xp shutdowns automatically. please help me

S

sai

My system shutdowns automatically giving the following
msg:

Event Type: Error
Event Source: Service Control Manager
Event Category: None
Event ID: 7031
Date: 10/17/2003
Time: 12:31:42 AM
User: N/A
Computer: SASTRY
Description:
The Remote Procedure Call (RPC) service terminated
unexpectedly. It has done this 1 time(s). The following
corrective action will be taken in 60000 milliseconds:
Reboot the machine.

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.


Event Type: Information
Event Source: USER32
Event Category: None
Event ID: 1074
Date: 10/17/2003
Time: 12:31:42 AM
User: NT AUTHORITY\SYSTEM
Computer: SASTRY
Description:
The process winlogon.exe has initiated the restart of
SASTRY for the following reason: No title for this reason
could be found
Minor Reason: 0xff
Shutdown Type: reboot
Comment: Windows must now restart because the Remote
Procedure Call (RPC) service terminated unexpectedly

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.
Data:
0000: ff 00 00 00 ÿ...

Please help me.
 
A

Allan

You Have a Virus, run your antivirus software

--
Good Luck!

AL
My system shutdowns automatically giving the following
msg:

Event Type: Error
Event Source: Service Control Manager
Event Category: None
Event ID: 7031
Date: 10/17/2003
Time: 12:31:42 AM
User: N/A
Computer: SASTRY
Description:
The Remote Procedure Call (RPC) service terminated
unexpectedly. It has done this 1 time(s). The following
corrective action will be taken in 60000 milliseconds:
Reboot the machine.

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.


Event Type: Information
Event Source: USER32
Event Category: None
Event ID: 1074
Date: 10/17/2003
Time: 12:31:42 AM
User: NT AUTHORITY\SYSTEM
Computer: SASTRY
Description:
The process winlogon.exe has initiated the restart of
SASTRY for the following reason: No title for this reason
could be found
Minor Reason: 0xff
Shutdown Type: reboot
Comment: Windows must now restart because the Remote
Procedure Call (RPC) service terminated unexpectedly

For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.
Data:
0000: ff 00 00 00 ÿ...

Please help me.
 
B

Babuji CCNA

Hi,

The "Blaster Virus" is affecting the entire personal
computer industry
and may impact any computer system running Microsoft
Windows XP or
Windows 2000.

The worm can exploit a security vulnerability on
unprotected Microsoft
Windows XP or Windows 2000 computers.

There are multiple steps provided in this message. I
recommend printing these steps for your reference. You
can also view this information (in detail) on the HP Web
site at:

http://www.hp.com/cposupport/mixed/support_doc/c00035757.ht
ml

Use the following steps to prevent the computer from
restarting, to
remove the virus, and to prevent the virus from re-
infecting the
computer. HP does not guarantee the success of this
procedure.

NOTE: The following steps require virus scanning
software (Norton
AntiVirus or McAfee VirusScan) and that the
person logged on
have administrative privileges.

1. Click Start, Run and then type: shutdown -a

This prevents the system from automatically restarting
long enough
for you to download and install the Microsoft security
update.

2. Click OK.
3. If the "shutdown -a" command fails to keep the
computer from
restarting, use the following steps:

a. Click Start, Run, and then type: services.msc

A Services window appears.

b. Click OK.
c. Double-click Remote Procedure Call (RPC) and
select the
Recovery tab. Be careful to not use the Remote
Procedure Call
(RPC) Locator item.
d. Set the First Failure, Second Failure, and
Subsequent Failures
items to Take No Action.
e. Click OK to apply the settings.

4. Enable the Cryptographic service:

1. Click Start and then click Run.
2. Type Services.msc and click OK.
3. Scroll down to find Cryptographic service. Right-click
on it.
4. Ensure that Automatic or Manual is selected in the drop-
down.
5. Click Start button to enable the service.

