Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Laptop boots to flashing cursor line


  • This topic is locked This topic is locked
32 replies to this topic

#1 CacsTech

CacsTech

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 12:43 PM

Hello,

 

This is my first time posting on here, so if there is a certain way to post on here that I don't do, I'm sorry about not doing that.

 

My friend's laptop (HP Pavilion dv6-2157wm) does not boot correctly into Windows 7. It first shows the HP logo, then it shows a blinking line cursor that is placed in the top middle of the screen.  My friend said that it could be a virus, so the very first thing I did, was use the Kaspersky Rescue Disk 10 to find and remove the virus(es).  Kaspersky did find several viruses, so I deleted all of them.  I tried booting the laptop again, but it still boots to that cursor.

 

I tried getting a DDS and FRST log for this laptop. Since the laptop doesn't boot properly, I tried running these programs off a flash drive by using command prompt from a Windows 7 Installation disk.  I could only get FRST to run.

 

FRST LOG:

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 11-05-2013 01
Ran by SYSTEM on 12-05-2013 13:04:23
Running from G:\
Windows 7 Home Premium (X64) OS Language: English(US)
Internet Explorer Version 9
Boot Mode: Recovery
The current controlset is ControlSet001
ATTENTION!:=====> FRST is updated to run from normal or Safe mode to produce a full FRST.txt log and an extra Addition.txt log.
 
==================== Registry (Whitelisted) ==================
 
HKLM\...\Run: [SynTPEnh] %ProgramFiles%\Synaptics\SynTP\SynTPEnh.exe [2096424 2010-05-27] (Synaptics Incorporated)
HKLM\...\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" [171520 2010-01-09] (Sun Microsystems, Inc.)
HKLM\...\Run: [SysTrayApp] C:\Program Files\IDT\WDM\sttray64.exe [487424 2010-06-18] (IDT, Inc.)
HKLM\...\Run: [MSC] "c:\Program Files\Microsoft Security Client\mssecex.exe" -hide -runkey [x]
HKLM\...\RunOnce: [*Restore] C:\Windows\system32\rstrui.exe /RUNONCE [296960 2010-11-20] (Microsoft Corporation)
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox]  ATTENTION! ====> ZeroAccess
HKLM-x32\...\Run: [HPCam_Menu] "c:\Program Files (x86)\Hewlett-Packard\Media\Webcam\MUITransfer\MUIStartMenu.exe" "c:\Program Files (x86)\Hewlett-Packard\Media\Webcam" UpdateWithCreateOnce "Software\Hewlett-Packard\Media\Webcam" [222504 2009-05-19] (CyberLink Corp.)
HKLM-x32\...\Run: [QlbCtrl.exe] C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start [323640 2010-02-25] ( Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [Microsoft Default Manager] "C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" -resume [439568 2010-05-10] (Microsoft Corporation)
HKLM-x32\...\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59720 2013-01-28] (Apple Inc.)
HKLM-x32\...\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime [421888 2012-10-24] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe" [152392 2013-02-20] (Apple Inc.)
HKLM-x32\...\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [252848 2012-07-03] (Sun Microsystems, Inc.)
HKU\Heaman\...\Run: [Pando Media Booster] C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe [4288048 2013-04-02] ()
HKU\Heaman\...\Run: [Internet Security] C:\ProgramData\amsecure.exe [831488 2013-05-04] (Apple Computer, Inc.)
 
==================== Services (Whitelisted) =================
 
S2 AESTFilters; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_70dacb64382a61a7\AESTSr64.exe [89600 2010-06-18] (Andrea Electronics Corporation)
S2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22072 2012-09-12] (Microsoft Corporation)
S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [368896 2012-09-12] (Microsoft Corporation)
S2 NOBU; C:\Program Files (x86)\Symantec\Norton Online Backup\NOBuAgent.exe [2804568 2010-06-08] (Symantec Corporation)
S3 npggsvc; C:\Windows\SysWow64\GameMon.des [3966416 2010-10-20] (INCA Internet Co., Ltd.)
S2 STacSV; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_70dacb64382a61a7\STacSV64.exe [247808 2010-06-18] (IDT, Inc.)
 
