Exterminate It! Antimalware

malpedia

Known threats:700,086 Last Update:March 16, 12:51

Testimonials

You guys are freakin' awesome, love the program, love the personalized service, and my pc loves it too :D

Justin S.

File: http_eliteunzip.dl.tb.ask.com_0.localstorage

Location of http_eliteunzip.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_eliteunzip.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_eliteunzip.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_eliteunzip.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_eliteunzip.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_eliteunzip.dl.tb.ask.com_0.localstorage

If you find http_eliteunzip.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_eliteunzip.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_eliteunzip.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
409689094626338F3523C933105B10E8FAF5May 26, 2014
4096438F8813ED7C719E926DA06D883F1F66Jun 28, 2014
40960DC03C122C4B223D9C01B7EA06EFF07FAug 1, 2014
4096BCCDB20E47EA84D40CB94321CC905BF9Aug 1, 2014
4096725FC105B611101D8E4F0D7940164427Aug 5, 2014
409681EDECC38CFFF9920C9AC6AF32EB6BDBAug 9, 2014
4096B97C032F539FDDEEF69C9F717456DEB2Aug 11, 2014
409625B56C3ADE64103071705243B5C3CA98Aug 17, 2014
40968E049F246E9B6389E673AC9FF680A061Aug 17, 2014
4096C7B2E443FCEB8C57A977E3A8CA5E0C6ASep 17, 2014
4096FE63AE8B43DE855A473C23E5FFF0DE37Sep 21, 2014
40963A2F0920EA59115370ADC1E96F3380ACSep 23, 2014
4096DC7E45CD60F61EB21EE5A856D2565F2FSep 26, 2014
40966E4B39B2D490FA591710BB1073F8E4F5Oct 12, 2014
4096F5BB63248593E66F385D9911D1095945Oct 26, 2014
409635D8A6B669814DC02DB23E8B73E13775Oct 27, 2014
51207C79EEA0D25A1EC3020B1424C4F13B9COct 28, 2014
40967B36AF0888C0E1641DBB45F0B63E5B39Oct 28, 2014
4096D1484D2EAF58BBFC0AC2E5B12F048380Oct 29, 2014
51201E52C79F131D1DB88D0B9989D830833CNov 2, 2014
40969241D08388D1D6D3596E7D878898F517Nov 3, 2014
40968323188FFA0A60D76D982125FC5C3EE1Nov 5, 2014
5120F790CF76F03638A08D3B39A2FAA5044BNov 6, 2014
40965A52F876B07196496D70843DFA952DCDNov 8, 2014
4096B055EAB87BA3658C1315C023EC0B8BA9Nov 10, 2014
51203B078B4E098208E9377AEE87DCC4A77ENov 10, 2014
5120B3D402365261FBC08CFB2B29087856C7Nov 11, 2014
4096AFFC92D2F3EE45ACA83794BF709D0F4ENov 12, 2014
4096D953F8D3BBD5816AC20919348573A427Nov 12, 2014
5120A3B8BA2381AF4CE862EE45706A961F2FNov 13, 2014
512099A0BAADEAB592CA689ED6C4C078095BNov 13, 2014
5120274131F342094E959AC676DF4113064FNov 30, 2014
5120474AD81B2FEA86BCB959C14B612A392CDec 11, 2014
51206480DF7658372524B4DD4DB0955E87EEJan 8, 2015
512004A4F5A230899DB62EFA037D449D28B0Jan 21, 2015
51204FDA6BF57C69BFBB98E148497419DD83Feb 3, 2015
512050F9E20598420D5AC12AF6DB6C502502Feb 15, 2015
51208CDA9A2EA8F00931C6F0B78DF166FE50Feb 20, 2015
5120257B630B67674700328FAB8D988DD10DApr 1, 2015
5120A6E745ABD0BC3B26D0ADE91148FAC0FAApr 1, 2015
512086AC9161F53650FC3E49031F402B885FApr 1, 2015
512089ADAABF8315A9CFAC75C731E3B94464Apr 22, 2015
51200E9765B23A8CC7A2F16D18785F5ECBE0May 2, 2015
51208D31EFF3917D8DC500CFD2D5DB6AA6FFMay 4, 2015
512081FAA32BB48E422E0412252E0DBEC1C4May 7, 2015
51201CB5ECC54846E2C753DFA29E94D187DCMay 11, 2015
5120E7A26DE9C1553EC552B78049919B61FCMay 25, 2015
512053A128CB6AF581CC99968443F5E045C7May 26, 2015
5120570A7CEA9666C3198391DCA623B56FB7Jun 14, 2015
512048583F2C9273536128258AC544065061Jun 30, 2015
5120130CF87311858E378215E7464C3C5CB3Jul 13, 2015
5120A7CB540022542EBAF641B64A11B88F0AAug 23, 2015
