Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:July 17, 22:52

Testimonials

Wow,

I really can't believe you got back to me. I had bought and paid for 2 other Malware programs in the last 5 days, X********E & P*********c Anti-Spyware, and sent them the same message. I paid for yours and got 2 others from friends that where cracked copies N****n & S*******r but no one has got back to me. I have not heard a peep out of them but You have got back to me.

Well done.

Your faithfully ( a customer forever)

Richard D. P.

File: http_zwinky.dl.tb.ask.com_0.localstorage-journal

Location of http_zwinky.dl.tb.ask.com_0.localstorage-journal and Associated Malware

Check whether http_zwinky.dl.tb.ask.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_zwinky.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage-journal
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_zwinky.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage-journal
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_zwinky.dl.tb.ask.com_0.localstorage-journal

If you find http_zwinky.dl.tb.ask.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_zwinky.dl.tb.ask.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_zwinky.dl.tb.ask.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
4640E0EB7508A174B9022EFB385433EAF9CAMay 4, 2014
46406559FE8B109B05CF3D2646B63F0CA15FMay 4, 2014
3608EEC70CC891B2D298DC24B8B2CC61CF07May 7, 2014
4640B7FF2CAEDF878A3EA0660028F5155093May 17, 2014
4640DCF5B70F62A965AABA3D57961E0266AAMay 20, 2014
3608064149A783BB05D67043F224339C3CB5May 23, 2014
360802EBEC29BB8E01C8C0B50470732F698DMay 24, 2014
3608FA380C81649879BA13073B16319E09DDJun 10, 2014
3608F693B862DCA29B0F9FCD19263ECE5CE9Jun 24, 2014
46407A99EA0685224C7EE0085C6D9700548EJun 24, 2014
3608C131A5054D7E8DF11ED9EDE76C399A6BJul 1, 2014
46403357DEBE7A36469312632AB0ED53216FJul 4, 2014
46407C1C12B9DE0AB6DA25ECA2EA8390827DJul 13, 2014
3608C6D3462E1B7CCDD546F0C90ECA2EAE5BJul 16, 2014
3608D2C1691C9918867A827343332306858FJul 17, 2014
3608D2EEEA99B03684549FD1165639574A3BJul 31, 2014
46404C2F3C1BA756E21D4079D674AF4DA08AJul 31, 2014
4640B73212EEECF3E4E087366ADF111CE94FAug 1, 2014
4640E435CDD95FD792F75C1CAAD90EB337EFAug 7, 2014
36088E46EA0CF5B7E2110773F09CE1C93DCBAug 16, 2014
3608D83805135715C40015C0A9977F7A4322Aug 16, 2014
3608A3DDDF0A9A41143E5245FBDDFE644CBDAug 27, 2014
36089FE40A2BAEC303D2A661EE1EC1DD76FEAug 27, 2014
3608AFBB50ED17CC540F4E5781782A635E15Aug 30, 2014
36088531B4F2CDC3C3F1F2FA667371A522C8Sep 7, 2014
3608647EB49FEB7E4F54174D26878867F289Sep 14, 2014
36080EA0DA56EAB4C1543D2C27DDC24EFA30Sep 17, 2014
4640CAB534C316C360A4E7BA24A0CBE1982ASep 17, 2014
36080C67176F13C54E888FF52289CC91368BSep 21, 2014
46401A51BFB1848167AEFBBD997B4542C4A5Oct 1, 2014
3608425EBAA56F8E5D31E80B3983BADF53E4Oct 9, 2014
36088D2ABD7630628C7B28F0B6515B737C3EOct 14, 2014
36089A3C2F6CDCD34008FC808208633B5E26Oct 27, 2014
464096BCC60BC1A32695307023BFF0DC012AOct 30, 2014
4640E30AE77400A65FE1E9C0FEF284187B89Nov 3, 2014
3608FAAE8D10B5500071A90C44C1B6B03DDENov 3, 2014
3608FD0B19FB40857725E751DB1871B40EFANov 3, 2014
4640FC742ABDA82B548C28A56BFA1A254058Nov 9, 2014
