The computer may automatically restart, or you may receive a "serious error" message or a Stop error message in Windows Server 2003, in Windows XP, or in Windows 2000 (894278)
The information in this article applies to:
- Microsoft Windows Server 2003, Web Edition
- Microsoft Windows Server 2003, Standard Edition
- Microsoft Windows Server 2003, Enterprise Edition
- Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
- Microsoft Windows Server 2003, Datacenter Edition
- Microsoft Windows Server 2003, Datacenter Edition for Itanium-based Systems
- Microsoft Windows XP Professional
- Microsoft Windows XP Tablet PC Edition
- Microsoft Windows XP Tablet PC Edition 2005
- Microsoft Windows XP Home Edition
- Microsoft Windows XP Professional 64-Bit Edition (Itanium)
- Microsoft Windows XP Professional 64-Bit Edition (Itanium) 2003
- Microsoft Windows XP Media Center Edition
- Microsoft Windows XP Media Center Edition 2002
- Microsoft Windows XP Media Center Edition 2004
- Microsoft Windows XP Media Center Edition 2005
- Microsoft Windows XP 64-Bit Edition Version 2002
- Microsoft Windows XP 64-Bit Edition Version 2003
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server
SUMMARYThis article describes several symptoms that you may experience if the computer is running the Spyware.Service.MiscrosoftUpdate (Trojan) rootkit spyware. To remove the Trojan virus, you must identify the files that cause this problem and then rename the files.
The user-mode (spyware) components Msupd*.exe and Reloadmedude.exe can be cleaned by some antivirus or anti-spyware programs as soon as the hidden driver is renamed. The hidden driver may be named "gbqxhia.sys," "upzvlbvv.sys," "jsbmefvk.sys," or some other random file name that contains only lowercase letters.
Several anti-spyware programs that can detect this virus are listed in the "More Information" section. SYMPTOMSYou may experience one or more of the following symptoms: - The computer automatically restarts.
- After you log on, you receive the following error message:
Microsoft Windows
The system has recovered from a serious error.
A log of this error has been created.
Please tell Microsoft about this problem.
We have created an error report that you can send to help us improve Microsoft Windows. We will treat this report as confidential and anonymous.
To see what data this error report contains, click here.
If the error message remains on the screen, click the "click here" link at the bottom of the message box if you want to see the data that the error report contains. If you do this, you see error signature information that may be similar to the following: BCCode : 00000050 BCP1 : 0xeb7ff002 BCP2 : 0x00000000 BCP3 : 0x8054af32 BCP4 : 0x00000001 OSVer : 5_1_2600 SP : 0_0 Product : 256_1 - You receive the following Stop error message:
A problem has been detected and Windows has been shut down to prevent damage to the computer
Technical information:
*** STOP: 0x00000050 (0xeb7ff002, 0x00000000, 0x8054af32, 0x00000001) PAGE_FAULT_IN_NONPAGED_AREA nt!ExFreePoolWithTag+237
- The System log records an event that is similar to the following:Date: date
Source: System
Error Time: time Category: (102)
Type: Error
Event ID: 1003
User: N/A
Computer: computer Description: Error code 00000050, parameter1 0xeb7ff002, parameter2 0x00000000, parameter3 0x8054af32, parameter4 0x00000001. For more information, see Help and Support Center at http://support.microsoft.com. Data: 0000: 53 79 73 74 65 6d 20 45 System E 0008: 72 72 6f 72 20 20 45 72 rror Er 0010: 72 6f 72 20 63 6f 64 65 ror code 0018: 20 30 30 30 30 30 30 35 00000MN 0020: 30 20 20 50 61 72 61 6d 0 Param 0028: 65 74 65 72 73 20 66 66 eters ff 0030: 66 66 66 66 64 31 2c
NotesThe symptoms of a Stop error vary according to the failure options of the computer system.
For more information about how to configure system failure options, click the following article number to view the article in the Microsoft Knowledge Base:
307973
How to configure system failure and recovery options in Windows
The four parameters that are included in the error signature information (BCP n) and inside the parentheses of the technical information for the Stop error may vary according to the computer's configuration. Not all stop 0x00000050 errors are caused by the problem that is described in the "Cause" section.
CAUSEThis error message is caused by a kernel driver that is installed by the following known rootkit spyware programs: - Msupd5.exe
- Reloadmedude.exe
RESOLUTIONTo resolve this problem, use one or more of the following methods. The methods are listed in the preferred order. Method 1: Rename the malicious driver by using Internet Explorer- Open Internet Explorer.
- In the Address box, type %windir%\system32\drivers, and
then press ENTER.
- Locate the randomly named .sys file,
right-click the file, and then select Rename.
- Type malware.old to rename the file, and then press ENTER.
- In the Address box, type \WINDOWS\system32, and then press ENTER.
- Locate and then rename the following files, if they exist:
- Msupd5.exe. Rename this file Msupd5.old.
- Msupd4.exe. Rename this file Msupd4.old.
- Msupd.exe. Rename this file Msupd.old.
- Reloadmedude.exe. Rename this file Reloadmedude.old.
