Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:July 17, 22:52

Testimonials

Matt,

Thanks so much for your help. For now, this seemed to have solved the problem and found all the infected files. I'll keep you updated, as I know this virus can be very hard to kill.

Thanks a million.

Jason

File: http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal

Location of http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal and Associated Malware

Check whether http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 3\Local Storage\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 3\Local Storage\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal

If you find http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
3608F085DB6E5C4B2402A7561BA19E6A0F21May 6, 2014
36086D435195FFC1CC5514008DD7A104F841May 7, 2014
4640D42D67220E1673C6BC8B3C74381983C0May 17, 2014
3608FD16BB34DB4A82210A22ACA435ACA7A7May 20, 2014
36086A6D885D3FDB73DE3E76F6993D60B1D0May 20, 2014
36080F290DAC02B3E33D43D9965A1F156F56May 27, 2014
3608FF472CFB76217385849503BFF33E3620May 28, 2014
4640E60AB399A9B44D865AB7170E2C814D83Jun 4, 2014
36086992CAD88D80AAB161FE45B0CFB09781Jun 8, 2014
36085B0DBD8563983FA56954CBF1461CE54AJun 14, 2014
360890F000ED93B9AA81EC51DEA0FDAB882FJun 14, 2014
46409C32B1192D8F68212C8002F342F39522Jun 16, 2014
464014D00D2C7061A3E72052A22B82118447Jun 16, 2014
36082D7C406CEFD1D2A18A7D412923F419DDJun 24, 2014
36081854302844F8A50543DB2E1118396CF1Jun 24, 2014
3608568D39D09B4540ECA257539549CECA9AJun 25, 2014
3608B937690FD53B293A872C8E4466156A24Jun 28, 2014
3608A4E4A6AF38FE1F4CE7635F828C6EED85Jun 28, 2014
46402F0B3924DBC20602DF4E60926F3B8DF3Jul 4, 2014
3608F14543503923E69DCA2D0C279C212BEDJul 9, 2014
360815D35DA89F9338F23BB164BC3273916AJul 9, 2014
360863AD3A7A2CCA7AF5F5E533D123691992Jul 12, 2014
36086FCD2E313BC0252F1214A201D4EE4171Jul 25, 2014
36083F3691D36E6755FD0FD66E9492DC5076Jul 25, 2014
4640F843E90322A550D44B8E0114F2647604Aug 6, 2014
46404841A0B215481B8B9BACEC2D6C41D4BDAug 7, 2014
4640F8DBE673934C2F76CBBFD208A1B558B2Aug 16, 2014
4640E7F459DD5357510394C465B99C552577Aug 17, 2014
464023A08127E1EC002C32D26FC05DA7FE2DAug 19, 2014
4640C4DC6FADBAC21C05F397543F6B675BDDAug 25, 2014
4640E0EEC213A16DBFDA27A5A968FB11111DAug 27, 2014
360880769E473F45420DF5CD1A13B3E6DED1Aug 30, 2014
4640A0F3764FB3EEC661D494A11DFD188B45Aug 31, 2014
360883A5BE76B4986F517AB47800477249B7Sep 3, 2014
36087826E24580B37BB3FAB52633F096FE9ESep 4, 2014
3608642F9DE186B1B38B651B6D1091169A19Sep 9, 2014
3608AB61AC89CF013147C2803716AF97A6BCSep 9, 2014
360819E942E78FD8A1F0B47BB85D71169A0FSep 9, 2014
46401DF47AB3B0005DDECBF1CB210683C88BSep 9, 2014
464088AE046CED6B4F8EE73AD5365A43AEA3Sep 18, 2014
3608B31ED09FD281BA411FC31260EC2945B6Sep 20, 2014
3608B4CA16474CF3799E245B40673708ABD6Sep 22, 2014
46400F821C00274BF2CDCC492981929625D6Sep 22, 2014
3608A62634BFC91F856B18C7079981379FFFOct 2, 2014
4640CA8CE8BE3524D0CDE47B107B91E0FE86Oct 6, 2014
36080A613D2BC58A92993ED3840D9AAE997AOct 8, 2014
36086677072A5F1135F10EC0AD080758DA83Oct 14, 2014
36084D141E95DE54D9BC6622036BA627D786Oct 20, 2014
464067D5A861785DE2028B26105684A3F6B3Oct 24, 2014
3608DD54DD9D085615723895DD680582233EOct 27, 2014
36087C860E6B78F0F29563C586008D354A7BOct 28, 2014
