Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

White Screen After Login


  • This topic is locked This topic is locked
10 replies to this topic

#1 Stegy

Stegy

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:09:43 PM

Posted 05 April 2013 - 01:10 PM

So, needless to say, I have a nasty piece of malware on my precious computer that is currently holding it hostage. It originally had a fake security warning telling me to pay $300 to get rid of it but I knew it was fake as soon as it popped up. It has since turned into a solid white screen, and I am unable to do anything. I can't end the process with Task Manager even if I get to it fast enough because it says "Access Denied."

 

I've been scouring the web on my good computer and I've already started the steps in getting rid of this malware but I need some extra help.

 

So far I have downloaded frst64.exe (as I have a 64bit Windows Vista system) and ran the initial scan. Right now I need to know what to type into notepad in order to have my fixlist and for someone to hold my hand and help me fix my baby! =(
 

Note: I cannot access the System Recovery section. I can hit F8 and select "Repair my Computer" but I get no other options until I reach the login, and at that point I am unable to login since it only says "User." I was able to run the frst64.exe through Safe Mode with Command Prompt.

 

frst log:

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 13-03-2013 (ATTENTION: FRST version is 23 days old)
Ran by Trunzo at 05-04-2013 13:58:04
Running from J:\
  Service Pack 2 (X64) OS Language: English(US)
Attention: Could not load system hive.
ATTENTION:=====> THE TOOL IS NOT RUN FROM RECOVERY ENVIRONMENT AND WILL NOT FUNCTION PROPERLY.


==================== One Month Created Files and Folders ========

2013-04-05 13:58 - 2013-04-05 13:58 - 00000000 ____D C:\FRST
2013-04-05 13:30 - 2013-04-05 13:52 - 00001004 ____A C:\Windows\PFRO.log
2013-04-05 13:07 - 2013-04-05 13:07 - 00000034 ____A C:\Windows\setupact.log
2013-04-05 13:07 - 2013-04-05 13:07 - 00000000 ____A C:\Windows\setuperr.log
2013-04-04 14:18 - 2013-04-04 14:18 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Curse Advertising
2013-04-03 09:21 - 2013-04-03 09:21 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2013-03-25 07:10 - 2013-03-25 07:10 - 79511552 ____A C:\Windows\System32\config\SOFTWARE.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 55853056 ____A C:\Windows\System32\config\COMPONENTS.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 00573440 ____A C:\Windows\System32\config\DEFAULT.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 00065536 ____A C:\Windows\System32\config\SAM.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 00032768 ____A C:\Windows\System32\config\SECURITY.iobit
2013-03-22 23:19 - 2013-04-02 23:03 - 00017828 ____A C:\Users\Trunzo\Documents\TombRaider.log
2013-03-21 17:05 - 2013-03-21 17:05 - 00000222 ____A C:\Users\Trunzo\Desktop\Tomb Raider.url
2013-03-18 01:42 - 2013-03-18 01:42 - 00000000 ____D C:\Program Files\SAMSUNG
2013-03-18 01:42 - 2010-04-26 22:25 - 00172104 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdmdm.sys
2013-03-18 01:42 - 2010-04-26 22:25 - 00141384 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdserd.sys
2013-03-18 01:42 - 2010-04-26 22:25 - 00136264 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdbus.sys
2013-03-18 01:42 - 2010-04-26 22:25 - 00019016 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdmdfl.sys
2013-03-18 01:42 - 2010-04-26 22:25 - 00015944 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdwhnt.sys
2013-03-18 01:42 - 2010-04-26 22:25 - 00015944 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdwh.sys
2013-03-18 01:42 - 2010-04-26 22:25 - 00015432 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdcmnt.sys
2013-03-18 01:42 - 2010-04-26 22:25 - 00015432 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdcm.sys
2013-03-18 01:41 - 2013-03-18 01:41 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Verizon
2013-03-18 01:41 - 2013-03-18 01:41 - 00000000 ____D C:\ProgramData\Samsung
2013-03-17 16:55 - 2013-03-17 16:55 - 00001069 ____A C:\Users\Public\Desktop\Uninstaller.lnk
2013-03-17 16:55 - 2013-03-17 16:55 - 00001018 ____A C:\Users\Public\Desktop\Advanced SystemCare 6.lnk
2013-03-17 16:55 - 2013-03-17 16:55 - 00000000 ____D C:\ProgramData\{CED89F1A-945F-46EC-B23C-5EAF6D2DB12A}
2013-03-17 16:36 - 2013-03-17 16:36 - 00000000 ____D C:\ProgramData\nyixl
2013-03-08 15:07 - 2013-03-11 21:09 - 00011264 ____A C:\Users\Trunzo\Documents\AdamResume.wps

