F5EF606FA6C539039F9Mar 5, 2016
360892A876F786D71AA2393340A53050C40DMar 23, 2016
3608151E9D04CBC12D0564A5D1F082779093Mar 30, 2016
36087863588F8F70707FEE824A30832BFFECMay 7, 2016
36087123BF6F0614D5F8D7747E06A1933C26Jun 15, 2016
36087959B1AD03165E889FC07C0F0162EAF0Jul 23, 2016
36087320555BDA6F6F28B613EC2E67357C58Aug 11, 2016
5672623609F7EEEC3C61B16A63B6AC61FB36Aug 30, 2016
360827EF88312CE116249B29EA5F1554F8EESep 7, 2016
36086A67258005F699253D863120DF391264Nov 15, 2016
360837B2C0B9346B9AB03267092FE0C6FC30Dec 17, 2016
36083C6B313BCC9C8BAFE7418954BFB56A4CJan 17, 2017
3608194E7D71CF5D9CE06353316B1359CA79Jan 28, 2017
3608EAF93287AE9BD5DC054B1CA3A389E44BFeb 16, 2017
3608E54397579AE7E78BA6AF1A94693151E3Apr 24, 2016
3608439ECF83608C92E9E90360FFF4D9F22AJul 30, 2016
3608BD754106DBDEDD903955CEC221A59B68Aug 23, 2016
3608A9EC7DBEC7A5E815ADA7E452D04791B9Jan 3, 2017
8768E215F4D728D1625477D358719EB19231Mar 30, 2017
98003CFCAE58491AEFBC877ABB2E90AFE889Dec 9, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal^

  1. To enable deleting the https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal. The name of the first found registry value referencing https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal and Associated Malware.