Exterminate It! Antimalware

malpedia

Known threats:699,742 Last Update:November 20, 22:46

Testimonials

My browser was taking 10 to 15 seconds to load up instead of being instant. Three of the top anti spyware programs insisted all was well. However a few simple instructions from your team and the problem was magically solved.

Nelson S.

File: http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal

Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal and Associated Malware

Check whether http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal

If you find http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal File^

File SizeFile Md5Last Seen
46407334B63F6C734712D0D8886EF6AF0319May 4, 2014
464031E3B1E370F9850623F7CFA8C4ABFF28May 6, 2014
36088FC5118E8C3A1DE697EACA0AB3E20601May 17, 2014
360868F86E7A1D5E005FB2E0006A60F5413AMay 21, 2014
46400FF585FA8D986E026193CFCE589A1524May 27, 2014
36083D98A0BAA1447740DBE5B349415D2F62Jun 1, 2014
3608D76B7B0D4B82938CB4184313B6F9E523Jun 7, 2014
360865BAE7DB5BD4BC7F419098E8165AB7F8Jun 13, 2014
36085913AE0A6684171B2DE7783A08F6B6DEJun 23, 2014
4640E249AD215AB208D3BCE5828EAE44132AJun 23, 2014
36083CF527C8D7D3CD71F8A0A0988E46FEA3Jun 25, 2014
3608909884C61C6B01F65FB6BB41386B4480Jun 26, 2014
360883E86012E686A632C9C00995D7222B46Jun 27, 2014
360825C3C0470700E65501F208AFDCB0013FJul 4, 2014
3608972E38A44A109BACCA0D6DC6A74FCA63Jul 7, 2014
3608E7C042E7F734E1FCBC7BD730AA8F17BBJul 9, 2014
3608E1C370575B059DED11430D3419EE9B15Jul 26, 2014
4640119BFA8DF04AE13C48794C0871E7C3D3Jul 27, 2014
4640A287D1B2B3AEEE7118E1FBFA9418F6B1Jul 27, 2014
36088DA4A0F08EA34BCFE9BAA07D7310B7B7Jul 27, 2014
3608EA8C62379BB94F8F33FCFA76AE538FE5Aug 1, 2014
4640DADDCD18F66DA2BF955493B6583B3956Aug 16, 2014
464099E8F0A514E23AC219CC4351393818B9Aug 16, 2014
464064CD6572BD2EE5C4D9388ED086C62BAFAug 19, 2014
4640B4B25CC0E4DB4D39DED8942BD66EA318Aug 30, 2014
4640575529DE35DACB4D853FCDA32D8FFA69Aug 31, 2014
46402B4105AB456B07295632DCA110850988Sep 1, 2014
464020104FB645A6E74DCA0A9A90506ABF8FSep 2, 2014
46407C0A9091EA50E4B98A9D98EA8D9F9D91Sep 4, 2014
36084768AEF6716F3A71F518F439668DE4E6Sep 6, 2014
4640581ECD79ACBD2367B0661CE1B2EC0934Sep 11, 2014
360832D87790707171F1FE40EE0138E69890Sep 17, 2014
464038639BE3B23F0F390DAC25C63FF13E3CSep 17, 2014
360872318927066BFB31915293FB68A2C79ASep 23, 2014
3608A39427644F95DB0CE7567303D611289BOct 18, 2014
3608FF8A20A577F7CB3AA55AE78081AEF78AOct 27, 2014
4640FAD6CB86C6A471D0A65DE4A6D6D4694DOct 30, 2014
4640D6F260A8ABB8DD36BC28B05D61DAA9CAOct 30, 2014
36080FF44E9B5A423D7E9A71195EFD14F99FNov 1, 2014
4640912DFB151B824BAB137985B2304A8E15Nov 2, 2014
36082DC003C8C63F851BEA665AA3859CB7D5Nov 3, 2014
46409C2592932056E142FC97EEF0713C2E8CNov 9, 2014
464028471D99D8DCD7F5DE96CCA6E710A065Nov 12, 2014
46407611F07E07D103A3519F3A48BA0AFC44Dec 17, 2014
3608F8A2BA9078248071D723D4BFE4995E7BJan 11, 2015
360824F57C505C4381755DEE186B00B98995Feb 7, 2015
46406C368CC7BB8BC257D519C47835E06CE9Mar 7, 2015
56729B919A6615C7DB2E815EAC16B8C352B0Mar 18, 2015
