RPC Failure System Continually Reboots

  • Thread starter Patrick Klavitter
  • Start date
P

Patrick Klavitter

After running the scan 18 items were found and targeted
for removal then Anti-Spyware requested a reboot. After
the reboot and you tried to logon, the system would
partially display the desktop after a couple of minutes
and you would get a pop up that NT Authority is shutting
down the system due to an RPC failure in 60 seconds. This
will occur even in safe mode. If you rename the
SVCHOST.exe you can log into the system and it will stay
up but has very limited functionality. The system is
running Windows XP Home Edition on a Dell 4500. I have
run repair from the Windows XP CD twice and this has not
helped. I scanned the system with several antivirus tools
and with the Malicious Software tool and none were found.
I set the the system to not reboot after a failure and
this did not help it still reboots. I can not run any
updates, programs or unistalls as the services required
wont start or stay running long enough. The system will
stay up as long as you do not log in.
 
F

Frank Saunders, MS-MVP IE/OE

Patrick Klavitter said:
After running the scan 18 items were found and targeted
for removal then Anti-Spyware requested a reboot. After
the reboot and you tried to logon, the system would
partially display the desktop after a couple of minutes
and you would get a pop up that NT Authority is shutting
down the system due to an RPC failure in 60 seconds. This
will occur even in safe mode. If you rename the
SVCHOST.exe you can log into the system and it will stay
up but has very limited functionality. The system is
running Windows XP Home Edition on a Dell 4500. I have
run repair from the Windows XP CD twice and this has not
helped. I scanned the system with several antivirus tools
and with the Malicious Software tool and none were found.
I set the the system to not reboot after a failure and
this did not help it still reboots. I can not run any
updates, programs or unistalls as the services required
wont start or stay running long enough. The system will
stay up as long as you do not log in.

Sounds like you have been running without a firewall and caught the Blaster
worm.
Your system is infected by the MSBlaster Worm. This is causing the system to
shutdown abnormally.

From Ron Martel

Do steps 1 and 2 on your working computer.

1. Get the Blaster removal script from MVP Kelly Theriot's web site:
http://www.kellys-korner-xp.com/regs_edits/msblast.vbs
2. Get the Microsoft patch from
http://support.microsoft.com/default.aspx?scid=kb;en-us;823980#WinXP

Copy the downloaded files to a 3.5 inch diskette (they will both fit
on the same 1.44 mb diskette) or burn them to a CD

3. Disconnect the infected computer from the Internet. Unplug
Cable/DSL modem if you have one. That prevents reinfection during the
time interval between running the script and the completion of the
patch installation.
4. Run the script.
5. Install the patch.
6. Activate the Internet Connection Firewall in Windows XP
7. Reconnect to the Internet. Update your antivirus software and do
a complete scan.
8. Go to the Windows Update and get all repeat all of the critical
updates for your computer.

Good luck


Ron Martell Duncan B.C. Canada

--
Frank Saunders, MS-MVP, IE/OE
Please respond in Newsgroup only. Do not send email
http://www.fjsmjs.com
Protect your PC
http://www.microsoft.com./athome/security/protect/default.aspx
http://defendingyourmachine.blogspot.com/
 
P

Patrick

Frank,
I thought it acted like the MSBlaster Worm as well, but
it was not detected after scanning the system with
several tools, McAfee, Norton, and Microsofts Malicious
Software Removal Tool. I even slaved the drive and
scanned it from another system.
 
J

Jim Byrd

Hi Patrick - Try this: When it starts to shutdown, go to Start|Run and
enter shutdown -a to stop the reboot.

Go to Start/Run and type in: services.msc. Scroll down to Remote Procedure
Call (RPC)/Recovery/First Failure/Restart the Service (instead of Restart
the Computer which it probably is now).


#########IMPORTANT#########
Show hidden files and run all of the following removal tools from Safe mode
or a "Clean Boot" when possible. Reboot and test if the malware is fixed
after using each tool.