5. Install the latest critical updates using Windows
Update. For more
information, go to the following Web sites:

* Microsoft's Security Bulletin: MS03-0266:

http://www.microsoft.com/security/security_bulletins/ms03-
026.asp

* How to use Windows Update:

http://www.hp.com/cposupport/personal_computing/support_doc
/bph07159.html

NOTE: We believe the worm is designed to increase
the Web traffic
to the Microsoft Windows Update Web site.
Some indications
are that on August 16, 2003, the worm's impact
on the
Windows Update site will increase
dramatically. If an
increase in Web traffic does occur, this Web
site may take
a long time to display, or may not display at
all when you
try to access it. Please be patient and try
to connect to
the Microsoft Windows Update site at another
time.

6. Remove the worm using your antivirus software. Do
this by
attaining the latest virus definitions and then
performing a scan.
For more detailed information go to the following Web
sites:

* McAfee's VirusScan Web page on the W32/Lovsan.worm
virus:

http://us.mcafee.com/virusInfo/default.asp?
id=description&virus_k=100547

* Symantec's Norton AntiVirus Web page on the
32.Blaster.Worm
virus.

http://securityresponse.symantec.com/avcenter/venc/data/w32
..blaster.worm.html

NOTE: Clicking the links may give an error
indicating it is
invalid. If this occurs, copy the portion of
the address
on the second line and paste it at the end of
the address
showing in your browser.

If all went well, the computer is now clean and
protected. If
these steps did not resolve the problem, contact
Microsoft and your
anti-virus software vendor for additional assistance.


7. If you used the "services.msc" command (as explained
above in
Step 3) to prevent your computer from restarting,
restore your RPC
recovery settings to their original state as follows:

a. Click Start, Run, and then type: services.msc
b. Click OK.
c. Double-click Remote Procedure Call (RPC) and
select the
Recovery tab. Be careful to not use the Remote
Procedure Call
(RPC) Locator item.
d. Set the First Failure, Second Failure, and
Subsequent Failures
items to Restart the Computer.
e. Click OK to apply the settings.

For more information on resolving and preventing viruses
on your
Computer, go to the following HP Web site:

http://www.hp.com/cposupport/personal_computing/support_doc
/bph07130.html

NOTE: One or more of the URLs above will take you to
a non HP Web
site. HP does not control and is not
responsible for
information outside of the HP Web site.


Thanks,

Babuji CCNA
 
C

cquirke (MVP Win9x)

On Wed, 14 Jan 2004 10:56:11 -0700, "Jupiter Jones [MVP]"
You most likely have Blaster.
Follow this to get rid of Blaster:
http://www3.telus.net/dandemar/blaster.htm

If you don't want to stay online that long, read this:

<paste>

It's been a while, so let me start with a recap of the history:

1) NT includes a Remote Procedure Call service that cannot be avoided
or turned off, because several internal processes require it. The
service exposes itself to all (TCP/IP only?) networks, including the
Internet. So any computer anywhere in the world can "have a go".

2) Since at least NT 4.0, if not earlier, the coding of this and
related DCOM critical services have included defects that allow
specially-constructed RPC requests to inject raw code into the system,
which Windows will run automatically shortly thereafter.

3) This defect persisted through all the NT 4.0 service packs, the
re-coding of NT for NT 5.0 and 5.1 (Win2000 and XP respectively) and
all the service packs thereof. However, the structure of the attack
packet changed between 5.0 and 5.1 - so that an attack crafted for 5.0
would cause 5.1 to simply crash, and vice versa.

4) In July 2003, MS documented the problem and issued a patch for NT
4.0, Win2000 and XP. As NT 3.xx is no longer supported, the lack of
coverage of this OS does not imply it is immune. However, Win9x
(95xx, 98xx and ME) *are* structurally immune, even if they have the
RPC service added to them - the code is completely different.

5) In August 2003, Lovesan.A spearheaded a series of malware that
attacked the NT RPC service. As well as several Lovesan variations,
there was also Welchia, a variant of the common SDBot trojan with
RPC-attacking capability added, and several others. Of these, only
those with alternate means of spread (such as SDBot.RPC.A) pose risks
to Win9x, though all Internet computers suffered the congestion caused
by Welchia's method of scouting for IP addresses to attack.

6) In Spetember 2003, MS revised the RPC patch, documenting three
additional exploitable defects in the previous "fix".

7) Subsequently, the author of SDBot.RPC.A and the author of a
Lovesan variant that had RAT (Remote Access Trojan) functionality
added to it, were apprehended and charged.


The most significant thing to know about RPC attacks is that you will
be attacked simply because you are connected to an infected network -
no software needs to be run, no action has to be taken by the user.
And the Internet is the mother of all infected networks :)

Because the process of attempting an attack can crash the system,
traditional antivirus protection is irrelevant. Your NT PC could be
spontaneously restarting every few minutes without any malware
successfully gaining a foothold; the attempts themselves are escalated
to a significant DoS effect, due to particularly dumb MS settings.


To protect yourself against RPC attacks (instructions for XP):

1) Harden the PC against consequences of attack attempts

1.1) Stop the PC from restarting every time a system error occurs

Start, Settings, Control Panel, System icon, Advanced tab
Startup and Recovery section; click the Settings button
UNcheck the "Automatically restart" setting, OKOK

1.2) Stop the RPC service restarting the system when it dies

Start, Settings, Control Panel, Administrative Tools icon
Click into the Service icon
Find and click into Remote Procedure Call (RPC)
Recovery tab; all failures default to Restart the Computer
Change all of those to Restart the Service, OKOKOK

1.3) Turn on the built-in firewall for your Internet connection

This may block RPC attacks; I haven't relied on it alone, so I can't
say whether it alone is enough of a shield.

2) Fix the defective code

Microsoft does NOT send code fixes by email, particularly unsolicited
email (they do send alterts by email if you subscribe to that service,
but these always link to thier site rather than attach files).

So you need to go to MS's web site, find the RPC defect patch that is
relevant to your version of NT, download it, install it, and restart
the PC when prompted so that it can go into effect.

All this while several thousand infected PCs are squirting tiny RPC
attack packets directly into your system, with immediate effect - so
good luck! Hence step (1). Beg a Win9x user to download it for you
if your PC keeps crashing; it fits on one diskette.

3) Detect and clean up Lovesan and other malware

If you are using NTFS, you are forced to rely on informal tools to do
this, i.e. antivirus scanners that try to clean the system while
standing waist-deep in infected code. Several free utilities abound
that will scan specifically for particular malware, and NAI has a
thing called "Stinger" that scans for and cleans up a small but
germain collection of common malware. Stick to reputable URLs, as
malware may "market" itself as anti-malware freebies.

Else http://users.iafrica.com/c/cq/cquirke/virtest.htm applies, i.e.
if you are using FAT32, you can take the formal approach, and should.

4) Apply general risk management

Beyond the scope of this post; Win9x-centric approaches described in
http://users.iafrica.com/c/cq/cquirke may not be directly applicable
to NT, but the concepts may, and "safe hex" is "safe hex".


Blaster is an example of the new breed of pure worms that can spread
globally within a few minutes (Slammer/Sapphire went global in 10
minutes). Not only does that make a mockery of daily av updates,
these are conceptually significant for another reason - they are
infosphere infectors, not computer or file infectors as most malware
and viruses are, respectively.

It's faster for these worms to re-infect you PC from the "installed
base" of infected systems on the Internet than it is to persist across
runtime by infecting your PC's files or OS runpoints. Many do not
even attempt to do so; switch the PC off, and the malware's gone -
until you reconnect to the infected network again.

With always-on servers, no-longer-needs-rebooting NT, and a
consumerland bulging with fast always-on broadband, this strategy
becomes more viable all the time.

The traditional approach to malware has been malware- rather than
risk-focussed. Just as you'd treat a bacterial infection with
antibiotics, malware has been treated with antivirus software that is
used to "cure" the PC. But just as you can't cure bioviral infections
with antibiotics, you can't clean the whole of the infosphere!

So these new threats demand risk management as the front-line defence.
Software that is stupid enough to allow direct attack is simply
indefensible, and has to be repaired (patched) or avoided.

</paste>


------------ ----- --- -- - - - -
Drugs are usually safe. Inject? (Y/n)
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top