CLOSED Rootkit.MBR.Vrabber.A (Boot image) (B)

Recommended Posts

Hello Guys,

I just runt EMISOFT Emergency Kit and I have been alert on this virus in this directory :


The message said that the sofware is not allowed to clean it to avoid destruction of the system Win. Can you help me to clean this signature ?

Thank you for your answers


Share this post

Link to post
Share on other sites

Hello Dominique ,

Welcome to the Emsisoft Support Forums. My name is Kevin, and I will be helping you with fixing your problems.

All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below:

NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed.

The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available.

Take note of some guidelines for this support request:

  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Furthermore, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean." We do not want to clean you part-way, only to have the system re-infect itself.
  • Do not start a new topic.
  • The logs that you post should be attached to the reply.
  • Set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.

Download to your Desktop:

Emsisoft Emergency Kit
Farbar Recovery Scan Tool

NOTE: You need to run the version compatible with your system, if you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive.

All scans are to be run in Normal Mode. Do not run anything in "Safe Mode," unless you are instructed to do so by the Malware Removal Specialist handling your case.

Do not force Safe Mode. Instructions on How to Boot to "Safe Mode" can be found at: http://www.malwarete...kb/SafeMode.php

Let's get started:

  1. Install and Run Emsisoft Emergency Kit (EEK):
    • Double click EmergencyKitScanner.exe to install EEK
    • When the installation of EEK is complete the Emergency Kit Scanner will run.
      NOTE: Make sure to enable PUPs detection.
    • Click "Yes" to Update Emsisoft Emergency Kit
    • Under "Scan" click-on "Malware Scan".
      IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted.
    • Save the scan log somewhere that you can find it.
    • Exit Emsisoft Emergency Kit.
  2. Run Farbar Recovery Scan Tool (FRST):
    • Double-click to run it. When the tool opens click Yes to the disclaimer.
    • Press Scan button.
    • Farbar Recovery Scan Tool will produce the following logs:
    • FRST.txt
    • Addition.txt
  3. Create a new topic in our Help, my PC is infected! forum and attach the following logs to your post:
    • Emsisoft Emergency Kit log (C:\EEK\Reports\)
    • FRST.txt
    • Addition.txt

    (NOTE: if you need to attach the logs to a reply to an existing topic, then you will need to use the More Reply Options button to the lower-right of where you type in your reply in order to see the controls for attaching files)

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

Share this post

Link to post
Share on other sites


Is this correct?

Disk: 3 (MBR Code: Windows 7/8/10) (Size: 1863 GB) (Disk ID: CE5FC4D4)
Partition 1: (Not Active) - (Size=1863 GB) - (Type=07 NTFS)

If so, the partition is not active. Which drive is that?

That appears to be the drive the scan is detecting.


Share this post

Link to post
Share on other sites

Hello Kevin,

You're right the was a disk not link but now  I think it is ok. But my machine is very slow. It looks that Kaspersky cleaner cleaned the rootkit but nothing really better. What do you want me to do ?

Share this post

Link to post
Share on other sites


Run a fresh scan with FRST. Make sure that  Additions.txt is selected to be produced.  Attach the new FRST scan reports to your reply.

Share this post

Link to post
Share on other sites


Something is wrong with this drive:

Disk: 3 (MBR Code: Windows 7/8/10) (Size: 1863 GB) (Disk ID: CE5FC4D4)
Partition 1: (Not Active) - (Size=1863 GB) - (Type=07 NTFS)
Attempted reading MBR returned 0 bytes.
 Could not read MBR for disk 4.

The MBR is unreadable.

Share this post

Link to post
Share on other sites

The MBR for each disk appears to be valid.

