NT Authority\system

B

Bernard

Can anyone please help - this problem appears to have been reported by
afew people. It is happening after connecting to the internet. An error
message appears:

"This system is shutting down. Please save all work in progress and log
off. Any unsaved changes will be lost. This shutdown was initiated by
NT Authority\system.

Windows must now restart because Remote Procedure Call (RPC) Service
terminated unexpectedly."

This happened 10ish times - on one occassion another error message came
up that mentioned something about "generic host process" and
"windows32" but that message only came up once and disappeared before I
could read it properly or write it down.

Some people have suggested a virus called msblast may be responsible.
Norton found no viruses but I am unable to connect to the internet for
long enough to download live updates.
 
D

David H. Lipman

From: "Bernard" <[email protected]>

| Can anyone please help - this problem appears to have been reported by
| afew people. It is happening after connecting to the internet. An error
| message appears:
|
| "This system is shutting down. Please save all work in progress and log
| off. Any unsaved changes will be lost. This shutdown was initiated by
| NT Authority\system.
|
| Windows must now restart because Remote Procedure Call (RPC) Service
| terminated unexpectedly."
|
| This happened 10ish times - on one occassion another error message came
| up that mentioned something about "generic host process" and
| "windows32" but that message only came up once and disappeared before I
| could read it properly or write it down.
|
| Some people have suggested a virus called msblast may be responsible.
| Norton found no viruses but I am unable to connect to the internet for
| long enough to download live updates.

Those are the symptoms of an unpatched PC being attacked by an Internet worm via TCP port
135. While this could be the Lovsan/Blaster worm, that is doubtfult as a long time has
passed by and that worm has pretty much died off. However, there are *OTHER* Internet worms
that have happily used the same kind of attack to infect a PC. Most notable are SDbot
variants. Others are; W32/Radebot.worm and W32/Mytob.gen@MM. There are some that can
either attack via TCP port 135 or via TCP port 445 just like the Sasser worm.

When you get the shutdown message ...

Go to; Start --> Run
enter; shutdown -a

This will halt the shutdown and give you a chance to Download the following patch for the
RPC/RPCSS and DCOM Vulnerabilities that are addressed by Microsoft Security Bulletin
MS04-012 - KB828741
http://support.microsoft.com/default.aspx?scid=kb;en-us;828741
and ...
http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx
http://www.microsoft.com/downloads/...BB-DA77-448D-8FF0-0A649A0D8FC3&displaylang=en

You also need a FireWall.

If you don't patch the PC and not use a FireWall then you will just be re-infected.
A Cable/DSL Router such as the Linksys BEFSR41 can mitigate this kind of Exploitation code
as those infectors that attack via TCP port 135.

It also means that you don't have WinXP SP2. You need to install this ASAP !

Download MULTI_AV.EXE from the URL --
http://www.ik-cs.com/programs/virtools/Multi_AV.exe

To use this utility, perform the following...
Execute; Multi_AV.exe { Note: You must use the default folder C:\AV-CLS }
Choose; Unzip
Choose; Close

Execute; C:\AV-CLS\StartMenu.BAT
{ or Double-click on 'Start Menu' in C:\AV-CLS }

NOTE: You may have to disable your software FireWall or allow WGET.EXE to go through your
FireWall to allow it to download the needed AV vendor related files.

C:\AV-CLS\StartMenu.BAT -- { or Double-click on 'Start Menu' in C:\AV-CLS}
This will bring up the initial menu of choices and should be executed in Normal Mode.
This way all the components can be downloaded from each AV vendor's web site.
The choices are; Sophos, Trend, McAfee, Kaspersky, Exit this menu and Reboot the PC.

You can choose to go to each menu item and just download the needed files or you can
download the files and perform a scan in Normal Mode. Once you have downloaded the files
needed for each scanner you want to use, you should reboot the PC into Safe Mode [F8 key
during boot] and re-run the menu again and choose which scanner you want to run in Safe
Mode. It is suggested to run the scanners in both Safe Mode and Normal Mode.

When the menu is displayed hitting 'H' or 'h' will bring up a more comprehensive PDF help
file. http://www.ik-cs.com/multi-av.htm

* * * Please report back your results * * *
 
D

David H. Lipman

From: "Will Denny" <[email protected]>

| Hi
|
| Your system has been infected by the Blaster Worm. Have a look at the
| following links:
|
| http://www3.telus.net/dandemar/blaster.htm
|
| "Virus Alert About the Blaster Worm and Its Variants"
| http://support.microsoft.com/?id=826955
|

That might have been true a couple of years ago but NOT Today.

Today is it more likey to be another Internet worm that exploits the vulnerability that was
first exploited by the Lovsan/Blaster.

Examples:
W32/Sdbot.worm!ftp -- http://vil.nai.com/vil/content/v_128082.htm
W32/Mytob.gen@MM -- http://vil.nai.com/vil/content/v_132158.htm
W32/Radebot.worm -- http://vil.nai.com/vil/content/v_132018.htm

In summation you CAN NOT make a definitive statement such as ...
"Your system has been infected by the Blaster Worm"
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top