Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hard drive issues, possibly fault of a virus...


  • Please log in to reply
59 replies to this topic

#1 Twisted13

Twisted13

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 30 May 2012 - 08:07 PM

Hello everyone,

I was struck by a nasty virus the other day, and spent alot of time cleaning it out, but failed badly at the clean up job. I ended up formatting the whole hard drive, and reinstalling the OS again. Just lately though, I have been getting Blue Screens of Death, so I'm not sure what's going on now. Can anyone help please? Thanks. :)

BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:50 AM

Posted 30 May 2012 - 08:09 PM

We need to know more about your BSODs...

Download BlueScreenView (in Zip file)

No installation required.

Unzip downloaded file and double click on BlueScreenView.exe file to run the program and When scanning is done, go to Edit > Select All.

Then go to File > Save Selected Items, and save the report as BSOD.txt.

Open BSOD.txt in Notepad, copy all content, and paste it into your next reply.

Compliments of Broni

#3 Twisted13

Twisted13
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 30 May 2012 - 08:14 PM

Wow that was fast reply! :) :D Here's the log...

==================================================
Dump File : 052912-14476-01.dmp
Crash Time : 5/29/2012 2:52:47 PM
Bug Check String : KERNEL_MODE_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000008e
Parameter 1 : 0xc0000005
Parameter 2 : 0x00000048
Parameter 3 : 0x8d642a7c
Parameter 4 : 0x00000000
Caused By Driver :
Caused By Address :
File Description :
Product Name :
Company :
File Version :
Processor : 32-bit
Crash Address :
Stack Address 1 : ntkrnlpa.exe+810d1
Stack Address 2 : ntkrnlpa.exe+78b9f
Stack Address 3 : pwdirfog.sys+218c
Computer Name :
Full Path : C:\Windows\Minidump\052912-14476-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 7601
Dump File Size : 146,960
==================================================

#4 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:50 AM

Posted 30 May 2012 - 08:23 PM

Hello,

And welcome to BleepingComputer.com, before we can assist you with your question of: Am I infected? You will need to perform the following tasks and post the logs of each if you can. If you have performed any of the scans below post the logs for those scans, and then perform the ones you have not done.

Please download and run Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

Malwarebytes Anti-Malware

NOTEMalwarebytes is now offering a free trial of their program, if you want to accept it you will need to enter some billing information, so that at the end of the trial you would be charged the cost of the product. Please decline this offer, if you are unable to provide billing information. If you want to try it out, then provide the billing information.

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Full Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.


SUPERAntiSpyware:

Please download and scan with SUPERAntiSpyware Free

  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are unchecked (leave all others checked):
    • Ignore files larger then 4mb
    • Ignore non-executable files

    Now Perform the scan with SUPERAntiSpyware as follows:
    • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    • On the left, make sure you check C:\Fixed Drive.
    • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
    • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    • Make sure everything has a checkmark next to it and click "Next".
    • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    • If asked if you want to reboot, click "Yes" and reboot normally.
    • To retrieve the removal information after reboot, launch SUPERAntispyware again.[list]
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

SAS Portable
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Now GMER

GMER does not work in 64bit Mode!!!!!!

Please download GMER from one of the following locations and save it to your desktop:

  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic Full Scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.


All scans above should be performed in regular boot mode, and if that is not possible then I will post instructions in a follow up reply on how to get into Safe Mode to perform the scans. Also all scans should be COMPLETE and not quick unless specifically instructed to do so.

#5 Twisted13

Twisted13
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 30 May 2012 - 11:28 PM

Update...i ran all those but at the time i was running hard drive regenerator program and it found few bad sectors....i made bootable disk now its regenerating all the sectors on my 500gb hdd which is going to take good while. If all else fails i'll just delete volume and format it...reinstall windows and redo as requested above...sorry...im on my cell...sorry for the long wait...i hope this regenerating fixes it tho too.

