PDA

View Full Version : Manual Removal Guide for Look2Me.BM2



Friday
2008-11-30, 14:43
The following instructions have been created to help you to get rid of "Look2Me.BM2" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
hijacker

Description:
This browser hijacker redirects harmless websites to malicious ones with similar names.
Supposed Functionality:
Not stated, judging by file name it seems to be some sort of updater.
Removal Instructions:

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

A file with an unknown location named "BM2.dll".
The file at "<$WINDIR>\Downloaded Program Files\BM2.dll".
A file with an unknown location named "UpdInstall.exe".
The file at "<$SYSDIR>\UpdInstall.exe".
The file at "<$WINDIR>\security\edb.chk".
Make sure you set your file manager to display hidden and system files. If Look2Me.BM2 uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

Delete the registry key "{E8CD72EB-402D-40C4-9001-B9372D962006}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{DDFFA75A-E81D-4454-89FC-B9FD0631E726}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\".
References to the file "<$WINDIR>/Downloaded Program Files/BM2.dll" at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\.
References to the file "<$WINDIR>\Downloaded Program Files\BM2.dll" at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls\.
Delete the registry key "{9A6E8BCF-8EFF-4B50-B051-FF9EF1D9A107}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry value "{9A6E8BCF-8EFF-4B50-B051-FF9EF1D9A107}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\".
Delete the registry key "{2324AC4E-C090-47BC-9172-E7C443C3A753}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry value "{2324AC4E-C090-47BC-9172-E7C443C3A753}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\".
Remove "<$SYSDIR>\akledit.dll" from registry value "DllName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Time Zones\".
Remove "<$SYSDIR>\anaamon.dll" from registry value "DllName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Accessibility\".
Remove "{06EB8E21-F496-4AB1-869F-BACBD639C958}" from registry value "ID" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Time Zones\".
Remove "{48254C4C-0598-4743-BEEE-1BE71ABFC60C}" from registry value "ID" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Accessibility\".
Delete the registry value "{06EB8E21-F496-4AB1-869F-BACBD639C958}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform\".
Delete the registry key "{97B05815-1B06-4395-BA51-EB434E538922}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry value "{97B05815-1B06-4395-BA51-EB434E538922}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\".
Remove "{F57B4C63-F18E-4C7E-9CF5-EB11C66B4CFD}" from registry value "ID" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Accessibility\".
Remove "<$SYSDIR>\adaamon.dll" from registry value "DllName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Accessibility\".
Delete the registry key "{52EF3EF5-B6E0-49CF-917D-0767A8343C1A}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry value "{52EF3EF5-B6E0-49CF-917D-0767A8343C1A}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\".
Remove "<$SYSDIR>\agctres.dll" from registry value "DllName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AeDebug\".
Remove "{9CF60C60-EE11-4415-A515-986CCD4789F7}" from registry value "ID" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AeDebug\".
Delete the registry key "{C03DDFE7-1FC1-4AE2-BC6F-3E582E6DF205}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry value "{C03DDFE7-1FC1-4AE2-BC6F-3E582E6DF205}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\".
Remove "<$SYSDIR>\apaamon.dll" from registry value "DllName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Accessibility\".
Remove "{BD44A7DA-F1B0-49C7-B290-D6FE76F6C0EC}" from registry value "ID" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Accessibility\".
Delete the registry key "{FE3CCEDA-67C2-4D1E-B9FD-441D140623C3}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry value "{FE3CCEDA-67C2-4D1E-B9FD-441D140623C3}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\".
Remove "<$SYSDIR>\astxprxy.dll" from registry value "DllName" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Console\".
Remove "{5C143729-CE7F-4F0F-9476-D89D384AB507}" from registry value "ID" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Console\".
Remove "BM2" from registry value "IDex" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Console\".
If Look2Me.BM2 uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.