==================== One Month Modified Files and Folders =======

2013-04-05 13:58 - 2013-04-05 13:58 - 00000000 ____D C:\FRST
2013-04-05 13:57 - 2006-11-02 08:46 - 00806696 ____A C:\Windows\System32\PerfStringBackup.INI
2013-04-05 13:52 - 2013-04-05 13:30 - 00001004 ____A C:\Windows\PFRO.log
2013-04-05 13:31 - 2009-09-02 08:31 - 00000288 ____A C:\Windows\Tasks\RtlNICDiagVistaStart.job
2013-04-05 13:31 - 2006-11-02 11:42 - 00032590 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-04-05 13:31 - 2006-11-02 11:42 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-04-05 13:30 - 2009-09-02 08:18 - 00000000 ____D C:\ProgramData\NVIDIA
2013-04-05 13:30 - 2006-11-02 11:22 - 00003616 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2013-04-05 13:30 - 2006-11-02 11:22 - 00003616 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2013-04-05 13:07 - 2013-04-05 13:07 - 00000034 ____A C:\Windows\setupact.log
2013-04-05 13:07 - 2013-04-05 13:07 - 00000000 ____A C:\Windows\setuperr.log
2013-04-05 07:24 - 2011-07-28 22:24 - 00000000 ____D C:\Users\Trunzo\AppData\Local\PMB Files
2013-04-05 07:24 - 2010-07-27 12:16 - 00000000 ____D C:\Users\Trunzo\AppData\Local\Deployment
2013-04-04 23:29 - 2009-09-04 11:47 - 00000000 ____D C:\users\Trunzo
2013-04-04 22:35 - 2011-07-14 12:47 - 00000912 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2761673884-2736334434-1686251276-1000UA.job
2013-04-04 20:35 - 2011-07-14 12:47 - 00000860 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2761673884-2736334434-1686251276-1000Core.job
2013-04-04 14:18 - 2013-04-04 14:18 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Curse Advertising
2013-04-04 14:18 - 2012-12-03 16:57 - 00000318 ____A C:\Users\Trunzo\Desktop\Curse Client.appref-ms
2013-04-04 13:55 - 2009-09-08 16:06 - 00000000 ____D C:\Users\Trunzo\Documents\Adam's Stuff
2013-04-04 13:14 - 2012-09-20 18:31 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service
2013-04-04 13:02 - 2011-06-18 17:54 - 00000000 ____D C:\Program Files (x86)\Steam
2013-04-04 02:20 - 2010-04-17 15:56 - 01136400 ____A C:\Windows\WindowsUpdate.log
2013-04-03 09:21 - 2013-04-03 09:21 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2013-04-02 23:03 - 2013-03-22 23:19 - 00017828 ____A C:\Users\Trunzo\Documents\TombRaider.log
2013-04-01 14:05 - 2012-09-19 21:01 - 00000408 ____A C:\Windows\Tasks\Ad-Aware Update (Weekly).job
2013-03-31 00:35 - 2011-07-14 12:48 - 00002049 ____A C:\Users\Trunzo\Desktop\Google Chrome.lnk
2013-03-25 07:10 - 2013-03-25 07:10 - 79511552 ____A C:\Windows\System32\config\SOFTWARE.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 55853056 ____A C:\Windows\System32\config\COMPONENTS.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 00573440 ____A C:\Windows\System32\config\DEFAULT.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 00065536 ____A C:\Windows\System32\config\SAM.iobit
2013-03-25 07:10 - 2013-03-25 07:10 - 00032768 ____A C:\Windows\System32\config\SECURITY.iobit
2013-03-21 17:05 - 2013-03-21 17:05 - 00000222 ____A C:\Users\Trunzo\Desktop\Tomb Raider.url
2013-03-18 01:42 - 2013-03-18 01:42 - 00000000 ____D C:\Program Files\SAMSUNG
2013-03-18 01:41 - 2013-03-18 01:41 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Verizon
2013-03-18 01:41 - 2013-03-18 01:41 - 00000000 ____D C:\ProgramData\Samsung
2013-03-17 17:12 - 2009-11-13 12:59 - 00000000 ____D C:\ProgramData\Spybot - Search & Destroy
2013-03-17 16:55 - 2013-03-17 16:55 - 00001069 ____A C:\Users\Public\Desktop\Uninstaller.lnk
2013-03-17 16:55 - 2013-03-17 16:55 - 00001018 ____A C:\Users\Public\Desktop\Advanced SystemCare 6.lnk
2013-03-17 16:55 - 2013-03-17 16:55 - 00000000 ____D C:\ProgramData\{CED89F1A-945F-46EC-B23C-5EAF6D2DB12A}
2013-03-17 16:55 - 2012-09-20 17:56 - 00000000 ____D C:\ProgramData\IObit
2013-03-17 16:55 - 2012-09-20 17:55 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\IObit
2013-03-17 16:55 - 2012-09-20 17:55 - 00000000 ____D C:\Program Files (x86)\IObit
2013-03-17 16:55 - 2010-11-18 01:47 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Apple Computer
2013-03-17 16:36 - 2013-03-17 16:36 - 00000000 ____D C:\ProgramData\nyixl
2013-03-14 12:14 - 2013-02-13 12:00 - 00000000 ____D C:\Program Files\Cryptic Studios
2013-03-14 10:04 - 2009-11-11 14:36 - 00002732 ____A C:\Users\Trunzo\AppData\Roaming\wklnhst.dat
2013-03-11 21:09 - 2013-03-08 15:07 - 00011264 ____A C:\Users\Trunzo\Documents\AdamResume.wps

ZeroAccess:
C:\Windows\assembly\GAC_32\Desktop.ini

ZeroAccess:
C:\Windows\assembly\GAC_64\Desktop.ini

ZeroAccess:
C:\$Recycle.Bin\S-1-5-21-2761673884-2736334434-1686251276-1000\$7ebe5f40e5424f16a92f7e132a9362f4

ZeroAccess:
C:\$Recycle.Bin\S-1-5-18\$7ebe5f40e5424f16a92f7e132a9362f4

==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys
[2012-12-11 20:04] - [2012-08-21 07:50] - 0267648 ____A (Microsoft Corporation) 582F710097B46140F5A89A19A6573D4B