==================== Drivers (Whitelisted) ====================
 
S0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [228768 2012-08-30] (Microsoft Corporation)
S1 MpKsl6b2e3e78; c:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{C97C70FD-AD24-44ED-B413-126FD6082C61}\MpKsl6b2e3e78.sys [35664 2013-05-04] (Microsoft Corporation)
S1 MpKsld5035ac2; c:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{C97C70FD-AD24-44ED-B413-126FD6082C61}\MpKsld5035ac2.sys [35664 2013-05-04] (Microsoft Corporation)
S2 NisDrv; C:\Windows\System32\DRIVERS\NisDrvWFP.sys [128456 2012-08-30] (Microsoft Corporation)
S3 NPPTNT2; C:\Windows\SysWow64\npptNT2.sys [4682 2005-01-02] (INCA Internet Co., Ltd.)
S0 AFS; No ImagePath
S3 dump_wmimmc; \??\C:\ijji\ENGLISH\u_sf\GameGuard\dump_wmimmc.sys [x]
S4 eabfiltr; 
S3 RSUSBSTOR; System32\Drivers\RtsUStor.sys [x]
 
==================== NetSvcs (Whitelisted) ===================
 
 
==================== One Month Created Files and Folders ========
 
2013-05-12 13:04 - 2013-05-12 13:04 - 00000000 ____D C:\FRST
2013-05-11 11:06 - 2013-05-12 04:48 - 00000000 ___AD C:\Kaspersky Rescue Disk 10.0
2013-05-04 23:01 - 2013-05-04 23:01 - 00000000 ____D C:\c274401de9f300973b263c
2013-05-04 22:51 - 2013-05-04 22:51 - 00277664 ____A C:\Windows\Minidump\050513-52806-01.dmp
2013-05-04 22:42 - 2013-05-04 22:42 - 00831488 ____A (Apple Computer, Inc.) C:\ProgramData\amsecure.exe
2013-05-04 22:42 - 2013-05-04 22:42 - 00000643 ____A C:\Users\Public\Desktop\Internet Security 2013.lnk
2013-04-27 01:43 - 2013-04-27 01:44 - 00000000 ____D C:\7543e88d8f0e005a56094d1acb4f
2013-04-23 15:17 - 2013-04-12 06:45 - 01656680 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\ntfs.sys
 
