Exterminate It! Antimalware

malpedia

Known threats:700,086 Last Update:March 16, 12:51

Testimonials

Hello, bought a license for your antivirus tool and I must say it was totally awesome! It cleaned TDSServ trojan which was a real pain in the ass for the last 8 months and it also found and killed Virtumonde together with all its files and a few other low level infections. I was already thinking about formatting and losing tons of information when I found your tool on the internet.

Thanks and please put this message where people can see it.

Andrei T.

File: http_televisionfanatic.dl.tb.ask.com_0.localstorage

Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_televisionfanatic.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_televisionfanatic.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_televisionfanatic.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_televisionfanatic.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_televisionfanatic.dl.tb.ask.com_0.localstorage

If you find http_televisionfanatic.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_televisionfanatic.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_televisionfanatic.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
409617FE609816A801D22CE611E90A963427May 5, 2014
4096C80398C0760B9F5138392F54D6BD0BA7May 6, 2014
4096209F38C3B6854E760AA14BBCE4BAC923May 13, 2014
40968ED0F36AD6C1F849CF02738C8965FEE7May 18, 2014
4096B9714FFC4090D4FEBF6CD1E5AD6816F8May 31, 2014
4096F4A7CE95D5A9615C46943E0F3983E0C8Jun 12, 2014
409623A4F4893E3C3CFE939A1DF7CC17F748Jun 14, 2014
4096E1C76C2EE8CCA67CA58FDB75913A5FAAJun 21, 2014
4096FC0ACE03D3FE9C431B62D3255E57DE1DJun 23, 2014
4096A94686332F01B76FC2F018F695B240FEJul 3, 2014
409671C69E500A677EC5B3F42AD87EC91BD7Jul 6, 2014
40964E0E88A5EFD406F9A4FE34C774B7FA81Jul 9, 2014
40968870B1ECEB0DEA7E66F2B7383AACC80CJul 16, 2014
40969EBB29656D486753ABA511F30256BA7AJul 27, 2014
4096A9405C8793441043FFA004320BFB87D9Jul 31, 2014
4096B34364B0050CAF836793A50031B4A99BAug 4, 2014
4096A08918666AF3E8C4E5313335247D7604Aug 14, 2014
4096B28B01FF18690E1AFF01F3BCDC20FEDBAug 16, 2014
4096601D3C5A9B66A1F418414CFC642123E8Aug 23, 2014
40963550013B7FA167AD9B0FA001513E74EAAug 31, 2014
4096B8AB03583488353DD8EA6C24D1CFA904Sep 2, 2014
307293E9814EB558F721EF2722A71D5E8091Sep 7, 2014
40963F0281584B688A4DAC55999D63C517ADSep 13, 2014
40969B24764348687E2F1815A7D7AD93206DSep 17, 2014
4096A6CD08ECD02234D064ECA37F2B93B63ESep 19, 2014
4096587600B538693A5E27E1AB4AEFA1BAA4Sep 26, 2014
409611A157C2967EA7D09B07C21F09947CE3Sep 26, 2014
4096D7E5F770C907163277F3D692327AEDF2Oct 19, 2014
409663BA77F935C3678AFC6021D765555902Oct 21, 2014
40966C9D349B458F5DECD123863226A310E5Nov 1, 2014
40960C37C0ADF51A0494C12EF3A9AE5218B2Nov 3, 2014
51208C31CC2042140E28083E9492D8DC9ED6Nov 3, 2014
409639F1A3A35ADBE938CBE35D506066BE93Nov 6, 2014
