Exterminate It! Antimalware

malpedia

Known threats:688,080 Last Update:December 14, 08:29

Testimonials

Matt,

Thanks so much for your help. For now, this seemed to have solved the problem and found all the infected files. I'll keep you updated, as I know this virus can be very hard to kill.

Thanks a million.

Jason

File: http_couponxplorer.dl.tb.ask.com_0.localstorage

Location of http_couponxplorer.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_couponxplorer.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_couponxplorer.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_couponxplorer.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_couponxplorer.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_couponxplorer.dl.tb.ask.com_0.localstorage

If you find http_couponxplorer.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_couponxplorer.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_couponxplorer.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
307253554D0D6BE2F579B152CFA0752150DCMay 6, 2014
4096C23CA171460EF84306B479CB8DE4E020May 21, 2014
4096F869219B8D28C564FD349022118542C3May 25, 2014
409644D05FDAC7F67B83CA5F0055E8EDE669Jul 10, 2014
307285FE4B5774213D501082DAFD3A068066Aug 7, 2014
40968B680C9D490C3C45D2858D97274381EBSep 3, 2014
40965D45B66CF922C75BFB6FF6740A33CD66Sep 21, 2014
409628DA244375268D86FB9C72653A84BC61Oct 9, 2014
4096FB0ADEFF5A8F9D8A38CF7650A9658D08Oct 30, 2014
5120235B623FA0216F29298F120B7D6CF393Nov 6, 2014
5120055083BDB28A778DC379FFDB9F1DD8D2Nov 8, 2014
5120C396B6A5CF7F410F2955E05FA399422FNov 11, 2014
5120C24C8495069AB03118371A1D3D485E4FNov 14, 2014
51202EBBF6A248F2DA9D3AD7AB2FB54E0B3FDec 24, 2014
5120715ECC8147BE195ADE82B19D77E58B48Feb 21, 2015
5120814351E81890B27615EAFF678E3147C7Feb 21, 2015
5120E4A07B832CB0659D5186FF1B63F52461Mar 24, 2015
5120BE7A98CDBEC68DC332C14D96819A19DCMay 14, 2015
40968252AFA752DB0829A08091EFBD286238Jun 11, 2015
4096832EBF1A9DA49DCD662C2252C36BF318Jun 16, 2015
5120436BEB6C0DE880124EF6A7D1741328A5Sep 28, 2015
30726CD54D6393B53D18C66DB649F39FAE08Sep 28, 2015
4096F16FDA1A913D960283E3C76716430BF0Oct 6, 2015
51207CA3AAF75D674CB804F1DC067265EE15Nov 9, 2015
409656BEB1B98C64CDF91F244E0FC38F2362Jan 15, 2016
512096073F0CFDF9920AC29C60F9EA94100FFeb 3, 2016
5120B1440D46029C560D172BF58871F5C944Mar 20, 2016
51203C8CE9AA2EEAD65859AF0D77993BA5BFApr 23, 2016
6144516D188499E8C4129A933DBD6DE722F2Jun 6, 2016
5120DE8F273124E894499F6924B52F8B0102Jun 10, 2016
71682449DCB018B50EF72FF04A439A7DD6DAJul 20, 2016
9216449701468E1C3F0FA39D2158CA6E5DC1Jul 31, 2016
6144F7F5C88ED91237A29E2C5F13ED11252BSep 2, 2016
5120A5CFD370AB3BE4D8B4129499C4970768Sep 9, 2016
5120CE98F3BFAE935E252531103741AA6851Nov 18, 2016
5120F54714BEB873769A6E4E3A72CDF0B553Dec 3, 2016
614411F0C8D242C23B0FF7E074B8D2510539Jan 8, 2017
71680C5E6C1D62C71E8BBFCD8CD02015C7B1Jan 24, 2017
71681607C2FC14356B7C2626666F4F6669C6Jan 29, 2017
614419265A64A9D44F36A645179C4D540CF2Jan 31, 2017
61444E52F744A0320D4F459B530AB5581CF5Feb 18, 2017
71686A7739BADBEE3D44364D4536BC4B3726Feb 22, 2017
7168FB1CB05DF73B7B33EF530F0C7A08970DMar 17, 2017
71686E76896B5EB46E7089C8A386DF42EE1DApr 5, 2017
61441930A9BC6EA97A4D51BDEF9A879B633BApr 8, 2017
716880F47F10A044BE4D0F0CE30B78C35B57Apr 18, 2017
7168F33BB19B2AE0ECDBA48C5D3CAF72E47BApr 22, 2017
61443B03D756FF6E7998A3D6E3D596AD2535May 6, 2017
6144921956D767E7E8A7E7EC106E94C07B7BMay 16, 2017
71681DD7983BA5516121DB28C2EEEFB2C968May 21, 2017
30729D73523F290421395D65C7B2D8E3ACBBMay 25, 2017
614455BC945BA3F818077892A97EE5C09D88Jun 3, 2017
307286162ECB111B44323696E3A1378413E1Jun 9, 2017
1228833D0CAC56068CD4FDBC49A9E80D02B84Oct 8, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_couponxplorer.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_couponxplorer.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_couponxplorer.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_couponxplorer.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_couponxplorer.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_couponxplorer.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_couponxplorer.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_couponxplorer.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_couponxplorer.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_couponxplorer.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_couponxplorer.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_couponxplorer.dl.tb.ask.com_0.localstorage and Associated Malware.