==================== One Month Modified Files and Folders =======
 
2013-05-12 13:04 - 2013-05-12 13:04 - 00000000 ____D C:\FRST
2013-05-12 04:48 - 2013-05-11 11:06 - 00000000 ___AD C:\Kaspersky Rescue Disk 10.0
2013-05-12 04:18 - 2010-03-11 20:10 - 00000000 ____D C:\users\Heaman
2013-05-12 03:46 - 2013-04-02 22:35 - 00000000 ____D C:\ProgramData\PMB Files
2013-05-12 03:46 - 2012-10-21 19:03 - 00000000 ____D C:\Windows\Minidump
2013-05-12 03:46 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-05-12 03:46 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\AppCompat
2013-05-12 01:37 - 2010-03-11 21:30 - 00000000 ____D C:\ProgramData\Recovery
2013-05-05 19:15 - 2013-04-02 22:36 - 00000000 ____D C:\Users\Heaman\AppData\Local\PMB Files
2013-05-04 23:01 - 2013-05-04 23:01 - 00000000 ____D C:\c274401de9f300973b263c
2013-05-04 23:00 - 2010-02-06 01:22 - 01093122 ____A C:\Windows\WindowsUpdate.log
2013-05-04 22:59 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-05-04 22:59 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-05-04 22:51 - 2013-05-04 22:51 - 00277664 ____A C:\Windows\Minidump\050513-52806-01.dmp
2013-05-04 22:51 - 2013-04-05 05:49 - 546786152 ____A C:\Windows\MEMORY.DMP
2013-05-04 22:51 - 2013-04-03 07:57 - 00005544 ____A C:\Windows\setupact.log
2013-05-04 22:51 - 2011-02-10 16:57 - 00000406 ____A C:\Windows\Tasks\FileCure Startup.job
2013-05-04 22:51 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-05-04 22:49 - 2012-08-16 12:01 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-05-04 22:42 - 2013-05-04 22:42 - 00831488 ____A (Apple Computer, Inc.) C:\ProgramData\amsecure.exe
2013-05-04 22:42 - 2013-05-04 22:42 - 00000643 ____A C:\Users\Public\Desktop\Internet Security 2013.lnk
2013-05-03 20:21 - 2012-08-18 18:13 - 00002113 ____A C:\Windows\epplauncher.mif
2013-05-03 15:37 - 2011-10-28 15:18 - 00000000 ____A C:\Windows\System32\HP_ActiveX_Patch_NOT_DETECTED.txt
2013-05-03 15:37 - 2010-04-02 16:00 - 00000052 ____A C:\Windows\SysWOW64\DOErrors.log
2013-05-02 07:29 - 2010-11-05 15:17 - 00278800 ____A (Microsoft Corporation) C:\Windows\System32\MpSigStub.exe
2013-05-01 16:55 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\NDF
2013-04-28 18:46 - 2011-08-31 17:48 - 00000404 ___AH C:\Windows\Tasks\Norton Security Scan for Heaman.job
2013-04-27 01:44 - 2013-04-27 01:43 - 00000000 ____D C:\7543e88d8f0e005a56094d1acb4f
2013-04-25 17:24 - 2011-02-20 20:42 - 00000000 ____D C:\Users\Heaman\AppData\Roaming\.minecraft
2013-04-21 19:07 - 2009-07-13 21:13 - 00739736 ____A C:\Windows\System32\PerfStringBackup.INI
2013-04-20 06:43 - 2011-02-10 16:57 - 00000390 ____A C:\Windows\Tasks\FileCure Default.job
2013-04-12 15:38 - 2012-08-16 12:01 - 00691592 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-04-12 15:38 - 2011-05-27 11:27 - 00071048 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2013-04-12 15:38 - 2010-01-09 16:40 - 00000000 ____D C:\ProgramData\Adobe
2013-04-12 06:45 - 2013-04-23 15:17 - 01656680 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\ntfs.sys
 
ZeroAccess:
C:\$Recycle.Bin\S-1-5-18\$a8f77fd530cebc82186cdb75047d5c2a
 
Other Malware:
===========
C:\Windows\svchost.exe
ATTENTION ====> Check for partition/boot infection.C:\ProgramData\amsecure.exe
 
==================== Known DLLs (Whitelisted) ================
 
 
==================== Bamital & volsnap Check =================
 
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
 
TDL4: custom:26000022 <===== ATTENTION!
 
==================== EXE ASSOCIATION =====================
 
HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK
 
==================== Restore Points  =========================
 
Restore point made on: 2013-05-03 20:20:14
Restore point made on: 2013-05-04 23:00:55
 
==================== Memory info =========================== 
 
Percentage of memory in use: 16%
Total physical RAM: 3894.87 MB
Available physical RAM: 3262.48 MB
Total Pagefile: 3893.02 MB
Available Pagefile: 3260.95 MB
Total Virtual: 8192 MB
Available Virtual: 8191.88 MB
 
==================== Drives ================================
 
Drive c: () (Fixed) (Total:284.67 GB) (Free:155.45 GB) NTFS (Disk=0 Partition=2) ==>[System with boot components (obtained from reading drive)]
Drive e: (RECOVERY) (Fixed) (Total:13.13 GB) (Free:2.18 GB) NTFS (Disk=0 Partition=3) ==>[System with boot components (obtained from reading drive)]
Drive f: (GRMCULXFREO_EN_DVD) (CDROM) (Total:3.06 GB) (Free:0 GB) CDFS
Drive g: () (Removable) (Total:29.8 GB) (Free:29.35 GB) FAT32 (Disk=1 Partition=1)
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
Drive y: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.16 GB) NTFS (Disk=0 Partition=1) ==>[System with boot components (obtained from reading drive)]
ATTENTION: Malware custom entry on BCD on drive y: detected.
 
