WinXP infected

  • Thread starter Thread starter a
  • Start date Start date
A

a

Hi
If my PC get infected by virus, but I have no chance to see what kind of the
virus is, and the PC cannot be boot up again. How can I recover the PC?
Thanks
 
|>Hi
|>If my PC get infected by virus, but I have no chance to see what kind of the
|>virus is, and the PC cannot be boot up again. How can I recover the PC?
|>Thanks

It's to the malwares advantage to have your system running.

But to your question, at that point it would be real helpful to have
Hiren's.BootCD handy.
 
Hi
If my PC get infected by virus, but I have no chance to see what kind of the
virus is, and the PC cannot be boot up again. How can I recover the PC?
Thanks
In addition to Pennywise's suggestion, another possibility is to borrow a second computer with
anti-virus software on it, put your HDD in it as a slave, and run the anti-virus software to
clean it up.
 
Unk said:
In addition to Pennywise's suggestion, another possibility is to borrow a second computer with
anti-virus software on it, put your HDD in it as a slave, and run the anti-virus software to
clean it up.

Thanks a lot for reply.
Is it possible to boot from WinXP CDROM, re-install the WinXP without format
the harddisk?
Is it possible to use recovery mode and safe mode in this case?
 
a said:
Thanks a lot for reply.
Is it possible to boot from WinXP CDROM, re-install the WinXP without
format the harddisk?
Is it possible to use recovery mode and safe mode in this case?

It is certainly possible to do a repair install, but this isn't going to
get rid of viruses and malware. The Recovery Console will also be
useless to you, and it isn't run in Safe Mode.

If you can get into Safe Mode, you can clean up your machine. It isn't
clear from your posts if you can get into Safe Mode or not since you
didn't explain exactly what you mean by "PC cannot be boot up again
(sic)".

If you can get into Safe Mode, here are malware removal steps:
http://www.elephantboycomputers.com/page2.html#Removing_Malware

If you can't get into Safe Mode, you can create a Bart's PE with
antivirus tools on it and do the scan from there:
http://www.nu2.nu/pebuilder/

Or you can slave the hard drive in a working XP box as suggested and
scan with an av that way, although there is always the possibility of
infecting the host XP install.

Another alternative is to retrieve your data with either a Bart's PE or
Knoppix (a Linux distro that runs from cd) and then do a clean install.
http://www.knoppix.net

http://michaelstevenstech.com/cleanxpinstall.html - Clean Install How-To
http://www.elephantboycomputers.com/page2.html#reinstall_Windows - What
you will need on-hand

All of these solutions require a fairly high level of computer skills.
Only you know what your skill level is. If this work isn't your cup of
tea, take the machine to a professional computer repair shop (not your
local version of BigStoreUSA).

Malke
 
[/QUOTE]

That started like a question ("If...") and ends as a description of an
existing problem. Which is it? I ask, because if it's an existing
problem you are sitting with, then I'd want to know more details to
guide further advice, else I'd have to keep it general.

There are two broad approaches:

A) "Just" wipe and rebuild the system

The idea here is that because you wipe the installation, you kill the
virus and thus you can be sure you are virus-free. But the adverse
impact is huge, and the more you mitigate that impact by saving and
then restoring "data" files, the more likely you will re-infect the PC
from an infected backup. Even if the system is clean when rebuilt,
you'd have lost patches, which may mean you'll be infected within a
few minutes of connecting to the 'net again.

See http://cquirke.mvps.org/reinst.htm

This solution may make sense if:
- your original installation was poorly-setup
- you have no need to salvage data
- you have a small set of apps you need to use
- you have a well-maintained system image to restore
- you want to force an original state on your users
All but the first of these apply in corporate computing, which is
where the norm of "just wipe and rebuild" comes from.

B) Detect and manage the malware

This used to be easy in the earlier days on Win9x, both because there
weren't quite so many different malware around, and because that OS
could be formally scanned from DOS diskette boot with DOS-based av.

See http://cquirke.mvps.org/9x/virtest.htm

But DOS can't read NTFS, or FATxx volumes > 137G, so one needs a
better solution for XP. It exists, but not on a plate from Microsoft;
Google( Bart PE) unless you know Linux well enough to use any one of
several CDR-booted Linux alternatives. Linux isn't really safe for
writing to NTFS, which may make Bart a better bet.

This solution may make sense if:
- your original installation was fully-patched and well set up
- you have a large number of apps and setting to preserve
- your data is on the same PC
- your backup facilities are poor
- using your "recovery" or installation CD will lose all patches
This situation is typical in consumerland.

