Solved

How to remove troj Dyfuca.m

Posted on 2004-10-03
5
246 Views
Last Modified: 2013-11-16
I got troj Dyfuca.m. It is in my windows directory. When I tried to delete this dll, My windows Xp  said the file was in use, could not be deleted. So how can I remove it?

peter

0
Comment
Question by:petershaw8
5 Comments
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 12210746
Hello petershaw8 =)

Try to delete this file in safemode !!
and after deleting it, run the common spyware and virus removal tools to make sure it has deleted completely !!
0
 
LVL 36

Expert Comment

by:Zyloch
ID: 12210757
Hi petershaw8,

You can probably use an antivirus software to delete it. Make sure you don't have any more viruses here: http://housecall.trendmicro.com/

Then, download Hijackthis here: http://www.majorgeeks.com/download3155.html

Run it and either post log here or here: http://www.hijackthis.de/index.php?langselect=english

Regards,
Zyloch
0
 
LVL 12

Expert Comment

by:rossfingal
ID: 12211482
Hi!

Go to Add/Remove Programs in Control Panel and look for:
Active Alert
Internet Optimizer
Optimize
Uninstall any that are present

Did you run your HijackThis log through the site Zyloch pointed you to?

RF
0
 
LVL 6

Accepted Solution

by:
knoxj81 earned 200 total points
ID: 12221254
I would disable system restore:
http://www.pchell.com/virus/systemrestore.shtml ( Instructions for ME & XP )

Then reboot into safemode ( holding F8 key )

Once in safemode I would do a search for the virus and type:

regsvr32 /u FILENAME.dll

then I would delete the filename.


Last, I would use these programs to help you prevent this from happening again:

Antivirus:
Kaspersky Antivirus 5.0 (new version) http://www.kaspersky.com/personal
This program is the best by far. It updates every 3 hours, scans web browser scripts also.
I've tested many other virus scanners through the years and this is by far the best.

AVG is also a great virus scanner (more for home user) not to mention they have a wonderful FREE edition.
http://www.grisoft.com/us/us_dwnl_free.php

Firewall:
Sygate Personal Firewall Pro - Compared to ZoneAlarm or Nortons which both have tons of exploits to drop their service like a fly. Sygate is the choice for a software firewall.

Sygate has a home editon for free as well.  www.sygate.com

Spyware/Adware/Malware/Dataware:
AD-AWARE - www.lavasoftusa.com
If you can afford it by the PRO version, the extra feature AD-WATCH is well worth it for it monitors your registry and notifies you of any changes made allowing you to ALLOW or REJECT the request on the fly.

RegistryProt 2.0 - http://www.diamondcs.com.au/index.php?page=regprot
This is a free program to monitor all changes to registry. This is a must in security for you windows machine. Big help in eliminating spyware, Trojans, backdoors, etc..

BHO Demon - www.majorgeeks.com/download3550.html  (mirrored)
This is a must now-a-days if your running Internet Explorer! BHO is used in a lot of the recent IE exploits as well as keyloggers. Windows XP SP2 offers something along these lines, but why trust M$.

IDS ( Intrusion Detection System ): - snort.org
I was reading my Windows & .NET Magazine, and it has a great article on SNORT. Setting it up and everything. Page 51! Or you can buy the book SNORT 2.1 Second Edition. This program is absolutly promising, this is for extreme paranoid users & advanced users.

References:
http://isc.sans.org/index.php?off=diary -Everyday info on the latest exploits/virus/security issues.
http://eeye.com - perfect for advisories and the best security software.
www.majorgeeks.com - Every program a nerd could think of!!
www.sygate.com – Great Software firewall.
www.kaspersky.com – Best AV on the market.
www.lavasoftusa.com – Best spyware removal program.
http://www.grisoft.com – Wonderful FREE AV.


Good Luck,

Jorden
0
 
LVL 6

Expert Comment

by:knoxj81
ID: 12233221
thank you. hope this worked out for you.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question