==================== MBR & Partition Table ==================
 
========================================================
Disk: 0 (Size: 298 GB) (Disk ID: 094B8C03)
Partition 00: (Active) - (Size=0) - (Type=00) ATTENTION ===> 0 byte partition bootkit.
Partition 1: (Active) - (Size=199 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=285 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=13 GB) - (Type=07 NTFS)
 
========================================================
Disk: 1 (Size: 30 GB) (Disk ID: 00000000)
Partition 1: (Not Active) - (Size=30 GB) - (Type=0C)
 
 
Last Boot: 2013-05-04 13:04
 
==================== End Of Log ============================
 
Thank you!
 


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:46 PM

Posted 12 May 2013 - 01:26 PM


Hello CacsTech

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
HKLM\...\RunOnce: [*Restore] C:\Windows\system32\rstrui.exe /RUNONCE [296960 2010-11-20] (Microsoft Corporation)
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox]  ATTENTION! ====> ZeroAccess
HKU\Heaman\...\Run: [Internet Security] C:\ProgramData\amsecure.exe [831488 2013-05-04] (Apple Computer, Inc.)
C:\$Recycle.Bin\S-1-5-18\$a8f77fd530cebc82186cdb75047d5c2a
TDL4: custom:26000022 <===== ATTENTION!
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 02:06 PM

Hello Gringo,

 

Thank you for this information!

 

I have run FRST just like you said to do and pressed "Fix".

 

Here is the Fixlog.txt:

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 11-05-2013 01
Ran by SYSTEM at 2013-05-12 15:02:29 Run:1
Running from G:\
Boot Mode: Recovery
==============================================
 
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\\*Restore => Value deleted successfully.
HKLM\Software\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\\Default => Value was restored successfully.
HKEY_USERS\Heaman\Software\Microsoft\Windows\CurrentVersion\Run\\Internet Security => Value deleted successfully.
C:\$Recycle.Bin\S-1-5-18\$a8f77fd530cebc82186cdb75047d5c2a => Moved successfully.
 
The operation completed successfully.
The operation completed successfully.
 
==== End of Fixlog ====

 

I booted the laptop normally, but I'm still getting the flashing line cursor at the top, middle of the screen right after the HP logo is shown.

 

Thank you!



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:46 PM

Posted 12 May 2013 - 04:22 PM

  • Download ListParts to a USB flash drive.
  • Download ListParts64 to a USB flash drive.
  • Plug the USB drive into the infected machine.

  • Boot your computer into Recovery Environment

  • Restart the computer and press F8 repeatedly until the Advanced Options Menu appears.
  • Select Repair your computer.
  • Select Language and click Next
  • Enter password (if necessary) and click OK, you should now see the screen below ...

  • W7InstallDisk2.png

  • Select the Command Prompt option.
  • A command window will open.
  • Type notepad then hit Enter.
  • Notepad will open.
  • Click File > Open then select Computer.
  • Note down the drive letter for your USB Drive.
  • Close Notepad.

  • Back in the command window ....
  • Type e:\listparts.exe and hit Enter (where e: is replaced by the drive letter for your USB drive)
  • Type e:\listparts64.exe and hit Enter (where e: is replaced by the drive letter for your USB drive)
  • ListParts will start to run.
  • Press the Scan button.
  • When finished scanning it will make a log Result.txt on the flash drive.

  • Close the command window.
  • Boot back into normal mode and post me the Result.txt log please.
  • [/list]

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 04:38 PM

Here is the Result.txt log:

 

 

ListParts by Farbar Version: 10-05-2013
Ran by SYSTEM (administrator) on 12-05-2013 at 17:33:58
Windows 7 (X64)
Running From: G:\
Language: 0409
************************************************************
 
========================= Memory info ====================== 
 
Percentage of memory in use: 12%
Total physical RAM: 3894.87 MB
Available physical RAM: 3390.07 MB
Total Pagefile: 3893.02 MB
Available Pagefile: 3372.47 MB
Total Virtual: 8192 MB
Available Virtual: 8191.91 MB
 
======================= Partitions =========================
 
1 Drive c: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.16 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
2 Drive d: () (Fixed) (Total:284.67 GB) (Free:155.53 GB) NTFS ==>[System with boot components (obtained from reading drive)]
3 Drive e: (RECOVERY) (Fixed) (Total:13.13 GB) (Free:2.18 GB) NTFS ==>[System with boot components (obtained from reading drive)]
4 Drive f: (GRMCULXFREO_EN_DVD) (CDROM) (Total:3.06 GB) (Free:0 GB) CDFS
5 Drive g: () (Removable) (Total:29.8 GB) (Free:29.35 GB) FAT32
6 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
 
