<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: New type of Ransomware using user32.dll</title>
	<atom:link href="http://www.411-spyware.com/new-type-of-ransomware-using-user32-dll/feed" rel="self" type="application/rss+xml" />
	<link>https://www.411-spyware.com/new-type-of-ransomware-using-user32-dll</link>
	<description>411-spyware.com - Get the 411 on Spyware</description>
	<lastBuildDate>Wed, 14 Feb 2024 20:29:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
	<item>
		<title>By: Dani</title>
		<link>https://www.411-spyware.com/new-type-of-ransomware-using-user32-dll#comment-15411</link>
		<dc:creator>Dani</dc:creator>
		<pubDate>Thu, 07 Aug 2014 17:04:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.411-spyware.com/?p=32931#comment-15411</guid>
		<description>The first instruction set worked for me and properly replaced user32.dll. Although after scannow completed and rebooted, the computer also did chkdsk and I allowed the full run of that as well. 

However, the virus prevented me from opening a cmd box so first steps must be taken around that. The most important step is to disconnect the computer from the internet. Mine was connected via ethernet so I could just unplug it. The virus establishes contact with a server and then takes over the screen with its image. I also deleted netadapt, netar and netflt drivers from the system32/drivers/etc folder. I find that when I disconnect the internet and delete these drivers the virus does not take over the screen and even allows the running of programs. But it is still operational and blocks task manager amongst other things. However, this way I could run the cmd prompt and get rid of the corrupt user32.dll</description>
		<content:encoded><![CDATA[<p>The first instruction set worked for me and properly replaced user32.dll. Although after scannow completed and rebooted, the computer also did chkdsk and I allowed the full run of that as well. </p>
<p>However, the virus prevented me from opening a cmd box so first steps must be taken around that. The most important step is to disconnect the computer from the internet. Mine was connected via ethernet so I could just unplug it. The virus establishes contact with a server and then takes over the screen with its image. I also deleted netadapt, netar and netflt drivers from the system32/drivers/etc folder. I find that when I disconnect the internet and delete these drivers the virus does not take over the screen and even allows the running of programs. But it is still operational and blocks task manager amongst other things. However, this way I could run the cmd prompt and get rid of the corrupt user32.dll</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Behnam Araz</title>
		<link>https://www.411-spyware.com/new-type-of-ransomware-using-user32-dll#comment-15391</link>
		<dc:creator>Behnam Araz</dc:creator>
		<pubDate>Wed, 06 Aug 2014 11:40:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.411-spyware.com/?p=32931#comment-15391</guid>
		<description>Hi, i had this problem too. i used a bootable CD like &quot;Hiren Boot CD&quot; with MiniXP and i did run &quot;HitmanPro&quot; program. it will scan your machine and replace user32.dll with original one automatically.
I hope it was useful for you</description>
		<content:encoded><![CDATA[<p>Hi, i had this problem too. i used a bootable CD like "Hiren Boot CD" with MiniXP and i did run "HitmanPro" program. it will scan your machine and replace user32.dll with original one automatically.<br />
I hope it was useful for you</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mike</title>
		<link>https://www.411-spyware.com/new-type-of-ransomware-using-user32-dll#comment-14981</link>
		<dc:creator>Mike</dc:creator>
		<pubDate>Wed, 02 Jul 2014 05:44:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.411-spyware.com/?p=32931#comment-14981</guid>
		<description>I am having this problem right now. The machine is unable to boot properly into safe mode, and also there is no backup copy of user32.dll in the Winsxs folder. I tried loading a copy of the file from a Windows CD, but that hasn&#039;t worked (machine won&#039;t even boot following this step). Any suggestions would be greatly appreciated. I am wondering if there is any software that can actually &#039;clean&#039; the infected file, since this machine won&#039;t run properly without it. Thanks.</description>
		<content:encoded><![CDATA[<p>I am having this problem right now. The machine is unable to boot properly into safe mode, and also there is no backup copy of user32.dll in the Winsxs folder. I tried loading a copy of the file from a Windows CD, but that hasn't worked (machine won't even boot following this step). Any suggestions would be greatly appreciated. I am wondering if there is any software that can actually 'clean' the infected file, since this machine won't run properly without it. Thanks.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
