New PC Security Tools Virus Malware
Security Tool Virus
OMG,another virus malware in the disguise of a PC tools system software is making its way into your protected computer. Yep, happened to me. Suddenly, a popup appeared stating that my computer was infected and that I should click to get a free scan. Knowing better, I simply clicked the X box and it was gone. Not so. Any response to this is too late. The virus malware had already made through and was installing.
The PC Tools system virus malware is polished and professional looking when it does appear with a long list of bogus problems and viruses on your computer. What the criminals want is for you to use your credit card and order it. There is nothing to buy. If you say no or close it, your desktop as you know it, vanishes and is replaced with awkward English gibberish trying to convince you that your hard drive is in deep doo-doo. It then prohibits any actions on your part, cuts off the Internet, prevents you from accessing programs, downloading etc. Basically, you have to unplug or turn off the computer. If you reboot, it returns to the software and tries again and so on.
So, when you reboot, press F8 (for most computers) after the startup screen and run it in Safe Mode with network connections, this will allow you to access the internet. You should download the FREE Vipre Rescue program @ live.sunbeltsoftware or go to sunbeltsoftware and search for PC Rescue. You can also search for Rkill and download it from softsailor.com. Once you download it into your infected computer, run it. Vipre will take almost 2 hrs to deep root scan your whole computer for virus and malware. I also suggest downloading the free Spybot or updating your existing one and running it after Vipre.
The VIPRE Rescue Program is a command-line utility that will scan and clean an infected computer that is so infected that programs cannot be easily run.
The VIPRE Rescue Program is packaged into a self-extracting executable file (.exe) that prompts the user for an "unpack" or installation location, then starts the scanner and performs a deep scan. The user can start the program either by opening it via windows or from the command line.
Virus definitions are included, and the program is self-running once executed. The initial scan, and all subsequent scans, include Rootkit Detection. Four command line options are available, perform a deep scan, perform a quick scan, log the events, and disabling the rootkit.
The virus creates random files and may insert them into C:\documents and settings\all users\appdata and in C:\windows\sys32\drivers\etc\hosts (the\etc\hosts is added by the virus), some reports indicate the EXE file is named: IEIL00902. But, this name may change at random.
It will modify Windows Registry and add the following entries:
HKEY_CURRENT_USER\Software\System Tool 2011
“[Random]“=”c:\Documents and Settings\All Users\Application Data\[Random].exe”
The threat will drop the following malicious files:
%UserProfile%\Desktop\System Tool 2011.lnk
%UserProfile%\Start Menu\Programs\System Tool 2011.lnk
%systemdrive%\Documents and Settings\All Users\Application Data\2BcT333842 [Random Folder]
-%systemdrive%\Documents and Settings\All Users\Application Data\2BcT333842\2BcT333842 [Random File]
-%systemdrive%\Documents and Settings\All Users\Application Data\2BcT333842\2BcT333842.exe [Random Files]
Delete Windows registry entries the malware created. It is important to BACKUP YOUR REGISTRY FIRST.
- On Windows Start Menu, Click Start > Run
- Type in the field, regedit
- Find registry entries mentioned above and delete if necessary. Or........
Download MalwareBytes’ Antimalware here and save it to your Desktop.
3. Close all open applications.
4. Double-Click on the downloaded mbam-setup.exe to start the installation.