Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:May 26, 18:52

Testimonials

Hello, bought a license for your antivirus tool and I must say it was totally awesome! It cleaned TDSServ trojan which was a real pain in the ass for the last 8 months and it also found and killed Virtumonde together with all its files and a few other low level infections. I was already thinking about formatting and losing tons of information when I found your tool on the internet.

Thanks and please put this message where people can see it.

Andrei T.

File: http_myfuncards.dl.tb.ask.com_0.localstorage

Location of http_myfuncards.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_myfuncards.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_myfuncards.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_myfuncards.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_myfuncards.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_myfuncards.dl.tb.ask.com_0.localstorage

If you find http_myfuncards.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_myfuncards.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_myfuncards.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
4096B6935AB4EF70EEA26F73AB0D9CD23D5AMay 31, 2014
40969B7BB9BDFD1DCF3692C821F9CA2107ECJun 2, 2014
4096D9C21986380E36F5950ECD0766CB3639Jul 1, 2014
40965652B24D644612170BE5B3660980F393Jul 2, 2014
4096DB69A9376F752010407C23BB779A542DJul 9, 2014
4096C4DD2F343CFEEA8E6B72F1CB82587B54Jul 19, 2014
409636D0A2B7BE371341883C1985D8F828EFAug 19, 2014
40964C325AC681D5959A0DA583A4ED2BC268Sep 13, 2014
4096710EE0857B07467B821606963C57160ASep 22, 2014
4096D60B0BD39159E26F21BF932A5868D576Oct 27, 2014
40965783F414C1C713275696B041024D4487Nov 22, 2014
51201167DAC7CCFACA6E92D0D26665B3DFA8Feb 7, 2015
409642418359FAA4D0D50C3B502DDA5454E2Apr 7, 2015
4096F71EDC667D23815C53A9531509C6134AMay 7, 2015
40967FDF2159CD19828203EC1E210C23DFD2Jun 23, 2015
5120E12066A1D6CB6278A13094AD00FDC6B7Jul 17, 2015
512075136B612613339615BEF72FE502C3FEOct 25, 2015
5120A0C0E7DB9E13A917E6D6F9DEDDF52496Dec 15, 2015
51207B0733C27845C7E653FD13175F317EADDec 24, 2015
4096985EBC2887C910E94D4DD1221BB870C8May 12, 2016
5120DEF6758C0B5A548D44A00B826278273AMay 25, 2016
6144B643A946B01FC7DC0CE4D9AB577C8769Jun 8, 2016
40966B11B8025F5F8D10EC53B6BE3228AE51Jun 28, 2016
51209634E44FA47A20035EE32794DD92D6FEJul 10, 2016
5120EB31031329AE80FC91E4566244E8FC21Jul 10, 2016
5120D7AFE2BF39B4C30B63055D6A76247217Jul 14, 2016
4096B41A56F362C12E8A7D1C3A119FB57E35Aug 7, 2016
6144B9C8F16E8AD7E70BC1FF05FACE7FC182Aug 31, 2016
7168172DCE07D73F4A85EADF01A4485F2303Sep 12, 2016
5120F7681662B8C4AAD6483B75F0D87F1055Sep 18, 2016
61440847DB66B5862F74DB33D57050706E9AOct 2, 2016
614477A5FD606A8062C2EC759ABCF7D1BFF5Oct 10, 2016
5120C46C71DDB2E71D35BE3470BB5C3857E5Oct 11, 2016
6144E438E1C48491B85BCB744B23D572C320Oct 19, 2016
40960A48B0049BE63A132B01AF6B716FEFAAOct 30, 2016
5120562533D6FDBC6D5C88D4866085FB7A15Oct 30, 2016
409613AE7324BF09D6E082757B337EAA3133Nov 20, 2016
71682B18CC9541849BE28735FBDB27330850Dec 6, 2016
71680C7449A99E54E1D18D9A216A4FD34D8CJan 30, 2017
51208A0AF575C3465D18ADA5190C853FDCF3Feb 3, 2017
51200B0933D347085DB14914620E4B03FA8FFeb 7, 2017
6144ECB2469EAC6938881AAE679C83A28A33Mar 6, 2017
716887BE4B2DC08BB98F24DC84B976634EF9Mar 18, 2017
409645F59935506A60895AA9290D8F6AA477Mar 19, 2017
4096FC3E361E6288105EBD320D09F5DD24BBMar 29, 2017
6144CF2B53D9032AA8309DC9A44C4B0D7528May 26, 2017
1228833D0CAC56068CD4FDBC49A9E80D02B84Nov 27, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_myfuncards.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_myfuncards.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_myfuncards.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_myfuncards.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_myfuncards.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_myfuncards.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_myfuncards.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_myfuncards.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_myfuncards.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_myfuncards.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_myfuncards.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_myfuncards.dl.tb.ask.com_0.localstorage and Associated Malware.