Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:July 17, 22:52

Testimonials

I consider myself pretty good with a computer, but after 10 hours of trying to do this myself, the sysguard.exe whipped me. I couldn't find all the files and when I thought I had them all, they would replicate and play hide and go seek I have never endorsed a product in a comment, but if you want to rid yourself of this stuff, pay the $24.99 and download Exterminate-It It fixed my system in 5 minutes!

Mike T.

File: http_motitags.dl.tb.ask.com_0.localstorage

Location of http_motitags.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_motitags.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_motitags.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_motitags.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_motitags.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_motitags.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_motitags.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_motitags.dl.tb.ask.com_0.localstorage

If you find http_motitags.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_motitags.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_motitags.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
4096FAD56A60148AA40A4B6D23889648BF9EJun 21, 2014
4096362DBE21E59F9BA0E7B8A069637DECAFJun 23, 2014
4096671A37031F8906861E167C362F9B0537Jul 7, 2014
4096177291CB7602BB0FB2434BC40FF22F3AAug 5, 2014
4096D9DA790B55ADD2E99BBB90F7B350138ENov 5, 2014
409651491BFF3A45A143215A1417A8094976Nov 7, 2014
512032BD874423FB6E3CDDB30E14486FDCB8Dec 11, 2014
5120AEBAB75A5A4D32ED8F0A1613681D5BE7Dec 13, 2014
51202C6E0BD0307A27EF5CAF0FE32E8F5919Mar 31, 2015
5120140229BA2709B1A6348B0D2D3F669D47Apr 5, 2015
5120D2A710B302E1B7E417C61F1F545762DFMay 6, 2015
5120827CC2E2DB4AE68A74B8893E0E05B736May 6, 2015
5120656E10D81B0A2E2DECB06CFF3136E113Jul 13, 2015
409666F64ACBD4C3FBDA088D0EE577E4E575Jul 20, 2015
5120B8BFC1AA9EB47724AA3FDEDD576724B3Sep 6, 2015
51205250D13B6D66AF27140E47446B43CE55Oct 9, 2015
512003B28CA6B7CD5C1E4E9C6847CA4AD2CADec 15, 2015
512078713097A0DF18B941A813497CF36C42Dec 22, 2015
5120F7571C7414C5B6E15B0E62B99FFAFB71Jan 4, 2016
512037F0B54315436A3A67C7ECC7054CEB55Jan 7, 2016
5120974318447297CCC207EEEB0D8671EB47Jan 13, 2016
512031009626CCC5B8C4FB913CA1C5A87309Feb 2, 2016
51203834CDF32BF586B9318B961DE3B371EFFeb 8, 2016
5120F964FCF24AFC88899ADAC447F4646669Mar 10, 2016
512027E5782A9E2EB055EF3FD6D129F834A4Mar 12, 2016
5120AD0C883F0ED275625394031A6AB1B58EApr 13, 2016
512034F654C8A23BE010F2407E8B6C5DBEB7Apr 28, 2016
51200B92EEA1B6A0F12E8419DBD08C68D31CMay 14, 2016
512004E71512D8A5DF91267FFD80EED67989May 26, 2016
5120BD0697D319339DC234DAFDBEDA6134F0Jun 8, 2016
51205F86FAD24229B70996088D821E6140C4Jun 25, 2016
512083E4AFC123E1ABE75E784F67D040FFC2Jul 17, 2016
5120C80D9127BCA4B51C23B36CED64EDDFABAug 3, 2016
5120C2D84B6402D5BFF7D3C1D9E1BAF1CD10Sep 2, 2016
5120DCF3AB92E47645963D85D3860EB8FE26Sep 2, 2016
5120A750F891A9E08DE10DFC48E775547FCASep 25, 2016
512036C2B19602D023CD27D9708EE067D1E6Oct 4, 2016
512099E9152BD7BD0B359E5795730E0EEE5DOct 4, 2016
512055DDC14E2312F43740DF914A8C24CE55Nov 2, 2016
51204E24B464E35CC983614EA592ED8B8F21Nov 4, 2016
5120FC09C76DAFD82FBD5DFCBE9DA731EC62Dec 13, 2016
5120F416E159348D37B4782E0D61C65F3CC4Dec 21, 2016
51205540C4B37AEF467734EA3684AFAEB512Jan 10, 2017
5120574CF1BC896718B62E1406051F11542EFeb 20, 2017
5120B18BFD9D2227E5BAD4B52390DB8EA0C3Mar 8, 2017
51205A717758D83A29A5408C15DDE73DE504Mar 16, 2017
5120987CE7A6F2F042BA80A5719CB831E553Mar 29, 2017
512024C90CC4D0CD2570611737D7D03C9C14Mar 31, 2017
51207CA967F0F2D5581083A1DC2DABEC7C4EApr 1, 2017
5120557D5AFD7FE3488B2D876ABFC6A48E69Apr 28, 2017
5120B85673B0F4AC40FD51230F7C8C4CC62CMay 9, 2017
61447C3D047D9E25097099FB170C67E72102May 13, 2017
4096630F7DF44A801D9F3B820FE9727EE365May 21, 2017
51208B9292105F2237A6C7BD747F254B3054May 23, 2017
51204168417A9AC62ED8120B59A89B6E56F5Jun 2, 2017
51209866C889A121FC22D45D79869CD599C6Jun 4, 2017
5120C145BC84D31BE7B98EEC7484BD4E38DCJun 22, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 26, 2017
6144B1A680472A70382679C56F0C7366A6A1Oct 8, 2017
12288A056CA6437B9799D99212D30F3377CABOct 19, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_motitags.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_motitags.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_motitags.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_motitags.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_motitags.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_motitags.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_motitags.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_motitags.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_motitags.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_motitags.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_motitags.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_motitags.dl.tb.ask.com_0.localstorage and Associated Malware.