Second update; I ended up stopping the Hard Drive Regenerator program, and just Deleted the Hard Drive Volume/formatted it and reinstalled Windows 7. I guess for now, posting logs would be pointless..? But I could still do it though... If need be?

Edited by Twisted13, 31 May 2012 - 02:59 AM.


#6 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:50 AM

Posted 31 May 2012 - 07:49 AM

Can you please post the logs.

Since the logs have been deleted it will be virtually impossible for us to determine the type of infection. I did not ask you to perform anything else but the scans above and post the logs. I have not heard of anything called Hard Drive Regenerator in my 12 years of IT Experience. Please post a link to this tool.

Edited by cryptodan, 31 May 2012 - 07:50 AM.


#7 Twisted13

Twisted13
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 31 May 2012 - 07:42 PM

Sorry for getting back to you so late, some how liquid got into keyboard and I had to clean it all up.. :( But yeah, sorry about the Hard Drive Regenerator running at the same time. I did that BEFORE... posting here, and you asking for the logs. I should have stopped that first I guess... Here's link to that HDD Regenerator program: http://majorgeeks.com/HDD_Regenerator_d5235.html


Here's the logs below here...

Results of screen317's Security Check version 0.99.41
Windows 7 Service Pack 1 x86 (UAC is enabled)
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
SUPERAntiSpyware
Malwarebytes Anti-Malware version 1.61.0.1400
````````Process Check: objlist.exe by Laurent````````
Malwarebytes Anti-Malware mbamservice.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 4%
````````````````````End of Log``````````````````````






Malwarebytes Anti-Malware (Trial) 1.61.0.1400
www.malwarebytes.org

Database version: v2012.05.31.04

Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 9.0.8112.16421
spencer :: SPENCER-PC [administrator]

Protection: Disabled

5/30/2012 7:12:12 PM
mbam-log-2012-05-30 (19-12-12).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 267120
Time elapsed: 13 minute(s), 46 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)



SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/30/2012 at 07:37 PM

Application Version : 5.0.1150

Core Rules Database Version : 8668
Trace Rules Database Version: 6480

Scan type : Complete Scan
Total Scan Time : 00:12:58

Operating System Information
Windows 7 Home Premium 32-bit, Service Pack 1 (Build 6.01.7601)
UAC On - Limited User

Memory items scanned : 488
Memory threats detected : 0
Registry items scanned : 32089
Registry threats detected : 0
File items scanned : 47084
File threats detected : 7

Adware.Tracking Cookie
C:\USERS\SPENCER\AppData\Roaming\Microsoft\Windows\Cookies\Low\spencer@ads.pointroll[2].txt [ Cookie:spencer@ads.pointroll.com/ ]
C:\USERS\SPENCER\AppData\Roaming\Microsoft\Windows\Cookies\Low\spencer@doubleclick[1].txt [ Cookie:spencer@doubleclick.net/ ]
C:\USERS\SPENCER\AppData\Roaming\Microsoft\Windows\Cookies\Low\spencer@c.atdmt[2].txt [ Cookie:spencer@c.atdmt.com/ ]
C:\USERS\SPENCER\AppData\Roaming\Microsoft\Windows\Cookies\Low\spencer@serving-sys[2].txt [ Cookie:spencer@serving-sys.com/ ]
C:\USERS\SPENCER\AppData\Roaming\Microsoft\Windows\Cookies\Low\spencer@questionmarket[2].txt [ Cookie:spencer@questionmarket.com/ ]
C:\USERS\SPENCER\AppData\Roaming\Microsoft\Windows\Cookies\Low\spencer@atdmt[2].txt [ Cookie:spencer@atdmt.com/ ]
C:\USERS\SPENCER\AppData\Roaming\Microsoft\Windows\Cookies\Low\spencer@pointroll[2].txt [ Cookie:spencer@pointroll.com/ ]



GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-05-30 20:42:06
Windows 6.1.7601 Service Pack 1 Harddisk1\DR1 -> \Device\Ide\IdeDeviceP2T0L0-4 WDC_WD5002ABYS-01B1B0 rev.02.03B02
Running: k3czxytj.exe; Driver: C:\Users\spencer\AppData\Local\Temp\pwdirfog.sys


---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwRollbackEnlistment + 140D 828863C9 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 828BFD52 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
PAGE peauth.sys 9508C02D 101 Bytes JMP 8577158A
PAGE spsys.sys!?SPRevision@@3PADA + 4F90 9AA5C000 290 Bytes [8B, FF, 55, 8B, EC, 33, C0, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 50B3 9AA5C123 629 Bytes [75, A5, 9A, FE, 05, 34, 75, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 5329 9AA5C399 101 Bytes [6A, 28, 59, A5, 5E, C6, 03, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 538F 9AA5C3FF 148 Bytes [18, 5D, C2, 14, 00, 8B, FF, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 543B 9AA5C4AB 2228 Bytes [8B, FF, 55, 8B, EC, FF, 75, ...]
PAGE ...

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[1884] kernel32.dll!CreateThread 75D1DCC2 5 Bytes JMP 6E3772FB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!EnableWindow 763C8D02 5 Bytes JMP 6E3B9A14 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!GetAsyncKeyState 763CA256 5 Bytes JMP 6E35DD9D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!CallNextHookEx 763CABE1 5 Bytes JMP 6E3D7BB7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!UnhookWindowsHookEx 763CADF9 5 Bytes JMP 6E3FEB10 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!DefWindowProcA 763CBB1C 7 Bytes JMP 6E379525 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!CreateWindowExA 763CBF40 5 Bytes JMP 6E38335B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!SetWindowsHookExW 763CE30C 5 Bytes JMP 6E3B2194 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!CreateWindowExW 763CEC7C 5 Bytes JMP 6E3DFF8F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!GetKeyState 763D2B4D 5 Bytes JMP 6E35DC73 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!IsDialogMessageW 763D4104 5 Bytes JMP 6E506EDD C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!DefWindowProcW 763D507D 7 Bytes JMP 6E3D7C1A C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!CreateDialogParamA 763E1F42 5 Bytes JMP 6E506740 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!IsDialogMessage 763E2019 5 Bytes JMP 6E506EB5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!DialogBoxParamW 763E3B9B 5 Bytes JMP 6E31170B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!CreateDialogIndirectParamA 763E721D 5 Bytes JMP 6E5067B0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!CreateDialogIndirectParamW 763EEA10 5 Bytes JMP 6E5067E8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!DialogBoxIndirectParamW 763F3B7F 5 Bytes JMP 6E50640E C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!EndDialog 763F3BA3 5 Bytes JMP 6E507189 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!CreateDialogParamW 763F5630 5 Bytes JMP 6E506778 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!SetKeyboardState 763F695A 5 Bytes JMP 6E5077A5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!SendInput 763F7019 5 Bytes JMP 6E50774D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!SetCursorPos 7640C1B0 5 Bytes JMP 6E507826 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!DialogBoxParamA 7640CF42 5 Bytes JMP 6E5063A9 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!DialogBoxIndirectParamA 7640D274 5 Bytes JMP 6E506473 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!MessageBoxIndirectA 7641E869 5 Bytes JMP 6E506330 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!MessageBoxIndirectW 7641E963 5 Bytes JMP 6E5062B7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!MessageBoxExA 7641E9C9 5 Bytes JMP 6E506253 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!MessageBoxExW 7641E9ED 5 Bytes JMP 6E5061EF C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] USER32.dll!keybd_event 7641EC3B 5 Bytes JMP 6E50770A C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] SHELL32.dll!RealDriveType + 173D 7680FDD0 4 Bytes [CF, 01, 62, 70] {IRET ; ADD [EDX+0x70], ESP}
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] SHELL32.dll!RealDriveType + 1745 7680FDD8 8 Bytes [E0, 61, 61, 70, 79, F7, 61, ...] {LOOPNZ 0x63; POPA ; JO 0x7e; MUL DWORD [ECX+0x70]}
.text C:\Program Files\Internet Explorer\iexplore.exe[1884] ole32.dll!OleLoadFromStream 75E56143 5 Bytes JMP 6E506BE7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!EnableWindow 763C8D02 5 Bytes JMP 6E3B9A14 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!DialogBoxParamW 763E3B9B 5 Bytes JMP 6E31170B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!DialogBoxIndirectParamW 763F3B7F 5 Bytes JMP 6E50640E C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!DialogBoxParamA 7640CF42 5 Bytes JMP 6E5063A9 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!DialogBoxIndirectParamA 7640D274 5 Bytes JMP 6E506473 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!MessageBoxIndirectA 7641E869 5 Bytes JMP 6E506330 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!MessageBoxIndirectW 7641E963 5 Bytes JMP 6E5062B7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!MessageBoxExA 7641E9C9 5 Bytes JMP 6E506253 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3408] USER32.dll!MessageBoxExW 7641E9ED 5 Bytes JMP 6E5061EF C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)