==================== Restore Points  =========================


==================== Memory info ===========================

Percentage of memory in use: 12%
Total physical RAM: 4094.26 MB
Available physical RAM: 3581.19 MB
Total Pagefile: 8363.82 MB
Available Pagefile: 7956.23 MB
Total Virtual: 8192 MB
Available Virtual: 8191.89 MB

==================== Partitions =============================

1 Drive c: (OS) (Fixed) (Total:581.11 GB) (Free:288.21 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
2 Drive d: (RECOVERY) (Fixed) (Total:15 GB) (Free:4.18 GB) NTFS
8 Drive j: () (Removable) (Total:3.73 GB) (Free:3.68 GB) FAT32

  Disk ###  Status      Size     Free     Dyn  Gpt
  --------  ----------  -------  -------  ---  ---
  Disk 0    Online       596 GB      0 B         
  Disk 1    No Media        0 B      0 B         
  Disk 2    No Media        0 B      0 B         
  Disk 3    No Media        0 B      0 B         
  Disk 4    No Media        0 B      0 B         
  Disk 5    Online      3819 MB      0 B         

Partitions of Disk 0:
===============

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    OEM                 63 MB    32 KB
  Partition 2    Primary             15 GB    63 MB
  Partition 3    Primary            581 GB    15 GB

==================================================================================

Disk: 0
Partition 1
Type  : DE
Hidden: Yes
Active: No

There is no volume associated with this partition.

=========================================================

Disk: 0
Partition 2
Type  : 07
Hidden: No
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 1     D   RECOVERY     NTFS   Partition     15 GB  Healthy            

=========================================================

Disk: 0
Partition 3
Type  : 07
Hidden: No
Active: Yes

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 2     C   OS           NTFS   Partition    581 GB  Healthy    System (partition with boot components)  

=========================================================

Partitions of Disk 5:
===============

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary           3819 MB    16 KB

==================================================================================

Disk: 5
Partition 1
Type  : 0B
Hidden: No
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 7     J                FAT32  Removable   3819 MB  Healthy            

=========================================================
============================== MBR Partition Table ==================

==============================
Partitions of Disk 0:
===============
Disk ID: A0000000

Partition 1:
=========
Hex: 00010100DEFE3F073F000000C9F50100
Active: NO
Type: DE
Size: 63 MB

Partition 2:
=========
Hex: 0008010807FEFFFF00F801000000E001
Active: NO
Type: 07 (NTFS)
Size: 15 GB

Partition 3:
=========
Hex: 80FEFFFF07FEFFFF00F8E1010080A348
Active: YES
Type: 07 (NTFS)
Size: 581 GB

==============================
Partitions of Disk 5:
===============
Disk ID: 00000000

Partition 1:
=========
Hex: 000021000B73F3C920000000E0577700
Active: NO
Type: 0B
Size: 4 GB


Last Boot: 2013-04-04 21:02

==================== End Of Log =============================



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:43 PM

Posted 05 April 2013 - 01:17 PM


Hello

The way you ran FRST (in safe node) we don't get all the info we need so Lets try to get FRST to work this way


Download the following three programmes to your desktop :


1. WiNTBootIc

For 64bit systems
2. Windows 7 64bit RC
3. Farbar Recovery Scan Tool x64

Extract wintoboot to your desktop
Insert a USB drive of at least 1GB
Run Wintoboot

wintoboot.JPG

Drag and drop the Windows 7 ISO to the programme in the space indicated
Tick the Format box and accept the warnings
Press Do It

You will see it progressing

usb%20progress.JPG

It will let you know when it is done
Then copy FRST to the same USB

frstwintoboot.JPG


Insert the USB into the sick computer and start the computer. First ensuring that the system is set to boot from USB
Note: If you are not sure how to do that follow the instructions Here


When you reboot you will see this although yours will say windows 7.
Click repair my computer
RepairVista_7275.jpg

Select your operating system
RepairVista_7277202.jpg

Select Command prompt
RepairVista_7277.jpg

At the command prompt type the following :

notepad and press Enter.
The notepad opens. Under File menu select Open.
Select "Computer" and find your flash drive letter and close the notepad.
In the command window type e:\frst64.exe and press Enter
Note: Replace letter e with the drive letter of your flash drive.
The tool will start to run.
When the tool opens click Yes to disclaimer.
FRST%20Start%20scan.gif
Press Scan button.
It will make a log (FRST.txt) on the flash drive. Please copy and paste it to your reply.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Stegy

Stegy
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:09:43 PM

Posted 05 April 2013 - 01:22 PM

I have Windows Vista and not Windows 7. Should I still download the 2nd link you gave me?



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:43 PM

Posted 05 April 2013 - 01:47 PM

Use this one - http://www.forum.probz.net/index.php?/files/file/20-windows-vista-recovery-environment-iso/
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Stegy

Stegy
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:09:43 PM

Posted 05 April 2013 - 01:51 PM

I found that one and added it to the WinToBootic already. I added everything to my USB drive, had my computer boot from it, and got all the way to "select an operating system" before I was unable to get to the Command Prompt or any of the other options listed in the second to last image you posted. It is now currently "scanning for problems" and attempting to "repair" as I type this. At the top of the box it says, "Your computer was unable to start."



