Exterminate It! Antimalware

malpedia

Known threats:688,080 Last Update:December 14, 08:29

Testimonials

Over the past six months I had a lot of trouble surfing the Internet and working on my PC. I tried different free and pay antivirus software, but they were all of little help. I scanned with Exterminate It! It turned out that my computer was infected by five different viruses and Trojans, and your tool found them all! Now my PC is perfectly fine. I am really impressed.

Exterminate It is also very simple to use, which is essential for computer novices like me. I like it so much that I recommend it to my family and friends.

Vale R.

File: http_gamingwonderland.dl.tb.ask.com_0.localstorage

Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_gamingwonderland.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_gamingwonderland.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 1\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 15\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 2\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Profile 3\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_gamingwonderland.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 1\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 15\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\ChromeDefaultData\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 2\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage
  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Profile 3\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage

If you find http_gamingwonderland.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_gamingwonderland.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_gamingwonderland.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
40965CC4825E97F36BF709017CB6DC09C889May 4, 2014
4096D1CF3972717264BC28906BC71ECD3E76May 6, 2014
4096E5FA02EBD25528A346A465A617F2ADB5May 21, 2014
4096081B83754D209C14846B9B18463F9A65May 27, 2014
40964CF765476A6F5F85413D4F436FF65374Jun 7, 2014
409668462730493753EB1CEED7CB73334C96Jun 13, 2014
4096AA2F33348C5C839170AD9969F9847E8FJun 23, 2014
409610A63056340EBC11B648DA2EBAF5CBDAJun 23, 2014
4096A1B4E7D7E985D8F9C4F6BD86724D4A0EJun 26, 2014
4096FEE7326B60FFA422BF3B9C654351C2C6Jun 27, 2014
4096B300A3776E238B8766183A0C4AC7C04CJul 4, 2014
4096D043484578FAF6191F6D1435991F622AJul 7, 2014
4096BC290641ED8D1F4B46DB23515C954CA7Jul 9, 2014
4096C623BAF2438ACD17CAF608183A524CC9Jul 26, 2014
3072087279B62E2244290D410B5F70DBC4F4Jul 27, 2014
40963FB0F5EDDB6268E1381782D7F66CFCEBJul 27, 2014
409675C572005E71E2D574B58088163469EDJul 27, 2014
409687685D7468DA67B4F0F6BE52777B9AD9Jul 29, 2014
409622452B36E84D2A2C3F79EAA952DAE8DEAug 1, 2014
409674080CEEB742C20C46259C55F4570A65Aug 9, 2014
40960054705DFE6BDBE285B6DECA0CA0C23DAug 16, 2014
409678788F4E7291D8879A82FDDFF8289D95Aug 16, 2014
40965BA117C608D0B7C31502BEDCB684AD06Aug 19, 2014
4096AA83F99FEBB2E161FFFBBB437F3D276BAug 30, 2014
409626CF0D8D6BCCB4157CC687D0AED460FFAug 31, 2014
4096D53D8A13B16EB7388226118F0ADC57E1Sep 2, 2014
409677ABD24E4E9F71B7F5341347D54ECA09Sep 2, 2014
409628C7BEED3FB6FCEA2F0B685D0879885ASep 4, 2014
40962BC98C34159AACF996A25D5DA318847ESep 6, 2014
40965624F2E0278807B13174BF567AEED453Sep 11, 2014
40965C9ED7531D60C8E5AAE1F2C75B37C9B9Sep 17, 2014
40968D87C845D87FD6E5A6108B8D8B87799ESep 17, 2014
4096D3B39568C4E9B6C22A24F8AC7E0E24D5Oct 5, 2014
40969C53EB914894403608F8469BB8817995Oct 27, 2014
4096EE84D7056CFC5AD9ACBC6D93F9A759C7Oct 30, 2014
