[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

winlogon.exe Abnormal Program Termination

Posted on 2004-09-13
3
Medium Priority
?
423 Views
Last Modified: 2013-12-11
We have a Packard Bell Windows ME machine that displays this mesage when it shutsdown.

winlogon.exe
Abnormal Program Termination

Any ideas, please???
0
Comment
Question by:Flexology
  • 2
3 Comments
 
LVL 29

Accepted Solution

by:
blue_zee earned 1500 total points
ID: 12045917

That file is not installed with Windows Millenium.

It may be a worm.

Have you tried an online virus scanner?

Panda ActiveScan
http://www.pandasoftware.com/activescan 

Bitdefender
http://www.bitdefender.com/scan/Msie/index.php 

McAfee FreeScan
http://us.mcafee.com/root/mfs/default.asp 

Symantec Security Check
http://security.symantec.com/sscv6/ 

Pc-Cillin (Trend Micro Housecall)
http://housecall.antivirus.com/housecall/start_pcc.asp 

PcPitstop
http://pcpitstop.com/antivirus/default.asp 

RAV
http://www.ravantivirus.com/scan/ 

Zee
0
 
LVL 29

Expert Comment

by:blue_zee
ID: 12045945

I would~also download, update and run these tools (the 3 of them!):

Ad-Aware:
http://www.majorgeeks.com/download506.html

SpyBot Search and Destroy
http://www.safer-networking.org/index.php?page=download

Spy Sweeper
http://www.webroot.com/wb/products/spysweeper/index.php

Zee
0
 
LVL 27

Expert Comment

by:Jonvee
ID: 12047855
Flexology,
Looks like a Trojan Horse, also known as "Backdoor.GrayBird".    See link below for more details, particularly the section
on 'Technical Details':    

                 http://securityresponse.symantec.com/avcenter/venc/data/backdoor.graybird.html

Zee's recommendations will probably fix it.      If not, you may like to scan with GFI's online 'Trojan' scanner:

                http://www.trojanscan.com

0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
It is a real story and is one of my scariest tech experiences. Most users think that IT experts like us know how to fix all computer problems. However, if there is a time constraint and you MUST not fail the task or you will lose your job, a simple …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question