4640C121284B0B8A97E42D0A9EE12D38650DJan 7, 2015
3608FF082D7EEA449C21A4E4EE2C1EE7445FJan 16, 2015
3608802E8BF12C70FB729E2FB10E07839E38Mar 25, 2015
3608F4AEBDAEFEE4FC7B906565353256B782Apr 23, 2015
360876F3827D5C3D79AFBDCA5906698ECE36Apr 25, 2015
4640DB1387DFF9F85A168D7E278BB420D983May 3, 2015
36080D03511BC16E3A5CE737274848DB0019Jun 14, 2015
36083B1AC3A68A6F6712DC9B1BA3C751FE47Jul 12, 2015
3608D4337FC606DC91115CD552FE4A910D8DJul 17, 2015
360871082B0DEE8D59D6C5DC85A38B40ED77Aug 15, 2015
360805A99F4920B4E40E9A7282EC72750AC0Aug 19, 2015
5672B82720184949A1C4666B71DACA87D7D8Oct 27, 2015
567202E37681C39DC870CCEBEE4EDA35BEB5Nov 7, 2015
4640F772AACD4A53C12807837D07CA907E3FDec 4, 2015
3608BEFDB6D95D8637B1ED7BF4066A348870Jan 2, 2016
3608A84F0BF1DC4646B705AF619734F8DDCDJan 7, 2016
464098B2ED2585BC82E185A650763E4134A6Jan 13, 2016
360827843149348F731D5E3270C797F7F495Feb 3, 2016
360871C977913B34FA966E4457474116B380Feb 6, 2016
36080871A71541726D939DEABCFA9B9AAAD0Feb 14, 2016
3608DE242C7BDDC38BA08A0E296A3866FA91Feb 17, 2016
4640AD5A75EC6E928FB158655246EC75D4B7Mar 3, 2016
3608731B9307FAD4FF5C58FEFE61E9B37C9EMay 10, 2016
464024E1E25BC89133A5ADDD3CD7FDE0C5A5Jun 6, 2016
3608DBCDF16E8BE0AE149C53AE545F80B04AJun 11, 2016
56729E2811D6C94370B578FE86AE13D581A7Jun 12, 2016
3608076AF27DBBD50E70BE7E7E3465E902A8Jun 28, 2016
3608622F9056BFB96B076E9411AA7678D42BJul 11, 2016
36080802015F93B4A2779F9A4E2D950EB335Jul 29, 2016
46404406861017834947C4B0A224C9CDAFAEAug 17, 2016
3608D550423698F2F74CBD9523B8CD98A124Sep 6, 2016
56725B22A42ED8CB30EA3FF349DC33786602Sep 10, 2016
4640E9CFF7E29DB15E6E2938A755DA2644FFSep 25, 2016
3608D3BF9AC5F3B34B9A2D70147D44709BC1Nov 23, 2016
4640D626B939131284CA171B683692E18B5ANov 28, 2016
360886B82C01182ED8B0DB0D6DFB4A048FAAJan 6, 2017
3608AFA516146FEEDB010BF0E2EB6948C89AJan 7, 2017
464091E0D0B8DDFB0D9752FC7E86E15D5265Feb 22, 2017
4640436F627DBFE9476B407FCB8EBD7EFC82Mar 11, 2017
3608C252B42A99FCC61846D290468C8917B0Apr 29, 2017
4640F95B5669031BD0D232691FB297CE106BMay 6, 2017
3608774B36371136FC8E8E2E9CEB69B2A534May 19, 2017
3608CB054095E6C8D64AD33D05B77BC174C5Jun 13, 2017
360860DE7B510199BA23219A890CE4477034Jan 4, 2018
5672C86153E6B01AE9180F12E1A425701F9BApr 1, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_zwinky.dl.tb.ask.com_0.localstorage-journal^

  1. To enable deleting the http_zwinky.dl.tb.ask.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_zwinky.dl.tb.ask.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_zwinky.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_zwinky.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_zwinky.dl.tb.ask.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_zwinky.dl.tb.ask.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_zwinky.dl.tb.ask.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_zwinky.dl.tb.ask.com_0.localstorage-journal. The name of the first found registry value referencing http_zwinky.dl.tb.ask.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_zwinky.dl.tb.ask.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_zwinky.dl.tb.ask.com_0.localstorage-journal and Associated Malware.