Exterminate It! Antimalware

malpedia

Known threats:685,730 Last Update:November 03, 14:34

Testimonials

Hi,

I'm very happy with your performance. I'll be a customer for life. Winctrl32.dll has gone. I have 4 other Bought and Paid for Malware programs that I have but none are as good as yours and none have the same individual response times as good as yours. Some do not respond to help At All.

Great job!

Richard D., Western Australia

File: http_radiorage.dl.tb.ask.com_0.localstorage

Location of http_radiorage.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_radiorage.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_radiorage.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 3\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_radiorage.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 3\Local Storage\http_radiorage.dl.tb.ask.com_0.localstorage

If you find http_radiorage.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_radiorage.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_radiorage.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
4096A1C332F218D237263DBDFA70DEC8BC1DMay 8, 2014
307214602FC36BA3B9653CDE536CED4A5E6CMay 11, 2014
4096DDCF2390DBCCBE96919F427CA6CF5FA5May 15, 2014
4096EF23D32C2ECC1AC5A34AF77727B9472EMay 20, 2014
409603DFC43FEC31C7A9737DB77EE0A1F74BMay 26, 2014
4096F97311ADA1FB6F0D09A59F05B857B8B5May 27, 2014
4096F106E3DA1AEE11A8ACE844964FE36033May 31, 2014
4096BB5A4E853D9E8A0D03856035F308DB36Jun 11, 2014
4096B4F8F2F78261157F8277E59DA4D1EFEDJun 25, 2014
4096BB1A7C1DF82841E28B196587D3860CA9Jul 3, 2014
4096F6835FF384D0FFFDB42ED59AA4462348Jul 8, 2014
409639BD3C8548D7AF3D682706A086FAE536Jul 30, 2014
409648B6B0269D1A28E38AD29CF3308A195CJul 30, 2014
4096D559BC3356BC09746546F877D24A8126Aug 7, 2014
409671AE40675E2E1D10B54159E180FBC979Aug 8, 2014
4096C47D64483795FA4FB248351667ABDD5AAug 9, 2014
4096F00496C64F584863A7B377695A780A27Aug 17, 2014
40965512C44E9D9647CA07CF9D2D6E94C301Aug 23, 2014
40963E4E3A4987C402633C8C132560E970B2Sep 13, 2014
409616272F1ED66B952100D876B0E3115EE0Sep 20, 2014
40963C65B57DF6EC716FAAD2B31F0679B8F5Oct 17, 2014
409663E5F0F7DB5C20F3C0DFC0003339B834Oct 27, 2014
40964CDBAF653E593BEE02E8745BA5501A40Oct 29, 2014
4096E6BC1DAF043158F0868B42EE60EDC0CBNov 1, 2014
409653A58BC6965887A11661EB869A2F3B00Nov 4, 2014
40968B4D11FECA2A2B01849577F492CF45C0Nov 5, 2014
4096C54E1BF6C8C51AD695F60AB81A5057FENov 7, 2014
4096319ECCFC47E7B98A92C24C96194E0F6ANov 9, 2014
40965C1BD1F72074C88666A4F098ECF1ECE2Nov 9, 2014
512043397CCE45145F1943FBF90BC499699FNov 11, 2014
40965AF500B49EA797A471E83BD7D589C997Nov 12, 2014
409693FBC2242952395D5D8BD8CE33DBFE32Nov 13, 2014
5120A6A298265ECFB879A43E8410A64145BDNov 15, 2014
51206056C461B4676A9B2559ABCFF62563CAJan 1, 2015
5120E46305A720785708C8FA8FE2F2E281D8Feb 2, 2015
5120925444A5F786742DDA83F0A32B393C46Feb 2, 2015
512020458100C7C514EC40ACB2DCDFDA9294Feb 6, 2015
409694692C7B4BA8266A918DFE139BBCD201Mar 25, 2015
4096A50AFB5A3A89D41C2B63D7423DFAFD9FMar 28, 2015
5120458C5FFE13B0906C5E87D12FB2817E4EApr 24, 2015
40964F3683B766A3AE64B400FAB80D4F3CBCJun 6, 2015
51206DC13AE6D63C474ECE7C30D9BBB57C12Jun 10, 2015
5120A79B2844676F9910D7266388832E91DCJun 27, 2015
51209FD22D74A2F9A1FEEE6421DADA68E7F4Jul 19, 2015
5120B9C55C9A092903ED60C32114D2469245Aug 18, 2015
51200EBC434DC56EA823DF723F76F5E69F28Aug 23, 2015
