Exterminate It! Antimalware

malpedia

Known threats:688,080 Last Update:December 14, 08:29

Testimonials

I ran the free version on my system that I knew had something on it, nothing would detect what was going on but your program did! I instantly bought it and now it's clean!

Awesome job! I'm an instant life-long customer.

Peter C.

File: http_pconverter.dl.tb.ask.com_0.localstorage

Location of http_pconverter.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_pconverter.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_pconverter.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\tazoygroulychabch\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 5\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_pconverter.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\tazoygroulychabch\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 5\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_pconverter.dl.tb.ask.com_0.localstorage

If you find http_pconverter.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_pconverter.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_pconverter.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
51202E16887E32A1A814026B5325E0C40D0CJun 30, 2015
5120C5732AE6D655C9AF44CDE6579B38F55EAug 11, 2015
5120DBAE22F781ADC54E1C2F0B489E35AA82Sep 4, 2015
5120823BC669FA64A905A744AF907E95EBE2Sep 8, 2015
5120F5861FB9CCE0767AB492BEE0DA5E257ASep 21, 2015
5120718CF29743659408F5FDC06FF97C32B5Sep 26, 2015
512038A2B1A0EF52CD1232ED9EF53680A076Oct 11, 2015
512029150EBA1C584D47A1DE83FC82333515Nov 20, 2015
5120CEE2C4B918DCBDCA0345860A4410EFEBNov 27, 2015
5120FEE6756EE9F665364E88F38FFFB1F14DDec 12, 2015
5120B87968D131915EA940D5D55DDE94E3EDDec 18, 2015
512047323D499D2A19C855D25E571446BF53Dec 24, 2015
51205F372D503E8AF9DC8B18AE87C2204DE3Dec 27, 2015
5120FE6B183BF70F86A9ADEDD26FAB3ABB11Jan 3, 2016
512010819A81841C879F322E55270BC7D0A7Jan 8, 2016
5120C5C0D9924EF71FC270FCA6D2F89B6BD3Jan 11, 2016
5120D7BF6C5BD4F77331D7BAD6A55ED249FDJan 12, 2016
51207A387D94006CC58AA71C81B86B0AE631Jan 13, 2016
51208FC63FEF09D29D7120F59F8670E065A9Jan 24, 2016
5120FAAFF973A871A8B7921B2FED699E0B6BJan 25, 2016
512029D455FBB1EBC6BBE76E9D3129F14AF0Feb 1, 2016
5120E5056C670E8C954924844BF9BBCE30CBFeb 1, 2016
51202B41918C99B10E1EA75E756E4BFD4651Feb 4, 2016
51204CC9CF9572DB1DA61537B680DE609597Feb 4, 2016
51209A801590B6DC90330E551ABF1B02DF4EFeb 9, 2016
5120EDEDF209453862E3F70193F063B8B0E8Feb 12, 2016
51207F50B9E16AF50410BE40C991F35E9767Feb 14, 2016
5120FE4C45DBF62951867DA41BB63D7BD345Feb 15, 2016
5120D1C47E8A5468AF5D48B2F200DC9520B1Feb 16, 2016
307292DB7EADEC07169420B6FBE70D3D87E8Feb 18, 2016
5120B725AB4E8DAC47A17E949C6FCBF214C7Feb 25, 2016
5120E9CB0B84667025B0E1390DED4B7B16AEFeb 29, 2016
512052CF0080FD1DF96CF39806A17E85AD43Mar 9, 2016
512000A9ACBC2F11360200056661D4DA4909Mar 13, 2016
5120E7B17F1A0831C68F2F4B2FB950E05102Mar 20, 2016
51209F3B2D51096C27BD090920DD70BEBE1FMar 20, 2016
5120B9765282A0610E7CA37CB5A7E492B137Apr 3, 2016
