Exterminate It! Antimalware


Known threats:700,086 Last Update:March 16, 12:51


A Big thanks to you people, who have developed this product. My Windows XP Media Center OS was infected with Win32.Renos, Backdoor, XPAntivirus, Xta.kill trojans, spyware as I use rapidshare links a lot. I have licensed McAfee, which is good for nothing and was unable to protect my laptop from these malwares. I tried trial version of Bit Defender, Sunbelt Spyware, Claim Win, A-Squared, but they were unable to do a complete detection and removal of malwares. Exterminate listed all the malwares and registry changes done by them, like task manager, registry edit was disabled. I bought a single PC license, activated, scanned my system thrice and my system is now free from all malwares and viruses and running absolutely fine. I still have to use Mcafee as I have a licensed version but buying Exterminate IT is a worth of £20 spent on it. I will recommend this to everyone who use P2P sites or rapidshare or torrents. Now, I dont have to worry about any malware as I have Exterminate in my system.

Rajkumar P.

File: http_howtosimplified.dl.tb.ask.com_0.localstorage

Location of http_howtosimplified.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_howtosimplified.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_howtosimplified.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_howtosimplified.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_howtosimplified.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_howtosimplified.dl.tb.ask.com_0.localstorage

If you find http_howtosimplified.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_howtosimplified.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_howtosimplified.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
4096DA0417A63D1B63267EBA0AD990104FADMay 6, 2014
409652E5089536776C03F5397245879FEE13May 9, 2014
409631F7ACE1D21BBAC67352EBCBECE1E8C7May 18, 2014
409625F7208C41BF00081903F1D543F6C52DMay 30, 2014
4096629BBBE6A20D5F6F22BBFFA0D684E693Jun 2, 2014
409602A4874B2547A8D81681E87E4AC92762Jul 3, 2014
4096B0B2853A9E1EDD60487390574FE523FCJul 19, 2014
307273A658CE66E64685A1378AFD7519C92FAug 1, 2014
4096295180B1291634B15A8666E164875D0CAug 26, 2014
40966C6AC769CA19304DBFA6E434376FB7FDAug 27, 2014
3072EFB4C441204D0B8E7EF688FE8EA71BF7Sep 11, 2014
409618D5653862AD0AB627CCBA7B19D227FDOct 26, 2014
4096A67D3200CA3ED641A439FE803649A6FCApr 4, 2015
51203E9AF8BCA6146E1166DED651A424F368Apr 18, 2015
512084065C1B544DB2A1E4C45FFB4F40A6DDJun 27, 2015
51206E54C15937E62F45AF96C1E5F7C879C9Jul 23, 2015
51207B52F7E52886FBB9F1467899E6832558Sep 20, 2015
51203E4391096B25ECA178B64BE63993007CSep 25, 2015
512000CD56B5E31809E2FCEF57CC358EA6E9Oct 6, 2015
51209CCE721374C04B23BBB3D06CA17AC91EOct 7, 2015
4096E53B8F5782103602CA569DEC8FB24525Oct 12, 2015
5120649C48F63D6B85F52BB10157D96A8F1BOct 24, 2015
5120D7CCF0021C9F1D16D6F6CF69DB428A84Oct 28, 2015
512088EBA2403114AE47FAADAF6051016854Nov 30, 2015
512046197303D1F0C049DBB4A810C5C60B39Dec 21, 2015
51202679523CD7EA3E3C76C5FDF79555C04AJan 8, 2016
5120F68AE03117B891CB0B233CF832BD441DJan 11, 2016
51206469BD31C43C796979BB04E0E54A1B00Jan 17, 2016
5120DE7993F09285B03423B94AFBE2864158Feb 3, 2016
