File: http_couponxplorer.dl.tb.ask.com_0.localstorage
Location of http_couponxplorer.dl.tb.ask.com_0.localstorage and Associated Malware
Check whether http_couponxplorer.dl.tb.ask.com_0.localstorage is present in the following locations:
Windows 2000, Windows XP, Windows Server 2003 specific http_couponxplorer.dl.tb.ask.com_0.localstorage file locations:
- C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_couponxplorer.dl.tb.ask.com_0.localstorage
Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_couponxplorer.dl.tb.ask.com_0.localstorage file locations:
- C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_couponxplorer.dl.tb.ask.com_0.localstorage
If you find http_couponxplorer.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:
Notes:
- You can check if http_couponxplorer.dl.tb.ask.com_0.localstorage is associated with the malware listed above by running a Exterminate It! Free Scan.
- You can easily remove all the files listed above with Exterminate It! Antimalware.
Different Variations of http_couponxplorer.dl.tb.ask.com_0.localstorage File^
File Size | File Md5 | Last Seen |
---|---|---|
3072 | 53554D0D6BE2F579B152CFA0752150DC | May 6, 2014 |
4096 | C23CA171460EF84306B479CB8DE4E020 | May 21, 2014 |
4096 | F869219B8D28C564FD349022118542C3 | May 25, 2014 |
4096 | 44D05FDAC7F67B83CA5F0055E8EDE669 | Jul 10, 2014 |
3072 | 85FE4B5774213D501082DAFD3A068066 | Aug 7, 2014 |
4096 | 8B680C9D490C3C45D2858D97274381EB | Sep 3, 2014 |
4096 | 5D45B66CF922C75BFB6FF6740A33CD66 | Sep 21, 2014 |
4096 | 28DA244375268D86FB9C72653A84BC61 | Oct 9, 2014 |
4096 | FB0ADEFF5A8F9D8A38CF7650A9658D08 | Oct 30, 2014 |
5120 | 235B623FA0216F29298F120B7D6CF393 | Nov 6, 2014 |
5120 | 055083BDB28A778DC379FFDB9F1DD8D2 | Nov 8, 2014 |
5120 | C396B6A5CF7F410F2955E05FA399422F | Nov 11, 2014 |
5120 | C24C8495069AB03118371A1D3D485E4F | Nov 14, 2014 |
5120 | 2EBBF6A248F2DA9D3AD7AB2FB54E0B3F | Dec 24, 2014 |
5120 | 715ECC8147BE195ADE82B19D77E58B48 | Feb 21, 2015 |
5120 | 814351E81890B27615EAFF678E3147C7 | Feb 21, 2015 |
5120 | E4A07B832CB0659D5186FF1B63F52461 | Mar 24, 2015 |
5120 | BE7A98CDBEC68DC332C14D96819A19DC | May 14, 2015 |
4096 | 8252AFA752DB0829A08091EFBD286238 | Jun 11, 2015 |
4096 | 832EBF1A9DA49DCD662C2252C36BF318 | Jun 16, 2015 |
5120 | 436BEB6C0DE880124EF6A7D1741328A5 | Sep 28, 2015 |
3072 | 6CD54D6393B53D18C66DB649F39FAE08 | Sep 28, 2015 |
4096 | F16FDA1A913D960283E3C76716430BF0 | Oct 6, 2015 |
5120 | 7CA3AAF75D674CB804F1DC067265EE15 | Nov 9, 2015 |
4096 | 56BEB1B98C64CDF91F244E0FC38F2362 | Jan 15, 2016 |
5120 | 96073F0CFDF9920AC29C60F9EA94100F | Feb 3, 2016 |
5120 | B1440D46029C560D172BF58871F5C944 | Mar 20, 2016 |
5120 | 3C8CE9AA2EEAD65859AF0D77993BA5BF | Apr 23, 2016 |
6144 | 516D188499E8C4129A933DBD6DE722F2 | Jun 6, 2016 |
5120 | DE8F273124E894499F6924B52F8B0102 | Jun 10, 2016 |
7168 | 2449DCB018B50EF72FF04A439A7DD6DA | Jul 20, 2016 |
9216 | 449701468E1C3F0FA39D2158CA6E5DC1 | Jul 31, 2016 |
6144 | F7F5C88ED91237A29E2C5F13ED11252B | Sep 2, 2016 |
5120 | A5CFD370AB3BE4D8B4129499C4970768 | Sep 9, 2016 |
5120 | CE98F3BFAE935E252531103741AA6851 | Nov 18, 2016 |
5120 | F54714BEB873769A6E4E3A72CDF0B553 | Dec 3, 2016 |
6144 | 11F0C8D242C23B0FF7E074B8D2510539 | Jan 8, 2017 |
7168 | 0C5E6C1D62C71E8BBFCD8CD02015C7B1 | Jan 24, 2017 |
7168 | 1607C2FC14356B7C2626666F4F6669C6 | Jan 29, 2017 |
6144 | 19265A64A9D44F36A645179C4D540CF2 | Jan 31, 2017 |
