Exterminate It! Antimalware


Known threats:699,742 Last Update:October 27, 11:19


I got to say that so far I'm very please with your service. This is my first experience with your company. I have used in the past SpyHunter,Malwarebytes,SpyBlaster, for my detection with Mcafee antivirus/firewall.

Don L.

File: chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal

Location of chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal and Associated Malware

Check whether chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal

If you find chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal file is associated with malware only if found in the locations listed above.


Different Variations of chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal File^

File SizeFile Md5Last Seen
12896937833364A0B8ADF043D9C4366490958May 6, 2014
876861AAF5CC6BEDFCCF1F48E2466BFCA936May 7, 2014
11864349A147A7ED851CBD12DE0A242754796May 21, 2014
98004E302BEAFCA69DF6F721A3C1CB287FDEJun 23, 2014
16384B7F7AB064A76EE1367C208DD78C84362Jun 27, 2014
163843E9213DE23AAE4CA0CE23FE33AD64B14Jul 3, 2014
16384707CAB4CC7331EB46984698B75D4C35AJul 16, 2014
16384EAB96BF5EC76D3D59B6DFD9F116CC636Jul 27, 2014
12896AA9DE04825113A5EC0A0924F30B98276Aug 7, 2014
9800CC9A6CEC05D89BCB7FD1C3E487CEEE28Aug 16, 2014
16384167CBA2E6B9FC910F0675AD5E390A6A8Aug 27, 2014
9800EEFA16DEF949FF8C7A7932E3123A9A80Aug 31, 2014
1496044B9B57110B10BF66E97FB052219366ESep 2, 2014
12896A0E9C6F26AFA7B1D13BA3BD248AAFE47Sep 2, 2014
10832BDA4E190AB74D9F53AC0D7766369C13ESep 4, 2014
128967CEF014AFED9259DB7FBF1158E357CC0Sep 10, 2014
13928A40BB2B881E1D8A87F92CD67A16E9372Sep 12, 2014
149601BDBB24937017CCCD0A5C087585EDC4BSep 19, 2014
10832EF422BD649866AA4B24136ADA9B45670Sep 20, 2014
360826D78506A37BC08193249179AE20CE18Oct 9, 2014
12896906AF20E61769BB63DD55547B4DD5117Oct 23, 2014
10832E5932FA466FC3A330ED3FB040CF8F9BFOct 31, 2014
163844AD475BCA78E9A8BC6F23BE2826AD3CFNov 12, 2014
118647FED1623FACAD1C7FF26D9B4651A305FDec 17, 2014
163841B75B4ADECA2F4C16BD053B83CF2D217Mar 30, 2015
16384D534CFCB95834E727DDDAF6491321D42May 24, 2015
163845751CDF349CD9B67D7A2B7A4643E589DJun 26, 2015
16384196F529A8F9170A6156938B56E85BF86Aug 13, 2015
16384839C029678EEBB60A4C6589AC59B172DAug 24, 2015
16384B8EB6BFF603670B2DF5111E3FF5089DASep 3, 2015
118643A932D40C3ECAB9A222589D06EDE1DD6Dec 24, 2015
163840E30DB9E2BF7A0FC1B8520DD21547638Feb 2, 2016
1186413A7D55531BFA392A99E26795C791FA7Feb 16, 2016
773643DA5A5AFCFC10175CDA1C0953511AE6Feb 27, 2016
16384B3AEB34EF28A75DAC77FF05B8C4485C9May 8, 2016
16384711E4884F47886E4A7C66BE5B128F1FDMay 17, 2016
16384A893A9303474154DAEDD065AE4162BC0May 25, 2016
16384F8CADBEF0DC1DB1481A5677E79F18958Jun 6, 2016
13928BDE69C38AF2C494EA560AE4F61C451CEJul 31, 2016
16384EBBA27927ECC368B1482E582BB3E0B10Sep 12, 2016
10832FDE83FF6B78135BAEF6EBDCEF5FA421FOct 5, 2016
163843DB8359AAD93405C03A9C86AB10591A6Dec 11, 2016
16384D590B86947D7CB12C5AB81E9D41B2976Jan 6, 2017
876809413CA92CFFE45CC02CB49434C465A3Jan 31, 2017
13928E9EDBAD083F3DC8EBE1E445B5B83D8C5Mar 15, 2017
5672476ED0B6F023CC4F82D06E8D70EFB43CMay 24, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal^

  1. To enable deleting the chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal. The name of the first found registry value referencing chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of chrome-extension_nglnnifljabmkcecofpnlokcgnmbecia_0.localstorage-journal and Associated Malware.