Internal_Power_Error blue screen > Click.GiftLoad & Win32.FraudLoad tagteam

Discussion in 'Malware Help (A Specialist Will Reply)' started by X4d7f04b, Apr 24, 2011.

  1. X4d7f04b

    X4d7f04b Private E-2

    Beloved Geek Corps,
    This Easter egg began rotting in my basket yesterday (23 Apr 2011) when my MSI CR600 running Windows 7 32bit updated from Vista slowed down until an unexpected shutdown (no announcement or warning) seemingly due to heat exhaustion. Rudimentary virus scans were impossible due to unexpected shutdowns. Repeated restarts were increasingly slow (at one point about 20 minutes in normal mode when the desktop showed one last time) until the desktop stopped loading in normal mode or safe mode after signing in with the password screen. Eventual searching lead to "www.prevx.com/blog/140/Black-Screen-woes-could-affect-millions-on-Windows--Vista-andXP.html" and a subsequent temporary "fix" which allowed me to access Normal Mode again and backup most of my current files.

    From that point I was able to load the Windows 7 desktop after the password sign in screen, which was initially impossible. I did a Spybot S&D scan and found "Click.GiftLoad" and "Win32.FraudLoad.edt" which didn't go away after they were "fixed," and led me to perform your "Malware Removal Guide" and "Win 7 Malware Removal/Cleaning Procedure." Everything worked well (with the exception of a missing "NIRCMD" in Combofix and a "Fops-DeviceIoControl Error! Could not scan drive D error 0XC0000024" when trying to use RootRepeal: no log created), but "Click.GiftLoad" and Win32.FraudLoad.edt" still show up in SpyBot after being "fixed."

    In addition, shutting down the computer leads to a blue screen describing an "INTERNAL_POWER_ERROR..." and a countdown. Then the computer automatically restarts with options of Safe Mode, Safe Mode with Networking and Normal Start. When Normal Start is selected a message appears that "Windows was executed after an unexpected shutdown again. Windows can search online for a solution to the problem..." (I've translated this message from German as I don't have the "ultimate" version of Windows 7, my computer speaks only auf Deutsch..."). Beyond these anomalies, functioning is basically back to normal and the unexpected shutdowns due to "heat" that started in the last few weeks are no longer happening.

    Four logs are attached (RootRepeal log didn't happen). Thank you for staying frosty :major
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there and welcome. I am currently reviewing your logs and will get back to you with a set of instructions in the next post I make to you.
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    DirLook::
    C:\Users\Haanumaan\AppData\Roaming\5015
    Folder::
    C:\Users\Haanumaan\AppData\Roaming\xkytuocrigxsnqyhge1blgbongnh21op2
    C:\Users\Haanumaan\AppData\Roaming\xmldm
    C:\Users\Haanumaan\AppData\Roaming\kock
    File::
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_1.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_2.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_3.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_4.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_5.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_6.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_7.tmp
    C:\Users\Haanumaan\AppData\Local\Bkirocedofibuj.dat
    C:\Users\Haanumaan\AppData\Roaming\srvblck2.tmp
    C:\Users\Haanumaan\AppData\Roaming\xkytuocrigxsnqyhge1blgbongnh21op2
    C:\Users\Haanumaan\AppData\Local\Mfezeg.bin
    RegLock::
    [HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
    @Denied: (2) (LocalSystem)
    "88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
       d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f5,03,33,51,21,95,93,4b,80,97,5e,\
    "2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
       d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,f5,03,33,51,21,95,93,4b,80,97,5e,\
    
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000
    
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000
    
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000
    
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000
    
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
    @Denied: (Full) (Everyone)
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  4. X4d7f04b

    X4d7f04b Private E-2

    Hello Kestrel13! Thanks for helping me out.
    Since my initial post I don't think I've changed anything to the system, and I hope I haven't done anything to interfere with your recommended script. On the desktop, I moved the requisite CFscript.txt file on ComboFix.exe and after the green bar graphic loaded it went to a blue screen reading "IRQL_NOT_LESS_OR_EQUAL" (or something similar - it was only up for a few seconds). After restarting in Normal Mode (ComboFix.exe didn't show on the desktop in Safe Mode) I tried the above again to get a better description for you-all. After twenty-five minutes of the mostly filled green bar graphic, ComboFix appears to have stalled although the hard drive is still moving every two seconds or so (the desktop clock is also stalled). To the best of my ability I didn't touch anything while it's been running. Any advice?
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Let it run a little while longer, if it is still stalled, then restart the computer and continue with the below.

