Cleaning up after WMF exploit – BHO removal



Browser helper objects (BHO’s) are listed in the registry and load with explorer when it runs (Internet Explorer/ File explorer are so closely tied it affects both.) I’ve used BHOdemon in the past to identify and disable BHO’s and a tool like that is the preferred method. However, in my case, this is a disposable virtual machine and I used the “blunt object” approach…. regedit.


I had identified one file in the infestation as a BHO by viewing it with a text editor and finding a text string identifying that it was a BHO. 3.00.13.dll was the file name. In the registry, I went to the following key HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects and deleted every entry. This is not the recommended way of dealing with it, but I was already several hours into cleaning up my virtual machine and didn’t have any “good” BHO’s that I was concerned that would disable.

Even if there were “good” BHO’s that I had disabled I would image a reinstall of the BHO would fix it. (Some good one’s for example might be an Acrobat reader BHO)… Anyway, I had forgot to detail that step in the earlier writeups and wanted to make sure there was a complete accounting.

Related Posts

Blog Traffic Exchange Related Posts
  • Audio on Linux weekend... For most people here in the US, this last weekend was known as Labor Day weekend, for me though... it was more like Audio on Linux weekend. I've mentioned before that I use my computer for most EVERYTHING and that's not far off.... I have watched movies on the PC,......
  • Virtual machine as a safe browsing environment I mentioned this in my summary yesterday morning as a possible workaround until there are patches for the WMF vulnerability that's been big news the last week. I notice that incidents.org has mentioned it too as a possibility today. VMware has released VMPLayer as a free way of running premade......
  • The latest and greatest in Malware Removals I have started referring to malware more and more lately because the term virus doesn't exactly describe the pests I see on peoples machines and the terms spyware or adware aren't doing justice to some of these pests either. (There are many pieces of what I would consider malware that......
Blog Traffic Exchange Related Websites
  • Free Success Ebook: “The Human Machine” by Arnold Bennett (6th Ed. 1913) – Free Download It has never struck you that you possess a machine?  That machine is yourself – you are the most fascinating bit of machinery that ever was.  Considering that we have to spend the whole of our lives in this human machine, considering that it is our sole means of contact......
  • FTP And Other File Transfer Tools In Web Hosting Anything related to the Internet or computers is bound to introduce technical issues pretty soon. One of the earliest that novice web site owners encounter is FTP, which is an acronym for File Transfer Protocol. Seeing it spelled out, it's easy to see why those in the know quickly move......
  • 5 Reasons To Say Goodbye To Internet Explorer Microsoft has long championed its own proprietary web browser, Internet Explorer. Internet Explorer 7.0 proves to be the current browser version promoted by the operating system behemoth. This comes installed on every computer that operates on the Windows Vista or Windows 7 operating systems. Although this Internet Explorer is the......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site