WinXP SP2, Avast Home edition
I’ve had no problems with Avast before but this one got through… Avast did catch some miscellaneous *.exe’s subsequently.
This what I did to resolve the problem. I encountered it yesterday, it included an unknown download of some SpyFalcon goodies (a corrupted malware program - no, I didn’t download it it came with the rest of the problems). Google it to find out more about them, not a good thing.
I was getting repeated *.tmp.exe attempts to access the internet, deleting those files in the temp directory did no good as recursors would just respawn.
Here’s a quick summary of what I did to solve the problem in hopes of helping others (#3 on should apply to all with the win???32.dll problem - BTW, mine was winbue32.dll):
- Uninstalled SpyFalcon;
- Uninstalled IE Favorites links added due to #1;
- Deleted these files from the following location: C:\windows\system32
a. win???32.dll;
b. ncompat.tlb;
c. hp?? ??.tmp (those should be four other characters without a space but this thing turns it into a frown); - Deleted registry entries for #3;
- Downloaded and installed both SMITREM (http://noahdfear.geekstogo.com/click%20counter/click.php?id=1) and EWIDO, only update EWIDO at this point, do not run a scan, (http://www.ewido.net/en/download/);
- Reboot into SAFE mode;
- Run SMITREM (just follow all prompts);
- Run EWIDO (full system scan);
- Restart to Windows.
System files deleted:
- C:\WINDOWS\system32\win???32.dll;
- C:\WINDOWS\system32\ncompat.tlb;
- C:\WINDOWS\system32\hp???.tmp;
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\win???32.dll (use the RUN command and then enter REGEDIT);
- C:\Documents and Settings[username]\Local Settings\Temporary Internet Files\Content.IE5[foldername]\wdinit64.exe.
Other files:
Miscellaneous C:\Documents and Settings[username]\Local Settings\Temporary Internet Files\Content.IE5[foldername]\win??.tmp.exe files (usually only show the .tmp extension if you look in the folders but you can do a search for *.tmp.exe).
The latter was identified as: Trojan.Dialer.oy
*** You could probably do this manually without resorting to SMITREM and EWIDO, I got all of the files except for the wdinit64.exe without them.