Exterminate It! Antimalware


Known threats:700,086 Last Update:March 16, 12:51


I have had major computer issues in the last week. I was infected with the Darksma and Vundo downloader trojans. After researching the net for possible solutions, i found they are extremely difficult to remove. I tried a variety of spyware removal tools to no avail. To do it manually is near on impossible.
The symptoms are, computer runs slow, constant ad pop ups, hijacking of emails, theft of information and locking of a variety of functions.
I then found buried deep in a google search a link to Exterminate It. After reading it, I downloaded to do a free scan and a lot of stuff no other spyware had found showed up. So i went searching the locations and sure enough the files where there on my system. I tried removing them with no luck. So i spent the $25 usa to activate.
It removed all but 4. I was disappointed that the Trojans once again reloaded and my problems continued. So, i used the SUBMIT STATE service. I supplied all the info i could gather, pop up addys and what they were for , what others programs had found and Exterminate had missed etc. Within 24 hours i received and email telling me they had updated there system and to download it. I rescanned the system and it deleted all the previous locked files.
Darksma and Vundo downloader trojans have not done their re appearing act since and my comp is running normal again.

It's worth remembering the addy or downloading it to see what it finds. I had no problems doing so in anyway with this program. They done what they said they would on there web site in under the time frame.


Administrator of Horse Racing Forums

File: http_ext.dl.tb.ask.com_0.localstorage

Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_ext.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_ext.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_ext.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_ext.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_ext.dl.tb.ask.com_0.localstorage

If you find http_ext.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_ext.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_ext.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
51206D21E9FA99C76FB92A89E36194E48CA7Sep 23, 2016
5120A35A65A3B62C23B8AA5517150D376F4DOct 20, 2016
5120AD53BC5A0D2155FA252FD4AC945AABBBOct 31, 2016
5120DE358C9A0008EA30F40744E5C4159109Nov 7, 2016
51206EA2DB3D660AD5E61FF40B29D3D70AFENov 9, 2016
5120D388E95DA8914F6F27658D3415F34722Nov 17, 2016
6144DC3208096E10B226D164F0F8FCDB963FNov 17, 2016
51203DDFFC8E817976C2BA88E00E2F4EE414Dec 7, 2016
5120E32F2F43F2BAC6B62069D5AC571B013CDec 10, 2016
5120807C08C98E924BBD53136E927FFA2B50Dec 10, 2016
5120D8AA9CA9EE75273EA8A269BFD02A6643Dec 21, 2016
5120A5E070A0D1F37149EFC9089F85805A5CDec 31, 2016
5120E034E2B52B5A5C9DDBB4A205899DC0F5Jan 3, 2017
40961998FA2BD9D744E104151AE6F6CA0C40Jan 12, 2017
51202AB51476ED45CCD72F4613F8C0A9389AJan 12, 2017
5120E945DD5D64FE1B9FC7B41D5BA4767B22Jan 16, 2017
5120BF208F273B7C3F93F001D58AD5363F13Jan 29, 2017
5120027CE42C33F83F1E031D7CD20823D81AJan 30, 2017
5120510EF2D08EF87DF6920B6DC7AF4B9C10Jan 31, 2017
5120CC446667851582E8FE26D930796E2467Feb 1, 2017
5120BB06292B109CDCECABE6EFE4F85D3DDCFeb 4, 2017
51202633C68A522C8A97C22D91F91191E9B4Feb 4, 2017
51205E278A8DA2FDB8E767989A414896046EFeb 6, 2017
51205E179F71A50DF8F8A460DBFB703C56B2Feb 12, 2017
5120892625A83422E4908813E3585A630DD6Feb 12, 2017
51208AACB57A739B500D3CA28366778AF939Feb 12, 2017
6144697C4A52010EBDBD9D2A55DEE74F004CFeb 12, 2017
51202BC48D0C0DACE7051B0B609480C7E89EFeb 14, 2017
51201A2AC22650F51C509A12FD215428FA3CFeb 16, 2017
51206EAF1E47F49B05F54084F71CC05CFFEBFeb 18, 2017
51205AE01DDD85C28433B15FA833C12842E9Feb 19, 2017
61444475E9922BC70E58BC6726E1DB356BB3Feb 22, 2017
40963CBF340D83F1ADE9367837EE39F965E8Feb 23, 2017
5120E2BD6CBCD43842FC612A22F319B2CC05Feb 26, 2017
614454D6720CF75F2183D7F4797347209F4BMar 5, 2017
51209168033572BD651BC5ADC54D70F1D469Mar 7, 2017
5120EAFEB55A180D01C8837C7B9430D7D2D3Mar 13, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_ext.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_ext.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_ext.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_ext.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_ext.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_ext.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_ext.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_ext.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_ext.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware.