Exterminate It! Antimalware

malpedia

Known threats:689,645 Last Update:January 04, 08:33

Testimonials

exterminate it remove the agent.nbo files without restart. i let it scan again, nothing found! great job!

now i surf since 5 minutes, no popups, it looks like the problem is solved!

big thanks to you and your team, you are the only company that give me response and realy help to remove this bad worm/malware!

i will place now links to our network to your homepage and email my friends and business partners that they know that there is a realy good company with a great tool and good programmers.

thanks.

regards,

m. s.

File: http_productivityboss.dl.tb.ask.com_0.localstorage

Location of http_productivityboss.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_productivityboss.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_productivityboss.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_productivityboss.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_productivityboss.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_productivityboss.dl.tb.ask.com_0.localstorage

If you find http_productivityboss.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_productivityboss.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_productivityboss.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
5120F8C76D171E91A798FFA7BFA08005A8ECSep 21, 2015
5120568F0D7929C6622D6570B93086D2F9A7Sep 28, 2015
9216F9F2ECCC17C8FE8D247DCEFFF37B7930Oct 10, 2015
5120EE00F9DB20342B47FE4C2BF92074AF28Oct 22, 2015
51208CC7240E4D139AFAE08A9DC5B8D975B7Oct 26, 2015
51200FA2529645C732ECE3137AA3234AF531Nov 20, 2015
5120478FA1A13DDAFB0E4689464ADC709929Nov 20, 2015
51200419A09D0562CDD19C96D07EDFDD203ENov 26, 2015
51208BE97F4A44A036BDD07258C7F1CBE14CDec 13, 2015
5120B4C389C706CBC0D5275FA7F96B2600ADDec 16, 2015
51208F929F418F99146115E342991DDD1F60Jan 1, 2016
512043993DB344391CA62378EF1BC1E8BA13Jan 5, 2016
5120FAB20E26033D23AEFBF19689B1F5C467Jan 8, 2016
51202CE78ED21A3F9EFEFB922DE66BAC1985Jan 10, 2016
51209D8219794E933FEEB3B3E845D2CCF178Jan 12, 2016
512089A9EF12A4CFEE946082C8574266DBAFJan 13, 2016
51201DAD7772DD9F23FA3310CA7F04202BB7Jan 18, 2016
51209CFBEF2E4462AC7B56DB945E6B9A2DF5Jan 25, 2016
5120D00CE2E1C6879F279DB897823B4E4A2BJan 25, 2016
512035A471CBB25878DAEC5A0AB31F317FCCJan 27, 2016
51208475184D071F9E184825E1328120E724Feb 4, 2016
5120FF585513F98C0D33C61A2DDD7582C436Feb 4, 2016
5120E7FA9A6D21FAFF2B435C043D360885C2Feb 9, 2016
51204F8D3DCEA339891869504635FB8C4D61Feb 9, 2016
5120E431271A9C15BC321F974403AEB04F6FFeb 16, 2016
5120D2158B8B706175ABE857C6B10C3A55FFFeb 22, 2016
5120E128C251E7B5A3B820FF7E429FCCB6CCMar 1, 2016
512049E23D85DC8EA532BC77E46D6F46CAFFMar 18, 2016
512071CD6F6FC8CD163B8E8F251B938A0CCFApr 3, 2016
512064B8FDF3CB7A11B444F7DDC815FECF2CMay 1, 2016
6144611559E036111C2599A02A91C2115F51May 3, 2016
6144206EE45F76F762F662D9F517D28D0339May 21, 2016
5120CC792FB6130D32647126580DA847BB76May 24, 2016
61448FD6A5BAB65732BAAE6719411E76556DMay 26, 2016
5120716A99FC28662AE3C981E10C985D2A41May 31, 2016
61449574AF322F3C199E4A8E19B078864143Jun 5, 2016
61443D1B8AF3823DC8DD15A89C714542E307Jun 7, 2016
51207E2DB7CA857EFEB07CE431389D3F79FBJul 2, 2016
30721A13034D35F285D4E9894CF55AA43257Aug 3, 2016
61447A011575FCE656BAD4EEA15A66A8AF1BSep 17, 2016
61447C62A82C76DCB16189B465EAA27E7358Oct 31, 2016
5120DDA208DFA876D92F54B49DC7D56850DFNov 5, 2016
614439128C6E66135700F9F9FF29DD4AFB12Nov 21, 2016
614472CDE4E7596AA7C3451983A34249F77BNov 25, 2016
614410C99F4DAD95ABA71D050D1543683A5BDec 2, 2016
614483AD913349E06315C06EBB12AD20CE47Dec 10, 2016
614466D61EF35E3A716192365824E62D16B9Dec 13, 2016
61443450699606617F66AE9A86B7E46F127AJan 11, 2017
51201DB0B2239C0B00AE991122A5BD44C414Jan 16, 2017
6144B73D21D9FBDCE288539BFF6CF758F458Jan 17, 2017
614441EAD2D1CBE99EA46F3C504BE6967E3EJan 23, 2017
614485E43FC23FC40C71A5DEAD4F1CFEAAB5Feb 5, 2017
614427C3473F17BE50C80A1B3CAD407FB0B0Feb 6, 2017
61446C2C94D9F686E96DB81C2F15EC6AF48BFeb 11, 2017
6144F0116AF06AF557F33E497081E931A2D3Feb 22, 2017
6144212D53F2186B21FF09BB53C79FF42221Feb 23, 2017
6144BAA99428B32AB5E32B5C03C2602AA0D5Feb 27, 2017
5120C2B3BA8EDA0F189A83604B59E7ECD172Mar 1, 2017
5120F12670F052F2105E727D27F40DEF0FA3Mar 2, 2017
6144FE4F8E0D088593EBC2263FAA75F003FDMar 12, 2017
61443A9DF1BF988160ABF95FD3A2B4C54085Mar 13, 2017
92164041B31C6EF976BA157FD7F24844D007Mar 24, 2017
61444E3388DB99BCDD6BACD63E3E37ECC74CApr 24, 2017
7168D1253AD510243AB1E987227E95FC4038Apr 29, 2017
61443B5C8CE3231267DC3C8A65AF73013698Apr 30, 2017
61445FBCB4D82C2A7C6CA5C2559B55E0F106May 6, 2017
5120B9464EC512BC0D27D977FA7E75761E30May 7, 2017
61446E75450553B486F4CFF7673B76BB0C2FMay 16, 2017
5120224D702FA78D7BC55DEF284E557564F1May 31, 2017
6144D29E995F4505618D538CA0C178B30FDFJun 3, 2017
6144BD91DCE72684A405E8F8C865C5E64B46Jun 10, 2017
5120CFECDC82DB1885DCE520F090A1ECE4E9Jun 22, 2017
61447C3F0B7196F54289E3580292848A2489Oct 9, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_productivityboss.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_productivityboss.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_productivityboss.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_productivityboss.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_productivityboss.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_productivityboss.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_productivityboss.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_productivityboss.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_productivityboss.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_productivityboss.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_productivityboss.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_productivityboss.dl.tb.ask.com_0.localstorage and Associated Malware.