Download the Pocket Killbox programme from
HERE. Extract it but don`t run it yet.
You might want to copy and paste these instructions into a notepad file. Then you can have the file open in safe mode, so you can follow the instructions easier.
Boot into safe mode, under your normal user name(NOT THE ADMINISTRATOR ACCOUNT). See how
HERE.
In Windows Explorer, turn on "Show all files and folders, including hidden and system". See how
HERE.
Open your task manager, by holding down the ctrl and alt keys and pressing the delete key.
Click on the processes tab and end process for(if there).
Pribi.exe
arpa.exe
w?nword.exe
<The question mark can be any random number/letter etc.
Close task manager.
Run HJT with no other programmes open(except notepad). Click the scan button. Have HJT fix the following, by placing a tick in the little box next to(if there).
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\windows\system32\blank.htm
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\windows\system32\blank.htm
R3 - URLSearchHook: (no name) - {5BFD825D-3799-6A6D-B9ED-30A67D5D96C7} - C:\WINNT\system32\mnzsplta.dll (file missing)
O2 - BHO: (no name) - {5BFD825D-3799-6A6D-B9ED-30A67D5D96C7} - C:\WINNT\system32\mnzsplta.dll (file missing)
O4 - HKCU\..\Run: [\Pribi.exe] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Pribi\Pribi.exe
O4 - HKCU\..\Run: [Aaau] "C:\PROGRA~1\COMMON~1\CROSOF~1.NET\arpa.exe" -vt yazr
O4 - HKCU\..\Run: [Sipa] C:\Documents and Settings\Administrator\My Documents\?icrosoft\w?nword.exe
O8 - Extra context menu item: &AOL Toolbar Search - c:\program files\aol\aol toolbar 2.0\resources\en-US\local\search.html
O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll
O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) -
http://i.grab.com/media/d3d944/games/files/222/222.cab
O16 - DPF: {6FDB0065-2787-11D6-B1D8-0001023916FC} (CLOActiveXInstaller Control) -
http://www.igl.net/clo/install/grab/CLOActiveXInstallerProj1.cab
O16 - DPF: {87056D28-9730-4A47-B9F9-7E890B62C58A} (WildfireActiveXHost Class) -
http://media.grab.com/media/35f4a8/games/files/1147/axhost.cab
O20 - AppInit_DLLs: wowexec.dll
Click on the fix checked button.
Close HJT.
Locate and delete the following
bold files and/or directories(if there).
C:\PROGRA~1\COMMON~1\
CROSOF~1.NET<Delete the entire folder.
C:\Documents and Settings\Administrator\My Documents\
?icrosoft<Delete the entire folder.
C:\DOCUME~1\ALLUSE~1\APPLIC~1\
Pribi<Delete the entire folder.
C:\windows\system32\
blank.htm
Run the killbox.exe file. When it loads type the full path to the file you would like to delete in the field and
check the delete file on reboot button. press the Delete File button (looks like a red circle with a white X). It will prompt you to reboot, select no until you have finished inputting the files you want to delete, only then allow it to reboot and hopefully your files will now be deleted. If your computer doesn`t automatically restart, restart it manually.
This is the filepath you need to enter into killbox.
C:\WINDOWS\system32\wowexec.dll
Once your system has rebooted, rehide your protected OS files.
Post a fresh HJT log.
Regards Howard
This thread is for the use of stunner only. Please don`t post your own virus/spyware problems in this thread. Instead, open a new thread in our security and the web forum.