HOW TO Enable Hidden Files
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2002092715262339

Clean Boot - General Win2k/XP procedure, but see below for links for other
OS's (This for Win2k w/msconfig - you can obtain msconfig for Win2k here:
http://www.3feetunder.com/files/win2K_msconfig_setup.exe ):

1. StartRun enter msconfig.

2. On the General tab, click Selective Startup, and then clear the 'Process
System.ini File', 'Process Win.ini File', and 'Load Startup Items' check
boxes. Leave the 'boot.ini' boxes however they are currently set.

3. In the Services tab, check the "Hide All Microsoft Services" checkbox,
and then click the "Disable All" button. If you use a third party firewall
then re-check (enable) it. For example, if you use Zone Alarm, re-check the
True Vector Internet Monitor service (and you may also want to re-check
(enable) the zlclient on the Startup tab.) Equivalent services exist for
other third party firewalls. An alternative to this for XP users is to
enable at this time the XP native firewall (Internet Connection Firewall -
ICF). Be sure to turn it back off when you re-enable your non-MS services
and Startup tab programs and restore your normal msconfig configuration
after cleaning your machine.

4. Click OK and then reboot.

For additional information about how to clean boot your operating system,
click the following article numbers to view the articles in the Microsoft
Knowledge Base:
310353 How to Perform a Clean Boot in Windows XP
http://support.microsoft.com/kb/310353
281770 How to Perform Clean-Boot Troubleshooting for Windows 2000
http://support.microsoft.com/kb/281770/EN-US/
267288 How to Perform a Clean Boot in Windows Millennium Edition
http://support.microsoft.com/kb/267288/EN-US/
192926 How to Perform Clean-Boot Troubleshooting for Windows 98
http://support.microsoft.com/kb/192926/EN-US/
243039 How to Perform a Clean Boot in Windows 95
http://support.microsoft.com/kb/243039/EN-US/
#########IMPORTANT#########


Sometimes the tools below will find files which they are unable to delete
because they are in use. A program called Copylock, here,
http://noeld.com/programs.asp?cat=misc#CopyLock can aid in the process of
"replacing, moving, renaming or deleting one or many files which are
currently in use (e.g. system files like comctl32.dll, or virus/trojan
files.)" Another is Killbox, here:
http://www.downloads.subratam.org/KillBox.zip
A third which is a bit different but often useful is Delete Invalid File,
here: http://www.purgeie.com/delinv.htm which handles invalid/UNC
file/folder name deleting, rather than the in use problem


Download and run Stinger.exe, here:
http://download.nai.com/products/mcafee-avert/stinger.exe or from the link
on this page: http://vil.nai.com/vil/stinger/ ME/XP users be sure to read:
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm


Download sysclean.com , from Trend Micro, here:
http://www.trendmicro.com/download/dcs.asp along with the latest pattern
file, here: http://www.trendmicro.com/download/pattern.asp Be sure to read
the "How-to" info here:
http://www.trendmicro.com/ftp/products/tsc/readme.txt (You might also want
to get Art's updater, SYS-UP.Zip, here for future updating of these:
http://home.epix.net/~artnpeg/). The updater files plus a short tutorial on
using them and SysClean are also available in one package here:
http://www.ik-cs.com/Programs/virtools/SYSCLEAN UTILITY.exe (If you
download and use the updater from the beginning, it will automatically
handle downloading the other files.) Place them in a dedicated folder after
appropriate unzipping.

Show hidden and system files (HowTo here:
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2002092715262339)

If you're using WindowsME or WindowsXP, SysClean (and the other cleaning
tools below) may find infections within Restore Points which it will be
unable to clean. You may choose to disable Restore if you're on XP or ME
(directions here:
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm) which will
eliminate ALL previous Restore Points, or alternatively, you can wait until
cleaning is completed and then use the procedure within the *********'s
below to delete all older, possibly infected Restore Points and save a new,
clean one. This approach is in the sprit of "keep what you've got" so that
you can recover to an at least operating albeit infected system if you
inadvertently delete something vital, and is the approach I recommend that
you take.

Then boot to Safe mode or a Clean Boot as above (HowTo here:
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406)

Read tscreadme.txt carefully, then do a complete scan of your system
and clean or delete anything it finds. Reboot and re-run SysClean and
continue this procedure until you get a clean scan or nothing further can be
cleaned/removed. Now reboot to normal mode and re-run the scan again.

