Exterminate It! Antimalware

malpedia

Known threats:696,754 Last Update:April 09, 23:37

Testimonials

Having wasted better part of a day on a Vundo infection, which none of the antivirus/antispyware solutions I normally use came even close to handling (one of them actually compounded the problem due to a partial fix, causing all browsers to seemingly lose connectivity after a few seconds), Exterminate It! fixed it in a single pass and one restart.

Nothing short of perfect. A few dollars very well spent. Thanks again!

Laura G.

File: http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal

Location of http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal and Associated Malware

Check whether http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal

If you find http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
360825104AC7D297768063444EC09110F439May 20, 2014
3608E9B3DDBF22A4E47FEB0C280EEA0E00EFJun 12, 2014
3608BD4138561ED671BC0A25D6388F3A46F4Jun 29, 2014
3608AB28291948584328E878D7486B6B64D2Jun 29, 2014
3608C96F1CED3CF10D3B51B147CEC0F3B845Jul 5, 2014
3608D3D462BB087FF7BA7905EEA3347DDF4BJul 8, 2014
3608752E8B50AB894A024B293EB028EF829AJul 10, 2014
360895406427317D04D07E832CBC328BA8FAJul 13, 2014
46406DD6A6A82C5D43CC8641CDBCB904DE19Jul 15, 2014
3608574C62CE5EFA5422ED8DA76ABD0ADBC8Aug 2, 2014
36080BD7435300C6B2795F5042A691A0DF1BAug 13, 2014
3608C8D4A05845230D95D3AE399234E3C4A5Aug 28, 2014
3608A4073C3EF46ACB7AE6D08F0641C73C74Sep 3, 2014
36088B50F48516C1FC69F07FAF1DBD238AC6Sep 18, 2014
3608A780367C549AD60159501F24A0B17E98Sep 19, 2014
4640FC9B4416C0A86057DFA68488BC75BC04Sep 21, 2014
360847FC49458AB18BED3132FA41D96A1F2ASep 22, 2014
360859CCCC69DE7CF35F3E56C54A4A126027Oct 8, 2014
36088CE0EF749A90097B7C3F1CC2509DBB02Oct 28, 2014
3608F32D9C09CF21996A647B01B1E5B08A51Oct 29, 2014
5672050B525FE21A61BC5F7D239742962664Nov 2, 2014
36082165531F31E9FF62C0B1C96A02A97D81Nov 2, 2014
3608C3387D0C79DF21FA285B6F2513A33A1DNov 3, 2014
36082076794F10F26DADFB9996989774407ENov 4, 2014
3608FE22EA814D5B9B2B5D8EB8705BA21229Nov 8, 2014
5672D94559CE491DACC538347DE5A27EA9A7Nov 9, 2014
3608F8C9873F14503F1494E7BF4A783823ECNov 12, 2014
360896AB96BFD7412A73EB72565A8630780CNov 25, 2014
3608D877E40526667F3182ADEAAF9C60DDBFJan 8, 2015
36088A94F1A6680057443394D8CACA179131Jan 24, 2015
3608ECDC7C2F52B37F45DC487C20BBCB12D0Jan 31, 2015
3608446420352041AB4B50B90E78FE919651Mar 18, 2015
3608DDF2522D3F3C226F5FAE111605C080A3Mar 22, 2015
36083EB4F3ABBD59D933AFD93FC831841BEAApr 12, 2015
36087A6CA39B99AFD1A1E8857FC635866129Apr 13, 2015
36085D49DDBB591E01165EC6BF0C3E53B7DCApr 25, 2015
87680EDCE4D67D53D806307B02C3D8CE525FMay 3, 2015
