Exterminate It! Antimalware

malpedia

Known threats:685,730 Last Update:November 03, 14:34

Testimonials

Thank you so much for developing such a wonderful product. I tried everything: PC Tools, McAffee, and the list goes on but nothing worked to remove a whopping 706 infections including backdoors like exterminate it did. I will recommend this product gladly to everyone I know.

Austin J.

File: http_filmfanatic2.dl.tb.ask.com_0.localstorage

Location of http_filmfanatic2.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_filmfanatic2.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_filmfanatic2.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 3\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_filmfanatic2.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 3\Local Storage\http_filmfanatic2.dl.tb.ask.com_0.localstorage

If you find http_filmfanatic2.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_filmfanatic2.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_filmfanatic2.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
40961BDAFD7624C96AD51B4ED784035A97EBApr 23, 2014
4096807D3E735CA21B3D844C96687D1F0A8BMay 21, 2014
307273A658CE66E64685A1378AFD7519C92FJun 1, 2014
4096B99262DA18599D3467119D3B581C3D20Jun 1, 2014
4096CCCC35C7E15F90398E5D4B9BE52AFD4EJun 11, 2014
409631B2B8DA15A1A3E18105BF7D07F1240DJun 11, 2014
4096BD3A7F8E054E4947D0F609E05C5CB974Jun 23, 2014
4096D79C6DF23498FE3AD0D8784ADEFE0D4AJun 26, 2014
409662315BB28698FF6A6168828082231F41Jul 8, 2014
40968453769E88B3065793FAF624D789D591Jul 13, 2014
3072D85BCA05E0F80A9C41352D4DB6629703Jul 20, 2014
4096501C3A7DC47AA4A1E2A93C4F3B198DDAJul 28, 2014
4096D18A791FAC27BA70A860FB00C709C6E8Jul 29, 2014
4096905114C3980B7584E993E27B877B5410Jul 31, 2014
409644A42F45797A9DD0A3EC8D796089712DAug 1, 2014
4096B90222A05B13FEFD468734A9A79477E8Aug 1, 2014
4096834ED06DAEB9D02B85B1483397B34878Aug 4, 2014
409651320997A3E23117087888F881866D5BAug 8, 2014
409640A6D798C105E572B75B883E1427F45CAug 26, 2014
4096179156008BFFC0434D2A5F713F418185Sep 2, 2014
40969F2F8E5C5A61B9E96B9EC85E122A3584Sep 5, 2014
40968B096BBED3D35FF14343526F131263CFSep 12, 2014
40967D798B34215D3CA0A4540FCB8BE14DF3Sep 16, 2014
3072E06A6333E09808B0BE116C32425031C5Oct 6, 2014
40969CFD2AAE9F985E224A90510F6805DEE5Oct 16, 2014
4096B82A16527C26B48370CBC7E6FCF32A4AOct 20, 2014
4096B50EA97AF79FD43D7AE8D05009B5EC25Oct 30, 2014
4096147D4D544C6171316C6E3F4233ED6B71Oct 31, 2014
40962330878B795A9296699CD0AB0C6EB91ENov 5, 2014
4096BD7AC3D3831F54D7BDC7A7028D949D34Nov 6, 2014
409663BF4AB15871F847F521DB98C089DD0CNov 9, 2014
5120E1F3EE02A947D3FB97163C64E818F5CEJan 23, 2015
51208DBF5D85B8723C013A6798168CF88EB1Feb 18, 2015
4096231413BB018EE7AF5141C1B8F9E4B69CMar 29, 2015
409651406482ADEF0A0452489BD8FDF23EA4Apr 2, 2015
5120D2F2AA6A6B2818A96D15E45BACD74BB1Apr 17, 2015
4096A53752E28D6EF218ED2D16265444C7F3May 6, 2015
51204F511B197564B8A92D8064EBA730F68DMay 11, 2015
