Exterminate It! Antimalware

malpedia

Known threats:689,645 Last Update:January 04, 08:33

Testimonials

My computer worked insanely slow and I got all sorts of silly advertisement whenever I got onto the Internet. At a friend’s advice, I gave Exterminate-It a try and was glad that I did!

I scanned and kicked out all that adware that’d caused my PC to be so slow!

My PC is back to normal speed and I haven’t had trouble with unwanted ads ever since.

Keep up the good work!

Eric K.

File: http_zwinky.dl.tb.ask.com_0.localstorage

Location of http_zwinky.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_zwinky.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_zwinky.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_zwinky.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage

If you find http_zwinky.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_zwinky.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_zwinky.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
4096CF6C24A2571EC03C428283764BD417FBMay 4, 2014
40962686F9832DF6153784BC14EC8865FB56May 4, 2014
4096F482A992ECA94FF9FE0897905077E5DAMay 7, 2014
40961E7EE0ADDE5EBC4915B0BB0D1B9F074AMay 17, 2014
40966318DC3469D9F0A6D55702788B619662May 20, 2014
4096175AE88BF3502B83441A2690A04B23A7May 20, 2014
409633DE9ADEB8425B6E1F5C68E3435426F6May 23, 2014
40966967AF86F5CF4628F22EE57ED8BBEEE9May 25, 2014
3072B0DC9DB501489CC388996516207223B8Jun 10, 2014
4096D2D16B330EA339DE9BE79BBCF4329769Jun 24, 2014
4096D0528BE30DCBB4330E8ED7B674268C95Jun 24, 2014
4096D2F7D102F066E65384FA57D822A44A52Jul 1, 2014
40960C5772C7DEAF9BC3BFD29F0FE0F21AD0Jul 4, 2014
40962D83F6F5C5B76C9F0636381264ED8B25Jul 13, 2014
4096369065C6AEF4CC546FB32632C3BC7E88Jul 16, 2014
409698AF71D8E4455967F0BC41D5FB73A9C7Jul 17, 2014
4096D1A5BA9AD5ABF5BD7884BE39FF377DD0Jul 28, 2014
409683955238BBCFC4B5A8A3CA957B6E5CE0Jul 31, 2014
4096F0AE4E9CF6F2BC1E1026E6A33404B860Aug 1, 2014
40965AEFF0D92C8862B30BA0F939BDED3E36Aug 7, 2014
4096497441752CCB49AE3DF6B6C4251E6854Aug 9, 2014
4096236236B07A49C879CD5104AE1F6806DDAug 16, 2014
409642C66957A7D56FA8F0C2348A635EA0BCAug 16, 2014
3072AA0E8199233BBA14D82D270DEC740312Aug 27, 2014
3072905F6739E6E3E650587F2FD7E70469A4Aug 27, 2014
30729CD78013AA7F1C5CA8FF9E77E397E599Aug 30, 2014
30720E7BA796CE3AD29B0B7BD29AE79E0292Sep 7, 2014
409643DA6483C9C6FB82C5772CAE6B324A92Sep 14, 2014
409644EDE9FD7C4CBAE18F1304B23C8D5611Sep 17, 2014
4096C56BD052BA9DD10CBBE930C162537F3ESep 17, 2014
4096246B5C49E89FDA8BDB3BB8B289ED6142Oct 1, 2014
4096A70906397675C095B8BDA39476540EE5Oct 9, 2014
4096C89FCB05EF17F431394E81AF6FDCB9CAOct 27, 2014
409641C93A1DBE533A56662E3F013DC4319EOct 30, 2014
40965BE09E0440B5BCBF512CB65328FD1F01Nov 3, 2014
4096BCB50E383F618D0C58AD7606E565DAB5Nov 3, 2014
307293E9814EB558F721EF2722A71D5E8091Nov 3, 2014
4096B1DEEE0E0ADFF10C192373E0C16A73CDNov 9, 2014
4096DDFAF9483B7A7D8FC05A079C95725EB0Dec 13, 2014
4096695F1E2E25170C9EF7123FB1AB97E3AFJan 30, 2015
512026E84482BC9FC87BB27FA0B382DDD42DMar 12, 2015
40962E68F01A5CA54823D4A8091F1BBF9CADApr 10, 2015
51203AB2120B3044B8D5BC9C317783517FCAApr 23, 2015
51202A95AA7D57A1CF299319C484FF9F2426Apr 25, 2015
4096DAE77572C391FFF2363326D32F940106May 3, 2015
51207E0891F3352F57F4B004443BF015BA82Jun 14, 2015
307282BD9BD9B402F142A5F3D1C6D913EEBCJul 12, 2015
5120E1A7A9C2D7483C182696739A5CF3D5F8Aug 15, 2015
5120AF0F7F084F54004F5879B910A123715BSep 22, 2015
51204CF629407C156990577BCD5767657805Oct 27, 2015
