{"id":4573,"date":"2011-06-20T10:51:54","date_gmt":"2011-06-20T16:51:54","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4573"},"modified":"2018-01-30T13:21:33","modified_gmt":"2018-01-30T20:21:33","slug":"windows-troubles-killer-salvage-system-rogue-of-the-week","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/06\/20\/windows-troubles-killer-salvage-system-rogue-of-the-week\/","title":{"rendered":"Windows Troubles Killer \/ Salvage System: Rogue of the Week"},"content":{"rendered":"<p><strong>By Stephen Ham and Andrew Brandt<\/strong><\/p>\n<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2002.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/06\/20\/windows-troubles-killer-salvage-system-rogue-of-the-week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2012.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week&amp;title=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2022.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week&amp;title=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2032.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week&amp;title=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2042.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week&amp;title=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2052.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week&amp;Title=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2062.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20R...+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2072.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/06\/20\/windows-troubles-killer-salvage-system-rogue-of-the-week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2082.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week&amp;headline=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2092.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F06%2F20%2Fwindows-troubles-killer-salvage-system-rogue-of-the-week&amp;h=Windows%20Troubles%20Killer%20%2F%20Salvage%20System%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2102.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2112.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_both_logo.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-4574\" title=\"Windows Troubles Killer \/ Windows Salvage System logo\" alt=\"Windows Troubles Killer \/ Windows Salvage System logo\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_both_logo.png\" width=\"306\" height=\"126\" \/><\/a>This week&#8217;s rogue, once again, mimics a system utility and not merely an antivirus product. Either way, the scam is the same: Convince the victim that their computer is broken, then coerce them to pay for useless snake oil.<\/p>\n<p>These rogue system utilities go by the names <strong>Windows Troubles Killer<\/strong> or <strong>Windows Salvage System<\/strong>; They are, for all intents and purposes, identical programs which have been &#8220;skinned&#8221; with different names. They actually appear to be a hybrid rogue, carefully blending a customized mix of <em>malarkey<\/em> and <em>baloney<\/em> into some sort of shenanigans smoothie. The program claims not only to be able to scan your computer for problems with software settings and other system optimization-sounding stuff, but also to perform some sort of check of your &#8220;Computer Safety&#8221; and &#8220;Network Security.&#8221; Oh yes, and there&#8217;s an antivirus component too, just to round out the complete package.<\/p>\n<p>All in all, it&#8217;s a fairly rudimentary rogue to remove (whether you choose to do it manually or use our software), but it performs some unique system modifications that disable some legitimate security software, turns off some important Windows features, mimics some of Microsoft&#8217;s own software, and generally acts as a nuisance while reducing the actual security level of an infected computer. I&#8217;ll detail those after the jump.<br \/>\n<!--more--><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_alert.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4583\" title=\"20110617_rotw_windows-salvage-system_alert_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_alert_crop.png\" width=\"530\" height=\"281\" \/><\/a><\/p>\n<p>The software installs itself to the <strong>%appdata%Microsoft<\/strong> path, using a random, six-alphabetic-character filename.The icon looks like a wooden shipping crate&#8230;because there is no material known to humankind with a better reputation for strength, protection, and durability than <em>wood<\/em>, amirite?<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-trouble-killer_programicon1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4601\" title=\"20110617_rotw_windows-trouble-killer_programicon\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-trouble-killer_programicon1.png\" width=\"101\" height=\"96\" \/><\/a><\/p>\n<p>Once installed, the rogue looks like yet another variation on the typical ransomware-type rogue app theme: It starts up with Windows, prevents the Desktop from loading, and only grants access to its &#8220;fix error&#8221; features if you pay for a license key.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_scanning.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4576\" title=\"20110617_rotw_windows-salvage-system_scanning\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_scanning.png?w=300\" width=\"300\" height=\"159\" \/><\/a><\/p>\n<p>The Settings tab in the rogue&#8217;s user interface has some options which allows the victim to close the app temporarily and continue loading the Desktop. But just getting to the desktop doesn&#8217;t mean you&#8217;ll be able to do anything on the computer once you get there: The rogue prevents most Windows apps from loading, such as the Task Manager, Command Prompt, or Internet Explorer.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_vmware-tools-alert.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4585\" title=\"20110617_rotw_windows-salvage-system_vmware-tools-alert_crop_comment\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_vmware-tools-alert_crop_comment.png\" width=\"557\" height=\"219\" \/><\/a><\/p>\n<p>For power users, the rogue also &#8220;detects&#8221; Microsoft&#8217;s <a href=\"http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb896653\" target=\"_blank\">Process Explorer<\/a> as malware, and suppressed or killed other manual removal or analysis apps like <a href=\"http:\/\/free.antivirus.com\/hijackthis\/\" target=\"_blank\">HijackThis<\/a>, <a href=\"http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb896645\" target=\"_blank\">Process Monitor<\/a>, <a href=\"http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb897437\" target=\"_blank\">TCPView<\/a>, or <a href=\"http:\/\/www.peid.info\/\" target=\"_blank\">PEiD<\/a>.