6144 | 4E52F744A0320D4F459B530AB5581CF5 | Feb 18, 2017 |
7168 | 6A7739BADBEE3D44364D4536BC4B3726 | Feb 22, 2017 |
7168 | FB1CB05DF73B7B33EF530F0C7A08970D | Mar 17, 2017 |
7168 | 6E76896B5EB46E7089C8A386DF42EE1D | Apr 5, 2017 |
6144 | 1930A9BC6EA97A4D51BDEF9A879B633B | Apr 8, 2017 |
7168 | 80F47F10A044BE4D0F0CE30B78C35B57 | Apr 18, 2017 |
7168 | F33BB19B2AE0ECDBA48C5D3CAF72E47B | Apr 22, 2017 |
6144 | 3B03D756FF6E7998A3D6E3D596AD2535 | May 6, 2017 |
6144 | 921956D767E7E8A7E7EC106E94C07B7B | May 16, 2017 |
7168 | 1DD7983BA5516121DB28C2EEEFB2C968 | May 21, 2017 |
3072 | 9D73523F290421395D65C7B2D8E3ACBB | May 25, 2017 |
6144 | 55BC945BA3F818077892A97EE5C09D88 | Jun 3, 2017 |
3072 | 86162ECB111B44323696E3A1378413E1 | Jun 9, 2017 |
12288 | 33D0CAC56068CD4FDBC49A9E80D02B84 | Oct 8, 2017 |
Why Is It Important to Remove Malware Files?^
It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:
- Disrupting the normal functioning of the operating system or rendering it completely useless.
- Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
- Directing all your Web searches to the same unwanted or malicious sites.
- Dramatically slowing down your computer.
- Gaining total control of your PC to spread viruses and trojans and send out spam.
How to Remove http_couponxplorer.dl.tb.ask.com_0.localstorage^
- To enable deleting the http_couponxplorer.dl.tb.ask.com_0.localstorage file, terminate the associated process in the
Task Manager as follows:
- Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
- In the Tasks Manager window, click the Processes tab.
- On the Processes tab, select http_couponxplorer.dl.tb.ask.com_0.localstorage and click End Process.
- Using your file explorer, browse to the file using the paths listed in Location of http_couponxplorer.dl.tb.ask.com_0.localstorage and Associated Malware.
- Select the file and press SHIFT+Delete on the keyboard.
- Click Yes in the confirm deletion dialog box.
- Repeat steps 2-4 for each location listed in Location of http_couponxplorer.dl.tb.ask.com_0.localstorage and Associated Malware.
- The deletion of http_couponxplorer.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
- The deletion of http_couponxplorer.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.
Notes:
Deleting Locked Files^
You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.
After you delete a locked file, you need to delete all the references to the file in Windows registry.
To delete a locked file:
- Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
- Restart your computer.
The file will be deleted on restart.
To remove all registry references to a http_couponxplorer.dl.tb.ask.com_0.localstorage malware file:
- On the Windows Start menu, click Run.
- In the Open box, type regedit and click OK. The Registry Editor window opens.
- On the Edit menu, select Find.
- In the Find dialog box, type http_couponxplorer.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_couponxplorer.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
- Right-click the registry value name and select Delete on the menu.
- Click Yes in the Confirm Value Delete dialog box.
- To delete all other references to http_couponxplorer.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
Matt,
Thanks so much for your help. For now, this seemed to have solved the problem and found all the infected files. I'll keep you updated, as I know this virus can be very hard to kill.
Thanks a million.