Search the archive:
YaBB - Yet another Bulletin Board
 
   
 
Page Index Toggle Pages: 1
Send Topic Print
need help- big problem (Read 521 times)
Jan 12th, 2004 at 9:45pm

Daz   Offline
Colonel
in the morning im making
WAFFLES!
Leeds, UK

Gender: male
Posts: 1171
*****
 
hi everyone got a problem

anyone know what the heck a remote call procedure is??

this bugger is shutting down my system like every 15 minutes or so saying "the remote call procedure failed, please save all work" or something along them lines.. then gives you about 30 seconds to save work before she shuts down...this happened a while back so i reinstalled everything including windows and i even formatted my hard drive....fresh install of windows reinstall everything....just basics like modem printer etc which have worked fine for 6 months on my new comp, and it does the same thing again.. quite annoying after i have spent 3 hours trying to fix it.....

i am using windows XP SP1 ontop of my siganture spec below and have conected my computer to my other computer via LAN << dunno if this makes any difference but have recently just set it up

its realy buggin me now and i am on the verge of punching my computer every time it shuts down..

any help would be appreciated thanx Cheesy
 

AMD athlon XP2800+ @2.34ghz&&Epox 8RDA3G 400 fsb, 8x AGP&&1024MB DDR400 PC3200&&XFX 256MB FX5950 Ultra (oc 525/1.04)&&40 gig maxtor 7200rpm&&80 gig seagate baracuda 7200rpm&&
IP Logged
 
Reply #1 - Jan 12th, 2004 at 9:51pm

chomp_rock   Offline
Colonel
I must confess, I was
born at a very early
age.

Gender: male
Posts: 2718
*****
 
Sounds to me like you have a virus that uses the RPC service to shut you down. If you don't have a firewall this is quite likely.
 

AMD Athlon 64 3700+&&GeForce FX5200 256Mb&&1GB DDR400 DC&&Seagate 500Gb SATA-300 HDD&&Windows XP Professional X64 Edition
&&&&That's right, I'm now using an AMD! I decided to give them another try and they kicked the pants off of my P4 3.4!
IP Logged
 
Reply #2 - Jan 13th, 2004 at 6:00am

Craig.   Offline
Colonel
Birmingham

Gender: male
Posts: 18590
*****
 
windows XP has its own firewall Use it, then update your virus definitions in virus scan if you have it, and use it to clean out the problem. there is a fix on the MS website i think
 
IP Logged
 
Reply #3 - Jan 13th, 2004 at 9:23am

GeForce   Offline
Colonel
It keeps going and going!!
Wooohoooooo!!
London, United Kingdom

Gender: male
Posts: 2616
*****
 
Quote:
Sounds to me like you have a virus that uses the RPC service to shut you down. If you don't have a firewall this is quite likely.


Ouch, sorry mate, you've (probably) got the Blaster worm. For a short term fix, go to Start > Run and type:

shutdown -a

This will stop the  computer shutting down even if the RPC ends. Then go to the following link and download the removal tool. Run it on BOTH computers.

Download the removal tool from here: http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.removal...

READ THE INSTRUCTIONS VERY CAREFULLY, AND FOLLOW THEM EXACTLY

Get it done quick, it's nasty. Because you have networked the computers, it is necesarry to check BOTH for the virus.

Here is some of Symantec's Security Response. I know it is a bit long but PLEASE take the time to read it, it is extremely important you get rid of it.

Quote:
When W32.Blaster.Worm is executed, it does the following:


Checks to see whether a computer is already infected and whether the worm is running. If so, the worm will not infect the computer a second time.


Adds the value:

"windows auto update"="msblast.exe"

to the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm runs when you start Windows.


Generates an IP address and attempts to infect the computer that has that address. The IP address is generated according to the following algorithms:

For 40% of the time, the generated IP address is of the form A.B.C.0, where A and B are equal to the first two parts of the infected computer's IP address.

C is also calculated by the third part of the infected system's IP address; however, for 40% of the time the worm checks whether C is greater than 20. If so, a random value less than 20 is subtracted from C. Once the IP address is calculated, the worm will attempt to find and exploit a computer with the IP address A.B.C.0.

The worm will then increment the 0 part of the IP address by 1, attempting to find and exploit other computers based on the new IP address, until it reaches 254.


With a probability of 60%, the generated IP address is completely random.


Sends data on TCP port 135 that may exploit the DCOM RPC vulnerability. The worm sends one of two types of data: either to exploit Windows XP or Windows 2000.

