Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Infected by Rootkit.Boot.STT.a

  • This topic is locked This topic is locked
3 replies to this topic

#1 dittohead


  • Members
  • 4 posts
  • Local time:01:56 AM

Posted 05 August 2012 - 01:28 PM


A couple of weeks ago I apparently got this virus. First there appeared a fake malware detection soft and then some icons disappeared from the desktop and start menu (I use Windows XP sp3). I got rid of the malware soft but my computer started to act slow and strangely. It wouldn't let me take out usb-drives claiming that there's some program using it, Firefox redirected me to some advertisement sites and blue screen appeared from time to time.

Then one day I started my computer and it stopped before going to Windows and claimed that it wouldn't find c:\windows\system32\hal.dll. I took the drive out and put it on this USB docking station and explored it on another computer. Everything looked fine except I couldn't access \system32 folder. Then I did chkdsk to the drive and it found these orphan files and they are now back on the folder. I checked the drive with Avira and found some virus detections that it cured. But when connecting the drive to this other computer Avira still shows that there's Boot sector virus on drive C.

Yesterday I checked the drive with TDSSkiller and it found Rootkit.Boot.STT.a from the drive. But next it asks this "Can't cure MBR. Write standard boot mode?" I don't know if I should allow it because my XP was installed with custom made CD. My question is could it do some damage to the drive and partitions if I answer yes? I have C, D, E, & F drives and there's a lot of stuff that I need to save. Can I copy them safely to another hard disk even there's the virus?

Any help or recommendations would be appreciated. Thanks!

BC AdBot (Login to Remove)


#2 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,530 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:07:56 PM

Posted 05 August 2012 - 07:18 PM

Hello, to safely fix this you need to repost this with some other info in a new topic.
Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
Skip GMER,instead post that TDSSkiller log.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 dittohead

  • Topic Starter

  • Members
  • 4 posts
  • Local time:01:56 AM

Posted 06 August 2012 - 11:49 AM

Thanks boopme! I started new topic on that area. TDSSKiller wouldn't open on the XP on the infected drive so I added the log made through my other computer with the drive attached. DDS logs went fine though. Hope they give some answers.

#4 Queen-Evie


    Official Bleepin' G.R.I.T.S. (and proud of it)

  • Members
  • 16,485 posts
  • Gender:Female
  • Location:My own little corner of the universe (somewhere in Alabama). It's OK, they know me here
  • Local time:07:56 PM

Posted 06 August 2012 - 12:07 PM

Now that you have posted logs in Malware Removal Logs

Please refrain from asking for further help from other members or staff until the Malware Removal Team has checked your posted log. The Malware Removal Team work very hard to investigate a unique solution to your problem and you will receive individual expert assistance. This takes time and effort so we ask you to please be patient while waiting for assistance and NOT to make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member. Any modifications you make on your own can result in system changes which may not show it the log you already posted. Further, following advice outside of that post may cause confusion for the team member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

The Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean. If you followed any other advice already, please ensure you inform the Malware Removal Team Team Helper when they respond to assist you with your log. This will help them know what has been done and they probably will ask for an updated log.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Removal Team member is already assisting you and not open the thread to respond.

If HelpBot replies to your topic, please follow Step One so it will report your topic to the team members.

This topic is now closed.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users