1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

(RPC) Service terminated unexpectedly

Discussion in 'Windows XP' started by solanabch, 2003/08/11.

Thread Status:
Not open for further replies.
  1. 2003/08/11
    solanabch

    solanabch Inactive Thread Starter

    Joined:
    2002/05/25
    Messages:
    39
    Likes Received:
    0
    When on the internet I am getting the following on my XP box:

    This system is shutting down. Please save all work in progress
    and log off. Any unsaved changes will be lost. This shutdown
    was initiated by NT AUTHORITY\SYSTEM

    Time before shutdown: 00:00:59

    Message:
    Windows must now restart because the Remote Procedure Call
    (RPC) service terminated unexpectedly


    I am on dial-up and would rather not download the Sevice Pack.

    Any fixes out there?

    Thanks in advance.
     
  2. 2003/08/11
    gghartman

    gghartman Inactive

    Joined:
    2002/01/07
    Messages:
    1,130
    Likes Received:
    0
    same problem help

    I have a client that got the same problem today so if anyone has a fix or knows what is happening please help me and the original poster.

    Thanks.
     

  3. to hide this advert.

  4. 2003/08/11
    Abraxas

    Abraxas Inactive

    Joined:
    2002/08/16
    Messages:
    2,361
    Likes Received:
    3
    Last edited: 2003/08/11
  5. 2003/08/11
    daimeionb

    daimeionb Inactive

    Joined:
    2002/08/21
    Messages:
    18
    Likes Received:
    0
    RPC services shutting down

    I have the same issue starting today. The post you suggested doesn't mention this occuring. Is it related to the virus? I use McAfee and it didn't detect a virus.
     
  6. 2003/08/11
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Ehhh... yea, download the fix! It's only 1.26MB

    You could also block port 135,139 & 445 (UDP/TCP) in your firewall.
     
    Arie,
    #5
  7. 2003/08/11
    daimeionb

    daimeionb Inactive

    Joined:
    2002/08/21
    Messages:
    18
    Likes Received:
    0
    I think even after you download the fix, you will need to get the latest virus definitions and remove the virus that is causing the problem. The fix from microsoft only patches the vulnerability, right?

    I just hope I can stay online long enough to download the latest updates to McAfee...
     
  8. 2003/08/11
    gghartman

    gghartman Inactive

    Joined:
    2002/01/07
    Messages:
    1,130
    Likes Received:
    0
    Arie

    What is the name of the virus ??? This one client is a new and I mean new XP install with the latest Norton definitions so how did it get though ???

    Also, in looking at the msconfig I noticed an executable called msblast.exe that wasnt there when I set the machine up at the clients site. I looked on the web and I cant find anything that mentions msblast.exe. Is this the virus's executable ???
     
  9. 2003/08/11
    CPO

    CPO Inactive

    Joined:
    2002/05/10
    Messages:
    7
    Likes Received:
    0
    for anyone that hasn't gone there yet, check the SRC at Symantec. Just downloaded the fix and cleaned two computers. Worked great.

    Both computers are on DSL and connected to a company through VPN. Looks like it spread from the company outward. Hmmm.

    Now have to get them to clean up and lock down the ports TCP 135, and 4444. UDP 69.
     
    CPO,
    #8
  10. 2003/08/11
    Daizy

    Daizy Inactive

    Joined:
    2002/02/19
    Messages:
    2,965
    Likes Received:
    0
  11. 2003/08/11
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    W32.Lovsan.worm Aliases include Win32.Poza (Computer
    Associates), Lovsan (F-Secure) and W32.Blaster.Worm (Symantec)


    From what I read, if you've been infected there may not be a real good way to be sure you have cleaned it up completely.

    Try start~run~cmd and then netstat -A. If you find a listing that you are listening on port 33571 you are probably infected. Good stuff (but technical) at http://isc.sans.org/diary.html?date=2003-08-09

    The latest info I have is that even though the critter likes to come in via port 135, blocking that port can cause some problems and you should be OK blocking TCP/UDP port 69 and TCP port 4444 since the worm /vvirus uses 4444 to FTP out and get the rest of it's payload and until then is fairly harmless.
     
  12. 2003/08/12
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Well, I have had that port blocked for incomming traffic since the Mircrosoft Security article mentioned it, just to see how many times I would be scanned/probed. I have 3 computers on my network, but haven't had any problems with blocking incomming traffic on 135 (and 139).

    I was probed 28 times on the 11th...
     
  13. 2003/08/12
    johngarnold

    johngarnold Inactive

    Joined:
    2002/01/14
    Messages:
    34
    Likes Received:
    0
    I don't know what fixed this same problem I had.
    I downloaded the FIX from microsoft (refer to a previous reply above) and then updated my (AVG) virus signature file (it was only 10 days old) to the latest and it then found the LOVSAN WORM virus in C:\WINDOWS\SYSTEM32\MSBLAST.EXE file and 'cleaned' it.
    All now seems to be working ok.
    This (worm) virus must be very new as my virus signature file was only 10 days old!

    Tell everyone to keep their virus signature files up to date!
    Cheers
    John :D
     
  14. 2003/08/12
    daimeionb

    daimeionb Inactive

    Joined:
    2002/08/21
    Messages:
    18
    Likes Received:
    0
    All fixed

    Same here, got the virus on 8/04, virus dat came out a few days later. I've applied the microsoft patch, scanned for viruses with the new .dat file, and deleted the msblast.exe (after i stopped it from running, busy little sucker). I also had to delete the TFTPxxxx file from the startup folder, and disable and remove my previous system restore points (which contained the virus).

    From what I understand, this virus will also start a DOS attack on the windows update server after August 15th. Hope people get the word and get this thing cleaned up!
     
  15. 2003/08/12
    BillyBob Lifetime Subscription

    BillyBob Inactive

    Joined:
    2002/01/07
    Messages:
    6,048
    Likes Received:
    0
    EXCELLENT THINKING

    BillyBob
     
  16. 2003/08/12
    sandra

    sandra Inactive

    Joined:
    2003/04/20
    Messages:
    10
    Likes Received:
    0
    just want to thank you for helping all the lost souls like me who did,nt have a clue what to do thanks guys and gals
     
  17. 2003/08/13
    even

    even Inactive

    Joined:
    2003/03/03
    Messages:
    7
    Likes Received:
    0
    Safe Mode Worked for me

    Hello All,

    I had to reboot into safe mode after downloading the newest Norton's definitions. From Safe mode I ran and removed the virus. When I rebooted it was somehow still working. I found it in the registry. Deleted that. To my amazement I ran Norton's again and it said it was gone, yet I still had the problem. I went to Symantec and downloaded a nice "REMOVING" program they had.
    Removal using the W32.Blaster.Worm Removal Tool
    Symantec Security Response has developed a removal tool to clean infections of W32.Blaster.Worm. This is the easiest way to remove this threat and should be tried first.

    Quotes from site above.

    That said it found and removed one more part! Then it tried to get me to install the patch from Microsoft. That would not install. "CRYPTOGRAPHIC" not turned on?
    I read to rename the \Windows\System32\CatRoot2 folder to CatRoot2OLD. My computer would NOT let me do this. ACCESS Denied! So I deleted all the files in it that I could. Then the Microsoft patch worked great.

    This seems to have fixed it for me. Thanks you all with your advice and help. I don't know what I would have done without this BBS group.
    :)
     
  18. 2003/08/14
    user

    user Inactive

    Joined:
    2003/08/14
    Messages:
    4
    Likes Received:
    0
    Plz tell me how to disable the restore and remove restore points...
    :confused:
    thanks
     
  19. 2003/08/14
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    Right click on My Computer > Properties > System Restore > check 'Turn off System Restore on all Drives'.
     
  20. 2003/08/14
    Liam Lifetime Subscription

    Liam Inactive

    Joined:
    2003/02/21
    Messages:
    199
    Likes Received:
    0
    the way I got rid from my sisters comp was just to re format, I did all the patches and other bits.
    Seems it only happens on dial up?

    How do you block port 4444, I know a few have said to do that but know one has said how?
     
  21. 2003/08/14
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Trend micro lists 3 variants of the blaster & a trojan

    WORM_MSBLAST.A
    WORM_MSBLAST.B
    WORM_MSBLAST.C
    WORM_MSBLAST.DRP
    WORM_MSBLAST.GEN

    paddyslammer - if you are running a firewall you just need to make sure that ports 69 & 4444 are not open outbound. Good idea to block both the UDP and TCP ports. If you aren't running a good firewall, you can't do it. The built-in XP one will only allow blocking inbound stuff for instance.
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.