For 80% of the time, Windows XP data will be sent; and for 20% of the time, the Windows 2000 data will be sent.

NOTES:
The local subnet will become saturated with port 135 requests.
While W32.Blaster.Worm cannot spread to the Windows NT or Windows Server 2003, unpatched computers running these operating systems may crash as a result of the worm's attempts to exploit them. However, if the worm is manually placed and executed on a computer running these operating systems, it can run and spread.
Due to the random nature of how the worm constructs the exploit data, this may cause the RPC service to crash if it receives incorrect data. This may manifest as svchost.exe, generating errors as a result of the incorrect data.
If the RPC service crashes, the default procedure under Windows XP and Windows Server 2003 is to restart the computer. To disable this feature, see step one of the Removal Instructions below.


Uses Cmd.exe to create a hidden remote shell process that will listen on TCP port 4444, allowing an attacker to issue remote commands on an infected system.


Listens on UDP port 69. When the worm receives a request from a computer to which it was able to connect using the DCOM RPC exploit, it will send msblast.exe to that computer and tell it to execute the worm.


If the current date is the 16th through the end of the month for the months of January to August, or if the current month is September through December, the worm will attempt to perform a DoS on Windows Update. However, the attempt to perform the DoS will succeed only if one the following conditions is true:
The worm runs on a Windows XP computer that was either infected or restarted during the payload period.
The worm runs on a Windows 2000 computer that was infected during the payload period and has not been restarted since it was infected.
The worm runs on a Windows 2000 computer that has been restarted since it was infected, during the payload period, and the currently logged in user is Administrator.


The DoS traffic has the following characteristics:
Is a SYN flood on port 80 of windowsupdate.com.
Tries to send 50 HTTP packets every second.
Each packet is 40 bytes in length.
If the worm cannot find a DNS entry for windowsupdate.com, it uses a destination address of 255.255.255.255.

Some fixed characteristics of the TCP and IP headers are:
IP identification = 256
Time to Live = 128
Source IP address = a.b.x.y, where a.b are from the host ip and x.y are random. In some cases, a.b are random.
Destination IP address = dns resolution of "windowsupdate.com"
TCP Source port is between 1000 and 1999
TCP Destination port = 80
TCP Sequence number always has the two low bytes set to 0; the 2 high bytes are random.
TCP Window size = 16384


The worm contains the following text, which is never displayed:

I just want to say LOVE YOU SAN!!
billy gates why do you make this possible ? Stop making money and fix your software!!


I know they are on the page, but the instructions given are:

Quote:
Download the FixBlast.exe file from:

http://securityresponse.symantec.com/avcenter/FixBlast.exe



Save the file to a convenient location, such as your downloads folder or the Windows Desktop (or removable media that is known to be uninfected, if possible).
To check the authenticity of the digital signature, refer to the section, "Digital signature."
Close all the running programs before running the tool.
If you are running Windows XP, then disable System Restore. Refer to the section, "System Restore option in Windows Me/XP," for additional details.


--------------------------------------------------------------------------------

CAUTION: If you are running Windows XP, we strongly recommend that you do not skip this step. The removal procedure may be unsuccessful if Windows XP System Restore is not disabled, because Windows prevents outside programs from modifying System Restore.
--------------------------------------------------------------------------------



Double-click the FixBlast.exe file to start the removal tool.
Click Start to begin the process, and then allow the tool to run.


--------------------------------------------------------------------------------

Note: If, when running the tool, you see a message that the tool was not able to remove one or more files, run the tool in Safe mode. Shut down the computer, turn off the power, and wait 30 seconds. Restart the computer in Safe mode and then run the tool again. All the Windows 32-bit operating systems, except Windows NT, can be restarted in Safe mode. For instructions, read the document "How to start the computer in Safe Mode."
--------------------------------------------------------------------------------



Restart the computer.
Run the removal tool again to ensure that the system is clean.
If you are running Windows XP, then re-enable System Restore.
Run LiveUpdate to make sure that you are using the most current virus definitions.