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:43 PM

Posted 05 April 2013 - 01:51 PM



Hello



Download the following three programmes to your desktop :


1. WiNTBootIc
2. Windows Vista 64bit RC
3. Farbar Recovery Scan Tool x64

Extract wintoboot to your desktop
Insert a USB drive of at least 4GB
Run Wintoboot

wintoboot.JPG

Drag and drop the Windows Vista ISO to the programme in the space indicated
Tick the Format box and accept the warnings
Press Do It

You will see it progressing

usb%20progress.JPG

It will let you know when it is done
Then copy FRST to the same USB

frstwintoboot.JPG


Insert the USB into the sick computer and start the computer. First ensuring that the system is set to boot from USB
Note: If you are not sure how to do that follow the instructions Here


When you reboot you will see this.
Click repair my computer
RepairVista_7275.jpg

Select your operating system
RepairVista_7277202.jpg

Select Command prompt
RepairVista_7277.jpg

At the command prompt type the following :

notepad and press Enter.
The notepad opens. Under File menu select Open.
Select "Computer" and find your flash drive letter and close the notepad.
In the command window type e:\frst64.exe and press Enter
Note: Replace letter e with the drive letter of your flash drive.
The tool will start to run.
When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) on the flash drive. Please copy and paste it to your reply.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Stegy

Stegy
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:09:43 PM

Posted 05 April 2013 - 02:03 PM

I have done all the steps but it still says, "Your computer was unable to start" after I select my operating system. Right now it is scanning for a problem and will prompt me to try a system restore. Should I do the system restore?



#8 Stegy

Stegy
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:09:43 PM

Posted 05 April 2013 - 02:29 PM

Okay, it worked after I allowed it to scan! Here's the frst file:

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 13-03-2013 (ATTENTION: FRST version is 23 days old)
Ran by SYSTEM at 05-04-2013 15:28:23
Running from J:\
Windows Vista ™ Home Premium  Service Pack 1 (X64) OS Language: English(US)
The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM-x32\...\Run: [avast5] "C:\Program Files\Alwil Software\Avast5\avastUI.exe" /nogui [4297136 2012-10-30] (AVAST Software)
HKLM-x32\...\Run: [amd_dc_opt] C:\Program Files (x86)\AMD\Dual-Core Optimizer\amd_dc_opt.exe [77824 2008-07-22] (AMD)
HKLM-x32\...\Run: [Monitor] "C:\Program Files (x86)\LeapFrog\LeapFrog Connect\Monitor.exe" [298376 2012-09-28] (LeapFrog Enterprises, Inc.)
HKU\RA Media Server\...\Run: [msnmsgr] "C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe" /background [3882312 2008-12-02] (Microsoft Corporation)
HKU\RA Media Server\...\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe [138240 2008-01-20] (Microsoft Corporation)
HKU\RA Media Server\...\Run: [Pando Media Booster] C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe [3093624 2013-02-12] ()
HKU\RA Media Server\...\Run: [SpybotSD TeaTimer] C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe [2260480 2009-03-05] (Safer-Networking Ltd.)
HKU\RA Media Server\...\Run: [AdobeBridge]  [x]
HKU\RA Media Server\...\Run: [WMPNSCFG] C:\Program Files (x86)\Windows Media Player\WMPNSCFG.exe [x]
HKU\RA Media Server\...\Run: [Creative WebCam Tray] "C:\Program Files (x86)\Creative\Shared Files\CamTray.exe" [x]
HKU\RA Media Server\...\Run: [Steam] "C:\Program Files (x86)\Steam\Steam.exe" -silent [1631144 2013-03-29] (Valve Corporation)
HKU\RA Media Server\...\Run: [Google Update] "C:\Users\Trunzo\AppData\Local\Google\Update\GoogleUpdate.exe" /c [136176 2011-07-14] (Google Inc.)
HKU\RA Media Server\...\Winlogon: [Shell] Explorer.exe
HKU\Trunzo\...\Run: [SansaDispatch] C:\Users\Trunzo\AppData\Roaming\SanDisk\Sansa Updater\SansaDispatch.exe [79872 2011-12-25] (SanDisk Corporation)
HKU\Trunzo\...\Run: [Actual Multiple Monitors] "C:\Program Files (x86)\Actual Multiple Monitors\ActualMultipleMonitorsCenter.exe" [1700200 2012-11-22] (Actual Tools)
HKU\Trunzo\...\Run: [Google Update] "C:\Users\Trunzo\AppData\Local\Google\Update\GoogleUpdate.exe" /c [136176 2011-07-14] (Google Inc.)
HKU\Trunzo\...\Run: [Pando Media Booster] C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe [3093624 2013-02-12] ()
HKU\Trunzo\...\Run: [Advanced SystemCare 6] "C:\Program Files (x86)\IObit\Advanced SystemCare 6\ASCTray.exe" /AutoStart [491840 2013-01-15] (IObit)
HKU\Trunzo\...\Winlogon: [Shell] C:\Users\Trunzo\AppData\Roaming\id.cff,explorer.exe
Winlogon\Notify\GoToAssist: C:\Program Files (x86)\Citrix\GoToAssist\514\G2AWinLogon_x64.dll [X]
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox]  ATTENTION! ====> ZeroAccess
Tcpip\Parameters: [DhcpNameServer] 209.18.47.61 209.18.47.62
Startup: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dell Dock First Run.lnk
ShortcutTarget: Dell Dock First Run.lnk -> C:\Program Files\Dell\DellDock\DellDock.exe (Stardock Corporation)
Startup: C:\Users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dell Dock First Run.lnk
ShortcutTarget: Dell Dock First Run.lnk -> C:\Program Files\Dell\DellDock\DellDock.exe (Stardock Corporation)
Startup: C:\Users\RA Media Server\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dell Dock First Run.lnk
ShortcutTarget: Dell Dock First Run.lnk -> C:\Program Files\Dell\DellDock\DellDock.exe (Stardock Corporation)
Startup: C:\Users\Trunzo\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CurseClientStartup.ccip ()
Startup: C:\Users\UpdatusUser\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dell Dock First Run.lnk
ShortcutTarget: Dell Dock First Run.lnk -> C:\Program Files\Dell\DellDock\DellDock.exe (Stardock Corporation)