51208BEBDA8E9888A8FB58012A55300E23ADNov 9, 2014
51204DC7FF4EC7215FCB839DB56C6928163ENov 12, 2014
5120DA06EE7FAF32F7C1FDC071EC2AC072FBNov 15, 2014
4096536762A9E483849E9D63D18B3658429EJan 9, 2015
409660422B5849D14C0883FA6B8A54833FAEFeb 7, 2015
5120B1C6E42D0B2F15D56E3D48DDA068FC8EMar 13, 2015
5120CAB9D076B285EFF82F02EA3DF77B21A6Mar 20, 2015
409653EEBC054501934F37972A1038EE7A3CApr 3, 2015
512067BAD43BF26E7BCD8A5B3BF440A85662Apr 13, 2015
51207DA9FEED59157F4654544C24EA7CFDAFApr 16, 2015
409616BA32EB3066A24D2145C4FAA31A042AApr 26, 2015
5120152D318D4C7A2FA78586B5CC7F07AF3CMay 7, 2015
51207B6F00452682052A96821D37CABA3E60May 18, 2015
512034FBC713E4BFC50CBF1205E6391F6B75Jul 1, 2015
51208F2E1953112ACE47323FA173066F5962Jul 3, 2015
51203825E3496FDBFE63C3C6AE8F93786971Jul 18, 2015
512019F0C892E49C8972C3BE0B932CB0E193Aug 24, 2015
7168A03FEA3B8CAED5F1A132F74E612798B4Sep 2, 2015
409696440DFF2EA86186D2193B268AD3B9A0Sep 20, 2015
4096700C3E5D2489A3B21904ECE9CDCC9C10Sep 26, 2015
5120E41DC9700639F01CAC3789151C1D2419Sep 30, 2015
51206F0F4AE877D54F7809EA5DFCC07D95C4Oct 9, 2015
4096E5825354FFF856FF780D90CDB7CBDCFEOct 11, 2015
40963677CE3BA5DF96677A4B9D441DB142F2Nov 10, 2015
61446297C2F5B21C21AE5E65A2D5AC078718Nov 15, 2015
5120C589A089266338DFDDC37FD46CD20E0BNov 25, 2015
51209A29AD092601526CEC73A42FEEA2958BDec 10, 2015
5120ADF9554F545809C79CEF6B907B48DBFADec 10, 2015
51206E6F2E8D8EEBCD0E287F454A90D88070Dec 14, 2015
512091E1220F353A1CFD9ABDF4F83F202299Dec 17, 2015
5120F43A18CDDC8AEEFF59B9802A71ED3C03Dec 20, 2015
6144F98341C5A0857F75CDF2A3D135679E46Dec 24, 2015
5120122C84A0EAFB4ADAC0772CF41F357DB9Dec 24, 2015
61442F1090A3C0CB81D4FFB0EE2D23FF4A3CDec 24, 2015
51208BAD8906E57BB5FC1DCE54E9D95AF43CJan 5, 2016
614454642201CD9E363B6949B93EE613AFAFJan 6, 2016
512084B05229AEA1F7CE63E84587D3152BF4Jan 7, 2016
6144DA1F20F8A107EE059105E4F73CC9F6BBJan 8, 2016
5120BFBEAD97D623636AB1072B4345A6A7A8Jan 9, 2016
61448DB03E0F3CF7CEF6BA657DDD3CFC89BCJan 12, 2016
5120DC1ADD30C6CC98AEE1278548916248E4Jan 13, 2016
6144092D6B1FB80B8FB0EFCCE035F75BFD40Jan 23, 2016
5120A638C308F6F538CD5C10B4531C378BEFJan 24, 2016
5120A7BCB48B2774DE87CF9F22C6FB931ED4Jan 30, 2016
51201ACB3E0B7BA02E2651C025387B8AD938Jan 30, 2016
51208901A9F7F8A9238ACBBD43A89BC8E501Feb 2, 2016
51209C00035E71B34334F81855C044ABCC49Feb 4, 2016
61447C2B2B014C0BC99B2B10FCB116E1DC9AFeb 12, 2016
512000AE6BCBDE066CA4AFAE4AB9BB529794Feb 14, 2016
5120CA2D238C4E2CED43C7EE0ED33EDABA1AFeb 16, 2016
40962AF723C2503718602BFCF72C084F66BCFeb 18, 2016
5120230A9551319769175FFF0897A8B5E60EFeb 27, 2016
5120A891EB5881A70861691FC3108AE918D5Mar 4, 2016
51200503CBB079629D57AB5A366FCECAFFE1Mar 7, 2016
5120E2D478FA249A630E137DEE2F115D18DAMar 29, 2016
51202A9C745422CB592DB18A8A9C69B84E99Apr 8, 2016
5120C76FF863F69D84BF5049A93F0D35B2A0Apr 18, 2016
5120EF0D7CDDFC3D1AED7347D3E317B3EE8AApr 23, 2016
