PDA

View Full Version : Manual Removal Guide for Win32.LoadAdv.h



Friday
2008-11-29, 21:52
The following instructions have been created to help you to get rid of "Win32.LoadAdv.h" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
trojan

Description:
Win32.LoadAdv.h connects to the internet in background, loads UltimateCleaner, VirusProtectPro, Zlob.ImageActiveXAccess, Search2Find, VirusLocker, MagicAntiSpy etc. without giving the user a possibility to cancel that process.
Removal Instructions:

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

The file at "<$PROGRAMFILES>\setup.exe".
Make sure you set your file manager to display hidden and system files. If Win32.LoadAdv.h uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Folders:

Please use Windows Explorer or another file manager of your choice to locate and delete these folders.

The directory at "<$PROGRAMFILES>\Obzaazxo".
The directory at "<$PROGRAMFILES>\uzupmbqb".
The directory at "<$SYSDIR>\okqipwgf".
Make sure you set your file manager to display hidden and system files. If Win32.LoadAdv.h uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

Delete the registry key "{3B60CECE-30F4-4EC3-8F5F-330B011BDDEE}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{64B94229-7967-860A-A0C2-034C02BA876B}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{de5ede53-9db0-422d-b32d-5c41c96d6f52}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{03F65A7B-6E49-4ACE-848B-4459DDBD3981}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{15125718-D196-47C9-8FBF-9889C0C85D67}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{21C40A12-3079-4A70-A715-8A44CE0DE829}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{2A3E745F-1EAE-441F-A5D5-E53C909CEEC1}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{2F6A3DCF-D68F-4663-8C25-312BCDBE4D47}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{48129B70-2F29-4DBA-A499-BEB1A1554E10}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{484E9A1B-C631-47F3-9BC0-F752CDAAFB9A}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{A1886D5E-3508-4109-A8A0-F045AA86F3A3}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{A2817460-5C53-4B41-8D01-D3EF255DD41E}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{AEEA2138-2168-449E-B995-B56612EEF65E}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{AEFD40BB-03E3-4C66-ABFB-B5720ACB833E}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{B9C7A624-88E3-4DFA-8D56-438B10BC0149}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{D21FBDCE-EF01-417C-A1A1-C1EEDB8D5DB6}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{EBA2671E-29BF-42D8-B17E-AB5315CC73C5}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{F105F0C9-50E2-44FA-B3EC-92CA7BFE0C0D}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{F664EA90-9B91-4825-9B51-5635AC38CCA6}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{6D7F9517-F134-45E3-BF2E-73414FF15CA1}" at "HKEY_CLASSES_ROOT\TypeLib\".
If Win32.LoadAdv.h uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.