  Disk ###  Status         Size     Free     Dyn  Gpt
  --------  -------------  -------  -------  ---  ---
  Disk 0    Online          298 GB   103 MB         
  Disk 1    Online           29 GB      0 B         
 
Partitions of Disk 0:
===============
 
Disk ID: 094B8C03
 
  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary            199 MB  1024 KB
  Partition 2    Primary            284 GB   200 MB
  Partition 3    Primary             13 GB   284 GB
 
======================================================================================================
 
Disk: 0
Partition 1
Type  : 07
Hidden: No
Active: Yes
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 1     C   SYSTEM       NTFS   Partition    199 MB  Healthy            
 
======================================================================================================
 
Disk: 0
Partition 2
Type  : 07
Hidden: No
Active: No
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 2     D                NTFS   Partition    284 GB  Healthy            
 
======================================================================================================
 
Disk: 0
Partition 3
Type  : 07
Hidden: No
Active: No
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 3     E   RECOVERY     NTFS   Partition     13 GB  Healthy            
 
======================================================================================================
 
Partitions of Disk 1:
===============
 
Disk ID: 00000000
 
  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary             29 GB    16 KB
 
======================================================================================================
 
Disk: 1
Partition 1
Type  : 0C
Hidden: No
Active: No
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 4     G                FAT32  Removable     29 GB  Healthy            
 
======================================================================================================
============================== MBR Partition Table ==================
 
==============================
Partitions of Disk 0:
===============
Disk ID: 094B8C03
Partition 00: (Active) - (Size=0) - (Type=00 ATTENTION ===> 0 byte partition bootkit.
Partition 1: (Active) - (Size=199 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=285 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=13 GB) - (Type=07 NTFS)
 
==============================
Partitions of Disk 1:
===============
Disk ID: 00000000
Partition 1: (Not Active) - (Size=30 GB) - (Type=0C)
 
 
****** End Of Log ****** 


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:46 PM

Posted 12 May 2013 - 05:17 PM

Please do the following:
  • Download Attached File  fix.txt   118bytes   11 downloads
    Save it to your flash drive.
  • Boot to System Recovery Options and select "Command Prompt".
  • run ListParts you did before this time Click Fix. Close the pop up after the fix is done.
  • Please restart, let it boot normally and then post the FixLog.txt

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 05:34 PM

Here is the contents of the PLfixlog.txt:

 

 

Script used: "Disk=0 partition=1 inactive"
Script used: "Disk=0 partition=1 active"
Script used: "Disk=0 partition=1 inactive"
Script used: "Disk=0 partition=1 active"
Script used: "custom"
 
An error occurred while attempting to delete the specified data element.
Element not found.
 
 
After I restarted the laptop, I finally say that Windows was starting to load, so I'm no longer seeing the blank cursor anymore. However, the OS wanted me to load "Startup Repair". After the scan completed, it asked me if I wanted to do a System Restore. I pressed Cancel because I really didn't think it needed to restore, so now, it says that it's "Attempting Repairs". It's been on this for a few minutes already. I will let you know when/if it gets done attempting repairs.


#8 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 05:53 PM

It finally stopped attempting repairs.  I rebooted the laptop to actually watch and see what happens during boot. The animation while "Starting Windows" completes successfully, I see the mouse icon on the screen for roughly a second, then the screen goes blank, and the laptop restarts.  When it restarts, I'm presented with the error screen that Windows failed to start. I'm presented with two options. "Launch Startup Repair (recommended)" and "Start Windows Normally".  Should I just start Startup Repair, and accept anything it asks me that it wants to do, like do a System Restore?

 

Thank you


Edited by CacsTech, 12 May 2013 - 05:54 PM.


#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:46 PM

Posted 12 May 2013 - 05:58 PM

Hello


have you tried to run safe mode?


I want a new report from FRST - the program that you started this topic with



Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 06:00 PM

I will try starting it in Safe Mode next.

