Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:October 27, 11:19

Testimonials

Over the past six months I had a lot of trouble surfing the Internet and working on my PC. I tried different free and pay antivirus software, but they were all of little help. I scanned with Exterminate It! It turned out that my computer was infected by five different viruses and Trojans, and your tool found them all! Now my PC is perfectly fine. I am really impressed.

Exterminate It is also very simple to use, which is essential for computer novices like me. I like it so much that I recommend it to my family and friends.

Vale R.

File: http_allin1convert.dl.tb.ask.com_0.localstorage

Location of http_allin1convert.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_allin1convert.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_allin1convert.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_allin1convert.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_allin1convert.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_allin1convert.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_allin1convert.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_allin1convert.dl.tb.ask.com_0.localstorage

If you find http_allin1convert.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_allin1convert.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_allin1convert.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
40966834115E80AD7B8DB054B9C4753429C7May 5, 2014
40966916089DDB549A94D22ABB0ED3A3CDA2May 5, 2014
4096D4BA8F36375D8A11B16FE4D2FE64F1FEMay 6, 2014
4096BEEB7EA1237F4B327BA49AEAFC3B9713May 7, 2014
40962CBDB752566D440D231E6B7D89249C7EMay 13, 2014
40963F01C982BC71169F2E6B4A75BA9CAF74May 13, 2014
4096689BE22EC52FAC17D08C63300750EF60May 13, 2014
409613DF0B9042A31E60DD7E39EAA6A26BE8May 16, 2014
409699712F2B44C94E30E1486C6E6CBF1000May 18, 2014
4096654423ABBE6050F1CBE3FCFC98908151May 18, 2014
4096CC1EDD8B2E9E0660D7D6984DF89C5238May 27, 2014
40969C3D76B63BED52494CF540029629D423May 28, 2014
40961C4DC327487047DB863C383B753D37D6Jun 6, 2014
409678B7412ACD5A9AE960112B497633F301Jun 8, 2014
40960DE334FF856361980E2D146486DA3B90Jun 9, 2014
4096E42734051D820B0249EC3ACA22C5156BJun 13, 2014
4096190FA3BF347DC5926B69056C06FCF85CJun 14, 2014
4096F3073C71F002B1912ED90B9D2AA5B9FEJun 15, 2014
40968BC0742DA2431FF3BA189D91FAFB5DB3Jun 15, 2014
40963E9502DCD21825D2425F68BA877E44CDJun 22, 2014
409661197C2385FF040E64521F7E4770D71CJun 24, 2014
4096AC29330F2CF42F1EF4152293A6A1132EJun 25, 2014
409673164BC113C3ECA25961CEB1BFF24963Jun 28, 2014
40962B4F6F846511C967A469B9E34307E927Jun 30, 2014
409641036CA68685319892FFAAB47D8A6CA2Jul 1, 2014
40969C75F73545005F89CB3A7F59FFB91D8AJul 1, 2014
40962C39CE241924AFB328EC9A56507046E9Jul 7, 2014
40966BB083ABF0F9FAFCAA1783D6AC55C463Jul 8, 2014
4096CE4638DDAFDBE10456B07B8C4BF5ED93Jul 8, 2014
4096012967F4CFEB582D8B9DD77F5D531D2FJul 12, 2014
40963DA70147E831669520EB92CE19866E1AJul 25, 2014
4096168FBDFBD2E4C8078F1CAE2EDAF0D9F0Jul 30, 2014
4096C70AB9E8B43302FC05BB34CA562FAEBBAug 1, 2014
4096ACE8F143CC49125F436C2895C43DA6C6Aug 3, 2014
4096B768716C0FDCAB84276CFF496FD2B312Aug 6, 2014
409610F97B0FA0B8CE433748B74404EA252CAug 8, 2014
40962F7B377A44FE4DA79FD331F8713DF838Aug 10, 2014
4096FCBBA810364D48FAC5B065AA762F5E80Aug 19, 2014