==================== Services (Whitelisted) ===================

2 AdvancedSystemCareService6; C:\Program Files (x86)\IObit\Advanced SystemCare 6\ASCService.exe [528192 2013-02-25] (IObit)
2 Akamai; C:\program files (x86)\common files\akamai/netsession_win_ca0e279.dll [4561152 2013-03-25] (Akamai Technologies, Inc.)
2 avast! Antivirus; "C:\Program Files\Alwil Software\Avast5\AvastSvc.exe" [44808 2012-10-30] (AVAST Software)
2 MBAMScheduler; "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe" [398184 2012-12-14] (Malwarebytes Corporation)
2 MBAMService; "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe" [682344 2012-12-14] (Malwarebytes Corporation)
2 PnkBstrA; C:\Windows\SysWow64\PnkBstrA.exe [75136 2012-08-06] ()
2 SBSDWSCService; C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe [1153368 2009-01-26] (Safer Networking Ltd.)
3 WeGameClientService; C:\Program Files (x86)\WeGame\WGClientService.exe [18472 2011-07-28] (WeGame.com, Inc.)
2 pla32; C:\Windows\system32\perfctrs32.exe [x]
2 SENS32; C:\Windows\system32\odbc32gt32.exe [x]

==================== Drivers (Whitelisted) =====================

3 ActionReplayDS; C:\Windows\System32\Drivers\ActionReplayDS_x64.sys [51600 2007-02-08] (Thesycon GmbH, Germany)
2 aswFsBlk; C:\Windows\System32\Drivers\aswFsBlk.sys [25232 2012-10-30] (AVAST Software)
2 aswMonFlt; C:\Windows\System32\Drivers\aswMonFlt.sys [71600 2012-10-30] (AVAST Software)
1 aswRdr; C:\Windows\System32\Drivers\aswRdr.sys [44272 2012-10-30] (AVAST Software)
1 aswSnx; C:\Windows\System32\Drivers\aswSnx.sys [984144 2012-10-30] (AVAST Software)
1 aswSP; C:\Windows\System32\Drivers\aswSP.sys [370288 2012-10-30] (AVAST Software)
1 aswTdi; C:\Windows\System32\Drivers\aswTdi.sys [59728 2012-10-30] (AVAST Software)
3 ATITool; C:\Windows\System32\DRIVERS\ATITool64.sys [30720 2006-11-10] ()
3 FlyUsb; C:\Windows\System32\Drivers\FlyUsb.sys [24576 2007-06-18] (LeapFrog)
3 MBAMProtector; \??\C:\Windows\system32\drivers\mbam.sys [24176 2012-12-14] (Malwarebytes Corporation)
3 mfeavfk; C:\Windows\System32\Drivers\mfeavfk.sys [102472 2009-09-16] (McAfee, Inc.)
3 mfebopk; C:\Windows\System32\Drivers\mfebopk.sys [41032 2009-06-18] (McAfee, Inc.)
1 mfehidk; C:\Windows\System32\Drivers\mfehidk.sys [308296 2009-09-16] (McAfee, Inc.)
3 mferkdk; C:\Windows\System32\Drivers\mferkdk.sys [40904 2009-09-16] (McAfee, Inc.)
3 mfesmfk; C:\Windows\System32\Drivers\mfesmfk.sys [49480 2009-09-16] (McAfee, Inc.)
3 P0620VID; C:\Windows\System32\Drivers\P0620VID.sys [126848 2005-08-15] (Creative Technology Ltd.)
3 PTHSBUS; C:\Windows\System32\Drivers\PTHSBUS.sys [70928 2010-04-01] (DEVGURU Co., LTD.)
3 PTHSMDM; C:\Windows\System32\Drivers\PTHSMDM.sys [184976 2010-04-01] (DEVGURU Co., LTD.(www.devguru.co.kr))
3 PTHSVSP; C:\Windows\System32\Drivers\PTHSVSP.sys [184976 2010-04-01] (DEVGURU Co., LTD.(www.devguru.co.kr))
2 RtNdPt60; C:\Windows\System32\Drivers\RtNdPt60.sys [26624 2008-07-21] (Windows ® Codename Longhorn DDK provider)
3 sscdserd; C:\Windows\System32\Drivers\sscdserd.sys [141384 2010-04-26] (MCCI Corporation)
3 usbbus; C:\Windows\System32\DRIVERS\lgx64bus.sys [17920 2008-11-11] (LG Electronics Inc.)
3 UsbDiag; C:\Windows\System32\DRIVERS\lgx64diag.sys [27136 2008-11-11] (LG Electronics Inc.)
3 USBModem; C:\Windows\System32\DRIVERS\lgx64modem.sys [33792 2008-11-11] (LG Electronics Inc.)
3 WUSB54GSCv2.NTamd64; C:\Windows\System32\DRIVERS\WUSB54GSCV2_AMD64.sys [253944 2008-01-08] ()
3 aspnet_state;  [x]
3 IpInIp; C:\Windows\System32\DRIVERS\ipinip.sys [x]
3 Lavasoft Kernexplorer; \??\C:\Program Files (x86)\Lavasoft\Ad-Aware\KernExplorer64.sys [x]
2 McShield;  [x]
3 McSysmon;  [x]
3 NwlnkFlt; C:\Windows\System32\DRIVERS\nwlnkflt.sys [x]
3 NwlnkFwd; C:\Windows\System32\DRIVERS\nwlnkfwd.sys [x]
3 usj; \??\C:\AeriaGames\EdenEternal\avital\ussjcs64.sys [x]
3 X6va001; \??\C:\Users\Trunzo\AppData\Local\Temp\001F65B.tmp [x]

