Exterminate It! Antimalware

malpedia

Known threats:688,080 Last Update:December 14, 08:29

Testimonials

I got to say that so far I'm very please with your service. This is my first experience with your company. I have used in the past SpyHunter,Malwarebytes,SpyBlaster, for my detection with Mcafee antivirus/firewall.

Don L.

File: http_www.search.ask.com_0.localstorage

Location of http_www.search.ask.com_0.localstorage and Associated Malware

Check whether http_www.search.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_www.search.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_www.search.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_www.search.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Chromium\User Data\Default\Local Storage\http_www.search.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_www.search.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.search.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_www.search.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Chromium\User Data\Default\Local Storage\http_www.search.ask.com_0.localstorage

If you find http_www.search.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_www.search.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_www.search.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
307286524981B382D460E28B0378D25253A3Mar 22, 2016
614435A044F71A7D6EECA9D7A0077F2467CFMar 25, 2016
8192E09ECB06EED19BEE9313CB4812AA165DApr 8, 2016
307269674FD4651A7075E8F44936FA99739AApr 10, 2016
3072B130A7179ECAEDBF4294CD009DEC9705Apr 11, 2016
3072CBF96BB5BBC2864D95691BE8E67CAAF9Apr 24, 2016
3072627CE5F7DC2F53F07205202899E989F2Apr 26, 2016
5120E973AE93EC298DB31F456ED0CC97DDF8May 2, 2016
5120D908B697C774764D6E98263E16686E6DMay 14, 2016
61444AAD1D8610C41E5C5253F6A524741F43May 18, 2016
71687C8BAD83482C501F541B6526E8718163May 19, 2016
3072E4C42458F3A52EEE111FE5620628F801May 27, 2016
3072415F4CC467C12F7728A997934348502BJun 1, 2016
307261A8AAE96A00786C013CFDC9E9CC0002Jun 2, 2016
3072BE8534F0251406EEB97BD50D58668BACJun 4, 2016
4474888832FBAEFF4E7B6506D1799509E76C54Jun 4, 2016
3072BB5088B20DACD28D43C041148A235B6AJun 4, 2016
61440F57110809DF4130F9FED44E4E5B2121Jun 7, 2016
71680F6155F92E4B0DD2D0AD08E5E5D5347BJun 7, 2016
3072EA14B819EA07EAD316E5E770D1CEC723Jun 9, 2016
3072424A5D8192ADEA38C319224ED75A8849Jun 13, 2016
5120CE8E3E0A7B7A60B2FE00EFE2DB8D071BJun 15, 2016
61446565966247EBEB9B8B39E6C9F327B47EJun 16, 2016
61448381950FF86ED596B3CA1B7FF0E07A30Jun 24, 2016
12800055444451B917973F73ABCD25BCE152C5Jul 6, 2016
16076875FA5CC7413FC70FF4F67D3821900D7DJul 12, 2016
5120661982F7BDCB4F62DE09A8404C14C0F1Jul 14, 2016
30724241992D508AB9A3D76A6D8FDD1F9C0AJul 17, 2016
92168FF9B3F6E6061554C75FB807F3F11C29Jul 19, 2016
30728282AB8EF5956945D4E07C2D048AD3F8Jul 20, 2016
6144D00E11A8F8293D3A6EAF47D9E20ACCDDJul 21, 2016
3072F517D0438FCFF03D9F9124C468C80C22Jul 25, 2016
40960111B0FE7EB2E7BCE03BEEA332ECE724Jul 28, 2016
9216988282855D4A4AABC6C87012E41D759DJul 31, 2016
30728357F0864277F57B1D82E926EDD99C4AAug 2, 2016
7168B5B8E68207C2DF3CBE43612964680B9BAug 9, 2016
3072F2E6C03A4150603D628DD6A9A0359070Aug 10, 2016
307278357DFA6C75D6670224225CDF2A6026Aug 16, 2016