51204260133910CBEF7C6F7C406026A06856Apr 20, 2016
5120E5567D68E03805CFBFBE86B0DD70AEC0Apr 20, 2016
5120D9BD8713DEF08B4DB1AA04E1298CBCBDApr 20, 2016
51206A95078E82EFEB65E8991D4D6D78603BApr 24, 2016
512027DD23940014E19E682E4C0FC56F944BMay 1, 2016
51207FE08EC21AF53CA3AB6BFBE7F101906CMay 14, 2016
61444C8F2E015E0EF223567ADC5814B276B5May 19, 2016
6144E144CAB13E760253885D19EDE82A2D70May 19, 2016
51200FF26DB74261B2633E4D53C5FE0DE8B4May 24, 2016
5120A25E7C746D00632841EC09C9196E11BCMay 26, 2016
6144B7C02BC55FD81D6D070C95C24E667C9BJun 3, 2016
51206510FD97FA2F21C7E2E167305D8431B7Jun 6, 2016
51201C3259B38582F96CF693FFCCAD8A7409Jun 11, 2016
6144CD2463E3EC85926653F7E092A85B4E1FJun 14, 2016
61446656A36ED03E64F3AF05EC595CD6A576Jun 15, 2016
51206771E88148ED4A58856B225099BAD129Jun 16, 2016
6144891FF9EB2285650936C6DE862DD76A3FJun 16, 2016
51206B306E53FB587AFC1C7AEF832726E5E5Jun 21, 2016
3072F34176E9910BF095D67F95AD9ACF4737Jun 28, 2016
61444E95BDCCB28513733A314B04DAD87A2AJun 30, 2016
512063A9B073D6196C755628E89EB7605344Jul 13, 2016
51207122300FE089967550B838F3BDD3AF84Jul 17, 2016
5120BD47709918AE943B459EA4B151517287Jul 21, 2016
5120D83A6165AED7E38CFC2C1B94D4EF179BJul 24, 2016
5120CA80C6EAAD13EA9EDE8EB29C848CB4E2Jul 26, 2016
51204F9AAE42A4D54DB18F7C24420AC0FEA1Jul 30, 2016
30721A13034D35F285D4E9894CF55AA43257Aug 3, 2016
512065593BFEE3AB5B5C6E2CD8F34DF3072AAug 14, 2016
61445E676A1541EEB0D148352B3EBBA77A64Aug 25, 2016
5120EBC426B994AB6BC35F8CBB8C8600218FSep 9, 2016
30728EBE115B43E235D9925B50B6FBB2063ESep 13, 2016
51207B01C5B2F8E1EE2CFACAB10A9B82B24ASep 13, 2016
51204ED151F57467751513590C627B6466FESep 14, 2016
51208BA4018C86F17C68C5D837CE71044E5ESep 18, 2016
5120EE4E8CA7E8C8A5F6FB763EFFC0BB168BSep 29, 2016
61449B450A321805274CA94259473C1E762DOct 3, 2016
30728300177C7D7713502EC0C90CEBD7D3CEOct 14, 2016
51200C53CBB43570EA007802D589EE592AB2Oct 20, 2016
61448DF0CC3D4AEF3B08592D4EB10EC0E191Oct 29, 2016
5120A698E1DB674693B59AB761C9DC74C46CNov 8, 2016
61447CACBEC3E4F748E0E14ED1025AA8A81BNov 15, 2016
512061E96CFB032933ABA2F4FD35D52E1958Dec 3, 2016
51207F0364DBBD7802E5DEEF9D4BEC3DAC7ADec 7, 2016
512099EFDC32D7107368EE83CE2452A4E39EDec 7, 2016
5120FC6F70A3381D425B082E1A269AB7974CDec 12, 2016
5120657EB8831B8631AA367448A0AE93CB37Dec 12, 2016
5120603669CAC4DEACE43E79EFFF2EB25A54Dec 13, 2016
5120A8BEB0BF1E08E35E81FC50F78B02678CDec 13, 2016
61444ABE3CA84E312B560D45C38F6F0C43DCDec 20, 2016
61445BB7DDF87B19618ADE153D798CAA7753Jan 5, 2017
6144A36F21A22827FB27D49685E830F8A6FEJan 6, 2017
61440C03B78E7F1E4E12449158734E383BD6Jan 12, 2017
6144BAE8422AF3C01372C374C3CA978E1353Jan 16, 2017
3072111CED66CB7480C4C8743D34E7FDE5D9Jan 20, 2017
5120604F634E3841398F9A312C7A6124A7F4Jan 29, 2017
6144BD5C8035EBF06B7F24B778FDB344A89EJan 31, 2017
3072FC4EF594E2E59AF4F1D9514C0C01F5CEJan 31, 2017
61447EE8638C3B6AF4DAB2AB618ED6E87140Feb 1, 2017
614407156EEE1BDAB1BE9C39C37D2E063662Feb 1, 2017
61443740602D02BB8017040DC8EE6271DD93Feb 2, 2017
614441E5A5AF39D30EC2EF3D2ABCF2719BCEFeb 6, 2017