==================== NetSvcs (Whitelisted) ====================


==================== One Month Created Files and Folders ========

2013-04-05 09:58 - 2013-04-05 09:58 - 00000000 ____D C:\FRST
2013-04-05 09:30 - 2013-04-05 09:52 - 00001004 ____A C:\Windows\PFRO.log
2013-04-05 09:07 - 2013-04-05 09:07 - 00000034 ____A C:\Windows\setupact.log
2013-04-05 09:07 - 2013-04-05 09:07 - 00000000 ____A C:\Windows\setuperr.log
2013-04-04 10:18 - 2013-04-04 10:18 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Curse Advertising
2013-04-03 05:21 - 2013-04-03 05:21 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2013-03-25 03:10 - 2013-03-25 03:10 - 79511552 ____A C:\Windows\System32\config\SOFTWARE.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 55853056 ____A C:\Windows\System32\config\COMPONENTS.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 00573440 ____A C:\Windows\System32\config\DEFAULT.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 00065536 ____A C:\Windows\System32\config\SAM.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 00032768 ____A C:\Windows\System32\config\SECURITY.iobit
2013-03-22 19:19 - 2013-04-02 19:03 - 00017828 ____A C:\Users\Trunzo\Documents\TombRaider.log
2013-03-21 13:05 - 2013-03-21 13:05 - 00000222 ____A C:\Users\Trunzo\Desktop\Tomb Raider.url
2013-03-17 21:42 - 2013-03-17 21:42 - 00000000 ____D C:\Program Files\SAMSUNG
2013-03-17 21:42 - 2010-04-26 18:25 - 00172104 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdmdm.sys
2013-03-17 21:42 - 2010-04-26 18:25 - 00141384 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdserd.sys
2013-03-17 21:42 - 2010-04-26 18:25 - 00136264 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdbus.sys
2013-03-17 21:42 - 2010-04-26 18:25 - 00019016 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdmdfl.sys
2013-03-17 21:42 - 2010-04-26 18:25 - 00015944 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdwhnt.sys
2013-03-17 21:42 - 2010-04-26 18:25 - 00015944 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdwh.sys
2013-03-17 21:42 - 2010-04-26 18:25 - 00015432 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdcmnt.sys
2013-03-17 21:42 - 2010-04-26 18:25 - 00015432 ____A (MCCI Corporation) C:\Windows\System32\Drivers\sscdcm.sys
2013-03-17 21:41 - 2013-03-17 21:41 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Verizon
2013-03-17 21:41 - 2013-03-17 21:41 - 00000000 ____D C:\ProgramData\Samsung
2013-03-17 12:55 - 2013-03-17 12:55 - 00001069 ____A C:\Users\Public\Desktop\Uninstaller.lnk
2013-03-17 12:55 - 2013-03-17 12:55 - 00001018 ____A C:\Users\Public\Desktop\Advanced SystemCare 6.lnk
2013-03-17 12:55 - 2013-03-17 12:55 - 00000000 ____D C:\ProgramData\{CED89F1A-945F-46EC-B23C-5EAF6D2DB12A}
2013-03-17 12:36 - 2013-03-17 12:36 - 00000000 ____D C:\ProgramData\nyixl
2013-03-08 11:07 - 2013-03-11 17:09 - 00011264 ____A C:\Users\Trunzo\Documents\AdamResume.wps