5120CDD588B52209A210DBEB7E9D45EE2B0CMay 12, 2015
4096E6F03A3CD3E5AF7C8079F7F38A206226Jun 1, 2015
5120FAB5945E21E3162EF4F14DDBDD7B295EJun 30, 2015
5120BD6E1999C874AB3A844500141A9C9AC3Jul 18, 2015
40967E8F3366AD13376C271725582E5B9D64Aug 21, 2015
512026613F37E396B93B59C60DEDB905DE13Sep 20, 2015
5120075F3250A0F215D7821E56B318A7E602Sep 26, 2015
40962973D1D0A7343031EFFCE51A663E8D87Oct 5, 2015
512047C990E0567B67771496A77889914E2AOct 6, 2015
5120F4A8CC0E8C16092978E371FABD0FBD4DOct 15, 2015
409648F7E9615AB881E5EA5802AF88E516C1Oct 18, 2015
5120D9949B0AFAD05614C6CB1E8900EBAB99Oct 27, 2015
51200CCABD1E4B7554621EBC12C9F538198ENov 12, 2015
51206F43AC023D3F668BBF36336589D8C107Nov 20, 2015
5120FD7B1F3DF4111DB28209B97AFA731354Nov 26, 2015
51202618578C5E683C2617C7E0103D04710BDec 8, 2015
5120E8C6844655AC10E699B5F5A744C00347Dec 15, 2015
409608765E8CF0D75568DABB5F16BF0A5407Jan 7, 2016
51203A0FCA24E272580FF4B0905856C23F85Jan 9, 2016
512078E7097C08D9E56556DD0E218B54AF70Jan 19, 2016
512098E55DC50F12BB22F86261C8EFBC5122Jan 30, 2016
5120FACD74D115FB6456BF02351E7DCC8D14Feb 4, 2016
51204F7A553289284DF9F2E578D94AB3CC7AFeb 8, 2016
51209E2EF9376820AB2D2F9812C8721371E3Feb 9, 2016
512063674107D67AB0D6B036512714CF4B1BFeb 10, 2016
51202B69935E5CD1A0A99438FC82C502FB3BFeb 16, 2016
5120339D50D7AB86CD569331789C423E71A2Mar 14, 2016
5120BAB57378C32661352564268163E37CA0Mar 15, 2016
614410F12936676A8497EF66ED49CB558B7AApr 2, 2016
7168F7C1F1B5AEAC41075C0CF50F82DDABEDApr 7, 2016
5120B27EF60ED9CF5D023FB5F33E3C6FA50EApr 18, 2016
7168100475DF47BFD9E4997F1A509C991166Apr 23, 2016
6144DE8B48A4A3DB5649C17BDA9B8A4AAA01May 9, 2016
5120F2B7A2DF1C76C1711F39E19440138C0EMay 15, 2016
512015CF33C7D9ACFE0B7E32469589631CE8May 16, 2016
5120DDC9AA09015BEAE3005658958AD85C62Jun 6, 2016
51205502A4FFACDC4B6FECC907126BA63158Jun 8, 2016
5120737E970D282347827C34C0EB951A3176Jun 12, 2016
51205C56274515C563D2E504550778B98E21Jun 16, 2016
5120C367D9FA3C6B06B708669D91EB985757Jun 23, 2016
6144F349B8AB8579EEF35157DA34DD307E00Jun 26, 2016
5120C1B6CD2EAB591105D2907B62C5662FE7Jun 27, 2016
614414A9B12693D10B2CA8378D5B6220A730Jul 2, 2016
6144E5CB5354293F0C276CC93BAADE939756Jul 11, 2016
51202124D1DD36C7E724929C95AF9CCF9B66Jul 24, 2016
5120B228B9E32F7F2E7F57D8AECF151F5352Jul 25, 2016
61442D85A39CEB72A1F23B68FEC1EE71D91EAug 6, 2016
7168BDF33B3B0A9A367A42BB1248AD0D6812Aug 14, 2016
51207C3DBB317E35F329E05D5ACC253FBB9FAug 29, 2016
5120B1FE7053024779219B0D6E063EECCEA8Sep 6, 2016
512021BA6A4ADD631F9381D1833E7CA4CF14Sep 8, 2016
4096DCB8667CAAC1FDE453379B9D42FF6CC5Sep 15, 2016
5120EC4FAD99CFD56728D6257D066198D7CASep 17, 2016
716828AC6BE447543CCBB79DDC1632B697B0Sep 18, 2016
5120B5AE06D3597117FB940287AA104DD0D0Sep 25, 2016
51209C0ABEE91EF4CD1BBA5C403B2A59881ESep 27, 2016
5120582D56D785E106CCFBFD3334077D1E74Sep 29, 2016
51205E41E212074FFAF1EC1062573A8BCBE8Oct 4, 2016
5120B3F6AF35D98D21E3F512369B247A6721Oct 10, 2016
7168662771C6D768C91A8ECBC3539DC687F0Oct 19, 2016