4096ABEB01B501188D5085B9F275663102F1Oct 30, 2014
4096CEFE8BD056C44F647043098E1F88853ANov 1, 2014
4096DAEFCD433166B41D0FD0EC8A5E689C06Nov 2, 2014
307293E9814EB558F721EF2722A71D5E8091Nov 3, 2014
40963E9BCF9BF9EF6A23BA45CB34EA14C329Nov 9, 2014
40963EC4407799CE5AAC6F6EAD9995B370BFNov 12, 2014
4096BD607140D811829E8F4FDE8EDC3759C2Dec 17, 2014
4096F80B75664E202091A9E6B96798C4DB65Jan 11, 2015
40963C72BD953FAA6A0114AB5DA63209BF18Jan 30, 2015
40969F7C125E9621350E50850C567C22B3E7Feb 7, 2015
40965268630EEA893E2C197E29F767517199Mar 7, 2015
5120F5D136988388492B08B1428BD407371EMar 18, 2015
307273A658CE66E64685A1378AFD7519C92FMar 26, 2015
51209DF1441AB86EE0FC7F8B236D6F7EA03AApr 16, 2015
5120815620BE3C83F8D0DA360312B8C6F952Apr 18, 2015
40962CA9C5221D483D611161E2F271869B1DMay 7, 2015
5120754BC4386C42302D4EAC955B143C4223May 23, 2015
5120D9A2F1C5ADDF49999E70385109E7B1AEJun 21, 2015
4096BD457480AF7BC143B126BFDA564BD871Jun 23, 2015
5120D3B224BFCEE48D51412D60969FF2BA87Jun 27, 2015
5120C77155039573E38AC60EB6AD5739420AJul 23, 2015
51205AC7AF750CE126FCE2D5C9E3F8B378AFAug 10, 2015
40967056C13A6C37F4022D6B09D5CB205CDEAug 24, 2015
512090F7A093BE4C19F0CF865A399159BAF9Aug 24, 2015
51204014C20BAFA3C62EF488CEB62E4F6BACAug 31, 2015
51205E9747A6E62BBAF4C241A0A38AAFDA54Sep 7, 2015
5120C81D44C1C619E19F130F226418BA08F0Sep 9, 2015
5120F8B156E03DDFD217546375698A61F83CSep 22, 2015
51200446615D52A34F9F9F3AD79411B63A7ASep 26, 2015
409696888F3BAFAB22E4B5A47EC866818DE1Oct 18, 2015
51209AAD8A6CD11A99B25CB8793EE0E85F5CNov 1, 2015
512083C72ECD4DB92B98FA07276C1743B2C1Dec 20, 2015
4096BEB26BA8D532DFAAD65FA509EA8FFF8BDec 24, 2015
51205851BBF1A09827EC272FDD1CB60B003DJan 1, 2016
512065ED2D045EFF651DF0B87EB5A7C7AD3DJan 10, 2016
5120AA1A2A680713EF6CCDD350CD8D2D34C0Jan 13, 2016
7168150A7976C07C2959BEE690F0F78FE0D7Jan 28, 2016
51201A5A82AC74DC27590396235606731F7BFeb 2, 2016
5120D9A8F60C36BE8DD63BCF75A29CFDEB37Feb 3, 2016
614457371DB7CABB8EB1B3944211999D73B0Feb 3, 2016
5120452BC47F9E38D88BB1D384E057C83C00Feb 13, 2016
4096157830F810FA621A58C4DC1808019C4CFeb 16, 2016
5120759DB7084D401FD63A509A08DFC6E923Feb 16, 2016
512070D4ED7FF100ECDBACDD1E918CC993FAFeb 18, 2016
5120941579ED3F049BBD12FC48B809A09DDCFeb 22, 2016
5120DC05C46C446D8B94FC58240E5F050E2AMar 14, 2016
5120B6CC5E223A232F4CD7C3F420FC82F3FAMar 23, 2016
512013A59173B6567D85A296730A79D33A96Mar 27, 2016
512046E2463E750FAFA222090A0C528BD60CMar 31, 2016
4096E5B6FF43E52BBA7D1830716E05F5063CApr 23, 2016
51209406BB26B55B658854E0C6CA299BB0F3Apr 26, 2016
6144483B2CBE70C81CDFA6654A80EE694FACMay 1, 2016
5120C717885B6B726E512397F83710BA0A00May 4, 2016
614467C1C555DC8C4541DD00468343F905B4May 12, 2016
614450B83FC4E32E195CF9447486B3AC6A90May 23, 2016
4096C0F659A87A4946777408808D0C338170Jun 1, 2016
6144635056D08353D71C72B7B211F5C9F01DJun 1, 2016
5120CB24F9FA6858ED84ABB0F6665F28CC63Jun 1, 2016
512085B018AD34296010CF5EC6CC6D43DC74Jun 4, 2016
61442E920857EDECCFA21B5E10DD49A6EE90Jun 8, 2016
5120E6328915D8EFC1FC3FE96D89E0E7F432Jun 12, 2016
51206FD2D9D96B8B6C2673805872801FFEDAJun 14, 2016
71680558B63DDF11447E5C76A146E878B01EJun 15, 2016
61448571013B484EE16889602383408339E2Jun 29, 2016
4096EB1B3AE58F03AF13E26953988CB613EEJul 10, 2016
7168B91E6246D58115A0DDB633C1CFDB1F7AJul 18, 2016
7168B327B47A028155A7971CF4273C37B405Jul 19, 2016
7168C2E3AF24DA9D21A26B1F10D55F6EE26CJul 24, 2016
409666D179727BE5451D784C8AF1DC07AA50Jul 31, 2016
61446420A7E2846C7723DBBCDE069AAB6C03Jul 31, 2016
6144A4024D4ED4C742CAF57246041F9EEEAASep 6, 2016