3608F49E6A39EC21C2C34D83450B0A82CE3ENov 3, 2014
46401475AE6D24BBDD36355D4ADA95A2B35ENov 4, 2014
36089923B12D15DA4CC01BC6924F7B771522Nov 5, 2014
464076BF84175B6254F9DD6798FD9AA2BBA3Nov 5, 2014
3608FE1382D98310C71195905AB9BD81AA4BNov 8, 2014
3608B9F7B5229CE2E99B442C1C0417D8C18ANov 9, 2014
360894464867910DD332AAE3B09B42C734D3Nov 10, 2014
3608AE53EBFEAFACE1433D27E29B80C89A69Nov 11, 2014
36085871B25D5DA65BB69BEC70ED596D0409Nov 13, 2014
3608032945AB92E6BD40DBFC31398CDE00ECNov 14, 2014
3608422E3D93E9CC8B34D3B13337F558087EDec 17, 2014
3608CBFC11C9A28B61AE2ABB5D79814B1F3BDec 28, 2014
360808FD01F9EE1D4CA6E708050341BA1329Jan 11, 2015
3608F2CD6BAA101C10F7DBE2BD4220F1C15FJan 24, 2015
360820761D15BED9240FE5C375D2A5521328Jan 29, 2015
4640EE5FE591E31224F3C3F208556169C850Feb 2, 2015
46404AB7147C49DFC7414F2EE1D470D9C9F1Feb 8, 2015
360844AF8A36E0CC0311ED9BFFEF3FD375B2Feb 8, 2015
3608563F58B2420502F53DB000D77A0B078CMar 2, 2015
5672DDA1CABECBCF6BE0A76801B296D94F54Mar 25, 2015
3608D1A3CCE53B80541EA7AAC70BCD83682DApr 2, 2015
5672F01B005D185E7C577FF593A5E4CB5CB3May 4, 2015
4640429212E6956713BFB1B51508E72BC135May 6, 2015
3608CEC6832524CEB3AF85112856DD5459B6May 7, 2015
36080B87430881B1BCE756BA90B2F09A2560May 11, 2015
36089C3DCD8B508ED1A0136030DCCCBAF06FMay 24, 2015
3608B578D63FD85EF9C80294A60ED2BDA5BEJun 16, 2015
4640D17C7599ACF8AEE3C94FF51B6403AB78Jun 30, 2015
3608229CA123C0C1E2D481501FAC8E63CBEEJul 19, 2015
360846157E86F80EFAA2177C49E4C6744684Aug 22, 2015
36085B1D9361A563712D0508974EC36CCBE1Aug 24, 2015
36089959DBCFC219B998A571C9D58FE377BCSep 1, 2015
3608A600C9A1096EB628BD8C8BCF9852F848Sep 25, 2015
36083AECC1E4D2C8E48618501562E7B7DB78Sep 26, 2015
360889E3FAB6736978879B99872C06A2C023Sep 28, 2015
3608F601472F4EC65DCD3DE7D8D1A67AA6A5Oct 5, 2015
36088DFD4C5475857DDB3E8BA89E1556FEE4Oct 6, 2015
36081BDE44DDC5B8B95FEB4E4EA149555604Oct 8, 2015
36088B39A34DA259F7A49AA749F247FEDFBBOct 10, 2015
4640ABF69714F79337E91D5EA777440977CDOct 14, 2015
36088525BE79C0CB23D71AB769B070136258Oct 18, 2015
3608560951A58E9DF5829F57B096F2FADE8CNov 13, 2015
56721A5486512DFF94BF99D39A61B24BFB46Nov 20, 2015
3608F76782B3A7E6E1E8C8E8DA1F1F4C9395Nov 27, 2015
3608210C5A6227BFA36C560389DCBE05938FDec 14, 2015
5672C2853BAE6C70AFEAB8E0F20FA5ECDEF8Dec 16, 2015
3608C97D802E22E95ADC8228E20FB1EAFEF4Dec 28, 2015
3608EF3F3589EEDE1D9DF3A942CDCE93A9C6Dec 29, 2015
3608D517FB230B7A6FF82E451B1E2C048428Jan 7, 2016
5672F6BFE825B0DEF6F6B2EF04F6A57E374BJan 8, 2016
36080D6E786C5BB55DB0F8D40C6C95735539Jan 9, 2016
3608F083835F14D80D5456BA83BEF8534110Jan 10, 2016
3608CB53265A3DE1E5C0D5A35F687472577BJan 18, 2016
36084D515935E49537B9BC4AA59BAA5BDDD0Jan 30, 2016
36088F163DE13FDF544303BA9E1CA6EC5F06Feb 1, 2016
5672A0FBB0815C546D4810C7835E3803CDABFeb 2, 2016
3608659D3AED7511F549CA64345AED083BB3Feb 4, 2016
3608E91F58A857DC63BD84589FAF53808FE7Feb 9, 2016
5672D3E5F50F100F43744B2125887484288AFeb 10, 2016
464087B55314D974480D417557C8D524939CFeb 15, 2016
3608AE4C5699D2CE8871CC18015D6A9B2B7AFeb 16, 2016
4640F5FF95C91DD13871DD58E1A0D379ED12Feb 16, 2016
3608639ADA6125C58DA338882E4BA5265943Feb 17, 2016
36083B0B3E5A91966030CA292D535AF4378CFeb 18, 2016
56723452FA08AB6712B1DB621F9522B4D295Feb 22, 2016
3608B4911AAD204641693BB9CA3FBA13E7BDMar 7, 2016
