Exterminate It! Antimalware


Known threats:700,085 Last Update:March 01, 12:55


I have had major computer issues in the last week. I was infected with the Darksma and Vundo downloader trojans. After researching the net for possible solutions, i found they are extremely difficult to remove. I tried a variety of spyware removal tools to no avail. To do it manually is near on impossible.
The symptoms are, computer runs slow, constant ad pop ups, hijacking of emails, theft of information and locking of a variety of functions.
I then found buried deep in a google search a link to Exterminate It. After reading it, I downloaded to do a free scan and a lot of stuff no other spyware had found showed up. So i went searching the locations and sure enough the files where there on my system. I tried removing them with no luck. So i spent the $25 usa to activate.
It removed all but 4. I was disappointed that the Trojans once again reloaded and my problems continued. So, i used the SUBMIT STATE service. I supplied all the info i could gather, pop up addys and what they were for , what others programs had found and Exterminate had missed etc. Within 24 hours i received and email telling me they had updated there system and to download it. I rescanned the system and it deleted all the previous locked files.
Darksma and Vundo downloader trojans have not done their re appearing act since and my comp is running normal again.

It's worth remembering the addy or downloading it to see what it finds. I had no problems doing so in anyway with this program. They done what they said they would on there web site in under the time frame.


Administrator of Horse Racing Forums

File: http_ext.dl.tb.ask.com_0.localstorage

Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_ext.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_ext.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 3\Local Storage\http_ext.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_ext.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_ext.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 3\Local Storage\http_ext.dl.tb.ask.com_0.localstorage