Jonathan 8)
 

...&&LiveScripts.NET - Over 300 free Scripts and Extensive Scripting Tutorials&&AMD Athlon 64 3700+ @ 2.8Ghz | Asus A8N-SLi Premium | BFG Tech GeForce 7900GT 256mb @ 475/1360Mhz | 1Gb GeIL Ultra-X NF4 Edition | 160Gb WD SATA-3 HDD | Hiper Type-R 580W
IP Logged
 
Reply #4 - Jan 13th, 2004 at 10:24am

Daz   Offline
Colonel
in the morning im making
WAFFLES!
Leeds, UK

Gender: male
Posts: 1171
*****
 
thanx a lot guys been realy helpful i got rid of the bugger and computer running normal again....beers on me D i have removed my other computer from network at the moment coz it most likely came from there and will sort that out soon
 

AMD athlon XP2800+ @2.34ghz&&Epox 8RDA3G 400 fsb, 8x AGP&&1024MB DDR400 PC3200&&XFX 256MB FX5950 Ultra (oc 525/1.04)&&40 gig maxtor 7200rpm&&80 gig seagate baracuda 7200rpm&&
IP Logged
 
Reply #5 - Jan 13th, 2004 at 11:42am

GeForce   Offline
Colonel
It keeps going and going!!
Wooohoooooo!!
London, United Kingdom

Gender: male
Posts: 2616
*****
 
Well done Daz, glad you got it sorted Wink Just for reference, did you use the removal tool I mentioned in my previous post?

Jonathan 8)
 

...&&LiveScripts.NET - Over 300 free Scripts and Extensive Scripting Tutorials&&AMD Athlon 64 3700+ @ 2.8Ghz | Asus A8N-SLi Premium | BFG Tech GeForce 7900GT 256mb @ 475/1360Mhz | 1Gb GeIL Ultra-X NF4 Edition | 160Gb WD SATA-3 HDD | Hiper Type-R 580W
IP Logged
 
Reply #6 - Jan 13th, 2004 at 8:15pm

Daz   Offline
Colonel
in the morning im making
WAFFLES!
Leeds, UK

Gender: male
Posts: 1171
*****
 
yeah did and it removed it fine Cheesy i di however before i used that check the registry to find that msblaster.exe did actualy exist and it did and i deleted it from registry...and the shutdown - a came in handy i never knew about that trick thanx
 

AMD athlon XP2800+ @2.34ghz&&Epox 8RDA3G 400 fsb, 8x AGP&&1024MB DDR400 PC3200&&XFX 256MB FX5950 Ultra (oc 525/1.04)&&40 gig maxtor 7200rpm&&80 gig seagate baracuda 7200rpm&&
IP Logged
 
Reply #7 - Jan 14th, 2004 at 6:04am

GeForce   Offline
Colonel
It keeps going and going!!
Wooohoooooo!!
London, United Kingdom

Gender: male
Posts: 2616
*****
 
OK Daz, thanks for letting me know. Anyway, you've got it sorted now so hope everything goes well from now on Wink

Jonathan 8)
 

...&&LiveScripts.NET - Over 300 free Scripts and Extensive Scripting Tutorials&&AMD Athlon 64 3700+ @ 2.8Ghz | Asus A8N-SLi Premium | BFG Tech GeForce 7900GT 256mb @ 475/1360Mhz | 1Gb GeIL Ultra-X NF4 Edition | 160Gb WD SATA-3 HDD | Hiper Type-R 580W
IP Logged
 
Reply #8 - Jan 14th, 2004 at 2:46pm

Katahu   Offline
Colonel

Gender: male
Posts: 6920
*****
 
My computer use to be the victim of the Blaster Worm as well.

It also runs Win XP Home Edition SP1.

Luckily for me, my dad owns a laptop that runs on Windows Me. The Blaster CAN'T infect Windows Me.

So, I went online using my dad's laptop and I downloaded and saved a windows XP update on to a floppy.

I placed the floppy in my computer that was already infected. I then installed the update and it worked. After that, my computer is safe. All thanks to my dad's laptop [which I consider it to be a P.O.S.]. Grin
 
IP Logged
 
Reply #9 - Jan 14th, 2004 at 4:20pm

Daz   Offline
Colonel
in the morning im making
WAFFLES!
Leeds, UK

Gender: male
Posts: 1171
*****
 
am i right in thinking POS means pile of ****e lol
 

AMD athlon XP2800+ @2.34ghz&&Epox 8RDA3G 400 fsb, 8x AGP&&1024MB DDR400 PC3200&&XFX 256MB FX5950 Ultra (oc 525/1.04)&&40 gig maxtor 7200rpm&&80 gig seagate baracuda 7200rpm&&
IP Logged
 
Page Index Toggle Pages: 1
Send Topic Print