71682C95BC8517A2FC7A6F010823A4C6ED16Sep 15, 2016
61440B7B9080955A63E764D4CD01B9E30FD0Sep 16, 2016
409640FF86D625C7BFCFFCADA1B557E6F5C2Sep 25, 2016
61448B0F07D3E3958EE59DBDA93E1B9F1BBFOct 10, 2016
7168DD63537459F8690E901342D372E4D477Oct 19, 2016
614471564CEFCED099E30052A9F2FE967BF0Oct 30, 2016
6144B924A1820119569382A53BB96CA6E4DFNov 9, 2016
6144352DF6C930E521F270ABE22EA38BC4EANov 12, 2016
6144A8C3F9EF0A875C0AE1B50FFF20950141Nov 18, 2016
6144B808F522237A9F535376E4BB7AEF3003Nov 21, 2016
61446791AA4876A5455CB8B9F2056D9743F6Dec 6, 2016
5120D46E43BBC8415CEFC6B98F3690E53BC6Dec 11, 2016
61441E458B5FB8E6CAC26F0733DC648E2039Dec 15, 2016
614418B670F5AB52F95C91AF3B26465B73EFDec 21, 2016
7168555810376E56C488A5FA8B94D8BE6EB3Dec 21, 2016
6144243BC23E30E896BFCBA5C6A82E2C8FCEDec 22, 2016
6144035CCAC959FEE3EBBBAC539EA85664BEJan 15, 2017
61446DC984249290C112024B2D222CCAC0ACJan 16, 2017
71684D27B685B08470C7FF097384B6478944Jan 27, 2017
6144BD7B5BA225BFAE7EFCA499C0ABCDF973Jan 29, 2017
6144556632A118E183D85CBA6845846F9022Jan 31, 2017
5120E6D084E64373AD0FB6A5BB5D3C3241F3Feb 1, 2017
6144A774198F91792D034A03275862A97899Feb 3, 2017
61440529D6FDCE17AE9F2E19ACD158748BC3Feb 10, 2017
614442314E346BD56DDFF8EDF37BF7D15730Feb 12, 2017
6144065FC706EC9AA472352DD7E6D55A08F9Feb 16, 2017
716873586294F2A56C0221BE96160BA3C116Feb 18, 2017
5120370422101990BCB4917BDB75CC0C3A7AFeb 24, 2017
6144A8E5C94A1CA84BB505B31BF1A2AFECB7Mar 11, 2017
7168129B8C98407636DFCC482DBFBD7F47EBMar 13, 2017
6144244A3EDF1E0955B98347734AA5DD3629Mar 15, 2017
61445BFAB6B56526629250E5BA349C6C0D8BMar 27, 2017
6144ADC0E8245A9F3AB5EA7CC8A9ECDEB2C5Mar 30, 2017
6144C2EE053C08D35C588AB185E8A894CF0DApr 1, 2017
614461CB27C4B8BD29D313A40CC5C24411D3Apr 4, 2017
61445DE1FA5F8483B6F0F7266957C08E7486Apr 6, 2017
716865A7BBB0DCA0FAB204461BD9A2DE350BApr 8, 2017
6144E2D3E67A78097FF42153675AAA6B392CApr 20, 2017
7168A3E218F4226051578FAB89FEA6F70A72Apr 24, 2017
61448F19DBB5A8512C2205217C7B8FFCE016Apr 27, 2017
7168965607DE3F632C4BF6F0CB31A1131D0BApr 29, 2017
71689A364362DF1C56A636BA538617283539May 4, 2017
61449763C5C419912520886F9DA8DC707B85May 12, 2017
614459F0072F5C53922B9FE4CB3530984152May 14, 2017
71680AD9EA4C30692C093BD3F4DF460AE1DCMay 23, 2017
61444D9F372E55DCC44136A2BA3EBB740BA1May 24, 2017
307286162ECB111B44323696E3A1378413E1Oct 8, 2017
8192E4E301D23956C9311932AC00FECA7303May 26, 2017
512055BFF8D8A95E43366C8B043D92812BB7Jun 3, 2017
6144CE4179E9C6B3B15FFB69657169975C1AJun 5, 2017
61445BBDD91AF70CEE5432B13E3C8C6800D4Jun 5, 2017
61442C7A8378F475281AB186CDF01214F986Jun 8, 2017
6144CC728C9320406EBBA48DD82042D08BA4Jun 14, 2017
6144669074D02575319E1C9A0F79CBFD19BDJun 16, 2017
30729D73523F290421395D65C7B2D8E3ACBBJun 5, 2018
1228833D0CAC56068CD4FDBC49A9E80D02B84Feb 28, 2018
122883E37147C4C2E90B0BED224800CDE7A55Oct 23, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_gamingwonderland.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_gamingwonderland.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_gamingwonderland.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_gamingwonderland.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_gamingwonderland.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_gamingwonderland.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_gamingwonderland.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_gamingwonderland.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_gamingwonderland.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage and Associated Malware.