This scan may take a long time, as Sysclean is VERY extensive and thorough.
For example, one user reported that Sysclean found 69 hits that an
immediately prior Norton AV v. 11.0.2.4 run had missed.


Download and run the free or trial version of A2 Personal, here:
http://www.emsisoft.com/en/ Run from a Clean Boot or Safe Mode with Show
Hidden Files enabled as above.


--
Please respond in the same thread.
Regards, Jim Byrd, MS-MVP



In
 
J

Jim Byrd

Hi Patrick - Sorry, forgot the ************* :)


*******
ONLY IF you've successfully eliminated the malware, you can now make a new,
clean Restore Point and delete any previously saved (possibly infected)
ones. The following suggested approach is courtesy of Gary Woodruff: For XP
you can run a Disk Cleanup cycle and then look in the More Options tab. The
System Restore option removes all but the latest Restore Point. If there
hasn't been one made since the system was cleaned you should manually create
one before dumping the old possibly infected ones.
*******


--
Please respond in the same thread.
Regards, Jim Byrd, MS-MVP



In
 
D

Dennis

I am also having the same exact problem with the
restarts. I tried everything that you mentioned below,
but I am still getting the resets. Do you have any other
suggestions?


-----Original Message-----
Hi Patrick - Try this: When it starts to shutdown, go to Start|Run and
enter shutdown -a to stop the reboot.

Go to Start/Run and type in: services.msc. Scroll down to Remote Procedure
Call (RPC)/Recovery/First Failure/Restart the Service (instead of Restart
the Computer which it probably is now).


#########IMPORTANT#########
Show hidden files and run all of the following removal tools from Safe mode
or a "Clean Boot" when possible. Reboot and test if the malware is fixed
after using each tool.

HOW TO Enable Hidden Files
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/ 2002092715262339

Clean Boot - General Win2k/XP procedure, but see below for links for other
OS's (This for Win2k w/msconfig - you can obtain msconfig for Win2k here:
http://www.3feetunder.com/files/win2K_msconfig_setup.exe ):

1. StartRun enter msconfig.

2. On the General tab, click Selective Startup, and then clear the 'Process
System.ini File', 'Process Win.ini File', and 'Load Startup Items' check
boxes. Leave the 'boot.ini' boxes however they are currently set.

3. In the Services tab, check the "Hide All Microsoft Services" checkbox,
and then click the "Disable All" button. If you use a third party firewall
then re-check (enable) it. For example, if you use Zone Alarm, re-check the
True Vector Internet Monitor service (and you may also want to re-check
(enable) the zlclient on the Startup tab.) Equivalent services exist for
other third party firewalls. An alternative to this for XP users is to
enable at this time the XP native firewall (Internet Connection Firewall -
ICF). Be sure to turn it back off when you re-enable your non-MS services
and Startup tab programs and restore your normal msconfig configuration
after cleaning your machine.

4. Click OK and then reboot.

For additional information about how to clean boot your operating system,
click the following article numbers to view the articles in the Microsoft
Knowledge Base:
310353 How to Perform a Clean Boot in Windows XP
http://support.microsoft.com/kb/310353
281770 How to Perform Clean-Boot Troubleshooting for Windows 2000
http://support.microsoft.com/kb/281770/EN-US/
267288 How to Perform a Clean Boot in Windows Millennium Edition
http://support.microsoft.com/kb/267288/EN-US/
192926 How to Perform Clean-Boot Troubleshooting for Windows 98
http://support.microsoft.com/kb/192926/EN-US/
243039 How to Perform a Clean Boot in Windows 95
http://support.microsoft.com/kb/243039/EN-US/
#########IMPORTANT#########


Sometimes the tools below will find files which they are unable to delete
because they are in use. A program called Copylock, here,
http://noeld.com/programs.asp?cat=misc#CopyLock can aid in the process of
"replacing, moving, renaming or deleting one or many files which are
currently in use (e.g. system files like comctl32.dll, or virus/trojan
files.)" Another is Killbox, here:
http://www.downloads.subratam.org/KillBox.zip
A third which is a bit different but often useful is Delete Invalid File,
here: http://www.purgeie.com/delinv.htm which handles invalid/UNC
file/folder name deleting, rather than the in use problem


Download and run Stinger.exe, here:
http://download.nai.com/products/mcafee-
avert/stinger.exe or from the link
 
B

Bill Sanderson

In the U.S. or Canada, call 1-866-pcsafety. This is a Microsoft Product
Support Services help line for virus-related or security patch issues.

