{"id":81,"date":"2011-10-16T03:47:57","date_gmt":"2011-10-16T03:47:57","guid":{"rendered":"http:\/\/triplescomputers.com\/blog\/?p=81"},"modified":"2013-06-30T11:24:47","modified_gmt":"2013-06-30T16:24:47","slug":"stop-error-0x0000007b-0xfffff880009a98e8-0xffffffffc000000d-0x0000000000000000-0x0000000000000000","status":"publish","type":"post","link":"http:\/\/triplescomputers.com\/blog\/casestudies\/stop-error-0x0000007b-0xfffff880009a98e8-0xffffffffc000000d-0x0000000000000000-0x0000000000000000\/","title":{"rendered":"Solution: STOP Error 0x0000007b (0xfffff880009a98e8 0xffffffffc000000d 0x0000000000000000&#8230;)"},"content":{"rendered":"<p>Hoo boy, this one&#8217;s a doozy.<\/p>\n<p>So following the removal of certain rootkits (such as Rootkit.Boot.SST.a, which is associated with the Windows Recovery rogue), you may find that your Windows boot configuration data has been totally corrupted. Worse yet, the usual steps to remedy (such as those described in my earlier post about TDL4 and the resulting blue screen) all fall apart when you reach the <strong>bootrec \/RebuildBCD<\/strong> command, which returns the message:<\/p>\n<blockquote><p>Total identified\u00a0Windows installations:\u00a00<\/p><\/blockquote>\n<p><em><\/em>Geez. \u00a0This essentially means that the bootrec command cannot identify your Windows installation, even though the Windows Recovery Environment has no trouble doing so upon starting. \u00a0So, now what?<\/p>\n<p>Sometimes it&#8217;s as simple as opening up your favorite disk partitioning software and marking the C: partition as ACTIVE, and if there are still problems, subsequently recovering the boot data as I mentioned in <a title=\"TDL4 Removal \" href=\"http:\/\/triplescomputers.com\/blog\/?p=52\">the TDL4 post<\/a> (keep in mind however that the System Managed partition is typically Active normally on a Windows 7 system thanks to the isolated boot partition that it uses). \u00a0This problem occurs because of some modern rootkits which create a hidden, encrypted partition at the end of the system drive and mark it as Active and Primary (while simultaneously marking the standard boot partition as Inactive). \u00a0This infection has been covered in <a title=\"\u201cSafeBoot is corrupted (92h)\u201d when McAfee Endpoint Encryption is installed\" href=\"http:\/\/triplescomputers.com\/blog\/casestudies\/safeboot-is-corrupted-92h-when-mcafee-endpoint-encryption-is-installed\/\">other recent blog posts<\/a> as well.<\/p>\n<p>Sometimes, however, the BCD is totally corrupted and this doesn&#8217;t even work. \u00a0At this point, most every source on the internet comes up a dead end. \u00a0Everyone ends up reformatting or reinstalling Windows overtop their existing partition; nothing else seems to work.<\/p>\n<p>You might not think it&#8217;d be helpful, but there&#8217;s an intimidating post over at <a title=\"NeoSmart\" href=\"http:\/\/neosmart.net\/wiki\/display\/EBCD\/Recovering+the+Vista+Bootloader+from+the+DVD\">the EasyBCD NeoSmart site<\/a>\u00a0which explains how to manually rebuild the <em>Vista <\/em>bootloader from the ground up in catastrophic situations. \u00a0As it turns out, this procedure applies to Windows 7 as well (which uses the same bootloader and BCD structure), and it&#8217;s the key to your recovery here.<\/p>\n<p>It&#8217;s no easy feat however, so roll up your sleeves and get ready to do some typing. \u00a0Here&#8217;s the full procedure from start to finish:<\/p>\n<ol>\n<li>Boot to the Windows Recovery Environment either by selecting Repair Your Computer when Windows fails to boot, by inserting the Windows installation disc, or by using a Windows ERD\/MS DART disc (if you happen to have access to one, that is).<\/li>\n<li>Cancel the recovery attempt if it tries to start on its own (it will fail anyway) and then choose the advanced options link at the bottom of the window.<\/li>\n<li>Choose to open the Command Prompt.