The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Vicious Malware: Internet Security 2010 + Bluescreen ("of death")

    Discussion in 'Security and Anti-Virus Software' started by ARom, Jan 15, 2010.

  1. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    I caught the Internet Security 2010 virus.

    I used a malwarebytes full scan to delete it.

    Upon restart, I can't get into windows. safe mode does not even work and 'last known working configuration does not work'.

    Right now I'm in linux.

    I would do a clean install of windows but I need the files on the windows partition.
     
  2. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
  3. ScuderiaConchiglia

    ScuderiaConchiglia NBR Vaio Team Curmudgeon

    Reputations:
    2,674
    Messages:
    6,039
    Likes Received:
    0
    Trophy Points:
    205
    Is there a question here? Or just a cry of anguish? If the latter, man, I feel for you. You can always try a linux live cd or one of the bootable CD versions of win XP to boot up and copy your data off to an external drive. (But be careful with that copy, the data files themselves MIGHT be infected as well.)

    Gary
     
  4. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    How do I fix this error while retaining my data?

    Or, safely retrieve my data from linux so I can store it on another medium.
     
  5. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    I tried:

    chkdsk /r

    (check disk repair) and it said it found and repaired multiple errors, but when I tried to go back into windows it could not.

    I also tried repairing windows again, no luck.

    Any other suggestions?

    is there a way I can back up windows files from linux? and then store them on another medium, format the hard drive, and replace my important files?
     
  6. weinter

    weinter /dev/null

    Reputations:
    596
    Messages:
    2,798
    Likes Received:
    1
    Trophy Points:
    56
    Yes simply mount the partition from your Linux System, copy off your important data the virus will not run on Linux and all hidden virus executable is visible.
    See that is why Microsoft should have made MSE a default install.
     
  7. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
  8. gerryf19

    gerryf19 I am the walrus

    Reputations:
    2,275
    Messages:
    3,990
    Likes Received:
    0
    Trophy Points:
    105
    Ran into this twice yesterday--I cannot say where Internet Security 2010 began and other viruses ended because the machines appeared to have been infected with multiple other viruses for some time--but I can tell you how to get back into your computer.

    It was definitely 2010 that crapped up these computers so badly the user could not even get into them like yours, though, because this infection was the onset of being locked out of the computer.

    After fixing these, I still had to go in and clean them up manually as their were partial infections left behind. Sorry I wasn't taking notes, but after you get it up and running, just try running every spyware program and antivirus known to man.

    I do recall there were 3 files in c:\windows\system32 all ending in *32--I cannot recall what they are now, but they were all named to sound like windows files....one was something like helper32.dll,,,,the others I cannot recall.

    The source of your problem, though, is that the thing infected your Windowsnt logon key in the registry, which is what is killing you--kill the files and winlogon won't let you logon. I think that is was malwarebytes may have done.

    Anyway, since you have xp3, this is what I would do.

    I made a vistaPE disk
    http://www.vistape.net/
    and booted the computer with it. You may be able to do the same with your ubuntu parition if you have read write capability.

    I retrieved a restore point from before the infection from SYSTEM VOLUME INFORMATION and pulled the 5 registry snapshot files out and renamed them:

    Rename _REGISTRY_USER_.DEFAULT to DEFAULT
    Rename _REGISTRY_MACHINE_SECURITY to SECURITY
    Rename _REGISTRY_MACHINE_SOFTWARE to SOFTWARE
    Rename _REGISTRY_MACHINE_SYSTEM to SYSTEM
    Rename _REGISTRY_MACHINE_SAM to SAM

    I then dropped these in c:\windows\system32\config--overwriting the (infected) registry hives present.

    Rebooted Windows. At this point, you are bypassing the virus files so Windows will start, but the actual virus files are still on your computer...but they are inert.

    Like I said earlier I cannot recall all the files that were specific to this virus as there were multiple infections and I kind of lost track, but this allowed me to get back into the machines, clean up the damage and get them back up and running.

    I doubt MSE or anything is going to save you from problems like this. In order to defeat a virus, an antivirus has to know about it in its virus definition. Barring that, you're relying on the heuristic components of AV programs which tend to look for oddly names files, but virus writers are making these things with normal sounding names--that and they change the virus every few weeks to avoid AV programs.
     
  9. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    I will try your VistaPE method and get back to you. thanks
     
  10. gerryf19

    gerryf19 I am the walrus

    Reputations:
    2,275
    Messages:
    3,990
    Likes Received:
    0
    Trophy Points:
    105
    Also of note: both machines also had rootkit infections in addition to Internet Security 2010. I don't know if this was part of the infection or a separate infection.

    Rootkit infections will not be detected by many av and spyware programs, so do a check with something like gmer as well.
    ( www.gmer.net)
     
  11. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    I will try to use WineHQ to run the VistaPE.exe (exe file) in Ubuntu.
     
  12. weinter

    weinter /dev/null

    Reputations:
    596
    Messages:
    2,798
    Likes Received:
    1
    Trophy Points:
    56
    What I mean is Poster probably downloaded it and installed it not an accidental infection. It is because of confusion hence people download any crappy malware calling itself anti-malware.
     
  13. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    haha, I did NOT, download and install "Internet Security 2010"...

    It's making headlines and installs itself as far as I can tell.

    Internet Security 2010 Virus Removal Only With Spyware Doctor

    I had only one user running as administrator, and Avira at moderate, so I think that is where the problem lies.
     