30724D4A327912E854DA008AEBF6C2E36C12Sep 3, 2016
4096F3EA6D35CD7B83441D2630BEDE54BB11Sep 9, 2016
6144F58610DBD6D8D7134E1DADBA0BBC44AFSep 20, 2016
819256BC275871E4546D47F85EDD4B10DD40Sep 25, 2016
512025857DEC1DA61A296D76FEF35E378E79Sep 28, 2016
9216AB739CA4577F04B56D66FABC6A71675AOct 23, 2016
9216436ABE2A820BFF21A16B67D10068D458Oct 24, 2016
3072FACD0D80D47386C298850F1AF0EA4CF9Nov 3, 2016
6144AC5F2807C97E7A22A1204E156BFF64E0Nov 7, 2016
3072276DB27296086B0271D53C8A285626CCNov 12, 2016
307227AE3C43F2789BB25CDF1A7462F9300CNov 21, 2016
921633D57DF69598F5E355AAD742237ACAFENov 26, 2016
3072B154A4CE1FD3300F7A7212C67CC0D95ENov 30, 2016
6144405203FBD5E99F052A50B9F298AE9610Dec 8, 2016
716865560F217ED9BF014E446480F228FCAFDec 15, 2016
30721B712744E86FEA31333A708C385A66F3Jan 11, 2017
30724E64C02EDCF98F23A65221D0DA667E39Jan 14, 2017
30723052C48C137EEE0E233216AE1908A1D3Jan 26, 2017
6144E936EC8C760BC79EBC91923BA346DEB5Jan 29, 2017
6144BA542C200E10B43E45A66C027230E790Feb 1, 2017
6144CFA94EB7A6124C958FBA9052C7123152Feb 10, 2017
307257E1B036257B28F98068695ADEDBE642Feb 23, 2017
399365D28FF57BF6D73EE1628CC21D71B8593Feb 25, 2017
61446175AF3D329D157AD316579EB40AB1D8Mar 15, 2017
6144719E3B74BDBC91DD568FCF2F4D823190Mar 24, 2017
6144ADD4738BB749A56E19A1C9B512BF9057Mar 29, 2017
307205D4EE88ACF673271C7A245EC988561BApr 2, 2017
30729482B10B226E1DC688A6CAE4038EF7E2Apr 17, 2017
3072B4BE89F76BCE14A97C5C34BA5DA3D027Apr 26, 2017
3072FB2593341894B0FA7D1DE949DEB50EB6Apr 29, 2017
458752D26F9AB4E8A41352598FCD2BFF16B7D4Apr 29, 2017
512047EC5F2740F7F2EE6647812B0008315AMay 3, 2017
3072FDEF5DA0A91E55D6E853EB1D9F86D7F4May 15, 2017
6144F407527C8E48EDAC1E4B23B375DEBDB2May 18, 2017
8192EA537BCA83513464AD4324392A949934May 19, 2017
307292C9B6B39DA5A1539766A31BE1FE7F25May 21, 2017
307282386997A38D38701307B5498F4915A8May 31, 2017
1495044B499E9426A9878592E91C8F6B28BB05May 31, 2017
307276B92344935958EE7BE9064B70AC19A4Jun 7, 2017
307284C09836FCD776EF621243F23A88EB00Jun 20, 2017
716819D353911F553E8A3EBBBFAB3FA197DCMar 16, 2016
30725DA7ECB289844C3782E1E13D6652768EAug 20, 2016
512094A2F89FF771F63FC57051D209BDCE15Oct 6, 2016
2560095E9D34AAFA15357ECA59EDE4D174495Jan 8, 2017
71682237A1E891AEB37AA52884F4BCA9906EJan 9, 2017
51201311775B582C7CCEC13B771B869C1D4CApr 24, 2017
3072A2BA706DF8FCB308AAA9F7E821FE627CJan 7, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_www.search.ask.com_0.localstorage^

  1. To enable deleting the http_www.search.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_www.search.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_www.search.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_www.search.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_www.search.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_www.search.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_www.search.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_www.search.ask.com_0.localstorage. The name of the first found registry value referencing http_www.search.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_www.search.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_www.search.ask.com_0.localstorage and Associated Malware.