51202E8F3D0447785865B0272EB816DCAD24Apr 23, 2016
5120922300AD4DB5946EBFE01EBA444BBC8CMay 17, 2016
51206D5B10985EEA2984D9838F73AA29BE3FMay 23, 2016
61443E2C969FD7030A73D6143FE72D1ED43BMay 24, 2016
61441CA83421631CDF7925050C02B7CD9097May 26, 2016
6144610D48882E8BB9499105FAC3AC8D6854May 26, 2016
6144C6F8BE7B6FF48D665E61CC7F4E324E42May 31, 2016
51202E9E26CE6AA20CCCD229DC18B40C7A0AJun 5, 2016
716864CBA6782375CB753A92E37A62064D91Jun 8, 2016
5120CC2223B3C6D1CA1D7DDED7169A2E4F11Jun 10, 2016
5120F671A78CE582685EA47943828EB2FF52Jun 10, 2016
7168810A3AA58E0EB12B090A5E70108D30EDJun 13, 2016
512019C6691499802DC92575CF81B9A901A2Jun 21, 2016
6144B3D6D45636C44EF2B577FC0A7CD93F87Jun 27, 2016
7168D85ED61588B813844BB52CA9DB79FF77Jul 2, 2016
61445ACC4255642DEC4FC50A79B3A87DCE85Jul 10, 2016
4096CE6FAE2D6CFAC8CF4B65448E5FBB9D66Jul 14, 2016
7168ED49B0B1D8C0145F07EFC9037E03F876Jul 31, 2016
71686F3FB8B4ED02295FD1F9630BCC2F42C7Aug 14, 2016
614421252DA557BC0170F5EBC088942E1F34Aug 29, 2016
7168A7D9947C8A40D4E63DCCE65E96BD7BE6Aug 31, 2016
51209653D57BDD2BF11BA4BEF27A8DB22D7BSep 13, 2016
7168D49798988F75B6268896693B5CD8C48FSep 19, 2016
51205ED147ED1C224CE3FDD97ED6547CBA07Sep 23, 2016
61449A072B1B04CA74341FB259B70787602DOct 4, 2016
51205761B650FA11EFECF56EE3B5B19241A5Oct 23, 2016
71681E562B5D27633A86B692D8CD6D5E728AOct 23, 2016
819221E406DD130273D8FA590F5BF75709B0Oct 27, 2016
7168869E57897EC01FEE2B09729B793ACCB5Nov 6, 2016
71682AB835106ED201A29C02D3940B0767AENov 27, 2016
51201CBEDC32C692CD8D0A9F84DFF9584B1DDec 7, 2016
4096C8445F8E3734E750529C761FBBA702EDDec 13, 2016
5120A5D4AFD59BD793AA8A4583446C7EC8DDDec 17, 2016
7168ACC78E83E72E2D9DCC6260C7550CDFE9Dec 19, 2016
61445DA2161B9690FD1ADDDEEE8DDF0C9684Jan 8, 2017
6144F156EDAD722342B9771BD1F4DDFDEE0AJan 15, 2017
7168661408C910A4D1BD609C3ABA93D0DCD1Jan 30, 2017
7168DD8B5518ACE9702AFA8FBDCB8C517980Feb 2, 2017
5120D1CC3E179C0BC6283C62C56A62A04CAFFeb 4, 2017
6144500F431C5F11538D5F9601E50481EE92Feb 5, 2017
81925C1897354644827BABF5A00796259C0DFeb 13, 2017
61449E039BAE35BB676CF9648D15395175E1Feb 26, 2017
6144B6F847A4496DE1BD63687EA473C29230Mar 6, 2017
7168792BD0B19DEBC688DFD31B5B9DEE0F6BMar 13, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_televisionfanatic.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_televisionfanatic.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_televisionfanatic.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_televisionfanatic.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_televisionfanatic.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_televisionfanatic.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_televisionfanatic.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_televisionfanatic.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_televisionfanatic.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage and Associated Malware.