==================== One Month Modified Files and Folders =======

2013-04-05 15:17 - 2006-11-02 05:33 - 00000000 ____D C:\Windows\PolicyDefinitions
2013-04-05 09:58 - 2013-04-05 09:58 - 00000000 ____D C:\FRST
2013-04-05 09:57 - 2006-11-02 04:46 - 00806696 ____A C:\Windows\System32\PerfStringBackup.INI
2013-04-05 09:52 - 2013-04-05 09:30 - 00001004 ____A C:\Windows\PFRO.log
2013-04-05 09:31 - 2009-09-02 04:31 - 00000288 ____A C:\Windows\Tasks\RtlNICDiagVistaStart.job
2013-04-05 09:31 - 2006-11-02 07:42 - 00032590 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-04-05 09:31 - 2006-11-02 07:42 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-04-05 09:30 - 2009-09-02 04:18 - 00000000 ____D C:\ProgramData\NVIDIA
2013-04-05 09:30 - 2006-11-02 07:22 - 00003616 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2013-04-05 09:30 - 2006-11-02 07:22 - 00003616 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2013-04-05 09:07 - 2013-04-05 09:07 - 00000034 ____A C:\Windows\setupact.log
2013-04-05 09:07 - 2013-04-05 09:07 - 00000000 ____A C:\Windows\setuperr.log
2013-04-05 03:24 - 2011-07-28 18:24 - 00000000 ____D C:\Users\Trunzo\AppData\Local\PMB Files
2013-04-05 03:24 - 2010-07-27 08:16 - 00000000 ____D C:\Users\Trunzo\AppData\Local\Deployment
2013-04-04 19:29 - 2009-09-04 07:47 - 00000000 ____D C:\users\Trunzo
2013-04-04 18:35 - 2011-07-14 08:47 - 00000912 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2761673884-2736334434-1686251276-1000UA.job
2013-04-04 16:35 - 2011-07-14 08:47 - 00000860 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2761673884-2736334434-1686251276-1000Core.job
2013-04-04 10:18 - 2013-04-04 10:18 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Curse Advertising
2013-04-04 10:18 - 2012-12-03 12:57 - 00000318 ____A C:\Users\Trunzo\Desktop\Curse Client.appref-ms
2013-04-04 09:55 - 2009-09-08 12:06 - 00000000 ____D C:\Users\Trunzo\Documents\Adam's Stuff
2013-04-04 09:14 - 2012-09-20 14:31 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service
2013-04-04 09:02 - 2011-06-18 13:54 - 00000000 ____D C:\Program Files (x86)\Steam
2013-04-03 22:20 - 2010-04-17 11:56 - 01136400 ____A C:\Windows\WindowsUpdate.log
2013-04-03 05:21 - 2013-04-03 05:21 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2013-04-02 19:03 - 2013-03-22 19:19 - 00017828 ____A C:\Users\Trunzo\Documents\TombRaider.log
2013-04-01 10:05 - 2012-09-19 17:01 - 00000408 ____A C:\Windows\Tasks\Ad-Aware Update (Weekly).job
2013-03-30 20:35 - 2011-07-14 08:48 - 00002049 ____A C:\Users\Trunzo\Desktop\Google Chrome.lnk
2013-03-25 03:10 - 2013-03-25 03:10 - 79511552 ____A C:\Windows\System32\config\SOFTWARE.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 55853056 ____A C:\Windows\System32\config\COMPONENTS.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 00573440 ____A C:\Windows\System32\config\DEFAULT.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 00065536 ____A C:\Windows\System32\config\SAM.iobit
2013-03-25 03:10 - 2013-03-25 03:10 - 00032768 ____A C:\Windows\System32\config\SECURITY.iobit
2013-03-21 13:05 - 2013-03-21 13:05 - 00000222 ____A C:\Users\Trunzo\Desktop\Tomb Raider.url
2013-03-17 21:42 - 2013-03-17 21:42 - 00000000 ____D C:\Program Files\SAMSUNG
2013-03-17 21:41 - 2013-03-17 21:41 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Verizon
2013-03-17 21:41 - 2013-03-17 21:41 - 00000000 ____D C:\ProgramData\Samsung
2013-03-17 13:12 - 2009-11-13 08:59 - 00000000 ____D C:\ProgramData\Spybot - Search & Destroy
2013-03-17 12:55 - 2013-03-17 12:55 - 00001069 ____A C:\Users\Public\Desktop\Uninstaller.lnk
2013-03-17 12:55 - 2013-03-17 12:55 - 00001018 ____A C:\Users\Public\Desktop\Advanced SystemCare 6.lnk
2013-03-17 12:55 - 2013-03-17 12:55 - 00000000 ____D C:\ProgramData\{CED89F1A-945F-46EC-B23C-5EAF6D2DB12A}
2013-03-17 12:55 - 2012-09-20 13:56 - 00000000 ____D C:\ProgramData\IObit
2013-03-17 12:55 - 2012-09-20 13:55 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\IObit
2013-03-17 12:55 - 2012-09-20 13:55 - 00000000 ____D C:\Program Files (x86)\IObit
2013-03-17 12:55 - 2010-11-17 21:47 - 00000000 ____D C:\Users\Trunzo\AppData\Roaming\Apple Computer
2013-03-17 12:36 - 2013-03-17 12:36 - 00000000 ____D C:\ProgramData\nyixl
2013-03-14 08:14 - 2013-02-13 08:00 - 00000000 ____D C:\Program Files\Cryptic Studios
2013-03-14 06:04 - 2009-11-11 10:36 - 00002732 ____A C:\Users\Trunzo\AppData\Roaming\wklnhst.dat
2013-03-11 17:09 - 2013-03-08 11:07 - 00011264 ____A C:\Users\Trunzo\Documents\AdamResume.wps


ZeroAccess:
C:\Windows\assembly\GAC_32\Desktop.ini

ZeroAccess:
C:\Windows\assembly\GAC_64\Desktop.ini

ZeroAccess:
C:\$Recycle.Bin\S-1-5-21-2761673884-2736334434-1686251276-1000\$7ebe5f40e5424f16a92f7e132a9362f4

ZeroAccess:
C:\$Recycle.Bin\S-1-5-18\$7ebe5f40e5424f16a92f7e132a9362f4

==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys
[2012-12-11 16:04] - [2012-08-21 03:50] - 0267648 ____A (Microsoft Corporation) 582F710097B46140F5A89A19A6573D4B


