Exterminate It! Antimalware


Known threats:699,443 Last Update:October 12, 11:44


A Big thanks to you people, who have developed this product. My Windows XP Media Center OS was infected with Win32.Renos, Backdoor, XPAntivirus, Xta.kill trojans, spyware as I use rapidshare links a lot. I have licensed McAfee, which is good for nothing and was unable to protect my laptop from these malwares. I tried trial version of Bit Defender, Sunbelt Spyware, Claim Win, A-Squared, but they were unable to do a complete detection and removal of malwares. Exterminate listed all the malwares and registry changes done by them, like task manager, registry edit was disabled. I bought a single PC license, activated, scanned my system thrice and my system is now free from all malwares and viruses and running absolutely fine. I still have to use Mcafee as I have a licensed version but buying Exterminate IT is a worth of £20 spent on it. I will recommend this to everyone who use P2P sites or rapidshare or torrents. Now, I dont have to worry about any malware as I have Exterminate in my system.

Rajkumar P.

File: http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal

Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal and Associated Malware

Check whether http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal

If you find http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.


Different Variations of http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
4640484221B6002EB412F62F4EECDDE7C081May 5, 2014
3608E057AD89C7E34BEA564A993021E6AED5May 6, 2014
3608893DE4F7F6CEC0C7A37F6F821230D82BMay 13, 2014
3608DC7F309649B31E7A5C295F85B9B9ECC4May 18, 2014
4640B27C0CF0734D01E21516ACAFB89623ABMay 31, 2014
360839A6756169AB709F0F7FB8A477536843Jun 4, 2014
3608C36D353C8F907199FDDCB91DF5CB9AD9Jun 12, 2014
36087819617D69082B7511C783AE19FE4C8CJun 14, 2014
4640170784BE6221187C683E0FBBEB946C75Jun 21, 2014
46406386916B45667570124C60CA781547EEJun 23, 2014
360872AF77B62273773CD27768E9D8E743F0Jul 3, 2014
36084B996D37059F4886B1594F858A71D1CEJul 6, 2014
360883A113575A67D6E34182A49C3A5E47DDJul 9, 2014
36083C74DC702962439D47782F4B5AA1C31AJul 16, 2014
4640F126450B67343526B3F0A4BDFBD6DC81Jul 27, 2014
36087885C1C6A65A0AA82BC00AEE1CD480B3Aug 1, 2014
3608BA9C975855241F998757CFC138B08569Aug 4, 2014
360864C7120D5A0C252A4C4C058A2BE8B7A8Aug 14, 2014
46407A6947D131CE1A818AE3954BC52DB500Aug 16, 2014
46405127A99EC6BEBF53BE20BF32D64515F7Aug 23, 2014
36083CBE050B22F7FFD55FFB80B9CFAC3AF7Aug 31, 2014
3608C1071B655A73A2FD9366A1599D015AF0Sep 2, 2014
3608E734C36F048AC0B70239B79B195876CCSep 7, 2014
36080CF36EDB98E7B6A8515CB2C49C3ADE3ESep 13, 2014
3608BBEC7699B4BEE02D40B1A49BEBABC82CSep 17, 2014
3608ED930E5B6FCF471FD595C5EC538C22A4Sep 19, 2014
36081F1F7FE135BAEAA4748A061E9BE30D77Sep 26, 2014
360821D95C15FEB4E893D1F504F5CF907E84Sep 26, 2014
464054C8E11CF88258A7922EE49EB7BA4E4AOct 19, 2014
36083DDCB528F4F88E1A54D881571AF0B68COct 21, 2014
4640A341801D07421A1C679768CC451341DENov 1, 2014
36083228843A9A5E8647E194637CD0AF87A2Nov 3, 2014
56723BAD41EC5A740C8543613F97AC28C998Nov 3, 2014