 

For running FRST, do you recommend that I first try running it in while Windows starts up in Safe Mode (if I can get it to start in Safe Mode) or should I run it from the Command Prompt like I did at the beginning?



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:46 PM

Posted 12 May 2013 - 06:04 PM

if you boot into safe mode report to me and don't run first
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 06:05 PM

Okay.

 

It will not run in Safe Mode, so I will run FRST off my flash drive.

 

After I select the Safe Mode option, I'm presented again with the mouse cursor, but the laptop restarts, and I'm presented with the Windows couldn't start error screen.



#13 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 06:15 PM

FRST.txt Log:
 
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 11-05-2013 01
Ran by SYSTEM on 12-05-2013 19:12:59
Running from G:\
Windows 7 Home Premium (X64) OS Language: English(US)
Internet Explorer Version 9
Boot Mode: Recovery
The current controlset is ControlSet001
ATTENTION!:=====> FRST is updated to run from normal or Safe mode to produce a full FRST.txt log and an extra Addition.txt log.
 
==================== Registry (Whitelisted) ==================
 
HKLM\...\Run: [SynTPEnh] %ProgramFiles%\Synaptics\SynTP\SynTPEnh.exe [2096424 2010-05-27] (Synaptics Incorporated)
HKLM\...\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" [171520 2010-01-09] (Sun Microsystems, Inc.)
HKLM\...\Run: [SysTrayApp] C:\Program Files\IDT\WDM\sttray64.exe [487424 2010-06-18] (IDT, Inc.)
HKLM\...\Run: [MSC] "c:\Program Files\Microsoft Security Client\mssecex.exe" -hide -runkey [x]
HKLM-x32\...\Run: [HPCam_Menu] "c:\Program Files (x86)\Hewlett-Packard\Media\Webcam\MUITransfer\MUIStartMenu.exe" "c:\Program Files (x86)\Hewlett-Packard\Media\Webcam" UpdateWithCreateOnce "Software\Hewlett-Packard\Media\Webcam" [222504 2009-05-19] (CyberLink Corp.)
HKLM-x32\...\Run: [QlbCtrl.exe] C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start [323640 2010-02-25] ( Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [Microsoft Default Manager] "C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" -resume [439568 2010-05-10] (Microsoft Corporation)
HKLM-x32\...\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59720 2013-01-28] (Apple Inc.)
HKLM-x32\...\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime [421888 2012-10-24] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe" [152392 2013-02-20] (Apple Inc.)
HKLM-x32\...\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [252848 2012-07-03] (Sun Microsystems, Inc.)
HKU\Heaman\...\Run: [Pando Media Booster] C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe [4288048 2013-04-02] ()
 
==================== Services (Whitelisted) =================
 
S2 AESTFilters; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_70dacb64382a61a7\AESTSr64.exe [89600 2010-06-18] (Andrea Electronics Corporation)
S2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22072 2012-09-12] (Microsoft Corporation)
S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [368896 2012-09-12] (Microsoft Corporation)
S2 NOBU; C:\Program Files (x86)\Symantec\Norton Online Backup\NOBuAgent.exe [2804568 2010-06-08] (Symantec Corporation)
S3 npggsvc; C:\Windows\SysWow64\GameMon.des [3966416 2010-10-20] (INCA Internet Co., Ltd.)
S2 STacSV; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_70dacb64382a61a7\STacSV64.exe [247808 2010-06-18] (IDT, Inc.)
 
==================== Drivers (Whitelisted) ====================
 
S0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [228768 2012-08-30] (Microsoft Corporation)
S2 NisDrv; C:\Windows\System32\DRIVERS\NisDrvWFP.sys [128456 2012-08-30] (Microsoft Corporation)
S3 NPPTNT2; C:\Windows\SysWow64\npptNT2.sys [4682 2005-01-02] (INCA Internet Co., Ltd.)
S0 AFS; No ImagePath
S3 dump_wmimmc; \??\C:\ijji\ENGLISH\u_sf\GameGuard\dump_wmimmc.sys [x]
S4 eabfiltr; 
S3 RSUSBSTOR; System32\Drivers\RtsUStor.sys [x]
 
