Exterminate It! Antimalware

malpedia

Known threats:700,086 Last Update:March 16, 12:51

Testimonials

My browser was taking 10 to 15 seconds to load up instead of being instant. Three of the top anti spyware programs insisted all was well. However a few simple instructions from your team and the problem was magically solved.

Nelson S.

File: BlockAndSurf_wd.job

Location of BlockAndSurf_wd.job and Associated Malware

Check whether BlockAndSurf_wd.job is present in the following locations:

BlockAndSurf_wd.job file locations that are Windows version independent:

  • C:\Windows\Tasks\BlockAndSurf_wd.job

If you find BlockAndSurf_wd.job file in any of these locations, your computer is very likely to be infected with the following malware:

IMPORTANT: Malware files can be camouflaged with the same file names as legitimate files. The BlockAndSurf_wd.job file is associated with malware only if found in the locations listed above.

Notes:

Different Variations of BlockAndSurf_wd.job File^

File SizeFile Md5Last Seen
408BF54B5AADB25A984B2E8B8CD4620F0FBMay 2, 2014
41615A9027953D89F81591C5CE765310B24May 4, 2014
396690B411676C99D6B79D3B071AFF54A0AMay 7, 2014
380B86B208301814987D2E8B375212052DBMay 15, 2014
40690A7834AD68F224613F19BDDCB8A8F2EMay 27, 2014
412CC37189D4F858D869B4526D0BB4C0056Jun 2, 2014
418247B7C033FE1CF94A83570ABBC7AFCBEJun 9, 2014
400C577CA3A78A25751335E6AC1032BC132Jun 11, 2014
42433AE5296864C89E34391A597DB33ED22Jun 13, 2014
4040F6704E25D586C3428CB566747F60B9FJun 14, 2014
408D6E52EF57C6F2822619761630F605975Jun 14, 2014
3865A72F26CDFAE06F9B5F89767B15D0541Jun 16, 2014
428B6231D12BF446290C338C5FD5F74C523Jun 22, 2014
382F873F4865A93A6F78E8F26FB308CA729Jun 24, 2014
3827B7C51CDC7E5035AAD3031BFCB3B3063Jun 26, 2014
4367FBA3DC667362219CE45B7A03FD1F8A7Jun 26, 2014
422C79718B0A8FBCCA799467649C2E8691CJun 26, 2014
4028BAAFCB318EA967654E62F87F56CCD3EJun 27, 2014
41293B05F967F47BD0C7C389A838D1A89B0Jul 1, 2014
3862EB848070AAD74CBABC96A071F98B193Jul 4, 2014
404F211619FC7D3C652617D428F44CC78E7Jul 8, 2014
4100D2AC02338EC1FEA60B198776812CA17Jul 9, 2014
382391531315E9B69B2D6F856B53CB1D1EDJul 9, 2014
402B08025411486045EA4FCB8E193181D07Jul 12, 2014
42080507349A99DA42B477C1BFFA7FFCF88Jul 12, 2014
4040459F1B004FCA6321815969591A8A43BJul 23, 2014
39877AA742A6DAB0EE0842FB248EDB5C121Jul 24, 2014
4346CE1C84F12ECEB95F21533D30515BF97Jul 27, 2014
4120C2B2BBCEB3D20EC8941BA9641BDEECBJul 29, 2014
386F7E08583C078A3B98A02782AC124D439Jul 29, 2014
398D76343CBDAF9A866717F9A2CB7A0CD89Aug 4, 2014
372D6B38B5497F2C05E646D5CBACF5E91F5Aug 6, 2014
386D1ED5D8A5C06486A7E0CF3F83A126A36Aug 6, 2014
408ADB8FCFAFEBDA65496F8A4ADB2594A63Aug 6, 2014
420B5ACA89685B1DE9EEDEC9CECB2921A09Aug 8, 2014
40245C7F5E2CD00277E12F531D816AC77FBAug 9, 2014
4507E380EFEEE3C8EABFC17B84120D9C435Aug 10, 2014
4507859B231E8E5C5820AC4CA191D68E800Aug 10, 2014
42868E6D625B3E5A2FE02AE3C78B5D69113Aug 11, 2014
4104E30DF5E5AB00F0C046764EA7269C358Aug 16, 2014
3787F525608E5C7069CEE3B4C6193D6F9C9Aug 18, 2014
424035DE174087CA5677D47B21C8788489CAug 22, 2014
402ADDB73039F5EDD6BF91F9952B264845CAug 26, 2014
43269C58953811F71449499645600E9BBEAAug 26, 2014
4040406CD4AF0882E822F8B2DCBD93B4F27Sep 1, 2014
40068E38EF5EAFBE67289CB16008ED371D0Sep 6, 2014
420EF47A2FE9C1CB1056D3B1AFE290F9D82Sep 7, 2014
408F875A0F2BE012948B21357896EC4C94ASep 11, 2014
390AE1073BA2D9D6CE69C1F6A8340928171Sep 13, 2014
394D6CC85FD00D772E99BAE7496D3559F5ASep 16, 2014
3965EB5F1CA651DA09C9E2A4C8E4E1493EASep 26, 2014
402ABE6312A1F3CA5DA2CE876878295C5FCOct 22, 2014
4044AEBC303C5EB2ED52B695540C7B94DFBOct 29, 2014
41039AE215921486B2EF20E4CB2587F8FBDNov 4, 2014
4105B87EE33F3D4530026D5AB0F532CBF4ANov 8, 2014
414C588F56A7B8ABC5D67A5071193794CC0Nov 20, 2014
400C779B5E63AF1C84BB719EECF129673CFFeb 8, 2015
386292DD94E27450F01EB31D474FB6253B9Apr 28, 2015
3787B1F763CB601917B74C23376F05B8993Jun 24, 2015
42495DDC45BA3193E05EC424B14C11E369DOct 23, 2015
408CBE35D2467BEF8C30AC6B862A334FC8ADec 28, 2015
404F92811921FAF1FE99E9D34603EE6894CMar 6, 2016
426CAB21808361548286F88EDC8E46C4314May 17, 2016
390E35BF1D47EE30C9A1E155F1A8A603A48Jul 10, 2016
402C78A05CBDBE475FD575950410C093863Jul 27, 2016
3885E57577950EB2EDDC7ECFD8EBB83D591Aug 11, 2016
382B7666EDD84C4A6E398EDEC3EEE9CF970Feb 28, 2017