409671C5DD8AE28582445B7FA7B2DF3D3310Aug 25, 2014
4096A82C04C3159E5556D32F15A6F87387EAAug 27, 2014
4096DB449A8EA1CF0C3E58014182B0A46079Aug 27, 2014
409652C660CD2994F9883467D41A2C37F52DSep 2, 2014
40961E634377E56E9BFFC3FB25271C3ADF86Sep 7, 2014
4096CA5B13C6C3F80E89AED91DB92CF69F9DSep 14, 2014
409675BA0DCD4DC4F3D388BCFD36BADC1A71Sep 14, 2014
4096066867D8E98063F96DFE7D21DB6BFB6BSep 17, 2014
4096AE667BA945F4DDBCCD22D0678A500254Sep 22, 2014
4096787EB4077C025743CF28F9F0866F6FC6Sep 22, 2014
30722A3934D8DDAE40D1C8BC5002BD22AA14Oct 16, 2014
512048FB9D10B7EE3B9088E67799C2C82530Oct 17, 2014
40962F5571F967E5B1A1E3C41C90B3CDF0E7Oct 18, 2014
4096223EC74EEF782283F0F0661DA92F66D6Oct 20, 2014
409694B0CEE078E6753F17A6DF11B1A475B6Oct 27, 2014
5120CC1535E8A79C9A64A95E1CDAFA27D6A0Oct 29, 2014
51206E4A91ED59107DFA0D66601812162E3DOct 29, 2014
4096321A1B03576A216DA25C75E8F2127878Oct 31, 2014
4096761A0FEA8380959312AAE49816184983Nov 1, 2014
40960C58F36F5311E2732CC6B557A5B90589Nov 3, 2014
409646895EA9A64D4C7B3F8DE9E2B653A5E6Nov 3, 2014
40969F8B9E724F3B2845D3D0C98EFBF7120BNov 6, 2014
4096DE0FE34F36123F2DF3B553B293452DE5Nov 9, 2014
4096ADC921384BCE8D5E2C048D70733D9F98Nov 12, 2014
409618570CBD1F47CE28A2AB6CA14EE70B2DNov 13, 2014
409680F09638CC96BF601E3FAADF860D2A34Nov 29, 2014
51203DF76676492455AAE2CCA9763185A54ADec 16, 2014
40960EB65D081FBEB62C085230CF9338648DJan 10, 2015
51200569BE68EAF8E3A177151B51074E40C5Jan 29, 2015
512039B696129C83AE26D2D349309807B9B7Feb 9, 2015
51205B6C23E7B54D3882593979705B9A8D59Feb 20, 2015
512043884A7FE44C31CC68331CC53313431EMar 3, 2015
4096A0AE95015F9A28DEB160E45F64956CD2Mar 29, 2015
5120E11254934B420D946F9A0B6F0E4A1F1FApr 6, 2015
51206E3CB324174FE47AD7443E114E115D68Apr 12, 2015
40965A546E0E895BE24E2345876427DC9EA5Apr 24, 2015
51200486591378A8377B46DEEFDB48258C57May 1, 2015
51209CEB255F8180F9D6A2F63091D7D46023May 2, 2015
5120D59B60133E76514EF2F821CAB7692258Jun 3, 2015
512048F2270C60B037C13029B2BF8267DC3BJun 5, 2015
40968FAAD2BCA456E8985D88DD247B80F9CCJun 22, 2015
409648A367027C46C20229D8DEE08C99883EJun 23, 2015
5120CDA065773790AA8632934029458E2BDDJun 30, 2015
5120F7F082C7ABC0E7996F327901D94BC243Aug 2, 2015
409612E8DBCB7452D1C9BDE366F7225DB134Aug 14, 2015
40962841D21784687941A86F5127763B7823Aug 23, 2015
51200C0B32B1B0D563B1F0DAA1FB89D845BDSep 4, 2015
40966FBF4100D89C8DEB0D5FB1FA9BE6F820Oct 5, 2015
4096C49FFB6A43ED489E58B6944DA3EBA1A7Oct 6, 2015
51206EAEF2E3CE57DECB83F28E7DEF03C861Oct 18, 2015
4096E3084EE3DAAEF490C768DC77BCE8DF14Oct 22, 2015
92169DAF4D7CC1D0D3B1616A80FB85120DCDNov 20, 2015
4096C6B429F9C9AA3B3974CBC3265F4D8CB7Nov 28, 2015
6144F0ADCF388178FA0EAA57C20D0CB0F796Dec 12, 2015
5120E8A7021942B72E29E20E0F88DA200E66Dec 16, 2015
4096D87EF8E2BFE0ECCC8A6A18E6ED12EEEBDec 24, 2015
5120A94A34B05B6AADAC7EBB63A3C0D1ADE1Dec 27, 2015
409607F8AFF11D9C80ED679BC505CBF409C0Jan 6, 2016
307286162ECB111B44323696E3A1378413E1Jan 8, 2016
4096553544019B1B5B2D648121E1A7299068Jan 11, 2016
5120321D5EA4B3F46F8DC86E340CBB2D31B9Jan 17, 2016
409689111D5E1A6C752884EA3A1373510A5BJan 31, 2016
51200621654881C0F0AA3A202BE2E0E4C6A2Feb 1, 2016
30722B2EBA84E3AB8E88CC3F43D04965BBDDFeb 4, 2016
92163227F64547C200C79178727439595208Feb 16, 2016
5120FC1C668242385F01F9F5093FDE914FB4Feb 16, 2016
409603ACC10321C96C44F65F27D91BDF235CFeb 16, 2016