5120EE971875227E0495617C488F61065949Feb 6, 2016
5120B10902C8EF3F8AE983AB66B1016563F1Feb 9, 2016
51202F6B12C7CBA82AABD287DBEDF6C5D0B3Feb 10, 2016
512055BD69C223455789A5460D5C18E09255Feb 15, 2016
5120B2D186CF16B213597F082D00E59C9ED4Feb 18, 2016
5120178256CB10A7AC8A72B686BE493876A7Mar 11, 2016
5120570D5DBFE4D0E390D3839A7A1BB037CCApr 11, 2016
6144D7EB8EE06A79BBA0AE33FBD34EB872A5Apr 20, 2016
5120C0982A0873D6407AB1FD8BBB5DBE97BAMay 3, 2016
5120C79A558CBD0C858624ED9719F0751D53May 5, 2016
51209B558B650ABE13B074D6CB154959AF21May 12, 2016
51204279E486D6F2D812FEDEF8B067F37BD6May 15, 2016
6144D923B040F97E3AEAA98CF6CDCC5E7FA0May 26, 2016
51207982E7DD80036B52074487B16EECB64EMay 26, 2016
6144488DE5B85CFDC8EECE0A14994C88959DMay 29, 2016
6144A073B831D7C177478CE03D0F555561B0Jun 3, 2016
6144DC9AEF6306EAE0763AAFDA5BBBC67046Jun 8, 2016
512003D783E80CF50A4EA3CD5CC325837CA6Jun 13, 2016
6144A6442363D13B0512361BF2BA12B6F46CJun 22, 2016
61447238A73B453E1FE8AF135136B5229993Jul 9, 2016
5120E244F791A981E6712FA7C456F9703C33Jul 15, 2016
61447F7E7FD741400DA83D1F94C5FB5417B7Jul 19, 2016
614426CE5E22E385C2E10398876E911A926DJul 26, 2016
614426141DFD904F660FAD854DB6033BC63AAug 6, 2016
6144F5ABF061D7F8196724AB9932B0BB92ACAug 12, 2016
7168CA929EE732E04D948B8B8724A5C4C20FSep 9, 2016
6144D318A834F4882776D905B141AAF6C969Sep 13, 2016
6144638C458B4B12219783BBC7D1E2892224Sep 30, 2016
61447E54CB2C21B3A520474B40DFF6BEE70AOct 18, 2016
6144731A30793AF87CDF644C674A9EBE76BANov 4, 2016
6144D9A0B49A547D93EEEE7C3BDFD333EA9FNov 11, 2016
614490FF1C72D3F57D67F01932F2AADA9500Nov 14, 2016
614451CCE02A571E56A92BCD6A1EB74C1AC1Nov 28, 2016
5120269CC68A753048FC377967925E74B6AANov 29, 2016
51202A23DF64DBC9A449AE1D1CEBA65544D3Dec 8, 2016
61445CE3F17E6AD595A174458F91CE73C91BDec 20, 2016
5120A62433E56568ADE45D540D2DBFB2C78ADec 25, 2016
6144CDDEB6C32CDC5674E7BF8DFEF18F0F73Jan 10, 2017
6144F7AB3EF17504DEC95323501E9AF19828Jan 12, 2017
716894B119C23997EAB08CB8F06BFF11B42CJan 15, 2017
6144B8AB7572F4CE5714BCBD2F8AA2FA9AF2Jan 28, 2017
6144C7F22E0A066A844C4D592E4D683531DBFeb 5, 2017
71687BB95345A671C744AF42FD943B073E5AFeb 12, 2017
61442B67D3B0E2D14E2C3DCC0E63C9718E6BFeb 13, 2017
6144898F150165A4A5CBDFD6CD6AED91E20BFeb 19, 2017
71687EFF2D30A8D6D1D14492FC6DAEAB8F4CFeb 23, 2017
716875E6A78A1116C212DCC307100A4FFD81Mar 13, 2017
6144F5BE6673B8E02B278B542A501373647CMar 13, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_howtosimplified.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_howtosimplified.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_howtosimplified.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_howtosimplified.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_howtosimplified.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_howtosimplified.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_howtosimplified.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_howtosimplified.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_howtosimplified.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_howtosimplified.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_howtosimplified.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_howtosimplified.dl.tb.ask.com_0.localstorage and Associated Malware.