Exterminate It! Antimalware


Known threats:699,443 Last Update:October 12, 11:44



I really can't believe you got back to me. I had bought and paid for 2 other Malware programs in the last 5 days, X********E & P*********c Anti-Spyware, and sent them the same message. I paid for yours and got 2 others from friends that where cracked copies N****n & S*******r but no one has got back to me. I have not heard a peep out of them but You have got back to me.

Well done.

Your faithfully ( a customer forever)

Richard D. P.

File: http_webmailworld.dl.tb.ask.com_0.localstorage

Location of http_webmailworld.dl.tb.ask.com_0.localstorage and Associated Malware

Check whether http_webmailworld.dl.tb.ask.com_0.localstorage is present in the following locations:

Windows 2000, Windows XP, Windows Server 2003 specific http_webmailworld.dl.tb.ask.com_0.localstorage file locations:

  • C:\Documents And Settings\USER_NAME\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_webmailworld.dl.tb.ask.com_0.localstorage

Windows Vista, Windows Server 2008, Windows 7, Windows 8 specific http_webmailworld.dl.tb.ask.com_0.localstorage file locations:

  • C:\Users\USER_NAME\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_webmailworld.dl.tb.ask.com_0.localstorage

If you find http_webmailworld.dl.tb.ask.com_0.localstorage file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The http_webmailworld.dl.tb.ask.com_0.localstorage file is associated with malware only if found in the locations listed above.


Different Variations of http_webmailworld.dl.tb.ask.com_0.localstorage File^

File SizeFile Md5Last Seen
5120AD99F1DE9D7CC21DEDA230A927F71367Jul 31, 2015
4096F4690280CF81D198EF434FCC573BBA01Sep 30, 2015
512026C3589E64DD7532248569E17E9B4ADBOct 5, 2015
30728B7752428FB67C0E23F1D739F52C8C07Oct 19, 2015
614454E349AEB3482B4282939F7DE8317565Nov 21, 2015
30728300177C7D7713502EC0C90CEBD7D3CENov 24, 2015
7168B48208692EB02C00F1ED4D0B38158BFCNov 28, 2015
5120352FFDC1FDA35BC30BA9AB03A9C80362Dec 29, 2015
7168569FB8D9263446E2FC04CF532DF625A4Jan 13, 2016
512050A289CBF64AC100D9090D7541C8B48FJan 25, 2016
5120C92DD7FA43AB1D3927E20D32BD587B7FJan 27, 2016
51202850BCC41F9E4B1B7FB025651A85AC75Feb 4, 2016
512005EA7742C57659981AE2457E4F805F1BFeb 4, 2016
5120D2C9037F8E463B2B66524A0B16C05369Feb 4, 2016
51200D76ECD79E90D04C0FE7220F2F73041AFeb 4, 2016
5120CD7374648C4749DA79F0A54B0E66181AFeb 9, 2016
51205191AE946B83000D999D5CCB0F458B0DFeb 11, 2016
7168865B4011782480A6D62F28BD888A83D4Feb 13, 2016
512094536EDCB92BAB88E17A3A2911A3DC39Feb 14, 2016
512093D517FCEE3D9EF6988B23DEE93F0385Feb 22, 2016
51205942D7E3F3963F3430188CE9A5CFAD1CFeb 29, 2016
4096FF99EFE95DD19B94DBC309B5E0CDAE01Mar 11, 2016
71680FF2A80AE9B1991F6BDEDF162358B965Apr 3, 2016
5120A4C4A836461499F080B46E96F732648EApr 10, 2016
5120C0D5965A61765496A4BAAE2251D06773Apr 25, 2016
5120C5F124E29181531E05D1940D2492747FApr 27, 2016
61447C106C33CD83C9DA9154EACCE15939E8May 11, 2016
6144328C23040C609197DE48F5B59079A267May 25, 2016
614429935281630E1322030451A11A5517DFMay 29, 2016
6144AC79A3D2F2DFC4E82CC4B28AC037D6F0Jul 18, 2016
5120FDAB3794E1D1D3FC1EFA1031DFE682CFSep 2, 2016
8192CD1371DD5FC1B516670C3A5F6502D0E6Sep 30, 2016
5120D17380710EB5CC73F97E068CEF12844BNov 25, 2016
716868AED3F8107A0FC2766BF2C565EA15A0Dec 3, 2016
5120ED2D8E1A9E79DCE3CB1BE13009781432Dec 8, 2016
614492EE93285AE842CD839C2710E03173B2Dec 13, 2016
51202522A7E8E5988F8E2326D33C9A9434B3Jan 8, 2017
512015CEAD277EA95133FF140644202E15A2Jan 14, 2017
71681DB9634DA343C76C262DAF9C6761C07CJan 27, 2017
71685F2030411DFAC036970CE3DB27C5EF70Jan 31, 2017
7168681EA607B6A4948581FB34C21CA69202Feb 4, 2017
51202EDE9CA3F6FB5F4CEFB0EF3E30291BFFMar 7, 2017
6144046947C17232F9C8ECB8C1931531C95CMar 12, 2017
6144B7B4539D4E965C4AA098E42D7DDD2190Apr 22, 2017
51200F11A4DD45209EE757CA94E2195BB93CApr 22, 2017
7168EB7E98DEF954D6179A499C331F7A76A1Apr 29, 2017
7168DC144098DCDD45A265D8CFD51BB3D039May 3, 2017
51207E671854EAD06C5E7DF7A338CA1284FDMay 7, 2017
30729D73523F290421395D65C7B2D8E3ACBBNov 24, 2017
614430281EA28E1BF8F1DE04327B1F709FABJun 16, 2017
614406BF4E7FB838476FE0967B441CD141E0Jun 17, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove http_webmailworld.dl.tb.ask.com_0.localstorage^

  1. To enable deleting the http_webmailworld.dl.tb.ask.com_0.localstorage file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select http_webmailworld.dl.tb.ask.com_0.localstorage and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of http_webmailworld.dl.tb.ask.com_0.localstorage and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of http_webmailworld.dl.tb.ask.com_0.localstorage and Associated Malware.
  6. Notes:

    • The deletion of http_webmailworld.dl.tb.ask.com_0.localstorage will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of http_webmailworld.dl.tb.ask.com_0.localstorage will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a http_webmailworld.dl.tb.ask.com_0.localstorage malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type http_webmailworld.dl.tb.ask.com_0.localstorage. The name of the first found registry value referencing http_webmailworld.dl.tb.ask.com_0.localstorage is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to http_webmailworld.dl.tb.ask.com_0.localstorage, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of http_webmailworld.dl.tb.ask.com_0.localstorage and Associated Malware.