Why Is It Important to Remove Malware Files?^

It is imperative that you delete malware-associated files as soon as possible because they can be used - or are already being used - to inflict serious damage on your PC, including:

  • Disrupting the normal functioning of the operating system or rendering it completely useless.
  • Hijacking valuable private information (credit card numbers, passwords, PIN codes, etc.)
  • Directing all your Web searches to the same unwanted or malicious sites.
  • Dramatically slowing down your computer.
  • Gaining total control of your PC to spread viruses and trojans and send out spam.

How to Remove BlockAndSurf_wd.job^

  1. To enable deleting the BlockAndSurf_wd.job file, terminate the associated process in the Task Manager as follows:
    • Right-click in the Windows taskbar (a bar that appears along the bottom of the Windows screen) and select Task Manager on the menu.
    • In the Tasks Manager window, click the Processes tab.
    • On the Processes tab, select BlockAndSurf_wd.job and click End Process.
  2. Using your file explorer, browse to the file using the paths listed in Location of BlockAndSurf_wd.job and Associated Malware.
  3. Select the file and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. Repeat steps 2-4 for each location listed in Location of BlockAndSurf_wd.job and Associated Malware.
  6. Notes:

    • The deletion of BlockAndSurf_wd.job will fail if it is locked; that is, it is in use by some application (Windows will display a corresponding message). For instructions on deleting locked files, see Deleting Locked Files.
    • The deletion of BlockAndSurf_wd.job will fail if your Windows uses the NT File System (NTFS) and you have no write rights for the file. Request your system administrator to grant you write rights for the file.

Deleting Locked Files^

You can delete locked files with the RemoveOnReboot utility. You can install the RemoveOnReboot utility from here.

After you delete a locked file, you need to delete all the references to the file in Windows registry.

To delete a locked file:

  1. Right-click on the file and select Send To -> Remove on Next Reboot on the menu.
  2. Restart your computer.

The file will be deleted on restart.

Note: In the case of complex viruses that can replicate themselves, malware files can reappear in the same locations even after you have deleted those files and restarted your computer. Exterminate It! Antimalware can effectively eradicate such viruses from your computer.

To remove all registry references to a BlockAndSurf_wd.job malware file:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK. The Registry Editor window opens.
  3. On the Edit menu, select Find.
  4. In the Find dialog box, type BlockAndSurf_wd.job. The name of the first found registry value referencing BlockAndSurf_wd.job is highlighted in the right pane of the Registry Editor window.
  5. Right-click the registry value name and select Delete on the menu.
  6. Click Yes in the Confirm Value Delete dialog box.
  7. To delete all other references to BlockAndSurf_wd.job, repeat steps 4-6.
IMPORTANT: Malware files can masquerade as legitimate files by using the same file names. To avoid deleting a harmless file, ensure that the Value column for the registry value displays exactly one of the paths listed in Location of BlockAndSurf_wd.job and Associated Malware.