3608E1ADD1CBA68BE94A8B0CCF8B2679FD85Mar 26, 2015
3608A161B32DBEAD744786DABA86DE32278AApr 16, 2015
5672D9317DBAD3093EB1A8246DB6D61309AFApr 18, 2015
3608BA1C217AD0775D3E5812CEF6E7B402F9May 7, 2015
360844586A688CCDB17D30C996213080611DMay 23, 2015
5672D6BC9278F4225E66135A59DA707EAAE0Jun 21, 2015
464003F28199828A17B74713E79EE5613848Jun 23, 2015
3608B88033BEA84FD21468EB4167296C5610Jun 27, 2015
3608167C031ED095C6579AB012E884E00D68Jul 17, 2015
5672425631D47C08B8410D66632B98009DC7Jul 23, 2015
360839CCEA8081877631F9F28920C4E79D44Aug 10, 2015
5672B7A07CFB42ADD67335B47D45BBE348E3Aug 24, 2015
360863B3D0FEC797A1205AC6C873AE46C275Aug 31, 2015
5672DCFBDAFA1599C840CEBA3EBEACE7DD4ASep 7, 2015
36080E53926931476836E46A831698F05527Sep 9, 2015
5672244181EBA3771D8A87D7BEFE57761189Sep 26, 2015
46401A628A05E51C14843516E4C4E20BE865Oct 18, 2015
3608B9BCEC31135C994A0A53B529B05B0784Nov 1, 2015
46408B56B485020AD36B9CBBC63CE77339D1Dec 24, 2015
5672F16836730AC57ECE08DF0DBA695F2303Jan 1, 2016
56729433A0CE0B597E631A3B85BBCADD9006Feb 2, 2016
3608DBE0624E7D5E784F35C2AA99C3538E32Feb 2, 2016
56723EA49BB154AEDDB595D9A8A357F2A319Feb 16, 2016
360825A14DED0AD36DF9B878178CCEDE233DFeb 16, 2016
56728F978301CF7359D2187DAE1010618197Feb 22, 2016
36089123016A55B13F8FF02FACE244F316CAMar 14, 2016
5672DF5B8148B2E2BD2F0ED2CBA1A7655741Mar 23, 2016
4640647F572847B352853F7E4085E35CA55EApr 23, 2016
36089FBEFD0D21623F9FA93C907D42579642Apr 26, 2016
464075864BFD6F483A3F888337AA8BBB68CDMay 7, 2016
56728A39F98829940571E34FCE0765D03CDEMay 25, 2016
4640C68BB6D71E8EF972B8CF12A4D088EEFAJun 1, 2016
36087C8B85E2282236DF00A8C70BACA5467FJun 4, 2016
3608E78ABEEC86C8CA4FAAFB7184FD94EE8AJun 4, 2016
36085EDA2DF7A42F26FE44942228F552CFBFJun 14, 2016
3608E3FACF55792FADC4C1D20B4E81B65279Jul 10, 2016
36084275E2F753AE7188C882DE2396806FC7Jul 31, 2016
46403681E2BE864BAC04A751A69A2514941CJul 31, 2016
3608D36C43330208428B923243559B75A182Aug 31, 2016
36088ACDD99A2E876F314FF6B43FCA1318CCSep 15, 2016
3608CAFB1AE04CEC7532AD2EFCFF9FCAC83ESep 25, 2016
3608E1D33C4E708F96D2DDC3F2EE51A96B0COct 28, 2016
3608A3C9DB7BDA4A3E78807096BCB856BAE5Dec 11, 2016
67044A5C031D2D49660C9A1F4E5FB0C948B0Dec 28, 2016
5672D6CD16E5326BD4D7F96B05EEAD4296ACJan 6, 2017
567290DE6A6518BB6CBD218BEF3FA237C8CAJan 14, 2017
56727EB0632AB2C6CF2EEDB307FD86159C54Feb 1, 2017
36080E829015CC204F269432E27980C834F6Feb 24, 2017
56721DCF887B03C7D9600C31B7DF1C4CF65DApr 28, 2017
567284DFE1987AEF80816DB743F29B4D0FAEMay 23, 2017
3608519FCEF8B1F82845CF63649C8FFB133AJun 3, 2017
36088D332FF9BBC99CF81DE95318BCA239B0Jan 4, 2018

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal^

  1. To enable deleting the http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal and Associated Malware.
  6. Notes:

    • The deletion of http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal. The name of the first found registry value referencing http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_gamingwonderland.dl.tb.ask.com_0.localstorage-journal and Associated Malware.