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-trouble-killer_blocks-procexp.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4588\" title=\"20110617_rotw_windows-trouble-killer_blocks-procexp_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-trouble-killer_blocks-procexp_crop.png\" width=\"540\" height=\"321\" \/><\/a><\/p>\n<p>The rogue also executes itself when you reboot into Windows&#8217; Safe Mode, sadly with no loss in functionality. In fact, when you boot into Safe Mode, the rogue displays a handy little dialog box that explains (from the perspective of an illiterate malware clown) what Safe Mode is (even though the rogue refers to it as <strong>Safe Boot<\/strong>).<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_safe-boot.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4586\" title=\"20110617_rotw_windows-salvage-system_safe-boot\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_safe-boot.png\" width=\"425\" height=\"247\" \/><\/a><\/p>\n<p>The rogue also suppressed 3 other process viewers that I tried to use &#8212; <a href=\"http:\/\/processhacker.sourceforge.net\/\" target=\"_blank\">Process Hacker<\/a>, PrcView, and <a href=\"http:\/\/www.nirsoft.net\/utils\/cprocess.html\" target=\"_blank\">NirSoft CurrProcess<\/a> &#8212; though it didn&#8217;t immediately suppress any of them like it did Process Explorer. Instead, the rogue allowed each process monitoring tool to run long enough until it was used to try to kill the rogue, then it tried to terminate the tool. NirSoft CurrProcess was able to kill the rogue&#8217;s process before the rogue could fight back, and the rogue did not automatically reload until Windows rebooted.<\/p>\n<p>In addition to actively suppressing analysis tools, the rogue also sets several so-called IFEO (image file execution options) keys in the Registry. When the <strong>debugger<\/strong> value is set in any IFEO key, it launches the filename specified in that debugger value instead of the program named in the key. While IFEO keys in general serve a valid purpose, they have been abused for years by rogues and password stealers that want to prevent certain antivirus products from starting up or functioning properly.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_ifeo-key.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4593\" title=\"20110617_rotw_windows-salvage-system_IFEO-key\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_ifeo-key.png\" width=\"678\" height=\"152\" \/><\/a><\/p>\n<p>IFEO keys are in the following location in the Registry:<\/p>\n<pre>HKEY_LOCAL_MACHINEsoftwaremicrosoftwindows ntcurrentversionimage file execution options(program name)<\/pre>\n<p>Among the programs targeted by the rogue&#8217;s IFEO keys were <strong>Avast Firewall, Avast Antivirus, Eset Smart Security, Windows Defender<\/strong> (the real one from Microsoft), and <strong>Microsoft Security Essentials<\/strong> (<strong>msascui.exe<\/strong> shown above). On an infected system, these programs would fail to start after a reboot, and you&#8217;d see <strong>svchost.exe<\/strong> start up momentarily and then quit &#8212; if you could get to the Task Manager. The rogue also terminates the <strong>Microsoft Malware Protection Service<\/strong> and the <strong>Windows Defender<\/strong> service (if present), then sets the services to disabled so they can&#8217;t restart after a reboot.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_terminate-msmpsvc.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4592\" title=\"20110617_rotw_windows-salvage-system_terminate-msmpsvc\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/06\/20110617_rotw_windows-salvage-system_terminate-msmpsvc.png\" width=\"702\" height=\"49\" \/><\/a><\/p>\n<p>In addition, the rogue sets the following keys that disable functionality on the system:<\/p>\n<pre>HKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionpoliciessystem | <strong>enablelua<\/strong> | 0\r\nHKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionpoliciessystem | <strong>consentpromptbehavioradmin<\/strong> | 0\r\nHKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionpoliciessystem | <strong>consentpromptbehavioruser<\/strong> | 0\r\nHKEY_LOCAL_MACHINEsoftwaremicrosoftwindows ntcurrentversionsystemrestore | <strong>disablesr <\/strong>HKEY_CURRENT_USERsoftwaremicrosoftwindowscurrentversioninternet settings | <strong>warnonhttpstohttpredirect<\/strong> | 0<\/pre>\n<p>These keys, when set as shown above, disable User Account Controls, turn off all the prompting that happens when you try to run a program that needs administrative access, disable the System Restore feature on the computer, and stops IE from warning you when you are entering data into a form that is being submitted to an unsecured HTTP Web site &#8212; for example, the order form for Trouble Killer\/Salvage System.<a title=\"Webroot blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"Webroot blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Stephen Ham and Andrew Brandt This week&#8217;s rogue, once again, mimics a system utility and not merely an antivirus product. Either way, the scam is the same: Convince the victim that their computer is broken, then coerce them to pay for useless snake oil. These rogue system utilities go by the names Windows Troubles [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4263,3453,8603,8601,8589,7823,8599,4193,4179,4893,8597,5827,8593,3467,3819,8595,8591,3471,3951,8605],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4573"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4573"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4573\/revisions"}],"predecessor-version":[{"id":13304,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4573\/revisions\/13304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4573"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4573"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}