Exterminate It! Antimalware


Known threats:700,086 Last Update:March 16, 12:51


Hello, bought a license for your antivirus tool and I must say it was totally awesome! It cleaned TDSServ trojan which was a real pain in the ass for the last 8 months and it also found and killed Virtumonde together with all its files and a few other low level infections. I was already thinking about formatting and losing tons of information when I found your tool on the internet.

Thanks and please put this message where people can see it.

Andrei T.

File: http_pdfconverterhq.dl.tb.ask.com_0.localstorage

Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_pdfconverterhq.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_pdfconverterhq.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_pdfconverterhq.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage

If you find http_pdfconverterhq.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_pdfconverterhq.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_pdfconverterhq.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
5120045E0590A7C6A2EEA0C58C305866643AMar 16, 2016
51200605A0D817DE160A66DF49469217A161Mar 25, 2016
61446B594C1EC395F91DBD8E3FB6FB3EFC3BMay 19, 2016
6144A5013E7D530CD67B1DB669CA94AC7A63May 20, 2016
5120DEA0D67A2D67E84CB8992DCBDE95BED7Jun 2, 2016
61446B42C254C81381F66C8ED6066DBC5CBCJun 6, 2016
6144736529145BFF1801EDE22FA0793CCE8DJun 23, 2016
6144BEC2D832E54E1A4DCC5C947D2048ED60Jul 18, 2016
61446543CCD794FA59485FC2C5C8B4EA58C1Jul 20, 2016
6144D1A3281D21C38F5CE40788CCA2A943ACJul 21, 2016
6144B1A8EFB9059AFA27871782604A3D4503Jul 26, 2016
6144847875BB5B3552B10142E74F5E254D81Jul 31, 2016
6144FFCB1443B7334042BF49FEB4A446E676Aug 5, 2016
6144147CB1442C0D6B85559DF3D274681030Sep 9, 2016
6144C9E59FBB21E46D343502E37D1FDBCD11Sep 9, 2016
5120639C13118B9A92F25217F63ACCF1FB4BSep 19, 2016
6144CBBA53737C9439DC03816C2E691C74E5Sep 25, 2016
6144A51E7EF37CBC4C024853759204F78C35Sep 30, 2016
614410FE631AFF91F63032146EC7210841F1Oct 4, 2016
61448B59D78C579D51FEE9F10F9BBE44FFC6Oct 4, 2016
5120AB434B8E5F078372E78432A5E92A7975Oct 14, 2016
5120C07984EC1EC6371C635EF8C5D319314COct 19, 2016
61440002FB616CB05546088A43CC8C992E94Oct 19, 2016
6144B6FDCED26D1071C21A204488F547640BNov 7, 2016
716862DE03BC0FE8903123911CC69D39538DNov 14, 2016
6144673E8C80A1248F5FE52BC42B49F13FE5Nov 14, 2016
6144177D334360E2D87B113A1D952AE1FE0ANov 21, 2016
71681A2047E52C8E6A70F0942BFCB1FE7B68Nov 22, 2016
5120432C355FE8D64BFB4E2FFB34CC12F69DNov 30, 2016
71681681EEF6B557084C9A0F590BC5246FBADec 7, 2016
6144E2921D33E64A14B81A9F6314F10D0DE2Dec 10, 2016
7168A76429E20385386D44FAAC7601CBB5FADec 10, 2016
6144FAC7F2609C2756688417C6C52577810EDec 10, 2016
6144983687277BB0D4442BD57AEAF17A7B4EDec 11, 2016
6144E5C35248E37068053AF41F77D4D569B1Dec 18, 2016
71681F70EEBC719096FBDF7300F145DF48C0Dec 20, 2016
7168EB700A61E3447DA685E9DBDDF4FE7413Dec 21, 2016
71681A560A52F8C4319ADDB439D6DD6BEDD0Dec 22, 2016
6144C5F86F14942E55D4C1F10B755ECB0FA3Jan 12, 2017
614450E9C19EF659A19ACFC33DA151006DEBJan 12, 2017
614491E6AE0963C47A1A5C261BD1F1BB13A4Jan 16, 2017
6144C2DE8281F8EC97766E465B88825EF1ABJan 19, 2017
7168FF990D115B667E692D6A272C1EE39C6BJan 29, 2017
7168664AB83114E256EC969C4A011A15DCD5Jan 29, 2017
6144CAD76F119E5531F9EE266462541CA1FBJan 29, 2017
71682C9B78ED5F7A434E763D8BEC29A5DCA8Feb 2, 2017
6144FE94C2D565A4DD10C8A3573932E8CC1CFeb 5, 2017
7168993CF8B7BF300FC2D1521D27B5F935A9Feb 5, 2017
61441844D56AD0CE11C3F39ED36AF04A2D7BFeb 12, 2017
7168B0671D772EF4E78D893FFAE23748C4DDFeb 13, 2017
716839990B4D7C4D9479E8F1228EE0D12BFBFeb 16, 2017
716854A98D530656DE30AC6D07FB7E9108DEFeb 19, 2017
6144101B1C44989BD8D44C7D97ED68091884Feb 22, 2017
71682546BA0CECE4F3B8A61DE7A933788FA9Feb 24, 2017
61449790F719C53E4170044BC6BE83167FEBFeb 25, 2017
5120999DCC5A34A3CECA99DF7E72F3393DCDFeb 26, 2017
71683A2C5143CDE682139FD68B9B6B5DC8E1Feb 26, 2017
71684EA03F1F0CF5616A1CA142E117E6C772Mar 2, 2017
71680A0222B7F6957834959CB0768F00F672Mar 13, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_pdfconverterhq.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_pdfconverterhq.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_pdfconverterhq.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_pdfconverterhq.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_pdfconverterhq.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_pdfconverterhq.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_pdfconverterhq.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_pdfconverterhq.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_pdfconverterhq.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware.