Exterminate It! Antimalware

malpedia

Known threats:688,080 Last Update:December 14, 08:29

Testimonials

Hello, bought a license for your antivirus tool and I must say it was totally awesome! It cleaned TDSServ trojan which was a real pain in the ass for the last 8 months and it also found and killed Virtumonde together with all its files and a few other low level infections. I was already thinking about formatting and losing tons of information when I found your tool on the internet.

Thanks and please put this message where people can see it.

Andrei T.

File: http_pdfconverterhq.dl.tb.ask.com_0.localstorage

Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_pdfconverterhq.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_pdfconverterhq.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData2\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_pdfconverterhq.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData2\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pdfconverterhq.dl.tb.ask.com_0.localstorage

If you find http_pdfconverterhq.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_pdfconverterhq.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_pdfconverterhq.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
5120045E0590A7C6A2EEA0C58C305866643AMar 16, 2016
51200605A0D817DE160A66DF49469217A161Mar 25, 2016
61446B594C1EC395F91DBD8E3FB6FB3EFC3BMay 19, 2016
6144A5013E7D530CD67B1DB669CA94AC7A63May 20, 2016
5120DEA0D67A2D67E84CB8992DCBDE95BED7Jun 2, 2016
61446B42C254C81381F66C8ED6066DBC5CBCJun 6, 2016
6144736529145BFF1801EDE22FA0793CCE8DJun 23, 2016
6144BEC2D832E54E1A4DCC5C947D2048ED60Jul 18, 2016
61446543CCD794FA59485FC2C5C8B4EA58C1Jul 20, 2016
6144D1A3281D21C38F5CE40788CCA2A943ACJul 21, 2016
6144B1A8EFB9059AFA27871782604A3D4503Jul 26, 2016
6144847875BB5B3552B10142E74F5E254D81Jul 31, 2016
6144FFCB1443B7334042BF49FEB4A446E676Aug 5, 2016
6144C9E59FBB21E46D343502E37D1FDBCD11Sep 9, 2016
6144147CB1442C0D6B85559DF3D274681030Sep 9, 2016
5120639C13118B9A92F25217F63ACCF1FB4BSep 19, 2016
6144CBBA53737C9439DC03816C2E691C74E5Sep 25, 2016
6144A51E7EF37CBC4C024853759204F78C35Sep 30, 2016
614410FE631AFF91F63032146EC7210841F1Oct 4, 2016
61448B59D78C579D51FEE9F10F9BBE44FFC6Oct 4, 2016
5120AB434B8E5F078372E78432A5E92A7975Oct 14, 2016
5120C07984EC1EC6371C635EF8C5D319314COct 19, 2016
61440002FB616CB05546088A43CC8C992E94Oct 19, 2016
6144B6FDCED26D1071C21A204488F547640BNov 7, 2016
716862DE03BC0FE8903123911CC69D39538DNov 14, 2016
6144673E8C80A1248F5FE52BC42B49F13FE5Nov 14, 2016
6144177D334360E2D87B113A1D952AE1FE0ANov 21, 2016
71681A2047E52C8E6A70F0942BFCB1FE7B68Nov 22, 2016
5120432C355FE8D64BFB4E2FFB34CC12F69DNov 30, 2016
71681681EEF6B557084C9A0F590BC5246FBADec 7, 2016
6144FAC7F2609C2756688417C6C52577810EDec 10, 2016
6144E2921D33E64A14B81A9F6314F10D0DE2Dec 10, 2016
7168A76429E20385386D44FAAC7601CBB5FADec 10, 2016
6144983687277BB0D4442BD57AEAF17A7B4EDec 11, 2016
6144E5C35248E37068053AF41F77D4D569B1Dec 18, 2016
71681F70EEBC719096FBDF7300F145DF48C0Dec 20, 2016
7168EB700A61E3447DA685E9DBDDF4FE7413Dec 21, 2016
71681A560A52F8C4319ADDB439D6DD6BEDD0Dec 22, 2016
614450E9C19EF659A19ACFC33DA151006DEBJan 12, 2017
6144C5F86F14942E55D4C1F10B755ECB0FA3Jan 12, 2017
614491E6AE0963C47A1A5C261BD1F1BB13A4Jan 16, 2017
6144C2DE8281F8EC97766E465B88825EF1ABJan 19, 2017
7168FF990D115B667E692D6A272C1EE39C6BJan 29, 2017
7168664AB83114E256EC969C4A011A15DCD5Jan 29, 2017