If you find http_ext.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_ext.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_ext.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
51206D21E9FA99C76FB92A89E36194E48CA7Sep 23, 2016
5120A35A65A3B62C23B8AA5517150D376F4DOct 20, 2016
5120AD53BC5A0D2155FA252FD4AC945AABBBOct 31, 2016
5120DE358C9A0008EA30F40744E5C4159109Nov 7, 2016
51206EA2DB3D660AD5E61FF40B29D3D70AFENov 9, 2016
5120D388E95DA8914F6F27658D3415F34722Nov 17, 2016
6144DC3208096E10B226D164F0F8FCDB963FNov 17, 2016
51203DDFFC8E817976C2BA88E00E2F4EE414Dec 7, 2016
5120E32F2F43F2BAC6B62069D5AC571B013CDec 10, 2016
5120807C08C98E924BBD53136E927FFA2B50Dec 10, 2016
5120D8AA9CA9EE75273EA8A269BFD02A6643Dec 21, 2016
5120A5E070A0D1F37149EFC9089F85805A5CDec 31, 2016
5120E034E2B52B5A5C9DDBB4A205899DC0F5Jan 3, 2017
51202AB51476ED45CCD72F4613F8C0A9389AJan 12, 2017
40961998FA2BD9D744E104151AE6F6CA0C40Jan 12, 2017
5120E945DD5D64FE1B9FC7B41D5BA4767B22Jan 16, 2017
5120BF208F273B7C3F93F001D58AD5363F13Jan 29, 2017
5120027CE42C33F83F1E031D7CD20823D81AJan 30, 2017
5120510EF2D08EF87DF6920B6DC7AF4B9C10Jan 31, 2017
5120CC446667851582E8FE26D930796E2467Feb 1, 2017
5120BB06292B109CDCECABE6EFE4F85D3DDCFeb 4, 2017
51202633C68A522C8A97C22D91F91191E9B4Feb 4, 2017
51205E278A8DA2FDB8E767989A414896046EFeb 6, 2017
6144697C4A52010EBDBD9D2A55DEE74F004CFeb 12, 2017
51205E179F71A50DF8F8A460DBFB703C56B2Feb 12, 2017
5120892625A83422E4908813E3585A630DD6Feb 12, 2017
51208AACB57A739B500D3CA28366778AF939Feb 12, 2017
51202BC48D0C0DACE7051B0B609480C7E89EFeb 14, 2017
51201A2AC22650F51C509A12FD215428FA3CFeb 16, 2017
51206EAF1E47F49B05F54084F71CC05CFFEBFeb 18, 2017
51205AE01DDD85C28433B15FA833C12842E9Feb 19, 2017
61444475E9922BC70E58BC6726E1DB356BB3Feb 22, 2017
40963CBF340D83F1ADE9367837EE39F965E8Feb 23, 2017
5120E2BD6CBCD43842FC612A22F319B2CC05Feb 26, 2017
614454D6720CF75F2183D7F4797347209F4BMar 5, 2017
51209168033572BD651BC5ADC54D70F1D469Mar 7, 2017
5120EAFEB55A180D01C8837C7B9430D7D2D3Mar 13, 2017
5120B472856A04C1BE5630E1A2F0C8A6321CMar 15, 2017
61446AE0AD47516D221A060C5633B1E45D3CMar 17, 2017
40960B69687FBFD7033C342F6C8E7BE462C3Mar 20, 2017
40964930EA22EB39BF11A5308D8A0E2E7586Mar 25, 2017
5120C5B1F80ADB15EE0386061678A99569DAMar 27, 2017
4096402A2ACED5A4546A11AAB26DC4BEDEBCMar 27, 2017
512093D899C9F9F2FDD1438217354EBA0C86Mar 30, 2017
61445A88C1808DF928649E4F668F1D29B824Apr 1, 2017
61448A9A06F6B536F1A75563E21B229B6171Apr 10, 2017
40964F355A9950E1618D915B1AB11AD67D7EApr 10, 2017
409651B121852D506BD65C144000BA93AB98Apr 11, 2017
40967D93760B396CFCBCA549E127BD201A04Apr 12, 2017
6144F71E0FBD9391A8760B634011B685F716Apr 13, 2017
4096027E1B0D0B5642665127A9938947BED8Apr 17, 2017
40963B9D7922DFBD40573E8E96A5ACABBC66Apr 18, 2017
71681D0A244CBBC0EAEBA6C508F5A566AB30Apr 21, 2017
614499FAA46CDA99D968ED48D7FF2038696DApr 22, 2017
6144FA20701A1F6228B8D0A7EFF0C8B8F2C3Apr 22, 2017
5120DE647B8E4C09EC6C8D95C137080F033BApr 22, 2017
4096A2506F937F24D19380786466647908D6Apr 23, 2017
40968E5A2C45A055B448E422E55A917F3123Apr 23, 2017
4096D979CDC000B1BA33CB492305A71C512BApr 24, 2017
61442212BD0D9FE8B77D4188E9C27F0DD893Apr 24, 2017
40968915ECA6FA1B7687404E6BDDAAE8D2A5Apr 26, 2017
409646F8D4F3DA689C7349F1C229FFF066EEApr 27, 2017
40963B0ABEB9A88B2318BE1B664D6850C484Apr 28, 2017
40961B3969D41EABA096CE9EB17A8E209C63Apr 29, 2017
5120670058FBAF0AB3F0F768B19B74B2F98FApr 29, 2017
307279936BF5FCEF14EDC16DB355C5682AC6May 1, 2017
614448CB405938FCC75C9A8F10FCEA0BE8C4May 3, 2017
614496F3C4DD151B80FA91C19E074B94A2EAMay 4, 2017
512052C06F1999D6A47175776C2B400B5465May 5, 2017
5120BB548693BD431E4F1FB1438BCB8C29B0May 5, 2017
5120E1AEF7A23421942179C986FB6952B07EMay 13, 2017
4096CE07E3FDF9A218F67AAAEAC6E485F4C9May 14, 2017
4096DBF5DBF0E5409DCAA6F5B6A2A771AFC6May 15, 2017
61443D791103A5851793A40983DFA52877C8May 16, 2017
5120E00F7D377EEC405B8304F6DD175D15BCMay 16, 2017
51202B3916448DC4AD4FBC890BC8198B373DMay 17, 2017
4096C008BA23E8204896E44EFA0D12929C26May 18, 2017
40967875597D0DAFEF82A9067235E804250AMay 18, 2017
4096296ED204051C992BDD073FCC6047663BMay 19, 2017
4096EDA8AC6C61896B32417C84815D6193FCMay 20, 2017
3072C939A07607071E569B99E90B2E4C24DDMay 22, 2017
51203BED0C1FC2F349F3667FE127FB9FF327May 22, 2017
5120B67D01039B5CB13CDF149C36500D4838May 23, 2017
5120E568A1350D92D5E86BEFA5263299650FMay 24, 2017
6144EB68369EB079EA50B0C9E3D2554FE7CBMay 24, 2017
7168B2281544BC745E30BAA7E9FFE4CA1DC8May 24, 2017
6144AEFE0B2ED857C7CE19B97ACE10B89463May 25, 2017
4096308EC58591435E97BDA45070FB785119May 26, 2017
4096EDBE3E34BD53AFA077AA111704B0450BMay 28, 2017
4096BCAE3CD20598B417D11CFF9F376FC541Jun 3, 2017
6144FA4B6B23CF7F93F1902961E585A9B4F6Jun 5, 2017
51200E6B6289DCA2865296007D04CB07361EJun 5, 2017
6144C2E2A3C679190BC3DF9849EC4C523AD6Jun 6, 2017
61447159BBD5A120A56B12E8E841748C1D12Jun 7, 2017
512058AA81272914CB3E5DAA3BF4D7094537Jun 7, 2017
614471194C66948EB1E68D4CE204AE4715D0Jun 13, 2017
1228833D0CAC56068CD4FDBC49A9E80D02B84May 4, 2018
4096BAA03463A99918816ED8B23A4962C373Jun 17, 2017
122881ADC043F32850D8D6A4DDC4093BA1B73Jun 18, 2017
4096361F6015DCCFA07FA7C2B8B2F5DFCB5EJun 19, 2017
512015C5BD03284897588E142125DC4F66C0Jun 22, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 22, 2017
307286162ECB111B44323696E3A1378413E1Oct 8, 2017
4096BBD30226973539F25EB07C9673A55F81Jun 27, 2017
5120B40E06CD217D5A60E90CA3A86E6698F4Oct 9, 2017
5120BE0D49C266730D8D006F9A956C8DFD53Oct 14, 2017
12288E3ED6275674FC64C71A14CE0CA952DBDJul 11, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_ext.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_ext.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_ext.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_ext.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_ext.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_ext.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_ext.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_ext.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_ext.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_ext.dl.tb.ask.com_0.localstorage and Associated Malware.