Exterminate It! Antimalware

malpedia

Known threats:661,734 Last Update:November 22, 21:37

Testimonials

Hi,

I'm very happy with your performance. I'll be a customer for life. Winctrl32.dll has gone. I have 4 other Bought and Paid for Malware programs that I have but none are as good as yours and none have the same individual response times as good as yours. Some do not respond to help At All.

Great job!

Richard D., Western Australia

File: http_getformsonline.dl.tb.ask.com_0.localstorage

Location of http_getformsonline.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_getformsonline.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_getformsonline.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_getformsonline.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_getformsonline.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_getformsonline.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_getformsonline.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_getformsonline.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_getformsonline.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_getformsonline.dl.tb.ask.com_0.localstorage

If you find http_getformsonline.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_getformsonline.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_getformsonline.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
51206FAF2C7F6A61E3D73AB02CB623F554AEJun 30, 2015
51202932F9BE08E670479534B241604C3071Aug 12, 2015
51208B3CD769D0663B3FA08D830EB1D5D345Sep 11, 2015
5120BF9C26C6499CADE909FCD0229F4AB6A2Oct 7, 2015
5120B6002B048A1FFC9FCFBF748ED9D0B800Nov 2, 2015
51203AE0231F916436BF820F8C5B16F23585Nov 28, 2015
716815FE7489B9FFF68DDE9BC216D27326E5Jan 7, 2016
51202C44B5469E33C1BFC5AB9C787DBF34F5Jan 13, 2016
51209CF28925DE0955708D611FFF1114E32FJan 28, 2016
5120837C0525F9D37670B58410F96788EE93Feb 1, 2016
5120E11AE2B263A55C7FB1CC3452A91787D7Feb 4, 2016
51206721E12045658F3E929BBE71C0014E59Feb 11, 2016
61449D9D1836A320AAF30AC5D18FCFE6A74DMar 16, 2016
512073C26751995CAD9F69A3340DC508602DApr 6, 2016
51205A1F775C987AFE3C359DC13A55647AE8Apr 14, 2016
5120D2B06F2090245289A3BC7182DB01D962Apr 20, 2016
5120D5C4215E54BF8D2724092325DF02EF76Apr 26, 2016
5120C4692C44E9E114B30EA61BBBAC1B7A29May 1, 2016
6144F22E812991738B7C5403016F873600B0May 4, 2016
307247FD31DCE939D69C13C99B7CA66ED062May 14, 2016
51200A04A2164967EFC9E5043579939E061CMay 20, 2016
5120057196DC33A271ADE8CC27B59264F97DMay 23, 2016
5120A2B25EDF536BAD4C47A266925A175B32May 24, 2016
51201C46BF4365CF392C7ADCA8ECC3C49EEBMay 26, 2016
51207DA8A75D64B527E9F6005D9C38FA9B93Jun 19, 2016
51206F8F0D97D867A59C84D5A569378E7ED4Jun 20, 2016
512077FFB11D9DCE3A01F41669FA2861231DJun 23, 2016
512032BEC2AA0ED13407FC1F47B676C35099Jun 26, 2016
5120A652752D548A8128CB1929F1C7D9C7A4Jun 27, 2016
5120B9D99322AF906D0434150E07AF314AE1Jul 9, 2016
716871F1F23CBB5F0A094873B9A376649A12Jul 15, 2016
5120D91062E62DD75576D8AE9932330279BAJul 18, 2016
5120DF4ECF135B04873A454FA82C170FF0B8Jul 23, 2016
512073E65D3032E30BEEBA8AEB3FF907C121Jul 25, 2016
512095175575D54260C5983541F5E5F04722Jul 30, 2016
61449BAFC93586992DF1B7A9602C2386FBEBAug 14, 2016
61449802DBD9FBCE3F395D1192D4E82F3345Sep 12, 2016
6144C955545C0F7BD4A17CE5C847CC2F6C97Sep 15, 2016
6144EA37EB29B2D27E8F007217C4F2DE1999Sep 16, 2016
614487A1F3FAE4132854D886E5234ACAF8EBSep 26, 2016
614472FBCE6E12083E49591CAE3D34F9ACD4Sep 28, 2016
6144A9832910B576CC4C0326FF3E72AED042Oct 8, 2016
512060C8614A1BC5B00E7764A0830E059EE7Oct 13, 2016
61444DAEE754BDC2316925622E358F59FE55Oct 20, 2016
5120F01CAC975AD568A736775A0706EC4575Oct 30, 2016
512056D432DAC8770C802B5EDAE2E041FDB1Oct 31, 2016
6144902087B7FD62DDDE5D22DDB33B25D965Nov 9, 2016
6144DBF08546525752CF25894BBF345609B2Nov 9, 2016
6144FFBB48811CCFB638AF18F7029E379531Nov 14, 2016
61440FF6765227DB6F73C69354917F1A2DC9Nov 14, 2016