- Close Internet Explorer.
- Restart the computer.
- Make sure that your antivirus or anti-spyware software is updated with the latest signatures, and then perform a
complete system scan.
Method 2: In Safe Mode, rename the malicious driver by using My Computer- Start the computer in Safe Mode. To do this, follow these steps:
- Restart the computer.
- As the computer starts, press the F8 key repeatedly (one time per second). This action will cause the Microsoft Windows Advanced Startup Menu options to appear.
- Use the UP ARROW and DOWN ARROW keys to highlight Safe Mode,
and then press ENTER.
- Open Internet Explorer
- In the Address box, type %windir%\system32\drivers, and then press ENTER.
- Enable the viewing of hidden files. To do this, follow these steps:
- Click Start, and then click My Computer.
- On the Tools menu, click Folder Options.
- On the View tab, click to clear the Hide protected operating system files (Recommended) check box, and then click Yes when you receive a warning message that states that you have chosen to display protected operating system files.
- Under Hidden files and folders, click Show hidden files and folders.
- Click to clear the Hide extensions for known file types check box.
- In the Folder views area, click Apply to All Folders, and then click OK.
- Locate the folder named C:\%windir%\System32\Drivers.
- Locate any .sys file that has the following characteristics:
- A randomly generated file name that is made up of eight lowercase letters, such as "gbqxmhia.sys," "upzvlbvv.sys," or "jsbmefvk.sys"
- A date of January 11, 2005
- A size of 14 KB (13,824 bytes)
- A hidden attribute that is set
Note A file that has its hidden attribute set displays an "HA" in the Attributes column in Windows Explorer. For instructions on how to view the Attributes column, see steps 5a and 5b of the procedure that is described in the "More information" section. - It has no version, product name, or manufacturer information.
- For each file that you locate, right-click the file, and then select Rename.
- Type malware1.old to rename the first file, and then press ENTER.
Note Type malware2.old to rename the second file, type malware3.old to rename the third file, and so on. - Locate the %windir%\System32 folder.
- Rename the following files, if they exist:
- Msupd5.exe. Rename this file msupd5.old.
- Msupd4.exe. Rename this file Msupd4.old.
- Msupd.exe. Rename this file Msupd.old.
- Reloadmedude.exe. Rename this file Reloadmedude.old.
- Restart the computer.
- Make sure that your antivirus or anti-spyware software is updated with the latest signatures, and then perform a
complete system scan.
Method 3: In Safe Mode, rename the malicious driver by using the command prompt- Start the computer in Safe Mode. To do this, follow these steps:
- Restart the computer.
- As the computer starts, press the F8 key repeatedly (one time per second). This action will cause the Microsoft Windows Advanced Startup Menu options to appear.
- Use the UP ARROW and the DOWN ARROW keys to select Safe Mode with Command Prompt, and then press ENTER.
- Click Start, click Run, type cmd in the Open box, and then click OK.
- At the command prompt, type CD %windir%\system32\drivers, and then press ENTER.
- Type Dir /ah, and then press ENTER.
- You will see text that is similar to the following text. The .sys file name will be randomly generated.
Directory of C:\WINDOWS\system32\drivers
01/11/2005 09:18 AM 13,824 gbqxmhia.sys
1 File(s) 13,824 bytes
0 Dir(s) 961,425,408 bytes free
- Type Attrib -s -h RandomFilename, and then press ENTER. This action removes the system attributes and the hidden attributes from the file.
Note The placeholder RandomFilename represents the name of the .sys file that is displayed after you perform step 5. For example, for the file name that is specified in the example in step 5, you would type Attrib -s -h gbqxmhia.sys.
- Type Ren RandomFilename malware.old, and then press ENTER. This action renames the randomly named file.
- Type CD, and then press ENTER. This changes the command line to the %windir%\System32 folder.
- Type the following commands one at a time, and then press ENTER after you type each command:
Ren msupd5.exe msupd5.old
Ren msupd4.exe msupd4.old
Ren msupd.exe msupd.old
Ren reloadmedude.exe reloadmedude.old Note If you receive the following error message, you can safely ignore the message, because it indicates that the targeted file does not exist:
The system cannot find the file specified. - Type Exit, and then press ENTER.
- Restart the computer.
- Make sure that your antivirus or anti-spyware software is updated with the latest signatures, and then perform a
complete system scan.
REFERENCES
For more information about the Microsoft AntiSpyware product, click the following article numbers to view the articles in the Microsoft Knowledge Base:
892279
How to obtain Microsoft Windows AntiSpyware (Beta)
892340 Microsoft Windows AntiSpyware (Beta) identifies a program as a spyware threat
For more information about antivirus software vendors, click the following article number to view the article in the Microsoft Knowledge Base:
49500
List of antivirus software vendors
Modification Type: | Major | Last Reviewed: | 9/22/2006 |
---|
Keywords: | kbSecurity kbSECAntiVirus kbtshoot kbprb KB894278 |
---|
|
|
©2004 Microsoft Corporation. All rights reserved.
|
|