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    Code:
    
    :files
    C:\Users\Haanumaan\AppData\Roaming\xkytuocrigxsnqyhge1blgbongnh21op2
    C:\Users\Haanumaan\AppData\Roaming\xmldm
    C:\Users\Haanumaan\AppData\Roaming\kock
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_1.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_2.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_3.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_4.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_5.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_6.tmp
    C:\Users\Haanumaan\AppData\Roaming\Microsoft\Windows\Templates\temp_7.tmp
    C:\Users\Haanumaan\AppData\Local\Bkirocedofibuj.dat
    C:\Users\Haanumaan\AppData\Roaming\srvblck2.tmp
    C:\Users\Haanumaan\AppData\Roaming\xkytuocrigxsnqyhge1blgbongnh21op2
    C:\Users\Haanumaan\AppData\Local\Mfezeg.bin
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  6. X4d7f04b

    X4d7f04b Private E-2

    Downloaded OTM and all seemingly worked fine. Rebooted at OTM's prompting and attached the requested logs. Unfortunately, the same problem persists when attempting to shut down Windows: a blue screen describing an "INTERNAL_POWER_ERROR" "000000A0", etc. appears quickly and begins "Dumping physical memory to disk" counting up from 0 to 100 before restarting and giving the option of safe mode, safe mode with networking and normal mode. After restarting in normal mode a "Windows was executed after an unexpected shutdown again. Windows can search online for a solution to the problem..." box appears with no solution if it is followed.
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    That message seems to be related to a hibernation file size. Try this;

    • Open a command prompt window with elevated administrator privileges.
    • Type the following command and press ENTER:
    powercfg /hibernate /size 100
     
    Last edited: Apr 25, 2011
  8. X4d7f04b

    X4d7f04b Private E-2

    Hi TimW et al - thanks for your suggestion. I increased the hibernation file size with an elevated administrator command prompt which informed me that "The size of the hibernation file is set to 348862208 bytes" (loosely translated). However, on attempted shutdown still causes the blue screen and the internal power error followed by a restart. Although it's only up briefly, the "Technical Information" on the blue screen reads "STOP: 0x000000A0 (0x00000001, 0x00000006, 0x875D5020, 0x00000000)."
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )


    Now download TDSSKiller from Kaspersky to your directly onto your Desktop
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor. )
    • If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123tdk.com).
    • Allow the application to run if prompted by Windows or any security programs you have installed
    • It will start the scan and run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    • Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )
     
  10. X4d7f04b

    X4d7f04b Private E-2

    Thanks chaslang, the MBRCheck log is attached. I downloaded TDSSkiller.exe to the desktop and it initializes to about 80% before closing. I renamed it as suggested and also renamed it prior to downloading it to the desktop, but renaming and opening as an administrator still doesn't get TDSSKiller to run (same results in safe mode).
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Do you have your Windows 7 Boot DVD so that you can boot from it to get to a command prompt?
     
  12. X4d7f04b

    X4d7f04b Private E-2

    This laptop was originally Vista upgraded to Windows 7, but yes I have a bootable disk I can use to get a command prompt. In confirming that I had the disk and this was possible, at the screen leading to the command prompt, etc. choosing "shutdown" actually allowed the machine to properly shut down for the first time in several days.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then move the TDSSkiller.exe file ( or redownload it ) to your root folder so that you have C:\TDSSkiller.exe to make it much easier to run.

    Then reboot your PC with your DVD and then get into the command prompt window. The enter the below and hit enter ( it is case insensitive ):

    C:\tdsskiller.exe

    Hopefully it runs okay. Then reboot normally and see if things are working better of not. Attach the log from TDSSkiller if it made one in your root folder.
     
  14. X4d7f04b

    X4d7f04b Private E-2

    Merciful moondogs - Success! I wasn't able to make a proper log of the event itself, but after putting TDSSkiller.exe in C: and using the command prompt from booting the disk it found "ROOTKIT.WIN32.TDSS.tdl4" After restarting to normal mode and running it again and was able to get a new log - a diabolical 66.6 KBs attached. Shutting down works properly now for the first time in days. Sincere thanks to you and all of the Majorgeeks who helped me out. Any advice on follow-up scans (especially for an external hard drive I use that is no doubt affected by this) would be greatly appreciated as well.
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    I suggest running ( from normal boot mode ) one more scan with Malwarebytes again and also another scan with MGtools.exe and then attach the new logs.
     
  16. X4d7f04b

    X4d7f04b Private E-2

    Requested logs attached. Thanks again to you all for your help with a satisfying victory :major
     

    Attached Files:

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Your logs are clean.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds