Exterminate It! Antimalware

malpedia

Known threats:700,086 Last Update:March 16, 12:51

Testimonials

Dear Jean,

Thank you for your follow-up. I did indeed use the Submit State feature last night and this morning, your team sent me instructions to run an 'update' and then re-run Exterminate It! on the PC. I just finished that process and the new update wiped it out. I ran my regular anti-spy/anti-virus to double-check and it wasn't able to detect it either. I appreciate the support from both you and your team.

Linda D.

File: At49.job

Location of At49.job and Associated Malware

Check whether At49.job is present in the following locations:

At49.job file locations that are Windows version independent:

  • C:\Windows\Tasks\At49.job

If you find At49.job file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The At49.job file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of At49.job File^

File SizeFile Md5Last Seen
38653D47B4C90A7B8D6C90D6316D44E3363Jul 5, 2010
386860F7DD2E889A56640A6C59B2915D1E5Sep 1, 2010
40622719C08B8584F4996638D95EE38E3ECOct 24, 2010
4049D5CBBBE96CCA98299DFA99A76CF96E8Oct 27, 2010
4045232C8832C174879C77FECDC3A034D81Oct 28, 2010
4068379B69AA0B492F1FC6CEA2CBE3C7EB6Oct 28, 2010
402BF5D3CA3191B98EBE4FFB9E6A45C2213Oct 28, 2010
406A8614B4749A19A37D66F27FD20AAD0C1Oct 28, 2010
404447DF7AF5B3681DA2F01DACE1F5E18ACNov 8, 2010
400C3AA462D9ADD0EBA1BC8EFAAB3094976Nov 11, 2010
40206CB14CB1E79300AB79E266C45EEF523Nov 14, 2010
416348EF87E8FC738015DDA45F0E2DFE173Nov 21, 2010
40076D46661EEE93A1EEE46D91E2D56D3C8Nov 23, 2010
434DC5FEE685307D17703EBF37FEDEAE7B0Dec 1, 2010
406E9930CA2551AD467BBDA7EFF211C94C2Dec 9, 2010
432E447A17E63D69648F1E2B7B8603EA431Dec 14, 2010
4062C1E89EF5375EA11A7106FDDD81417EDDec 16, 2010
4284FD219C12BCAFB10234849D05B6B6084Dec 16, 2010
3920BE248F71886DE884E4C5DB39D4B4F95Dec 23, 2010
3922154E29436B443EB01570ACA37AAFA53Dec 23, 2010
4168A03567D27754BE91BD15AF17299E392Jan 9, 2011
4066972D2E3B36A689FA1DA74E43E125943Jan 13, 2011
404625CA98F23E82757E29BD159DD58A51BFeb 1, 2011
4027604721173FF66CB83CA3834ED878C41Feb 4, 2011
400A0791862B8B6072B256F9301CEC517D9Feb 4, 2011
420F7437D93A74F356F26BE665221F9FB40Feb 5, 2011
420C2D24C2BF712F81E6857FCB65D607F49Feb 6, 2011
4004D0E5600E603A8FC41F3C0AECE099762Feb 13, 2011
432E63DEBC784AF5CEF41A1C0F4B9DB76ECMar 15, 2011
404AF0673F63E3E44BF4390BC0D8C2D2B4FApr 20, 2011
418B4ED23709CB4F5E6B8603E02242EC039Apr 26, 2011
4182F1864ACF891600BA83B91CF9F9CE2E8Apr 27, 2011
4023A6AAE4B467F1CBE6A52586772010F7EMay 2, 2011
360C5021583550F5CA92BBFDA3A296395DEMay 23, 2011
430BECF7A4416977236C1558F11FC03BA9CMay 30, 2011
4204113A4C26EF983A913073602C776121AJul 18, 2011
406AC05C2BD0133ED1BDB8F5C3FA47E7548Dec 24, 2011
4229EACE161D808D8FD806ED3188FE2BC0DFeb 16, 2012
4222EB33027C05702D7108BF8686DED59DFApr 5, 2012
430CC98F2163C065B7D4B41127A7B51D38FJun 8, 2012
3709C08E1BA7D0DFE023A649FA1AA349116Mar 15, 2010
38634BA9AF2EC82CD6EF118CFFFD56A9BEFJul 18, 2012
386354DCE033ECFB0EF6F8539A8FB54C52CJul 21, 2012
434825013236B0DBA993B279891B18D987AApr 27, 2010
434165AA4CDF26853EE4455E14D0B7FF350May 1, 2010
434F76254F5BBC874283FF2CC19F77771EBJun 19, 2010
4501B698FE15015FF2E92A300123A355AF7Feb 6, 2011
436792FE88A320681C1DB4EBF12F1F7346EJun 9, 2011
436F5DCA88E7B0B69290E9757F68CE8055CJun 17, 2011
43633767B9FAC65205871B4D1E20638FE8CJun 27, 2011
4361B9CEFB5523927851A1C668CC0937044Dec 27, 2011
41669CEF096BF1ECFC69EC029D3EE1DE6B8May 7, 2010