---- Files - GMER 1.0.15 ----

File C:\$Recycle.Bin\S-1-5-21-50739193-1897631812-695329061-1000\$IW3QUJK.txt 544 bytes
File C:\$Recycle.Bin\S-1-5-21-50739193-1897631812-695329061-1000\$IYEZMCW.txt 544 bytes
File C:\$Recycle.Bin\S-1-5-21-50739193-1897631812-695329061-1000\$RW3QUJK.txt 0 bytes
File C:\$Recycle.Bin\S-1-5-21-50739193-1897631812-695329061-1000\$RYEZMCW.txt 0 bytes

---- EOF - GMER 1.0.15 ----

#8 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:50 AM

Posted 31 May 2012 - 07:50 PM

I would like for you to download and the data life guard tools from http://www.wdc.com and use the dos mode one and burn it to a bootable cd.

#9 Twisted13

Twisted13
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 31 May 2012 - 09:00 PM

Ok, I downloaded it and burnt it to disc, I didn't have Nero or Ez-Creator or whatever software...I just right clicked whilst it was on the DVD write/cd drive.. and clicked Burn Image to disc... It's finished and still in drive

#10 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:50 AM

Posted 31 May 2012 - 09:08 PM

Now reboot and make sure in the BIOS that the CD-Drive is bootable.

#11 Twisted13

Twisted13
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 31 May 2012 - 09:09 PM

Okay... I'm sure it is, because when I load the Windows 7 cd.. I get prompted to boot from cd/dvd press key to do so... lol. But okay, I'll reboot and check in BIOS quick.. Should I take out the CD before checking in BIOS?

#12 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:50 AM

Posted 31 May 2012 - 09:12 PM

Keep the CD in.

If it doesn't boot use this http://isorecorder.alexfeinman.com/W7.htm to reburn the ISO to the CD. It is a great little program and its free.

#13 Twisted13

Twisted13
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 31 May 2012 - 09:14 PM

Okay, and thanks! I downloaded it... xD If it does boot the cd/works... Just exit or does it scan automatically.. haha.. I just don't want to push/select for wrong thing and screw it up lmao. When checking on my Western Digital hard drive, it didn't list it's for Windows 7... Maybe because they didn't update their information for it... >_>

Edited by Twisted13, 31 May 2012 - 09:15 PM.


#14 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:09:50 AM

Posted 31 May 2012 - 09:17 PM

itll automatically start up.

Its for DOS so windows version doesnt matter.

#15 Twisted13

Twisted13
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:04:50 AM

Posted 31 May 2012 - 09:18 PM

Okay...I'll give it a try...I'll be back, if it doesn't "load"...I'll reburn it using that free software you linked to me.. :)




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users