Elsewhere, call your local Microsoft subsidiary. Equivalent help is
available and is free, but the phone call may not be.

They are not there to help with the beta or problems resulting from it--but
call and describe your symptoms, and I believe they will help.

--
FAQ for Microsoft Antispyware:
http://www.geocities.com/marfer_mvp/FAQ_MSantispy.htm

Dennis said:
I am also having the same exact problem with the
restarts. I tried everything that you mentioned below,
but I am still getting the resets. Do you have any other
suggestions?


-----Original Message-----
Hi Patrick - Try this: When it starts to shutdown, go to Start|Run and
enter shutdown -a to stop the reboot.

Go to Start/Run and type in: services.msc. Scroll down to Remote Procedure
Call (RPC)/Recovery/First Failure/Restart the Service (instead of Restart
the Computer which it probably is now).


#########IMPORTANT#########
Show hidden files and run all of the following removal tools from Safe mode
or a "Clean Boot" when possible. Reboot and test if the malware is fixed
after using each tool.

HOW TO Enable Hidden Files
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/ 2002092715262339

Clean Boot - General Win2k/XP procedure, but see below for links for other
OS's (This for Win2k w/msconfig - you can obtain msconfig for Win2k here:
http://www.3feetunder.com/files/win2K_msconfig_setup.exe ):

1. StartRun enter msconfig.

2. On the General tab, click Selective Startup, and then clear the 'Process
System.ini File', 'Process Win.ini File', and 'Load Startup Items' check
boxes. Leave the 'boot.ini' boxes however they are currently set.

3. In the Services tab, check the "Hide All Microsoft Services" checkbox,
and then click the "Disable All" button. If you use a third party firewall
then re-check (enable) it. For example, if you use Zone Alarm, re-check the
True Vector Internet Monitor service (and you may also want to re-check
(enable) the zlclient on the Startup tab.) Equivalent services exist for
other third party firewalls. An alternative to this for XP users is to
enable at this time the XP native firewall (Internet Connection Firewall -
ICF). Be sure to turn it back off when you re-enable your non-MS services
and Startup tab programs and restore your normal msconfig configuration
after cleaning your machine.

4. Click OK and then reboot.

For additional information about how to clean boot your operating system,
click the following article numbers to view the articles in the Microsoft
Knowledge Base:
310353 How to Perform a Clean Boot in Windows XP
http://support.microsoft.com/kb/310353
281770 How to Perform Clean-Boot Troubleshooting for Windows 2000
http://support.microsoft.com/kb/281770/EN-US/
267288 How to Perform a Clean Boot in Windows Millennium Edition
http://support.microsoft.com/kb/267288/EN-US/
192926 How to Perform Clean-Boot Troubleshooting for Windows 98
http://support.microsoft.com/kb/192926/EN-US/
243039 How to Perform a Clean Boot in Windows 95
http://support.microsoft.com/kb/243039/EN-US/
#########IMPORTANT#########


Sometimes the tools below will find files which they are unable to delete
because they are in use. A program called Copylock, here,
http://noeld.com/programs.asp?cat=misc#CopyLock can aid in the process of
"replacing, moving, renaming or deleting one or many files which are
currently in use (e.g. system files like comctl32.dll, or virus/trojan
files.)" Another is Killbox, here:
http://www.downloads.subratam.org/KillBox.zip
A third which is a bit different but often useful is Delete Invalid File,
here: http://www.purgeie.com/delinv.htm which handles invalid/UNC
file/folder name deleting, rather than the in use problem


Download and run Stinger.exe, here:
http://download.nai.com/products/mcafee-
avert/stinger.exe or from the link
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top