5120C186A8DFE74F98820881647FB27A55A0Nov 7, 2015
5120A7B762B03ECA03BE393C7DE0AD72CD9DDec 20, 2015
512092F877F50D27D91FE1F74504D318CB51Dec 29, 2015
51207E8FA5DE868093DA130887AB2753ECFDJan 2, 2016
512008C976EBDAFA4649A2A27F705213CEB8Jan 7, 2016
5120D8AAA732EAD337680D3554FB60988BF1Jan 8, 2016
512031FAB20E86BA4E686179F404A1B70EC5Jan 19, 2016
51208410E971898A8106DC70EC0F6EBCB14CJan 26, 2016
5120C1FA255D3EA331956BC748228C9883FAJan 28, 2016
4096907829C1C28FDE04BC70D2ECF08FEAE7Feb 3, 2016
5120F75953938615AA57FE993F89E156DF4AFeb 6, 2016
5120F4D2F0E0D0D73FFEFCB8C94D2B638052Feb 6, 2016
5120598C832A9D806C79FB9782AEA266B234Feb 14, 2016
4096D4DEC8CA0FB4A5A5136CD263229B87A6Feb 17, 2016
5120ABD4099ED034E19611615245812B9E9AFeb 17, 2016
4096541822CE022793A96D2E37DD2EBF5E78Feb 18, 2016
3072FED406012B4773523CA57E4A56140104May 10, 2016
512029CE8F352007D057AF7BDD6DD113792DMay 31, 2016
92166637BC1E068EB18DE60B6809F11104FEJun 1, 2016
4096C2540B05BEDA1B03A3A53F86FC3ECFE9Jun 6, 2016
5120D555F4B7DDA9D1F064F22287036A0CFBJun 10, 2016
5120EDD452F1388B988B36AE124416015227Jun 11, 2016
51203FAD5C7CC8204AEC6C4144FC9B747EECJun 12, 2016
307250B1ED39C3C0E1C2E7BD41C5F800FA8CJun 28, 2016
5120C04033EC791293E951DCB4C2D4A30A7CJul 10, 2016
5120FC70495235C7092B552E09593ACCE9BFJul 11, 2016
6144758F494AB1246EA8FEBD89A98B71B58AJul 26, 2016
4096590A342EAD822D0802B8A22F2A6DC926Jul 29, 2016
409615A2E6E5B078C5752B38B1BB9EDBE70EAug 17, 2016
40963EFAE64FEB05F3F0E4076A9DB391B785Sep 6, 2016
5120DF6AF557A1EAD78208677E38AD10DA6BSep 10, 2016
4096E6639C71F3FE99C9C70E1F5CFE6BD41BSep 25, 2016
51208EA2BAB0F6F0BA14DA39A472ADC6A3D4Sep 27, 2016
51200741B496FF71D657BD7E33F2DCF4E4B9Sep 28, 2016
512017B550C706D6443ECB126B0C3C53744BOct 14, 2016
51204D45348F857E62E6B487BCE27A8CB648Nov 19, 2016
4096FB18B1A015B28CFA6C4419759C8A6059Nov 23, 2016
51209F1A2A8689406CF2E9743524B36BB3CENov 28, 2016
51202227311645E6CA264DB929E595C3789EDec 8, 2016
51205BFDD052868B9FB29E204B3A778DA6AFDec 26, 2016
4096C75D714AAB207B734758DB93463E19F3Jan 6, 2017
5120BFC749AF0DA0A08B2F4BD7A6799EC2B0Jan 7, 2017
40963DBE829E6ADCB4AA1DF5890DECD7206BFeb 22, 2017
4096D45B136CBC3173DCC18E2105B0C99D75Mar 11, 2017
5120B81F3E0A3F3F3FDAC16DCECF8A7E7C09Apr 5, 2017
512067026E245D07CF7F31016D3C37CB76A9Apr 7, 2017
307234DE30A66907AFF7694465947622D39DApr 29, 2017
4096EEC7A8184745EC91E818CAC08CE72461May 6, 2017
40967334309D54D8BF8A1F29AF5A629D1C88May 18, 2017
5120AA02051432A5BF73B0FF0949E791DCC5May 19, 2017
5120931E6B138C0AB1955FBCDC424D69AB88Jun 3, 2017
5120B6C38EDB507E765933F834B8BE74382DJun 13, 2017
5120864577799B0AB0ABFD9302AD70B5328AJan 4, 2018
51201AA2712C20ACAE2AC657C28088A0059BApr 1, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_zwinky.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_zwinky.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_zwinky.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_zwinky.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_zwinky.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_zwinky.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_zwinky.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_zwinky.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_zwinky.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_zwinky.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_zwinky.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_zwinky.dl.tb.ask.com_0.localstorage and Associated Malware.