36082AE0E5E28BD31D8681A2948166B2C2E3Nov 6, 2014
5672571F7FAE829BDF308164CF2B580F964BNov 9, 2014
3608FB430CDF5C0CF23172A2F769C0D0EDC7Nov 12, 2014
5672858B23ACF7F2D354EB5E9C8016D08C28Nov 15, 2014
36089654CA10A3327A1B938D8509FCAA56A1Jan 9, 2015
3608BCA5477B6C12A7D297E40CC2E8B324A5Feb 7, 2015
4640F4EC93D5D650614864D4F261D9F41CD5Mar 7, 2015
360875EADE5974D64FCCA0294A81AF727846Mar 20, 2015
3608ECDA00976ECA50400D19A63EE041CA66Apr 3, 2015
5672EC03FA02A3C0D170B8734B0079E7729BApr 13, 2015
3608217E66F16E54434D0E9573CC8C964672Apr 16, 2015
360870E6ADCF7C833ED7FEE5F7DBD65FA9ADApr 26, 2015
360843BFB69D4CBC15719AC08FBDE539D856May 7, 2015
360839729766FA04A684C3ABD0BCA3DDFB18May 18, 2015
3608124D926C664B1930F20C80030969B12AJul 1, 2015
3608E1C91B01864230954E8A193433A3E130Jul 3, 2015
3608C42DCDE91AC7770673DF7D70642E6B48Jul 18, 2015
36086E29D1BED056E63AD29D990599BDD6A1Aug 24, 2015
46409756356F40ACD9083ACEBD76A2BE5859Sep 20, 2015
4640DF9F5D0D905459377FBC518DE23DCC00Sep 26, 2015
3608A1A9C4439D539AD88145D86B39D4B141Sep 30, 2015
36088F175353FF4D2258760A904164405191Oct 11, 2015
3608865459BFD8EBDB17480E5921C6764135Nov 6, 2015
360896028236F4D08A819EC6F8DF30B60E5ANov 10, 2015
360885990520691F2B218A3DFA47E14287A4Nov 25, 2015
567242CB2A5C44B06D46F6FE2DE2B7D4DF1BDec 14, 2015
3608EC80004B257A41A8196C6FDB3D7C30F5Dec 24, 2015
3608324870851C035F592C1309D0114AB73FJan 6, 2016
3608C6F4AA15C3906125B0CF99C8C8B852D6Jan 9, 2016
3608C402073F3FDEAEC7A34D835DF51F5E8DJan 13, 2016
360889680C22551826B3EEF6FF521086D904Jan 30, 2016
567221726023B19F7FBA3FCAE6C1DF70F6D2Jan 30, 2016
36088275874DCE26C2FBB02D98A9F1E6DAC0Feb 4, 2016
3608782AEDE7BC642487054E27DA5AC88D2AFeb 6, 2016
5672EB079B6FEBE67B80307DA06F9D855D3EFeb 14, 2016
5672889852C282C3C2BAC8AC91FE08B93EB6Feb 16, 2016
360854420BA2EA76090239FBB3E4FBD758D2Feb 18, 2016
36085F2D498BE771EFC372341C62DF54F383Mar 7, 2016
3608F36FBCAF377773B8AC3F444FBCC456C6Mar 29, 2016
56720A66B404C2D158892DCD04BFFCDE6F55Apr 15, 2016
5672BF0A44859F2BA6966072A3F86D35AB4DMay 23, 2016
360885AAF7D5970CEEC2929FB6B2EE2299ECJun 8, 2016
360890D32D6CFF547E270CBFC7452A66352BJun 14, 2016
3608B5EF7218DE3DC417BEEC3FE69B0B6C66Jul 14, 2016
360813753C4E07AE83583C1B0AEA71F19390Sep 13, 2016
36080B8E1C44E041C416E17EE5BE7F3CE029Oct 23, 2016
5672E5C57EC54C58C1FAA81DAB14BCCC705ADec 7, 2016
3608261B3F863458787705067E5347F71B5AJan 26, 2017
360840A3BC96AAAD42D419165087BDD01832Feb 4, 2017
3608432860DC09BF7B0F0E1B81EDF9263D17Mar 19, 2017
360803825586E94A29427EACBE140FD2CC5CApr 14, 2017
4640971FF5997289281C28E53E123BF30049Apr 17, 2017
360823B15CB317F1BE5DA04FEA3EB745D995Apr 21, 2017
3608330C881F985B3F9D266982D06D241442May 5, 2017
5672E82EFDD923F2EAEEF9861E142F02F04EMay 19, 2017
3608F1A49078FF0BC6F0DE25547373673876May 21, 2017
3608F7E6F2519BD5685207BB020F726C79FDOct 31, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal^

  1. To enable deleting the http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal. The name of the first found registry value referencing http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_televisionfanatic.dl.tb.ask.com_0.localstorage-journal and Associated Malware.