  14. weinter

    weinter /dev/null

    Reputations:
    596
    Messages:
    2,798
    Likes Received:
    1
    Trophy Points:
    56
    1)The malware has to have a point of entry website or something otherwise it is a worm and worm seldom hit system with dynamic IP address especially with router firewall
    2)It cannot elevate system permission itself someone has to give it (unless it is xp).
     
  15. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    1) obviously
    2) not true

    3) I don't understand the point you're trying to make...
     
  16. weinter

    weinter /dev/null

    Reputations:
    596
    Messages:
    2,798
    Likes Received:
    1
    Trophy Points:
    56
    It means someone accidentally
    1)Visit some website which launch the malware
    2)Downloaded the malware.

    2) is true Windows Vista/7 has a UAC which most malware cannot bypass.
     
  17. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    64) UAC can and has been disabled by many vista and windows 7 users.

    bottom line) Let me grab my time machine, go back in time, purchase windows 7, back up my files, install windows 7, keep UAC enabled... and prevent losing all my future data. Thanks for your help, I really appreciate it...
     
  18. ScuderiaConchiglia

    ScuderiaConchiglia NBR Vaio Team Curmudgeon

    Reputations:
    2,674
    Messages:
    6,039
    Likes Received:
    0
    Trophy Points:
    205
    ARom,

    At this point you are better of just writing off the existing OS and applications and ONLY worry about recovering your data. As I said before you need to create a bootable WinXP or Vista CD, (i.e. a fully operational OS that boots from a CD or DVD: Google for "BARTpe".) then copy all you data off the machine and disinfect the data. Then wipe the drive clean and start over. Anything less is going to leave behind doubt that you got rid of the virus completely.

    Gary
     
  19. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    Solution

    I found my windows files in "file system/host" (ubuntu). :rolleyes:

    All windows files of a wubi ubuntu install are stored in "file system/host". (courtesy of ubuntu forums.org)

    For future reference:

    - If you did not do a wubi install but the normal ubuntu install, simply click - Places/x.0 GB Media (computer, x.0GB Media)

    - If you did not do a wubi install but the normal ubuntu install, and you cannot see the Media Drive, try mounting your windows drive with the ntfs configuration tool: http://www.psychocats.net/ubuntu/mountwindows

    - check: "filesystem/host" regardless

    - If you do not have any version of linux installed but have come across this problem (any Bsod or 'blue screen of death'), boot up a live ubuntu cd:
    http://www.howtogeek.com/howto/wind...backup-files-from-your-dead-windows-computer/

    - If you do not have any version of linux installed and prefer a windows based alternative to seek the files on your hard drive try a live windows cd: http://www.dedoimedo.com/computers/livecd.html (Bart's PE Builder)

    Also

    If you're going to run as administrator in Windows XP, make sure you raise the level of detection of your anti virus (high), and make it start earlier when windows boots up. Then you need a program like Malware Bytes Live Protection to compensate for not having Windows UAC because Avira, Avast, Eset, Norton etc.. have not been able to stop this one.

    Otherwise, running as a Power User & or Limited user do not have access to your /windows files.
     
  20. gerryf19

    gerryf19 I am the walrus

    Reputations:
    2,275
    Messages:
    3,990
    Likes Received:
    0
    Trophy Points:
    105
    So my solution did not work?
     
  21. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    It might work, but I did not have a blank disc for Bart's PE builder. You can get it running with WineHQ in linux however. Without linux and wineHQ installed you'd need another machine to burn the live disc. vistaPE does not work in linux because WineHQ cannot install windows server 2003.

    But even if you had to burn one live disc, I suspect that a live ubuntu disc is a better option than the windows clones. There are various ways to copy the data from the windows partition once in linux. And Linux is more robust than Bart'sPE or vistaPE in terms of support and security if you need time to find a windows xp/vista/7 disk to reformat the drive or just to convert the files and get some work done, or email, etc..

    I can even see all of the windows/windows32 files, but I can't be bothered to try and manually delete the virus, reformatting and a reinstallation will guarantee it's gone.
     
  22. ARom

    ARom -

    Reputations:
    507
    Messages:
    3,814
    Likes Received:
    0
    Trophy Points:
    105
    Solution

    I found my windows files in "file system/host" (ubuntu). :rolleyes:

    All windows files of a wubi ubuntu install are stored in "file system/host". (courtesy of ubuntu forums.org)

    For future reference:

    - If you did not do a wubi install but the normal ubuntu install, simply click - Places/x.0 GB Media (computer, x.0GB Media)

    - If you did not do a wubi install but the normal ubuntu install, and you cannot see the Media Drive, try mounting your windows drive with the ntfs configuration tool: http://www.psychocats.net/ubuntu/mountwindows

    - check: "filesystem/host" regardless

    - If you do not have any version of linux installed but have come across this problem (any Bsod or 'blue screen of death'), boot up a live ubuntu cd:
    http://www.howtogeek.com/howto/wind...backup-files-from-your-dead-windows-computer/

    - If you do not have any version of linux installed and prefer a windows based alternative to seek the files on your hard drive try a live windows cd: http://www.dedoimedo.com/computers/livecd.html (Bart's PE Builder)

    Also

    If you're going to run as administrator in Windows XP, make sure you raise the level of detection of your anti virus (high), and make it start earlier when windows boots up. Then you need a program like Malware Bytes Live Protection to compensate for not having Windows UAC because Avira, Avast, Eset, Norton etc.. have not been able to stop this one.

    Otherwise, running as a Power User & or Limited user do not have access to your /windows files.