==================== NetSvcs (Whitelisted) ===================
 
 
==================== One Month Created Files and Folders ========
 
2013-05-12 13:04 - 2013-05-12 13:04 - 00000000 ____D C:\FRST
2013-05-11 11:06 - 2013-05-12 04:48 - 00000000 ___AD C:\Kaspersky Rescue Disk 10.0
2013-05-04 23:01 - 2013-05-04 23:01 - 00000000 ____D C:\c274401de9f300973b263c
2013-05-04 22:51 - 2013-05-04 22:51 - 00277664 ____A C:\Windows\Minidump\050513-52806-01.dmp
2013-05-04 22:42 - 2013-05-04 22:42 - 00831488 ____A (Apple Computer, Inc.) C:\ProgramData\amsecure.exe
2013-05-04 22:42 - 2013-05-04 22:42 - 00000643 ____A C:\Users\Public\Desktop\Internet Security 2013.lnk
2013-04-27 01:43 - 2013-04-27 01:44 - 00000000 ____D C:\7543e88d8f0e005a56094d1acb4f
2013-04-23 15:17 - 2013-04-12 06:45 - 01656680 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\ntfs.sys
 
==================== One Month Modified Files and Folders =======
 
2013-05-12 18:58 - 2010-03-11 21:30 - 00000000 ____D C:\ProgramData\Recovery
2013-05-12 13:04 - 2013-05-12 13:04 - 00000000 ____D C:\FRST
2013-05-12 04:48 - 2013-05-11 11:06 - 00000000 ___AD C:\Kaspersky Rescue Disk 10.0
2013-05-12 04:18 - 2010-03-11 20:10 - 00000000 ____D C:\users\Heaman
2013-05-12 03:46 - 2013-04-02 22:35 - 00000000 ____D C:\ProgramData\PMB Files
2013-05-12 03:46 - 2012-10-21 19:03 - 00000000 ____D C:\Windows\Minidump
2013-05-12 03:46 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-05-12 03:46 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\AppCompat
2013-05-05 19:15 - 2013-04-02 22:36 - 00000000 ____D C:\Users\Heaman\AppData\Local\PMB Files
2013-05-04 23:01 - 2013-05-04 23:01 - 00000000 ____D C:\c274401de9f300973b263c
2013-05-04 23:00 - 2010-02-06 01:22 - 01093122 ____A C:\Windows\WindowsUpdate.log
2013-05-04 22:59 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-05-04 22:59 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-05-04 22:51 - 2013-05-04 22:51 - 00277664 ____A C:\Windows\Minidump\050513-52806-01.dmp
2013-05-04 22:51 - 2013-04-05 05:49 - 546786152 ____A C:\Windows\MEMORY.DMP
2013-05-04 22:51 - 2013-04-03 07:57 - 00005544 ____A C:\Windows\setupact.log
2013-05-04 22:51 - 2011-02-10 16:57 - 00000406 ____A C:\Windows\Tasks\FileCure Startup.job
2013-05-04 22:51 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-05-04 22:49 - 2012-08-16 12:01 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-05-04 22:42 - 2013-05-04 22:42 - 00831488 ____A (Apple Computer, Inc.) C:\ProgramData\amsecure.exe
2013-05-04 22:42 - 2013-05-04 22:42 - 00000643 ____A C:\Users\Public\Desktop\Internet Security 2013.lnk
2013-05-03 20:21 - 2012-08-18 18:13 - 00002113 ____A C:\Windows\epplauncher.mif
2013-05-03 15:37 - 2011-10-28 15:18 - 00000000 ____A C:\Windows\System32\HP_ActiveX_Patch_NOT_DETECTED.txt
2013-05-03 15:37 - 2010-04-02 16:00 - 00000052 ____A C:\Windows\SysWOW64\DOErrors.log
2013-05-02 07:29 - 2010-11-05 15:17 - 00278800 ____A (Microsoft Corporation) C:\Windows\System32\MpSigStub.exe
2013-05-01 16:55 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\NDF
2013-04-28 18:46 - 2011-08-31 17:48 - 00000404 ___AH C:\Windows\Tasks\Norton Security Scan for Heaman.job
2013-04-27 01:44 - 2013-04-27 01:43 - 00000000 ____D C:\7543e88d8f0e005a56094d1acb4f
2013-04-25 17:24 - 2011-02-20 20:42 - 00000000 ____D C:\Users\Heaman\AppData\Roaming\.minecraft
2013-04-21 19:07 - 2009-07-13 21:13 - 00739736 ____A C:\Windows\System32\PerfStringBackup.INI
2013-04-20 06:43 - 2011-02-10 16:57 - 00000390 ____A C:\Windows\Tasks\FileCure Default.job
2013-04-12 15:38 - 2012-08-16 12:01 - 00691592 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-04-12 15:38 - 2011-05-27 11:27 - 00071048 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2013-04-12 15:38 - 2010-01-09 16:40 - 00000000 ____D C:\ProgramData\Adobe
2013-04-12 06:45 - 2013-04-23 15:17 - 01656680 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\ntfs.sys
 
