1. Download
Knoppix (click there) and burn the ISO file to a blank cd. You can use
Active@ISO burner for this. Note that the download for Knoppix might start ar 10kb/s or less but it WILL rev up (to around 200kb/s). The server must be throttled. (I'm using a 4mb/s connection)
2a. Pop the CD in the drive. Reboot your comp. You might need to force it to boot from the CD. To do this, go into the BIOS and set 'boot from CD-ROM' as the number one boot priority.
2b. Knoppix (it's a linux distro) will boot off the CD as if the CD is your hard drive. It will make no changes to your computer. On the Knoppix bootup screen, press enter. You'll know when you get this screen.
3. In Knoppix, open up your hard drive. You should be able to find it. It's the folder with all the same files and folders as your C: drive in Windows. Delete these files:
For Vista and 7:
Replace '%UserProfile%' with 'Users\(Your Username)\'
Replace '(Your Username)' with, well, just guess.
Replace '<random>' with a random string of characters like 'cf8dbkd' or 'fkf3gd' or something.
%UserProfile%\AppData\Local\<random>\
%UserProfile%\AppData\Local\<random>\<random>sysguard.exe
%UserProfile%\AppData\Local\<random>\<random>sftav.exe
For XP:
Replace '%UserProfile%' with 'Documents and Settings\(Your Username)\'
Replace '(Your Username)' with, well, just guess.
Replace '<random>' with a random string of characters like 'cf8dbkd' or 'fkf3gd' or something.
%UserProfile%\Local Settings\Application Data\<random>\
%UserProfile%\Local Settings\Application Data\<random>\<random>sysguard.exe
%UserProfile%\Local Settings\Application Data\<random>\<random>sftav.exe
Now boot back in windows and delete these registry entries:
For any version of Windows:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "<random>"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "<random>"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyServer" = "http=127.0.0.1:5555"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = ".exe"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "RunInvalidSignatures" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyOverride" = ""
HKEY_CURRENT_USER\Software\avsoft
I've got infected with the 'AntiSpyware Soft' variant, and so did two of my clients. (I repair computers for a living.) I just used a slightly modified version of this procedure and it worked all three times.
I guess you could use a automated removal program, but you never know if the job is complete.