6144DD04893245F04D980EB2FBBC512C57BANov 17, 2016
7168C7A46AF79FA8A0F452B7FB46A5BD2499Nov 18, 2016
6144611D328EACC80E9628377F3376C93244Dec 6, 2016
512017D3772E5F8567203EE2FF0A47B9F23BDec 7, 2016
5120447D02545BC60BD78BFFBBD92BC194B7Dec 7, 2016
5120528F15CC9CFFC92F10AA147037006468Dec 9, 2016
5120F629253A5E5F64DCD94499A3A6F5948CDec 10, 2016
51207497CFD45899CA89A336169A1395D32EDec 10, 2016
30720B2FDDAECB7C3028A40207FBBB8C263EDec 14, 2016
51203F7681AFB62557EB23B41A207CAAC6F9Dec 21, 2016
51203E768911B4A52C06195FB35D96D8FE3CDec 21, 2016
51204DC694E8936467B1DAF4C90E8DA9FB41Dec 26, 2016
5120C98833B19C19509D970C3095EBE66885Jan 16, 2017
51201FD012FADB9E70C3BFD4ECA19B3DDF16Jan 17, 2017
51205C55D0DB306E260D40A4142E4B4BC773Jan 30, 2017
3072DBF15B9B469FDAFCABE768459692AF6AFeb 5, 2017
61443149D94024A1045D5FEB22B1369FC77BFeb 8, 2017
61447C2F3470C73792B73CE847CEDB29EFCBFeb 8, 2017
716810A515484546F4FA787950A27AEEB10DFeb 11, 2017
512083F8E18D195520897F23775ECFB48904Feb 13, 2017
614439E17F9F0EC81B7A84EF7584955722FBFeb 13, 2017
614410B493574CDC94C2EC5C07A4C5996DA5Feb 14, 2017
51201EB09B22E87A6607CE74374F8DF2A523Feb 18, 2017
61448B78DE13FFAB309675B7C348A0233F35Feb 23, 2017
512023D89D7D9397F2C9BCF5E87623ECA072Mar 7, 2017
5120440D9A8A36B6D507B11BA56D913E0925Mar 10, 2017
61442CED6A5F14A9AB6CF0C471EB6680AB01Mar 16, 2017
5120D71FC1BFACB28050C83504965654AAB4Mar 22, 2017
51208771081D04B07837C4516D49392BDB12Mar 24, 2017
6144B360080CE8BEA0B3EB2119E79EF3A03BMar 29, 2017
5120CAEEE94EA619A49F2263407167157F69Apr 1, 2017
5120CE2B927BFF651182B0B39E1C985824EDApr 6, 2017
51206E8DE22922628628B869F287C005EAAAApr 14, 2017
5120C05B16AA9842F57E0D70A41166B86BA5Apr 15, 2017
512001BC173F0943F12868FA979CF51E30B3Apr 17, 2017
5120AB201081ED0AC4F7F1A1EBCCA5CD1CC0Apr 17, 2017
61448BB3D2B2916210403C9E3F35642F26CBApr 22, 2017
614443D1423C24ACE8434B056FB5DA57D2A9Apr 22, 2017
5120C5216D574D7D50C14AC68A98B00DEBFEApr 27, 2017
5120DFE4E87C09C9509BCB0EC94564E30FF5Apr 29, 2017
5120B72F8E6CAC64B689983C86288C1C5E86May 1, 2017
61449098B6CE1DB1AA06E5772196EA0DB57EMay 5, 2017
6144CCC0B9576B17338DCB305FAE5BDFADC5May 8, 2017
6144083BFCA56C2B0778578566293935FDA8May 13, 2017
61441B9A2D1013C6A8317FCDE69D879B8E56May 13, 2017
61448434FEB8BD66B04F6AA87DC1FE8D10CAMay 14, 2017
61440712AC45E5DE7C73E874604516B1812DMay 16, 2017
51202C62501EAA669A38A9899295FACFD79CMay 17, 2017
6144DBFA97C99D9B0A8066B4EAB995A96814May 23, 2017
51209E3DE5287A5E38541B5EC2965A50C8A4May 29, 2017
5120EE1DB7FEE3965A0ECAAC864508A98DA3May 30, 2017
7168F11157EADCAF08ED32767EA2E114B022Jun 6, 2017
51204E0C8603A7E84A0F3D8264A09642284FJun 6, 2017
61445C65A5FFD9C4C15B72EA208E0162EE5FJun 7, 2017
61447055FC61FE6E3D6B4F9FDDA3D7520FA9Jun 9, 2017
7168F1E4E25CF93957810911F54595B6E99EJun 9, 2017
6144629A8D1DC89F4CF554A5A7E6761D8AB8Jun 13, 2017
6144E61C2B921EB53AA8B654B4D6E05C5558Jun 18, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 26, 2017
1228833D0CAC56068CD4FDBC49A9E80D02B84Nov 5, 2017
61449CE8808509058FC55B2799A7D0F1D40ANov 22, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_getformsonline.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_getformsonline.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_getformsonline.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_getformsonline.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_getformsonline.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_getformsonline.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_getformsonline.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_getformsonline.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_getformsonline.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_getformsonline.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_getformsonline.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_getformsonline.dl.tb.ask.com_0.localstorage and Associated Malware.