<\/li>\n<li>Here&#8217;s the fun part. \u00a0Once at the prompt, enter the following commands one by one. \u00a0<em>Take care not to mistype anything, and be sure to replace C: with whatever your system drive happens to be<\/em>:<\/li>\n<\/ol>\n<blockquote><p>bootrec.exe \/fixmbr<br \/>\nbootsect.exe \/nt60 all \/force<br \/>\nbcdedit \/export C:\\BCD_Backup<br \/>\nattrib -h -s C:\\boot\\BCD<br \/>\nren C:\\boot\\BCD BCD.old<br \/>\nbcdedit \/createstore c:\\boot\\bcd.temp<br \/>\nbcdedit.exe \/store c:\\boot\\bcd.temp \/create {bootmgr} \/d &#8220;Windows Boot Manager&#8221;<br \/>\nbcdedit.exe \/import c:\\boot\\bcd.temp<br \/>\nbcdedit.exe \/set {bootmgr} device partition=C:<br \/>\nbcdedit.exe \/timeout 10<br \/>\nattrib -h -s C:\\boot\\bcd.temp<br \/>\ndel c:\\boot\\bcd.temp<br \/>\nbcdedit.exe \/create \/d &#8220;Windows 7&#8221; \/application osloader<\/p><\/blockquote>\n<p>At this point, note the value within the curly braces <strong>{&#8230;&#8230;..} <\/strong>as you will need it during the next steps. \u00a0<strong>Replace the dots within the curly braces below with that entire string on each line. \u00a0<\/strong><em>NOTE: \u00a0To make this easier, once you type it once, you can press the Up arrow to restore the last command and simply edit that line for the next one.<\/em><\/p>\n<blockquote><p>bcdedit.exe \/set {&#8230;..} device partition=C:<br \/>\nbcdedit.exe \/set {&#8230;..} osdevice partition=C:<br \/>\nbcdedit.exe \/set {&#8230;..} path \\Windows\\system32\\winload.exe<br \/>\nbcdedit.exe \/set {&#8230;..} systemroot \\Windows<br \/>\nbcdedit.exe \/displayorder {&#8230;..}<br \/>\nbcdedit.exe \/default {&#8230;..}<br \/>\nbcdedit.exe \/set {&#8230;..} locale en-US<\/p><\/blockquote>\n<p><em>Thanks to\u00a0Bitt Faulk for the final line, which restores the correct Windows loading screen as well. \u00a0You will need to replace the en-US entry with something different representing your region if you are not in the US.<\/em><\/p>\n<p>Then you&#8217;re back in Windows, miraculously. \u00a0No reinstall necessary!<\/p>\n<p>Side effects? \u00a0A little. \u00a0Hopefully you can handle not having the nifty new Windows 7 startup animation screen, because this will lose it for you. \u00a0Instead, you&#8217;ll be stuck with the old-school plain Jane Windows Vista progress bar. \u00a0You&#8217;ll also lose any special boot options you had previously. \u00a0But as a last resort, this works, and it&#8217;s still just as quick as ever.<\/p>\n<p>Apart from that, once you&#8217;re back in Windows, of course, you&#8217;ll still have to disinfect the rest of the way. \u00a0In my customer&#8217;s case, the system damage was actually so bad that I ended up performing an in-place upgrade (the Vista\/7 equivalent of a Repair Install), but after that, everything was great. \u00a0It was a triumph for sure, and yet another situation where the usual solution of reformat\/reinstall was not necessary. \u00a0Now you know how to avoid it!<\/p>\n<p>I hope you&#8217;ve found this post useful&#8211;if so, please take a moment to leave me a comment!<\/p>\n<p><em>If you need computer help in the Louisville, KY area, there&#8217;s simply no one better. \u00a0Give me a call today!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hoo boy, this one&#8217;s a doozy. So following the removal of certain rootkits (such as Rootkit.Boot.SST.a, which is associated with the Windows Recovery rogue), you may find that your Windows boot configuration data has been totally corrupted. Worse yet, the &hellip; <a href=\"http:\/\/triplescomputers.com\/blog\/casestudies\/stop-error-0x0000007b-0xfffff880009a98e8-0xffffffffc000000d-0x0000000000000000-0x0000000000000000\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[64,63,9,62,11,32,26],"class_list":["post-81","post","type-post","status-publish","format-standard","hentry","category-casestudies","category-security","tag-bcd","tag-bcdedit","tag-boot-problems","tag-bootkit","tag-malware","tag-rootkit","tag-stop-error"],"_links":{"self":[{"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":0,"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts\/81\/revisions"}],"wp:attachment":[{"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/media?parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/categories?post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/tags?post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}