360800C582DCB1AC0EECFB471C9F9D13692BMay 20, 2015
36087C0A0093C83DAAFCDF2F44621878DD60Jun 5, 2015
36087D8FCD765DB32AA1291FE30D7DF50CA1Jun 22, 2015
360854EF0C5B9263C68079892A91D9DC687FJun 30, 2015
360839384551944B03C5FC3DD2A59DA7D73FJul 20, 2015
5672DEC90A2E8BEC7242A85BF1622F31ED4ASep 6, 2015
3608E2DF9D8920DF616D61834E8D96FB879BSep 8, 2015
3608DAFDA4FFAFE34F5BE1CF50D86A1D3F77Sep 27, 2015
360898DF930A90274FDECACEB5CB1043E421Oct 6, 2015
3608A0AE9641FBC71F4E448366D8B2F8B63DOct 14, 2015
36089DD33C853214CC09D1ECCD53245E1001Oct 19, 2015
360844F9154AD0F2B1F93DBD1B88EF71328BNov 2, 2015
5672FF938F732C9C57F62DAEDAC13DC621F0Nov 26, 2015
56726750722106CF5FC6927906B3D59549BFDec 16, 2015
360858FA79D68D0CDC6D93E711B6CD08A745Dec 24, 2015
670468E7AB7F0234CA5FB9EECE9D97232F2AJan 7, 2016
3608535F1FC2BCACA86E299458F99ADA2BF4Jan 7, 2016
5672A4FF492F2BAB9BD58ACCD7B1F882919BJan 10, 2016
3608279A96471A20020DDE37F8EB4F60DAD3Feb 2, 2016
5672E1D138A57D8566C7C879FF26C8AD8BC6Feb 9, 2016
56721717A17732774D5512D5DF90CF5B3AE5Feb 22, 2016
3608FBC4B21DAECE92ED8D3C04641E8FA970Feb 26, 2016
5672504C8D0DB2693E2075C6780006338FA4Apr 4, 2016
5672255B4ECB8FDF4425E9E7DD30894E479AApr 15, 2016
360863B0CF9A98DBC7595CDAB40951F90CACApr 16, 2016
3608B51E87FE6DC032832D1E9D3384DC876DMay 4, 2016
36084E6B256268731EB0C179C4CF4B1DBC60May 12, 2016
36085EDED37462516B05F404B0B4F1BF3A2FMay 25, 2016
3608C1A8D5C3082DEC91FE7F1F1895A1F427Jun 6, 2016
360801EE5F3960F45848E051359E09180A01Jun 21, 2016
5672DAF12E7343EF5BF0501E09A90FAF1B52Jun 21, 2016
3608FB6515C83D492FD28A403979E205F79EJul 3, 2016
3608855C4D244F3B5794952B193C6497F615Jul 9, 2016
4640BFAB221463432CE7AD96AEA0FE906F97Jul 10, 2016
3608EF357334CB0F2AF0D362AEE1EB03805EJul 18, 2016
4640D3BB06340D2C8124B01B364525689817Jul 31, 2016
5672FC198F7F93641CC583931013714F34F7Aug 3, 2016
5672DF7515D182C0275887814C59ABB80AEFNov 1, 2016
36089EF58C705406B3B2E250A5540C2D5BA5Nov 9, 2016
567266BC9543AD895054DCCAE36CE7BEC171Jan 6, 2017
3608B908BB5A33543FCF2E4D2CA39A14CDB2Feb 7, 2017
3608B4DACBF23DA5BC7FAD17727EC887A661Feb 23, 2017
5672A4B55FCCC52B765FE77C6BF054B94C27Mar 4, 2017
3608B72BEF49B5377A26F02144258B21E841Mar 5, 2017
3608C68E7B4D1B09F0C022E9C12B09687246Mar 29, 2017
36082F0DC4EAA3AB538505F1F9069314D1FAApr 28, 2017
36086E2560D4C8BD8393E203282E98B17350Nov 4, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal^

  1. To enable deleting the http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal. The name of the first found registry value referencing http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_internetspeedtracker.dl.tb.ask.com_0.localstorage-journal and Associated Malware.