Other Malware:
===========
C:\Windows\svchost.exe
ATTENTION ====> Check for partition/boot infection.C:\ProgramData\amsecure.exe
 
==================== Known DLLs (Whitelisted) ================
 
 
==================== Bamital & volsnap Check =================
 
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
 
==================== EXE ASSOCIATION =====================
 
HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK
 
==================== Restore Points  =========================
 
Restore point made on: 2013-05-03 20:20:14
Restore point made on: 2013-05-04 23:00:55
 
==================== Memory info =========================== 
 
Percentage of memory in use: 16%
Total physical RAM: 3894.87 MB
Available physical RAM: 3264.23 MB
Total Pagefile: 3893.02 MB
Available Pagefile: 3263.75 MB
Total Virtual: 8192 MB
Available Virtual: 8191.89 MB
 
==================== Drives ================================
 
Drive c: () (Fixed) (Total:284.67 GB) (Free:155.43 GB) NTFS (Disk=0 Partition=2) ==>[System with boot components (obtained from reading drive)]
Drive e: (RECOVERY) (Fixed) (Total:13.13 GB) (Free:2.18 GB) NTFS (Disk=0 Partition=3) ==>[System with boot components (obtained from reading drive)]
Drive f: (GRMCULXFREO_EN_DVD) (CDROM) (Total:3.06 GB) (Free:0 GB) CDFS
Drive g: () (Removable) (Total:29.8 GB) (Free:29.35 GB) FAT32 (Disk=1 Partition=1)
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
Drive y: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.16 GB) NTFS (Disk=0 Partition=1) ==>[System with boot components (obtained from reading drive)]
 
==================== MBR & Partition Table ==================
 
========================================================
Disk: 0 (Size: 298 GB) (Disk ID: 094B8C03)
Partition 1: (Active) - (Size=199 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=285 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=13 GB) - (Type=07 NTFS)
 
========================================================
Disk: 1 (Size: 30 GB) (Disk ID: 00000000)
Partition 1: (Not Active) - (Size=30 GB) - (Type=0C)
 
 
Last Boot: 2013-05-04 13:04
 
==================== End Of Log ============================


#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:46 PM

Posted 12 May 2013 - 06:26 PM

Hello CacsTech



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt
 
 
C:\ProgramData\amsecure.exe
C:\Windows\svchost.exe
TDL4: custom:26000022 <===== ATTENTION!
CMD: bootrec /FixMbr
CMD: bootrec /FixBoot
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo

Edited by gringo_pr, 12 May 2013 - 06:26 PM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 CacsTech

CacsTech
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:46 PM

Posted 12 May 2013 - 06:36 PM

Here is the fixlog.txt log:

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 11-05-2013 01
Ran by SYSTEM at 2013-05-12 19:31:41 Run:2
Running from H:\
Boot Mode: Recovery
==============================================
 
C:\ProgramData\amsecure.exe => Moved successfully.
C:\Windows\svchost.exe => Moved successfully.
 
An error occurred while attempting to delete the specified data element.
Element not found.
The operation completed successfully.
 
=========  bootrec /FixMbr =========
 
ÿþT h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
=========  bootrec /FixBoot =========
 
ÿþT h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
==== End of Fixlog ====

 

The mouse cursor is still showing for a second then it restarts.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users