512010F27D9A791A78AE6324F15D1AC7BDA1Feb 11, 2017
51201203EB6B7D1325402DDBCB4E2E796F59Feb 11, 2017
6144F80EB0C5AFA6E30B6ECE6EB548C87DBEFeb 12, 2017
6144E3044DB19A06AE1EB15C1AD4A397224EFeb 16, 2017
716824C94A53E0C80C02D02E2528A8906920Feb 18, 2017
716883F75538E9B17270ECF3209BE8652ECDFeb 19, 2017
614496CAE86AFCB0D8BB7E127333EA5E2929Feb 19, 2017
51208D622B2FD274F087255E2F1E48498317Feb 23, 2017
51205E10E81DA529E67E761D61F096D3EBCDFeb 23, 2017
51203E0923231FF212AED5FC8997B55DF81AMar 2, 2017
512002008860A5459A59E75D0FA135B79D2EMar 17, 2017
6144E4EDFB0E8DF53E24B10324C5DE14C783Mar 20, 2017
6144366DB0CCB93F2DD1B20AE90F8B94D2B4Mar 20, 2017
6144476BA79349CDD2A74EE7DA227FC039DDMar 22, 2017
61447AB30E271DA6C42D39D1B14AA76D04C8Mar 23, 2017
7168587F99659979EDDFC380071600F729FBMar 26, 2017
61446FDB8DB1A2606B877D3D5E6D3279F7DBMar 27, 2017
3072E67590C4B1ABA5DA0F053E5ABE3FF1BAApr 1, 2017
614427B27DF19F8D3D94F72DF660F015F427Apr 2, 2017
5120DC11D17529753ACDF0306ABD749008BAApr 9, 2017
51201866F91C94BFB1F119E6226509DE338DApr 13, 2017
61443CDE7B78AED3B478B775B7186DCEED04Apr 18, 2017
6144FDE3BCF351B0EAF73BEB723DCB76FB67Apr 21, 2017
6144E1F1BE0CEA4D9964A0267A3C939848BAApr 22, 2017
6144A9E0623C611D3B674BA6C433D9A31699Apr 22, 2017
61440A3E52644CD0CF3A1EFD5E7D989E7BE9Apr 27, 2017
6144CCD4C1A7D69C92794B6E8AEBBEC72172May 4, 2017
30728D21E5099FE6AE06528ACAAAA3E51E4CMay 4, 2017
6144EB4E3E223C5480266110E0D2BF724178May 5, 2017
614406F2ADBFD5A6DB6AE05E8212B9F9508CMay 6, 2017
51207E0854DE9BEDA767537133701F95900CMay 7, 2017
30728D5B37EAE28EB6BF8E16C72CFC09D842May 16, 2017
61440C29E309501E46F2270F6C544E3AD7EFMay 17, 2017
6144DCACF2CFA159D07AE6EC37865A081B9BJun 7, 2017
614416DFFD64CFE37722D2FDBB6BC5D7A3C5Jun 12, 2017
61443736030FF4B1C9D8CF8F7929FFAE9C37Jun 13, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 15, 2017
61440834403472EEADD22F174546A3B3BA7DJun 16, 2017
307286162ECB111B44323696E3A1378413E1Oct 8, 2017
6144776C53D0BC8262554533413575E3249EOct 8, 2017
6144189DE520742B08A30FEFBEAD7C2A9815Oct 9, 2017
5120D0FDBD1EDCB0CFE962BB1EB63C79ABB2Jan 7, 2018
1228833D0CAC56068CD4FDBC49A9E80D02B84Jun 23, 2018
12288281980B134294721687A883F873D1044Nov 1, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_pconverter.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_pconverter.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_pconverter.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_pconverter.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_pconverter.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_pconverter.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_pconverter.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_pconverter.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_pconverter.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_pconverter.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_pconverter.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_pconverter.dl.tb.ask.com_0.localstorage and Associated Malware.