PDA

View Full Version : Manual Removal Guide for Look2Me.Topconverting



Friday
2008-11-28, 17:42
The following instructions have been created to help you to get rid of "Look2Me.Topconverting" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
malware

Description:
Topconverting hijacks the hostsfile, and thus redirecting websites.
It downloads and installs other malware/spyware and trojans without user consent.
It hooks up to the IE and Explorer and opens the IE regularly with malicious websites.
Removal Instructions:

Installed Software List:

You can try to uninstall products with the names listed below; for items identified by other properties or to avoid malware getting active again on uninstallation, use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) or RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer) to locate and get rid of these entries.

Products that have a key or property named "TopConverting".

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

The file at "<$SYSDIR>\guard.tmp".
The file at "<$WINDIR>\VT00.exe".
The file at "<$WINDIR>\package8032_SIAC.exe".
A file with an unknown location named "loader2.ocx".
A file with an unknown location named "loader2.ocx".
A file with an unknown location named "loader2.ocx".
A file with an unknown location named "loader2.ocx".
A file with an unknown location named "loader2.ocx".
A file with an unknown location named "loader2.ocx".
The file at "<$SYSDIR>\guard.tmp".
A file with an unknown location named "loader2.ocx".
A file with an unknown location named "VT00.exe".
A file with an unknown location named "VT10.exe".
The file at "<$SYSDIR>\guard.tmp".
The file at "<$SYSDIR>\SWLAD1.dll".
The file at "<$SYSDIR>\SWLAD2.dll".
Make sure you set your file manager to display hidden and system files. If Look2Me.Topconverting uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Folders:

Please use Windows Explorer or another file manager of your choice to locate and delete these folders.

The directory at "<$PROGRAMFILES>\TopConverting".
Make sure you set your file manager to display hidden and system files. If Look2Me.Topconverting uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

Delete the registry key "TopConverting" at "HKEY_LOCAL_MACHINE\SOFTWARE\".
References to the file "<$WINDIR>/Downloaded Program Files/loader2.ocx" at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\.
Delete the registry key "{CB8097BE-3ACA-49DA-835B-4A4C4288918E}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "H323TSP" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\".
Delete the registry key "{13AD18A3-7011-4FDF-B392-5D59675BFDDF}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry value "{47735513-4737-4173-A1AB-2100837E6C04}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform\".
Delete the registry value "{13AD18A3-7011-4FDF-B392-5D59675BFDDF}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\".
Delete the registry key "{C08801CF-EBCA-4C1E-B23F-8F17F5DE0D79}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{4FE82BA0-9335-4D4E-8E98-76409A88F2C1}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{ACE5B10B-92A3-4103-8583-3684BB09409F}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{423B9E38-3EFF-4F3C-AB5F-5D794E9D2127}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{D52433A9-A44C-43AB-A013-24B3C756DD2B}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{6CDC3337-01F7-4A79-A4AF-0B19303CC0BE}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{B288F21C-A144-4CA2-9B70-8AFA1FAE4B06}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{E0D3B292-A0B0-4640-975C-2F882E039F52}" at "HKEY_CLASSES_ROOT\TypeLib\".
A key in HKEY_CLASSES_ROOT\ named "SWLAD1.SWLAD", plus associated values.
If Look2Me.Topconverting uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.