4096DB0856BF6DD7E69695243866C00D62DBSep 4, 2015
5120A728E7988F910CEE94D9038F6DA49133Sep 4, 2015
5120454BCCFA28B0B500265AC18CD7A495EDSep 30, 2015
51209DDD13FD972125818A95F73A9443DD43Oct 4, 2015
51201A012FEE39D4F8C2F9FEDEFD064F2D67Oct 7, 2015
512071888DF232834CC68E474FFC2B376C07Oct 7, 2015
51203397E15C5FED1232531AECA4A83E0FBCOct 23, 2015
409636EDA738D797FC6DDC36F210EB005104Oct 26, 2015
512038B765AE5D03FA7401A643497BAA66CBNov 2, 2015
51207DDE4AB7EBF8F8BFEF102C9459468210Nov 22, 2015
614410B9CFB34F2EC930D693DF5D4C7D117FNov 27, 2015
6144160A52ECD00A45B592C61F021EFCED45Dec 1, 2015
4096A374D8ED6493AD20DDD9845C691FCD1ADec 19, 2015
5120F91C84F4DB009403B6AE5A89E3A6E29FDec 25, 2015
40962B5BAB166E15F89F8922FC88FDA1FE8DDec 26, 2015
5120F51B56FB28531DBCF2E2F8D6F52E9E6DJan 7, 2016
5120D358F33E4014C69461760CF7956634FFJan 12, 2016
51206288EC2B19B312AA74766DA21D370E73Jan 22, 2016
51204ABD1F6623E6AB2109B5B268730F40EBJan 31, 2016
512018B9F7CB8BFE304F6BF92BF3C9D23E76Feb 2, 2016
5120E2DDE0510659C7F269C521F08123DA05Feb 10, 2016
512018BE9E4E64C6065115BC81816492A8A6Feb 16, 2016
4096B32AED382C6F03EA0C14ABE0B6761682Mar 6, 2016
61442CC52111DED9263F32226A29DFFBE3E6Mar 9, 2016
51202E004A6A527C517F0181364FEFCBBC65Mar 20, 2016
409681012168EF1E5684187F8B71D0B356D3May 1, 2016
40964734119FA7775B1E0136A5A5D41A268DMay 3, 2016
512004B95B3CA547197DF84BFFE8DFF04C02May 4, 2016
51209C876D5F8E13F90DFED4940E806D16D2May 15, 2016
5120666D2010940A5A19F08F7C064260E4F7May 18, 2016
409614A49223B162D4E3CECBF577F3DFBE35May 26, 2016
5120CCD9461C014ACD99653551D18BAD608CMay 31, 2016
512043DA4C27BB8305093E5BAA669FDA5928Jun 16, 2016
5120E9A49C8CEA861B4AD432C242A16ED7DFJun 22, 2016
4096C7E14738180DAE09E6D6C9D2FF0FDF6CJul 6, 2016
51209388BCEF3FCD37F1B657F26ECF37F52EJul 6, 2016
61445A8DE8CBF5B1DF911FAA493DC9FD12D0Jul 19, 2016
4096CF1ABE19C3AB839E81C2D6BA2C5DA9B2Jul 23, 2016
5120A0B15DE26B5AEB09F7B3569978FB8F1CAug 7, 2016
4096F056E6BDB398BCCAF7061E3789D70E3BAug 31, 2016
5120A78B815F87E434D92CC5CAD7F57FE54DSep 16, 2016
51203EAD7B6D0B6E321F266EB618AD9C66BBSep 28, 2016
51205CAF50F09AF3B300AA687CC0F86A103ENov 3, 2016
5120947CE5AE1CA44DB9671E464F65A34C1ANov 16, 2016
5120C938CC1B52DDF8002933302CBD14446FDec 5, 2016
5120003B90862C6A0078E2E807DF9D69D0D3Dec 7, 2016
51208C7ACE849CA1EC01C5C64D82C1FC6476Dec 8, 2016
4096CD7BA95DD7DF704513B895F18D1A3CA6Jan 1, 2017
512030A8C0746252808E1F7DFE6A9D1FA170Jan 1, 2017
5120D8A1A33357D15E1D22F63DFE0A57F569Feb 15, 2017
4096ED576280900BE394A8925F72B05B386DFeb 23, 2017
5120EBD5F4BE38606366DD5655C63EAFA824Feb 26, 2017
5120C7F55254D90E81D797D00730E4C3322AMar 11, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_eliteunzip.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_eliteunzip.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_eliteunzip.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_eliteunzip.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_eliteunzip.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_eliteunzip.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_eliteunzip.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_eliteunzip.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_eliteunzip.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_eliteunzip.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_eliteunzip.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_eliteunzip.dl.tb.ask.com_0.localstorage and Associated Malware.