How to Remove Zlob.trojan.Media-Codec, Goldcodec, Silvercodec, Braincodec
Also known as: LightCodec, TVCodec, MovieCodec, PCodec, ZCodec, PlayerCodec, Dvd Codec, iCodecPack, DVDAccess, StrCodec, XPassword Generator, MPCodec, MP Video Codec, PornMagPass, MyPornMagPass, WMCodec, WinMediaCodec, MediaCodec, VidCodec, VideosCodec, IMCodec, IMediaCodec, MedCodec, SoftCodec, MMCodec, MMediaCodec, HQCodec, TrueCodec, VCCodec, VideoCompression Codec, JPegEncoder, PornPassManager, KeyCodec, VideokeyCodec, IVideoCodec, VidCodecs, VideoCodecs, QualityCodec, EliteCodec, PerfectCodec, SuperCodec, GoldCodec, SilverCodec.Often these infections can be found placed in fake MySpace profiles, and other social websites. They are fake codecs. They install the Zlob.trojan.Media-Codec which pops up fake alerts in an attempt to make you buy software, and will hijack your homepage.
Option 1 (smitfraudfix by S!Ri):
Instructions for SmitFraudFix (by S!Ri)
SmitFraudFix only works with Windows XP or 2000
- Please download SmitfraudFix (by S!Ri)
Extract the content (a folder named SmitfraudFix) to your Desktop.
Don't use it yet.
- Reboot into Safe Mode: ( without networking support !)
°To get into the Safe mode as the computer is booting press and hold your "F8 Key". Use your arrow keys to move to "Safe Mode" and press your Enter key.
- Open the SmitfraudFix folder and double-click smitfraudfix.cmd
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files. - (Warning : running option #2 on a non infected computer will remove your Desktop background and set it blank again. But you can reapply your desktop background again afterwards
- You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.
- The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".
- The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.
- A text file will appear onscreen, with results from the cleaning process; save that log in case you need it to reply together with a hijackthislog. The report can also be found at the root of the system drive, usually at C:\rapport.txt
Instructions for Smitrem (by noahdfear)
- Download smitRem.exe ©noahdfear, and save the file to your desktop.
Double click on the file to extract it to it's own folder on the desktop. - Reboot into Safe Mode: ( without networking support !)
°To get into the Safe mode as the computer is booting press and hold your "F8 Key". Use your arrow keys to move to "Safe Mode" and press your Enter key. - Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish. - The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed. Save that log and post it if needed along with any others if you need to start a new topic.