5120EEC8E9F011A26CA6ACAD9CF32738CED4Oct 31, 2016
51209FC812680F70DB08571E2EE905B9BE5FOct 31, 2016
512076D148356E04998BDF5ACC71AEDD955CNov 11, 2016
7168859173C86160DF3F2439E14447DDFE2BNov 11, 2016
7168D3855530BE5F3DFAF83767627833C0ABNov 18, 2016
512050587B4958CC5E5ED5DE5E66DB0CB8BCNov 19, 2016
7168B62B761378B64E550133D9B1F1B69630Nov 22, 2016
5120F8765FABA97AB11DE7BA0004896DC1B8Nov 22, 2016
512022EF41B593937B3023E479F329524D9FDec 4, 2016
5120ADA3CC555F7D8E7CD675B1EE3AAE9AC6Dec 13, 2016
5120FCE8D382DDACB566CCBA67E1BA043166Dec 15, 2016
7168BEB90B149377D2B4C99AAC82CDEB0576Dec 22, 2016
71688B6933C9A25EDC4DA98958D5F4FCF7C7Jan 15, 2017
51206724F4357B22802AEBE97FA42749396CJan 17, 2017
8192A4EB3347098DC9C0FD4E677C4F31E750Jan 27, 2017
6144AC489C5DFF05004891B1FDC4EF0668FEJan 29, 2017
5120D1463DF466D300E3CAE9DF86C8BFFD8EJan 31, 2017
71680A0831EC86E664DF538C4F113764648EFeb 12, 2017
6144215D53ACC0CE159AF13314E29F426D9CFeb 21, 2017
51208C1A6A99303C985193D0D8EC8184420AFeb 23, 2017
51204CAC36F677C0BC8EEBE437C9B3006955Mar 17, 2017
716814DE1346C5FA6C362E77D9C659E17B2EMar 19, 2017
716882EA795A30520162F0E46D6DA9DF8C79Mar 23, 2017
7168F1689E046A0C6186F3402C339DA930B5Mar 23, 2017
614426A604B60AA0332616A32C3BCCBD0970Mar 29, 2017
7168046431CB482D96AA49A3A1EDB9D1F339Apr 9, 2017
51206C255683CBAEFA77DB7D3E0269467E56Apr 9, 2017
7168D4AB5283F9EC1F2CC438E2B32FA443C1Apr 15, 2017
409649F957507956DB870DE184C8008C2769Apr 17, 2017
512084F098CD422418989676C913DFD451E7Apr 18, 2017
5120A81DB107E962E66B76FB08B4AE889122Apr 23, 2017
7168389A9C3DEA48E61C2882DD56D66BD7D3Apr 27, 2017
512019E3AFB1D6B09F91807BDF114F652577May 10, 2017
6144D60ABAA6B081F1327491E7316F0E9FD3May 13, 2017
61448B14E0F4880D2C8930E98B141A1ABCD6May 17, 2017
5120D2F625DA1C6FA09A3DF060296001FE34May 21, 2017
71681F4386EC8F866A7387D72CACA6550424May 23, 2017
512027EB4D11CE2E2B9CE753D04ED99704E9Jun 3, 2017
7168578676325E50E699417E07DA4A09A128Jun 3, 2017
5120967F830FE495B659E3F181519151F5B1Jun 7, 2017
1228833D0CAC56068CD4FDBC49A9E80D02B84Jul 11, 2018
30729D73523F290421395D65C7B2D8E3ACBBDec 29, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_filmfanatic2.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_filmfanatic2.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_filmfanatic2.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_filmfanatic2.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_filmfanatic2.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_filmfanatic2.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_filmfanatic2.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_filmfanatic2.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_filmfanatic2.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_filmfanatic2.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_filmfanatic2.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_filmfanatic2.dl.tb.ask.com_0.localstorage and Associated Malware.