6144CAD76F119E5531F9EE266462541CA1FBJan 29, 2017
71682C9B78ED5F7A434E763D8BEC29A5DCA8Feb 2, 2017
6144FE94C2D565A4DD10C8A3573932E8CC1CFeb 5, 2017
7168993CF8B7BF300FC2D1521D27B5F935A9Feb 5, 2017
61441844D56AD0CE11C3F39ED36AF04A2D7BFeb 12, 2017
7168B0671D772EF4E78D893FFAE23748C4DDFeb 13, 2017
716839990B4D7C4D9479E8F1228EE0D12BFBFeb 16, 2017
716854A98D530656DE30AC6D07FB7E9108DEFeb 19, 2017
6144101B1C44989BD8D44C7D97ED68091884Feb 22, 2017
71682546BA0CECE4F3B8A61DE7A933788FA9Feb 24, 2017
61449790F719C53E4170044BC6BE83167FEBFeb 25, 2017
71683A2C5143CDE682139FD68B9B6B5DC8E1Feb 26, 2017
5120999DCC5A34A3CECA99DF7E72F3393DCDFeb 26, 2017
71684EA03F1F0CF5616A1CA142E117E6C772Mar 2, 2017
71680A0222B7F6957834959CB0768F00F672Mar 13, 2017
7168DA3E0401268AF58B2E969ECBF8860DD6Mar 20, 2017
7168E8EBC267124D5B8E5678D73C6CE221ABMar 20, 2017
71687FCC7F9BC33B7D194D8AF7FA6A93F18FMar 21, 2017
61444497102AB4BFE905570290B343616577Mar 24, 2017
61442D533DE0C2E3392DF47DA2282948E52AMar 27, 2017
7168CAF604700DCDCFDA3301DE99F8F50432Mar 31, 2017
7168800857B3E87250811F8BA9187DA9CC3CApr 1, 2017
716801C7A370D02D708A05DDFCC69D9AC987Apr 4, 2017
7168BC91B8CAA254761FAA706A9474196B39Apr 10, 2017
6144B8CEA828B224EBC9E24EB6ADAE68D820Apr 10, 2017
7168D6EE7C09B543F585E71BEF44958E9E76Apr 13, 2017
7168983DAE398F1DFC4565453C855CC7DCC5Apr 20, 2017
6144ADA7C05C863AD316E52413753350928BApr 22, 2017
716881114AE0ECF09A95DABC52F395D39F9EApr 22, 2017
6144A56607B09BC7806A91CD8A43C55229FDApr 23, 2017
7168D66DB38E1F3ACFFC46FE2EDEAC7DB72AApr 24, 2017
7168B4ACF912D9B663747B3395661AC77F9FApr 26, 2017
7168ECE34D29799D7DCF40CB20FBE6D15275Apr 27, 2017
61442D03EA63150C973B2073B480BB6633B8Apr 29, 2017
6144ABD5B8B6D9B52C07A8D2E88FBC3C846CMay 2, 2017
716865AD178DEB6E5FDD575A37D48B2983E7May 2, 2017
7168F152F380EC2D2B2541680440B760DA36May 3, 2017
61445D2E00432387DA71FD991ED859E6AC3BMay 5, 2017
7168E7A51BAF2DA53446FB5689EA0B8ADE6BMay 13, 2017
307286162ECB111B44323696E3A1378413E1May 16, 2017
6144D576E39C0CA18B1988535F65BA66F954May 17, 2017
61441FAC8DADE0BDCA477B3BDA3F20DF643CMay 21, 2017
7168641434994E8D5F6DCA9EEF35DF3D247DMay 23, 2017
6144801F517FDA13F213605AF70F7E6BB8A3May 23, 2017
71683C04F87230117C3510E525E6F402561EMay 30, 2017
6144E66614B38D94CED5ACBAF120F2303040May 30, 2017
61444752853BBFB11377EDF0E692BE2E9FF2Jun 6, 2017
6144E21512B6F26AECD037324F9731195600Jun 6, 2017
61440DE4C9A99FE16193D85A753FF723CA42Jun 9, 2017
6144B0409ACFF22A9890EF0F18207AD6D8F2Jun 13, 2017
12288708F1F0B685F2B9F535A0B073609A821Jun 13, 2017
6144FDC033B490465A623DB5C8F396327C93Jun 26, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 16, 2018
1228833D0CAC56068CD4FDBC49A9E80D02B84Oct 26, 2017
614470C327DCD9A7EE0E924D25F12E7FF294Oct 22, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_pdfconverterhq.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_pdfconverterhq.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_pdfconverterhq.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_pdfconverterhq.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_pdfconverterhq.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_pdfconverterhq.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_pdfconverterhq.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_pdfconverterhq.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_pdfconverterhq.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_pdfconverterhq.dl.tb.ask.com_0.localstorage and Associated Malware.