Solved

Virus infection damage

Posted on 2013-01-17
4
410 Views
Last Modified: 2013-01-21
In Windows XP running I downloaded an advertisement  from a website then uninstalled it. Now my Icons won't work, IE wont open but, will start to open the browser but then it closes. Executables won't open, At the time I was running an up to date Comcast provided Norton Antivirus suite.  One error that is rendered is an "application can't be started, an internal error has occurred." Another attempt to open a program renders a "Access is Denied" notice. So I ran as local admin in Safeboot w/networking to no avail. Tried opening a user account page to make myself an admin which failed. While in Safeboot mode w/networking and attempting to open any applets in Control Panel I receive the notice "Windows cannot access the specified device,path or file. You may not have appropriate permissions to access the item".
0
Comment
Question by:geesanjays
  • 2
4 Comments
 
LVL 13

Accepted Solution

by:
Alexios earned 500 total points
ID: 38786632
Hello
From safe mode without networking try to run system restore and choose a date 2-3 days ago for restoring
0
 
LVL 17

Expert Comment

by:Lior Karasenti
ID: 38786883
Try downloading from another computer Rkill and copy it to the infected machine

http://www.bleepingcomputer.com/download/rkill/

And then Combofix
http://www.bleepingcomputer.com/download/combofix/
0
 

Author Closing Comment

by:geesanjays
ID: 38800073
To my surprise that indeed worked and I am very grateful. I was surprised because System restore in Safeboot w/networking wouldn't worked whereas w/o networking  (your solution) worked. So why did this work? What was the difference as it relates to the error message I received which was "access denied" when in Safeboot w/ networking? Thank you for your response Geesanjays
0
 
LVL 13

Expert Comment

by:Alexios
ID: 38800130
Hello again Geesanjays

With networking enable the virus-malware could connect to internet so it could "protect" it self in a matter of way.

Glad to help!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Read about achieving the basic levels of HRIS security in the workplace.
Shows how to create a shortcut to site-search Experts Exchange using Google in the Chrome browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch the Search Engine Menu: In chrome, via you…
How to create a custom search shortcut to site-search Experts Exchange using Google in the Firefox browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch your Bookmark Menu: Press 'Ctrl +…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now