Corrupt change-log, run Chkdsk, but how?

Posted on 2011-10-19
Last Modified: 2012-05-12
Got a malware on one of my wife's computers running Lavasoft's AdAware Pro. Lavasoft hasturned off their chat service and does not seem to answer emails.

I tried to restore to an earlier restore point.

I know that when doing this, it sometimes takes a while for the system to come back up. After an hour I shut it down and started it up again.

Now I get a system error saying that my change-log is corrupt and to run Chkdsk.

I run "Chkdsk c: /f" and it, of course, warns me that it will need to restart. I respond that Yes, I want to scan on startup, then restart.

No scan, just the change-log warning.

What should be my next step?

Running Windows XP SP3 on an HP machine
Question by:David Brugge
    LVL 25

    Accepted Solution

    It sounds like the Malware could have interfered with the system restore and possibly it never finished. If that happened, Windows could really be messed up.

    Try booting into safemode: restart, press F8 multiple times  when you see the HP logo.
    Selecr Safemode with Networking.

    If this runs properly, it might resolve the immediate problem.
    LVL 32

    Assisted Solution

    Do you have an XP CD to boot from? If so, you can run chkdsk from the Recovery Console.
    LVL 26

    Author Closing Comment

    by:David Brugge
    Willcomp, I'm throwing you points for being technically correct, however whenever I try to run Recovery Console with command lines, machines just laugh in my face.

    TG! That worked. Took me forever to find a PS/2 keyboard because the USB keyboard driver was not being loaded in time to catch the F key at boot. Once that was done, the safe mode loading window hung during all of the driver downloads. I was about to bail when I remembered that it might be running the Chkdsk.

    I never got a Chkdsk report, so it May have been running and it MAY NOT have been. Whatever happened, I came back an hour later and it was smiling at me, all happy.

    Now to tackle the dang malware problem and curse Lavasoft to the rafters!

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Join & Write a Comment

    Suggested Solutions

    I wanted to pass this along in case anyone has a problem removing a device from the Device Manager, or if you suspect a corrupted Driver that you want to remove in its entirety. I know it is kinda lengthy and very basic in its format, but I figured …
    Ok I have been working on this for some time having learned and gained certification in XenDesktop 4 along came version 5 which was released last month. Since then I have been working to deploy XenDesktop 5 in a small environment with only 2 virt…
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now