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

HKLM-x32\...\Run: [] => [X]
HKU\S-1-5-21-3493600282-2420636565-4097935214-1000\...\MountPoints2: {35abdf51-3e20-11e5-b53d-806e6f6e6963} - E:\CheckID.exe
HKU\S-1-5-21-3493600282-2420636565-4097935214-1000\...\MountPoints2: {66a241fa-3e7d-11e5-b4c8-806e6f6e6963} - H:\AutoRun.exe
HKU\S-1-5-21-3493600282-2420636565-4097935214-1004\...\MountPoints2: {d39accc6-3e1c-11e5-9451-3860770e2afc} - H:\dvdcheck.exe
HKU\S-1-5-21-3493600282-2420636565-4097935214-1004\...\MountPoints2: {d39accd4-3e1c-11e5-9451-3860770e2afc} - K:\dvdcheck.exe
HKU\S-1-5-21-3493600282-2420636565-4097935214-1004\...\MountPoints2: {ef3caf63-674d-11e5-a5f8-3860770e2afc} - J:\AutoRun.exe
HKU\S-1-5-21-3493600282-2420636565-4097935214-1004\...\MountPoints2: {ef3caf75-674d-11e5-a5f8-3860770e2afc} - J:\AutoRun.exe
FF Plugin: -> disabled [No File]
FF Plugin-x32: -> disabled [No File]
2016-10-31 19:16 - 2016-10-31 19:16 - 000000604 ____H () C:\Program Files (x86)\_43_S
Task: {A598C31C-912D-4D5E-8014-8CCA3A9F7BD9} - System32\Tasks\{AFD0307A-F33A-4B70-B4DD-1AA541570704} => C:\Windows\system32\pcalua.exe -a H:\AutoRun.exe -d H:\
Task: {D8745799-E9AF-4ED9-A9CB-481F0D09B014} - System32\Tasks\{9F666911-20C3-4D5A-861B-4816C7CE48AC} => C:\Windows\system32\pcalua.exe -a "C:\Users\Uranusdpj\AppData\Local\Temp\\Install FSUIPC4.exe" <==== ATTENTION
Task: {FA67F43E-E0C8-4B66-BA6D-E637CCF82426} - System32\Tasks\{297AA92A-4859-418B-A9EB-6ADD7D3C5508} => C:\Windows\system32\pcalua.exe -a "C:\Program Files (x86)\InstallShield Installation Information\{C0E7FAD8-F8AE-4819-AEBF-D92562315EEE}\setup.exe" -c -runfromtemp -l0x0009 -uninst -removeonly
2018-03-07 18:17 - 2018-03-07 18:17 - 000402944 _____ () \\?\C:\Users\Uranusdpj\AppData\Local\Temp\D8B2.tmp.node
2018-03-07 18:24 - 2018-03-07 18:24 - 000402944 _____ () \\?\C:\Users\Uranusdpj\AppData\Local\Temp\2A89.tmp.node
FirewallRules: [TCP Query User{37EB7F2E-6ED2-44BC-A7BD-245C77243B76}C:\program files (x86)\searchtool\ëñë÷¹¤¾ß.exe] => (Allow) C:\program files (x86)\searchtool\ëñë÷¹¤¾ß.exe
FirewallRules: [UDP Query User{45EBA896-F047-44AE-920E-8C16111FD63E}C:\program files (x86)\searchtool\ëñë÷¹¤¾ß.exe] => (Allow) C:\program files (x86)\searchtool\ëñë÷¹¤¾ß.exe

Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Share this post

Link to post
Share on other sites

This Disk is a datas disk That run very good. I did a check disk earlier of all my Disks and I didn't have any pb. This is not the C:\ Disk and not the cause of my slow speed. when I run Marlwarebyte I have every time PUM and PUP signatures. Also regular PUP with AdwCleaner or Roguekiller. I just run a check disk again of the disk 3


Share this post

Link to post
Share on other sites


Export RogueKiller scan reports to plain text files.

You have PUP detection enabled.  So, if we are not detecting it then we either do not have signatures for the PUP or do not consider it a PUP.  When you get a PUP we do not detect, do not delete it.  Send me the logs showing the detection and the EAM scan report showing that it was not detected.  Also send me the installer or browser extension that was responsible for installing the PUP.

How are things running?

Share this post

Link to post
Share on other sites
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.