Exterminate It! Antimalware


Known threats:700,086 Last Update:March 16, 12:51


Hello, I wanted to say thanks for the time you guys spent on getting that Vundo trojan off my computer.

Thanks again, I am highly recommending your software to friends and partners because of the extra effort I know you went to.

Michael M.

File: http_internetspeedtracker.dl.myway.com_0.localstorage

Location of http_internetspeedtracker.dl.myway.com_0.localstorage and Associated Malware

Check whether http_internetspeedtracker.dl.myway.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_internetspeedtracker.dl.myway.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_internetspeedtracker.dl.myway.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_internetspeedtracker.dl.myway.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_internetspeedtracker.dl.myway.com_0.localstorage

If you find http_internetspeedtracker.dl.myway.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_internetspeedtracker.dl.myway.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_internetspeedtracker.dl.myway.com_0.localstorage File^

File SizeFile Md5Last Seen
51200F56071E5B4C01D82A6313BBD06652BEJun 30, 2015
5120EB54E609460315874BB86291BBF94864Jul 16, 2015
51202A11B2EB248DDCE2DE0CFA8479366571Sep 8, 2015
51203118CC4498E2D4CE301403225551FD5AOct 14, 2015
51204B7518832BF36420DB9DF34234EBCA21Dec 18, 2015
5120F245058145037177C613319BCDB8996AJan 3, 2016
6144F22FEDDDFB22C937594D4F7AD5BA8491Jan 7, 2016
61449A3F6DC07AAD4DC1DB551F33BA1672B1Jan 9, 2016
614406070B8789911ECAF43B2CA5E3DB658EJan 13, 2016
6144BD1065090BEF2CA7FC505402C4478994Jan 22, 2016
5120576EA70357486645D35476B44D215379Feb 2, 2016
30721C1B520D5E02C4DDF99DA1ABCB88305FFeb 4, 2016
5120702C7A3B71FE916524EB35BB082721CAFeb 11, 2016
30728300177C7D7713502EC0C90CEBD7D3CEFeb 16, 2016
5120F3B7E89C66AB40DB99561091305BC861Feb 22, 2016
512046CC4ADF5B051729E0B5723E8978D4A7Mar 10, 2016
51203196ABC0FB01F75E177F11A608FC4027Apr 4, 2016
51204844560F28C4773CE21A4F07647AD1A6Apr 20, 2016
6144E538AAF4CCE8ACA04A62224696DED3F9May 13, 2016
5120B7A8AE1A62F1A888E7F2E1EBDBD973EAMay 14, 2016
5120E7798586678E4C466040AA4540B49993May 18, 2016
6144C2702B7137C47BE89C0F4460A62829A4May 22, 2016
5120924E8E317DF77E54480F08284B988879May 23, 2016
5120810294D60BEDF71949E7AF71C3C6F54BMay 25, 2016
5120794996C23AD86B98FB8EF16F81DD45DCMay 27, 2016
51202133C0815779BD1F2891454FBFF3856BMay 29, 2016
6144246B8E56C431DC46778517309EC161C2Jun 1, 2016
716869069486AAFF3CC0AFA0C690BC519EC0Jun 5, 2016
614408F23EC48F32BE52C7E1785F1077110FJun 8, 2016
5120EDDB51C4DCF3EDB10EDCA48D12CCBEDCJun 16, 2016
5120D9AC5912F54B8C0F5C96016732F5E0BEJul 4, 2016
5120266E5D45974540A3A616E64669FE36CBJul 4, 2016
614424B8485BC4B159B0740EA6DD687723A8Jul 19, 2016
61449F1793132A23BE38933781844FA4A60EJul 24, 2016
614401E390031F178AA951D939EFF2A0F0F3Aug 6, 2016
6144A9D7C0210222672A17F6F145A9FF0ADESep 6, 2016
512064DAD6AEF98ABDDEFC954BBE0C4B6E76Sep 20, 2016
6144B81C3554B1A21C552195A4CF4FE6BB2ESep 22, 2016
61445A7E242BD118A091BC112BE71AF60249Oct 10, 2016
71683720D39D345F9DBC8B77F0F04A842E10Nov 2, 2016
3072E9DBAAC291826BA892B1C5779CA53AB3Nov 14, 2016
51206BF9A6B4E8BE69CC76E15C4300F973C1Nov 24, 2016
614476C7BB68AD4AEAF42E75B213551DCE07Dec 18, 2016
614483375CC12668858D5C49809A41C46C81Dec 19, 2016
61448C7EAB1A5DED64BD0356FE4C28DEA177Jan 9, 2017
61449117DD2A22CB9FB4236A2F79E0561BF7Jan 12, 2017
61445D441F052B3EADDC50B1DF5036CE24AFJan 18, 2017
71682BAF86A275EFEDE47A157B29FE699EE1Jan 24, 2017
7168D3D792AD383AF5FA8B7A5B49BD4FD6BEFeb 4, 2017
51203200D3687A858E539C9E4B3F030C7B48Feb 10, 2017
716820FE97DFC4835CE57CBF084253993E31Feb 18, 2017
7168A4657631E829D7E0621BB9F29797BB6BFeb 24, 2017
51207A4C2C02CE231F3755A5BD10C579A08FFeb 24, 2017
6144830FAD1CB238772E040B5FC14C3BD7EAMar 12, 2017
6144E68C801898BD655C24693692197164C0Mar 13, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_internetspeedtracker.dl.myway.com_0.localstorage^

  1. To enable deleting the http_internetspeedtracker.dl.myway.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_internetspeedtracker.dl.myway.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_internetspeedtracker.dl.myway.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_internetspeedtracker.dl.myway.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_internetspeedtracker.dl.myway.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_internetspeedtracker.dl.myway.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_internetspeedtracker.dl.myway.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_internetspeedtracker.dl.myway.com_0.localstorage. The name of the first found registry value referencing http_internetspeedtracker.dl.myway.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_internetspeedtracker.dl.myway.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_internetspeedtracker.dl.myway.com_0.localstorage and Associated Malware.