416EFE2FB9A51A7503A7969C2A69BC37913May 20, 2010
350454648C6198D3A37E672CDC068C72429May 24, 2010
416020AB81B09ACA6FE13C27E97D8090FFFJun 11, 2010
4160D6E88740DCE3715D98D967B935B4622Jul 18, 2010
416EE18EC4BC8A516441FA8F8B79426B99BAug 3, 2010
416DBB0D56C0CBFA7188E3FFCBE46CEF31EOct 4, 2010
416BFA8385CE7936266AC661ED96A4EB30AOct 11, 2010
338BDFAFCB0299C30C5DC829F5DF674A7B5Dec 22, 2010
342131F5344968C696A6A299B03E8B6709ADec 27, 2010
348204BDDC64767C3D5BA63E2BCAF6541F4Dec 28, 2010
3406B9D3F1EC9E2D6A789FE219DD994ED3CJan 3, 2011
34261410139B48DF57F311A93A876B3E458Apr 1, 2011
3521D76F119A1064AB09ED7ADE8F2C25C25May 7, 2011
3482777EA795E6E2B95C5DAFAC544001D5BMay 18, 2011
3481DD7B80E3A868F47887D5F92F4FA22CDMay 18, 2011
33820F2CAF7989F1E36133792074F4A9BD7May 28, 2011
342AA50F9214241E908198DFD1943E359B2Jun 21, 2011
338DEAF30C21BCD4EC0E842A7F55C52F17AJul 19, 2011
3405064E1803F42BBDBF67F359563E9ABC2Jul 30, 2011
34479BFF07E49AF5DF856CCE146C435D8FDSep 20, 2011
352817F16CA77DF237C8F451E11E00F6416Oct 2, 2011
3382F328D02CCC08640A1D074E45880D302Oct 10, 2011
348D6665D141198911EADDB974CA289E9E5Nov 11, 2011
3404C2EEF22FA8B8485ACD8AE19E2955838Dec 6, 2011
352A910992DEF4C48915D0E479D964AA8E5Dec 25, 2011
344768C0421B9F779B3D182697E73E2463EJan 6, 2012
352069D8032AC616203A5CE0C216439DD2AJan 29, 2012
34852ABB34112700227497A0AD903308B9BFeb 6, 2012
354476DED903DB3561326500B67DF52701AFeb 18, 2012
3467C7F5A4ACDCE8AA82197DCCCD989C2CEFeb 27, 2012
4183BBD48A739FE3AFEEF444D5EE80499A3Feb 29, 2012
3520617DD90ED12CF7600BD5B710BEEE741Mar 28, 2012
34641783D78BA5A7F6EC58757AFF2A257C2Apr 6, 2012
3400D139AFB213180F60B8B56DC9879E3C6Apr 6, 2012
3387791B2E25235267D829A75EF274B6E4FApr 8, 2012
3566CC66B7F4051C4025F7461A170E66ED4Apr 11, 2012
350183B7D868917F9731B0E59F469229325Apr 18, 2012
344ACF8691ECDBF5F413310078F095FBEC5Apr 20, 2012
344EA76D01ADE2F17C8485B659778AC79A8Apr 23, 2012
342E1D523CB51288CB52CAF4FF27799CB49Apr 29, 2012
348E3984B401889DD522C1BA84D77A7B2CEMay 8, 2012
354E3996A634DE7CDD62A26E5CA6CAA8E60May 10, 2012
354B74353282A88C5EB72205EC54DBFBB96Aug 18, 2012
34626C971F1B5C764D1496D59C2E01CE463Oct 31, 2012
3461CB3EAAECE1E060CE49DAEDE1B41183EMay 21, 2013
34235739541AB7F32BFEEAE90CA2910F916Jun 15, 2013
3422948900A137D6C8FF09CF8D5C776466DSep 24, 2013
33654C00DE9B4EDECB68CFC0E02B23F5FE1Nov 26, 2013
35089E1A517D39E47F06014C74FD69B6800Jan 10, 2015
3425B7A28099C2530F885AE6619A37D6C54Feb 17, 2017
3860AF00702988DD8009B3922A0D6BDDA27Jan 4, 2012
39269206B87B01BFE1642927E2525E7A475Feb 18, 2012
396493A9414A245387AAC46A5D4442793A3Mar 15, 2012
388A816DF5178C7C962FDF580522B3C6A91Jun 27, 2012
4068EAC6A076E3ABE0E15E31A465965EB2CNov 26, 2014

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove At49.job^

  1. To enable deleting the At49.job file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select At49.job and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of At49.job and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of At49.job and Associated Malware.
  6. Notes:

    • The deletion of At49.job will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of At49.job will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a At49.job malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type At49.job. The name of the first found registry value referencing At49.job is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to At49.job, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of At49.job and Associated Malware.