567282ADE55EE36EAB0C9BB3CAE3AFDC8FA6Mar 23, 2016
3608388B0895FB487047408D4D85ED696FC3Apr 1, 2016
3608DDB7BC4FD87D48EB8D2D14DCB5821EEDApr 8, 2016
567229448A8C47F040F90004A9086C9EA78CApr 19, 2016
3608C804C1BC3F127CCA75F710D1DB70F8BDApr 20, 2016
3608DFBA09DC0337FAC513F4AD04499E1F84Apr 30, 2016
3608B8FC237D8833E1E3EDB753733533B909May 3, 2016
3608AB938F4635E368D55C59FDDAE8C9953DMay 4, 2016
56721616CC8D4B74C472D5A00B23C1BB0DC6May 16, 2016
36084CC7BD87F2EB49ED18543F677F829CEAMay 20, 2016
3608C0D5EE8C88D3733921301B3461E704DEMay 21, 2016
360860680EBF1E84FEE4E55F0AC9375F5D0AMay 23, 2016
36081ED65B51AB4F2156D806327236AD285EMay 24, 2016
3608CAE8902CE3EAD6D440DA138771929EE4May 27, 2016
3608095713E1657BFACA617D0B2AC16C4D9DJun 8, 2016
360818380257E469776F20DCE23CDCD86349Jun 14, 2016
36082DD0FCA4BB1BDA893F471D0503BDFDF4Jun 24, 2016
3608706939896EA94DCEE7409A2738A8C873Jun 24, 2016
5672ED3F3FD6255BC7595260CE60AEC3D80AJul 7, 2016
36088999C68D593D0A30A3DB2DFE412E474BJul 12, 2016
36085B712E98267FEC6A4C02698A9B6712D0Jul 12, 2016
36089E41C87C4981F4CFCC349E8B8B53A55CJul 15, 2016
36084CD699E2096048EC178B4C299D2F458AJul 20, 2016
3608BC85CCE67A31B17CD79D0C16445E83DDJul 20, 2016
3608D42DA6E800C8C2D719756EDD89E0BDF9Jul 26, 2016
36083992AD464B4077881BCC4F9F642B020AAug 3, 2016
360848C6DF75F510385F2354CD85AEA6337CAug 21, 2016
360832841F61E08CB6717BC9C308467786EBSep 6, 2016
3608DFF410744698D0BA1367D6663A405B3ESep 6, 2016
567295A565DA7E10F7D1AB13F1FE9140EAE4Sep 6, 2016
3608756CB1D211E294ECB40071CED34007ABSep 28, 2016
360898771C04C4AC1DAF55E8DF0189672A91Sep 29, 2016
36082BCF280C59B36891192103534EC538BDSep 29, 2016
4640520DC607A648F467971C1C2D9042B266Oct 11, 2016
3608FB6D7FDF5A37C5C3F7AC13331958FB4COct 20, 2016
3608951A27E6E2AAA4C5F0CD8F5D6A1F5A69Oct 28, 2016
56726B6E189998F1B73A5918E9FAF708ACFDNov 17, 2016
3608444AF2D40EEE3D30BBF22BCD0E886C8BNov 18, 2016
3608AF3B76945D81E9C2E37E34E6EB8A271ENov 30, 2016
56725BC40C810D8CD9AB02ED9215D4EECF5BDec 5, 2016
3608712639E49CE71923DE7E93B901FFCD5FDec 7, 2016
3608CEFD6B79055DEDAF75C21675A66FE80BDec 12, 2016
3608671DDA32EF2AE2D16EC0345D4FAB2772Dec 16, 2016
3608207EEBA6DB729872B6A6E88C05945687Dec 20, 2016
3608FB5AD4E6191533F217B501F10E834EE1Dec 26, 2016
464033765A4B0D915E81FD43CE0B75C92000Jan 16, 2017
46404BD05DD1DA56C14BF23CD825E1581D61Jan 30, 2017
67044F31446F09FE9832EB94C891EE230517Feb 16, 2017
3608E809FB0CDD480B82DD1B2281F6E7BD7CFeb 21, 2017
7736B47EBFA03F62A9D29888A0C64E65060FFeb 23, 2017
36083819CBB4EF569323F1688C0191D862D0Mar 3, 2017
360878BE67B956F5C83FF1E01EBD8F474EF0Mar 11, 2017
56720AC6480C4CEE00A37A5BE6A7951F0A2CMar 26, 2017
67049191961944E55D041526292E500CC578Apr 23, 2017
360865D7E7EF4BAF59D814E1A42E39D1F694Jun 3, 2017
3608063CB3001E2CDA586DC331B24EAE8BD1Jun 11, 2017
3608E1EC48219A314AABD23C200A22C36FDBJun 19, 2017
360852D12F8BD5F6BE4EAEB24018AE8DAB32Jun 26, 2017
3608034CFE383810E389E1C0F1F978AD62ECNov 4, 2017
512BF619EAC0CDF3F68D496EA9344137E8BApr 6, 2018
3608FE671751FDA26FE112222715EF8E7E90Nov 3, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal^

  1. To enable deleting the http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal. The name of the first found registry value referencing http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal and Associated Malware.