Ah, Malke's pretty much said it all...
If you can get into Safe Mode, you can clean up your machine. It isn't
clear from your posts if you can get into Safe Mode or not
If you can get into Safe Mode, here are malware removal steps:
http://www.elephantboycomputers.com/page2.html#Removing_Malware
If you can't get into Safe Mode, you can create a Bart's PE with
antivirus tools on it and do the scan from there:
http://www.nu2.nu/pebuilder/
Or you can slave the hard drive in a working XP box as suggested and
scan with an av that way, although there is always the possibility of
infecting the host XP install.
Another alternative is to retrieve your data with either a Bart's PE or
Knoppix (a Linux distro that runs from cd) and then do a clean install.
http://www.knoppix.net
All of these solutions require a fairly high level of computer skills.
Only you know what your skill level is. If this work isn't your cup of
tea, take the machine to a professional computer repair shop

So in summary, it's:

1) Clean from Windows via online scanner
- advantage: Scanners are free and up to date
- disadvantage: Malware has the highest level of control

2) Clean from Windows via installed av
- slightly less dangerous than (1)
- still relies on the malware allowing you to clean it

3) Clean from Windows Safe Mode
- suppresses many malware, making these safe to clean
- nearly as easy as (1) and (2)

4) Clean from Windows Safe Mode Command Prompt Only
- suppresses more malware than (3), thus safer
- not as easy as (1-3) if you are used to using a GUI

5) Drop hard drive into other PC, clean from there
- as wide a range of av tools as (1+2), which is great
- less likely to be running the malware, so safer than (1-4)
- but scanners may miss things if relying on registry clues
- may also fail to properly clean as wrong registry in effect
- risk of infecting the host PC
- risk of Windows writes further corrupting a sick file system

6) Bart CDR boot, run scanners from there
- avoids running the malware, so safest approach
- the Bart CDR is read-only, so can't be infected
- reasonable range of scanners and tools
- does not initiate writes to the HD, unlike (1-5)
- a plugin exists to use the hard drive's registry, unlike (5)
- but CDR must be prepared on a clean system
- skills and research required to use plugins to add tools

7) As per (5), (6) or using parallel install, but using Linux
- different skill set required to use Linux
- difficulty in managing Windows registry
- difficulty in handling NTFS safely
- may be suitable if you already know Linux

My approach is to start with (6), then (4), then (2). If I need a
wider range of scanners, I may add (5) and do (1) from this setting
also - it's safer doing an online scan if the OS you booted up is that
of a clean host PC, and not the installation you're trying to clean.

Suitable av scanners, and compatibility:
- Bit Defender 8 on-demand scanner; for (2-5)
- Trend SysClean on-demand scanner; for (2-5 and 6)
- McAfee SuperDat command-line scanner; for (2-5 and 6)
- Sophos command-line scanner; for (2-5 and ?6)

These catch only a few malware, but are worth adding:
- McAfee Stinger small-range scanner; for (2-5 and 6)
- Avast Cleaner small-range scanner; for (2-5 and 6)

Free resident av (install only one of this category):
- AVG 7; for (2-5)
- Avast av; for (2-5)
- AntiVir 7; for (2-5), perhaps (6)

Anti-spyware scanners generally need registry access:
- AdAware SE; for (2-4) and (6) if used with RunScanner
- Spybot SD; for (2-4) and (6)
- MS Antispyware / Defender; (2) only
- Ewido anti-malware; (2-4)

Integration checkers need registry access to work; no (5):
- MSConfig; for (2-4) and (6) with RunScanner
- HiJackThis; for (2-4) and (6) with RunScanner
- Nirsoft utilities; for (2-4) and (6) with RunScanner

Rootkit behaviour detectors must be run "dirty", i.e. (2) not (5-6):
- F-Secure Blacklight Beta; may catch some
- Rootkit Revealer, which may be harder to interpret

Generally I scan for commercial malware after tackling the more
hard-core stuff. Because I'm more worried about side-effects of
removal than malicious counter-action, I detect but don't clean from
(6) and then clean from (4), so that I have the Undo info on the
system and I can use System Restore as well.

System Restore is one of two major "hidden traps" from which malware
can re-infect the system (the other being email mailboxes that hide
attachments). I normally:
- scan System Restore data via (6)
- leave this data in place
- create a new and clean baseline restore point when clean
- test the system is working OK
- then use Disk Cleanup to purge all but this last restore point

HTH... in your case, it sounds as if you may have other problems that
could put data at risk, so I'd tread very carefully.


-------------------- ----- ---- --- -- - - - -
Running Windows-based av to kill active malware is like striking
a match to see if what you are standing in is water or petrol.
 
Back
Top