I had a user that got this one.  Vipre didn't catch it either.  Vipre tech
support was able to clean it quickly.

On Mon, Apr 4, 2011 at 10:25 AM, Jonathan Link <jonathan.l...@gmail.com>wrote:

> I approach these machines with UBCD4Win to perform necessary cleaning.
> After cleaned with UBCD4win, I'll reboot and run Vipre and other tools in a
> network disconnected state, putting an update on a USB disk, if necessary.
>
>  On Mon, Apr 4, 2011 at 11:22 AM, Steve Ens <stevey...@gmail.com> wrote:
>
>> I've found recently that these are killing the profiles...logon as a
>> different user...then nuke the bastage!
>>
>>
>> On Mon, Apr 4, 2011 at 10:19 AM, <richardmccl...@aspca.org> wrote:
>>
>>>
>>> Greetings!
>>>
>>> I was greeted by our overnight vet who was working at someone else's
>>> desk.  She said she had a rogue AV popping up all the time.
>>>
>>> Dell PWS-3500; Windows XP Professional 32-bit, SP3
>>>
>>> Popups are something like "AntiVirus XP 2011".
>>>
>>> Found that VIPRE had been shut down by the rogue, and it could not be
>>> launched.  Could not install MalwareBytes.  Could not open a command prompt.
>>>  All resulted in a new rogue window opening.
>>>
>>> Booted into SafeMode; no improvement!  I launched Task Manager. I noticed
>>> that whenver I tried to restart VIPRE, to launch the MBytes installer, or
>>> even to "Start->Run-> cmd", I'd get a rogue window (forgot to mention - the
>>> roque windows would begin scanning with a separate window about
>>> registrering).  In Task Manager, I noticed a new task, "tmu.exe", starting
>>> at the time of the popup.  When I highlighted "tmu.exe" and then "End
>>> process...", the window would close.
>>>
>>> I went to another PC, ran REGEDIT, then "Open Network Registry" to access
>>> that machine.  I checked both HKLM\Software and HKLM\Users\.Default, and I
>>> found nothing unexpected in ...\Microsoft\Windows\CurrentVersion\Run, or in
>>> other places I've seen registry changed by malware.
>>>
>>> I made a remote connection to the infected machine's drive and searched
>>> for "tmu.exe".  I found it in
>>> ADMIN$\System32\config\systemprofile\Application Data.  I checked "some of
>>> its neighbors", and TMU.EXE was not found.  So, I deleted it from the
>>> infected machine.
>>>
>>> Still playing around, I booted the machine in "Safe Mode with Command
>>> Prompt".  I was able to give the command "chkdsk /f", and it did run a file
>>> system check when rebooted.  Again from booting into "Safe Mode w/Command
>>> Prompt", I was able to launch the MBytes installer.  The app, though, would
>>> not start (I would imagine this is because in command prompt mode, there
>>> would be no GUI displays.)
>>>
>>> Booted into both normal and Safe modes.  Nothing will run!  Double-click
>>> a short-cut, double-click a file icon in Explorer, or enter something (ie,
>>> "Start->Run-> cmd"), and a window opens asking with which application to
>>> open the file.
>>>
>>> So, the machine is such that remote access to the file system and
>>> registry is available.  At the actual machine, the only way to do anything
>>> is to boot into command prompt mode.  Again, however, no apps will run if
>>> they involve a GUI - only console-type commands will run.
>>>
>>> Next steps?  Thanks!
>>> --
>>> richard
>>>
>>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>>
>>> ---
>>> To manage subscriptions click here:
>>> http://lyris.sunbelt-software.com/read/my_forums/
>>> or send an email to listmana...@lyris.sunbeltsoftware.com
>>> with the body: unsubscribe ntsysadmin
>>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to