512029127E579B29E7F20BC6D31BA93DF90AFeb 16, 2016
409610B066F1002E189B0F0137BCB0263775Feb 18, 2016
71684013D7A0B97AE6A5CA9F3BEEB92249E8Mar 1, 2016
51207B5D23843FF833B368F7EFE8D26D0EFFMar 22, 2016
5120E362E5F6EB3FF0028E93A12E7B3F2241Apr 12, 2016
40960473A9C33FDDBD2A7994AFCA656FE2C8Apr 16, 2016
51207E4AD261119D6BC9BF60CAD2BFAE3B18May 6, 2016
51205E6EFBC43702DA0C006573EEEC38E81BMay 10, 2016
512009520D8B1FDD989894BF7E7406EBFC20May 18, 2016
30726C8EE75FE2EEDE12C049188E41C48883May 20, 2016
512055064FDC59E873CBC3675C391CAE5913May 20, 2016
409607E5CC2CFD7F2EECE2C93FC1E4B6566CMay 28, 2016
40966F1A2767742C75A9E4E8CB1E7846FA66May 28, 2016
51200F99DEF7FECF3CADB15ABA4D8EB5C8A9May 31, 2016
51206E2F1478B64173B302F7DC6598193EE0Jun 12, 2016
5120A7BF797EE2BB9C01B298D63D673EE2EDJun 14, 2016
6144C2D5CAA47AB03F5F5DE4F191F12453D7Jun 23, 2016
409606CEE7D2FA951EA9BAEF162FBECEC212Jun 24, 2016
51204D6309B1F260C10ECA976357E17F927BJun 28, 2016
5120281E9E6A1156D323AD654C23D17AE9F9Jul 3, 2016
40963C51F054AE2ADE3F7978B97F5AED93DAJul 10, 2016
6144FEE7B459C5351D5E7A9E37A22F861309Aug 18, 2016
5120C945433D912150EDE82229A87A9AFBD8Sep 29, 2016
5120FC85352E34A48F81E64A76F41D7A9C46Sep 30, 2016
5120C2E44844E7C32438CFE6FF753FF6C638Oct 16, 2016
512045B507C2BC7AFCBB6C78310D36B35049Oct 17, 2016
40967EC838B0A92D384EB867697E58E2247DNov 2, 2016
51207401EF7E4414C32DA4AEDDFCB0F6870BNov 16, 2016
5120C7078F37B7FE0A264F642E8943116C8ANov 18, 2016
5120FF5707790A615A9F8340559DEEDDD6E5Dec 4, 2016
40963370C74D461A6E7AE9D45B5D20ED18FADec 5, 2016
4096C23606D191716BA35F2297EDE0CF4D9ADec 7, 2016
409697FFAB0BB49E740ADB9CD9593B088F7DDec 11, 2016
71685A478B0DA0ABF8218046AF9D7D519832Dec 15, 2016
6144DD60F1400639164424EE67A6F7EE5023Dec 19, 2016
512015A80BBC59D2EDBF2A0CBF059310E769Dec 30, 2016
614467CDDF18490D8A86DBE3315320D00C90Jan 17, 2017
512078AA117148FA1D39B5790EA0380F33C7Jan 20, 2017
40964279B6B556C74F1E64F648EC13A5C6C6Jan 27, 2017
6144D622102A4201602BD1CF41CE2B290C48Feb 28, 2017
409616692114BF71950A9387B13C5AE019F4Mar 18, 2017
512082B6B0CE3697B28EE14675CA3548209DApr 4, 2017
5120566B3D3A15E7FAD3C0940C05106DBBB8Apr 13, 2017
512003C822BA283540BC70E60F0B247036D1Apr 28, 2017
4096CDE16BB06A2FC14B399C3C47A707C07DMay 16, 2017
512038B2201C465A697B7EC5492AFCCBAEDDMay 24, 2017
5120C998F577D062EA4EF909E7340831EE57Jun 8, 2017
6144111F42BF3563F7A6B09C537A25CD7254Jun 25, 2017
5120695063C419B532EBDDDCD0391850D22EOct 11, 2017
6144A2F34FA4B855DBDB594F5963B43C385FDec 8, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_allin1convert.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_allin1convert.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_allin1convert.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_allin1convert.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_allin1convert.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_allin1convert.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_allin1convert.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_allin1convert.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_allin1convert.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_allin1convert.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_allin1convert.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_allin1convert.dl.tb.ask.com_0.localstorage and Associated Malware.