409691B1CD6FA92187495535F6D92F303964Sep 21, 2015
5120BB5A344884F71FB0720AA610D4227377Sep 26, 2015
5120201037D1A93884E7F9AE49F2259F0263Oct 20, 2015
4096F4334A7A8E5A896459A271BC644BA0DANov 2, 2015
5120CD1496AC162CC47555F538B12B9E39B9Nov 6, 2015
5120BD4FEDBAC9894670E408BE607B2E3E6FNov 17, 2015
4096B7B4D1094CAB37D972D9AE2A48790718Dec 16, 2015
40962F0E52D4EC7AA10052D3ADB54409EE2ADec 17, 2015
5120B237E6DCA57F5F90EA4ABAF9C0248A1BJan 5, 2016
5120A516C7F05E1DBD97B1FC8BF41D47E4AAJan 29, 2016
51200E10C78559B029942DF3FB759AC536F8Feb 12, 2016
4096CF78D0F264D0387F3D0B2DF09CBA9C1DFeb 13, 2016
512050EBF6E845FEA5D9A1C1B36B756C5E19Feb 18, 2016
4096EC28E92100F59A8E9901C96F66035C78Mar 18, 2016
51208558CF668784520D17F1FDE924F546F7Mar 22, 2016
51201535D05541B5506AFF263910E83DC96CApr 23, 2016
5120394624A5B2F364B41A4B94C3040044D2Apr 26, 2016
5120B94F4B5DEC548E7D87B2E5098109E4C5May 2, 2016
5120FCCF83141EF68EDE3B6DCDD262273E61May 19, 2016
512005748A648061E25948160205A1EB3602May 20, 2016
409643138A941C27A2A719C5A4CB28CAB70BMay 23, 2016
5120147D6F66D10CB150744A4041FC3AE4D0May 27, 2016
5120E0D4D668111FF1FD1E73F3E1396781D2May 27, 2016
71681E2886952F8D2D976A5A381C2B86F539Jun 8, 2016
81929117403E450EC953B8822F0F36FEA314Jun 8, 2016
5120537B71F9DA33B2A2E0B37BFBD12036E8Jul 1, 2016
4096443F520ABF2A11C41F57C83AE8596B96Jul 12, 2016
51203A67E2818E5C4845760107B448671EE8Jul 19, 2016
5120571BB29C96C8362232DF56C4A2DC57DFJul 21, 2016
40967E60586E1E2FCC2645F31854AC9F3647Aug 7, 2016
5120149E7BF2E7755493268D98801836E81ASep 13, 2016
51203A2022765B5111176B9F701D7BFA6B57Oct 25, 2016
61445A71C56D17A54FB9E88D831EA498DBE7Nov 14, 2016
61447E01B5DCD97A257F5656C026083BBEFBNov 14, 2016
512073A2B73299A1660E4DECE25FE8937719Dec 28, 2016
5120410B453D948C999204C2BFB22B3A0C54Jan 1, 2017
61448258E42A411885FC0A54ACC9ACC4BF31Jan 16, 2017
51206864BF96D2289F0686168259292EF8D1Jan 27, 2017
4096C7B21E22F55873CD3A7026C5F6795295Feb 3, 2017
512037E4FBEF01F802E801D46CBED971BB81Mar 17, 2017
5120877E4658CC0785FB1B79A63692D1E414Apr 5, 2017
716848BE9A9F628581F979F56B94BFD2A238Apr 12, 2017
6144B5B5253B833B6F6F985A1C2BFF88D104Apr 16, 2017
5120B2D582E1E3C06A9918B478B8BD80ABACApr 29, 2017
512034F6268233D1CA9D4EC92D55449BD0AFMay 17, 2017
6144327B5B6932066D46A9384345C8717BCFMay 25, 2017
6144C3C44E5B662B6A15533A1D172BAF2240Jun 6, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 27, 2017
1228833D0CAC56068CD4FDBC49A9E80D02B84Nov 5, 2017
12288E4C0A2B245C8475F7260CDBBCEDA35CCOct 23, 2017
12288469373BFCE4B09EE55D66C17A12F81C7Jul 11, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_radiorage.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_radiorage.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_radiorage.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_radiorage.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_radiorage.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_radiorage.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_radiorage.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_radiorage.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_radiorage.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_radiorage.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_radiorage.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_radiorage.dl.tb.ask.com_0.localstorage and Associated Malware.