==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================

Restore point made on: 2013-03-15 20:25:23
Restore point made on: 2013-03-16 20:48:18
Restore point made on: 2013-03-17 21:31:03
Restore point made on: 2013-03-17 21:42:13
Restore point made on: 2013-03-17 21:43:07
Restore point made on: 2013-03-17 21:44:03
Restore point made on: 2013-03-17 21:45:00
Restore point made on: 2013-03-17 21:45:51
Restore point made on: 2013-03-17 21:46:51
Restore point made on: 2013-03-17 21:47:54
Restore point made on: 2013-03-17 21:48:51
Restore point made on: 2013-03-17 21:49:59
Restore point made on: 2013-03-17 21:51:00
Restore point made on: 2013-03-17 21:52:11
Restore point made on: 2013-03-18 20:00:13
Restore point made on: 2013-03-19 22:45:18
Restore point made on: 2013-03-21 19:09:01
Restore point made on: 2013-03-22 19:19:32
Restore point made on: 2013-03-23 20:00:29
Restore point made on: 2013-03-24 20:00:18
Restore point made on: 2013-03-25 15:45:46
Restore point made on: 2013-03-26 20:31:22
Restore point made on: 2013-03-27 20:23:20
Restore point made on: 2013-03-28 20:00:20
Restore point made on: 2013-03-30 10:54:14
Restore point made on: 2013-03-31 20:17:14
Restore point made on: 2013-04-01 20:00:18
Restore point made on: 2013-04-02 22:26:16
Restore point made on: 2013-04-03 20:31:29
Restore point made on: 2013-04-04 12:30:36

==================== Memory info ===========================

Percentage of memory in use: 14%
Total physical RAM: 4094.26 MB
Available physical RAM: 3494.88 MB
Total Pagefile: 3824.19 MB
Available Pagefile: 3467.35 MB
Total Virtual: 8192 MB
Available Virtual: 8191.91 MB

==================== Partitions =============================

1 Drive c: (OS) (Fixed) (Total:581.11 GB) (Free:286.83 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
2 Drive d: (RECOVERY) (Fixed) (Total:15 GB) (Free:4.18 GB) NTFS
8 Drive j: () (Removable) (Total:3.73 GB) (Free:3.54 GB) NTFS
9 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS

  Disk ###  Status      Size     Free     Dyn  Gpt
  --------  ----------  -------  -------  ---  ---
  Disk 0    Online       596 GB      0 B         
  Disk 1    No Media        0 B      0 B         
  Disk 2    No Media        0 B      0 B         
  Disk 3    No Media        0 B      0 B         
  Disk 4    No Media        0 B      0 B         
  Disk 5    Online      3819 MB      0 B         

Partitions of Disk 0:
===============

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    OEM                 63 MB    32 KB
  Partition 2    Primary             15 GB    63 MB
  Partition 3    Primary            581 GB    15 GB

==================================================================================

Disk: 0
Partition 1
Type  : DE
Hidden: Yes
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 8                      FAT    Partition     63 MB  Healthy    Hidden  

=========================================================

Disk: 0
Partition 2
Type  : 07
Hidden: No
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 1     D   RECOVERY     NTFS   Partition     15 GB  Healthy            

=========================================================

Disk: 0
Partition 3
Type  : 07
Hidden: No
Active: Yes

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 2     C   OS           NTFS   Partition    581 GB  Healthy            

=========================================================

Partitions of Disk 5:
===============

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary           3819 MB    16 KB

==================================================================================

Disk: 5
Partition 1
Type  : 07
Hidden: No
Active: Yes

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 7     J                NTFS   Removable   3819 MB  Healthy            

=========================================================
============================== MBR Partition Table ==================

==============================
Partitions of Disk 0:
===============
Disk ID: A0000000

Partition 1:
=========
Hex: 00010100DEFE3F073F000000C9F50100
Active: NO
Type: DE
Size: 63 MB

Partition 2:
=========
Hex: 0008010807FEFFFF00F801000000E001
Active: NO
Type: 07 (NTFS)
Size: 15 GB

Partition 3:
=========
Hex: 80FEFFFF07FEFFFF00F8E1010080A348
Active: YES
Type: 07 (NTFS)
Size: 581 GB

==============================
Partitions of Disk 5:
===============
Disk ID: 00000000

Partition 1:
=========
Hex: 8000210007FE7FE520000000E0577700
Active: YES
Type: 07 (NTFS)
Size: 4 GB


Last Boot: 2013-04-04 17:02

==================== End Of Log =============================



#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:43 PM

Posted 05 April 2013 - 04:44 PM



Hello Stegy



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt
 
HKU\Trunzo\...\Winlogon: [Shell] C:\Users\Trunzo\AppData\Roaming\id.cff,explorer.exe
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox]  ATTENTION! ====> ZeroAccess
C:\Windows\assembly\GAC_32\Desktop.ini
C:\Windows\assembly\GAC_64\Desktop.ini
C:\$Recycle.Bin\S-1-5-21-2761673884-2736334434-1686251276-1000\$7ebe5f40e5424f16a92f7e132a9362f4
C:\$Recycle.Bin\S-1-5-18\$7ebe5f40e5424f16a92f7e132a9362f4
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:43 PM

Posted 10 April 2013 - 01:05 PM



Hello

48 Hour bump

It has been more than 48 hours since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

  • Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:43 PM

Posted 14 April 2013 - 09:41 PM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users