Solved

WINDOWS\SYSTEM32\CONFIG\SYSTEM Corrupt Win XP

Posted on 2013-06-13
5
1,385 Views
Last Modified: 2013-06-19
Have a laptop encrypted with Checkpoint FDE, came in this morning started laptop got following error:
Windows could not start because he following file is missing or corrupt:
\WINDOWS\SYSTEM32\CONFIG\SYSTEM

Tried booting with XP CD into recovery console, since the drive is encrypted it does see anything except a RAW disk.  Wondering any way to hook drive to external drive case connect to another machine and run SFC / SCANNOW on the external drive?
0
Comment
Question by:ManieyaK_
5 Comments
 
LVL 13

Expert Comment

by:Michael Machie
Comment Utility
Sure, there are plenty of HDD docking stations on the market that allow you to plug either a SATA or IDE HDD to it. I use one all the time and perform Virus scans, backup data, format, install O/S's etc.

However, the problem you may run in to is the encryption on the drive. You won't really know if you can connect the drive externally and still access it until you try. You may want to connect the drive externally to another machine that has a similarly encrypted HDD in case that makes any difference.
0
 
LVL 29

Expert Comment

by:Sudeep Sharma
Comment Utility
Since you have encrypted HDD, you would first need to decrypt it start working on it.

As you have mentioned Checkpoint FDE is used to encrypt it you would need help from them to decrypt the data. They would be able to provide you the bootable CD or DVD to boot and decrypt the HDD, however they would also need the key, which usually resides on the system itself to decrypt the data. Unless there is some master key used to decrypt the HDD.

If that doens't goes well, the only other option left is to wipe clean, format and rebuild the OS.

Sudeep
0
 
LVL 62

Expert Comment

by:☠ MASQ ☠
Comment Utility
Are you able to launch the Windows PE boot environment through the FDE login?
When the PC reboots and the User Identification dialog box is displayed, press CTRL + F10 then login as normal and you should see the Alternate Boot Menu. If you can lauch the PE you may be able to repair Windows without having to use an Endpoint Recovery CD to decrypt the partition.
0
 
LVL 14

Accepted Solution

by:
ThomasMcA2 earned 250 total points
Comment Utility
Some encryption tools have a Recovery CD that can repair or validate the encrypted container. Also, have you searched (or asked your question) at Check Point's forum? (https://forums.checkpoint.com/forums/index.jspa)
0
 
LVL 91

Assisted Solution

by:nobus
nobus earned 250 total points
Comment Utility
as said - it must first be decrypted  - - then use this method :

http://support.microsoft.com/kb/307545
----------------------------------------------------------------------------------------------
An easier way is to boot from a Bart PE CD (or UBCD4Win CD) and use the file manager for manipulating files. Here  the procedure :
1. rename c:\windows\system32\config\SYSTEM to c:\windows\system32\config\SYSTEM.bak
2. Navigate to the System Volume Information folder.
it contains some restore {GUID} folders such as "_restore{87BD3667-3246-476B-923F-F86E30B3E7F8}".
The restore points are in  folders starting with "RPx under this folder.
3. In such a folder, locate a Snapshot subfolder. This is an example of a folder path to the Snapshot folder:  C:\System Volume Information\_restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8}\RP1\Snapshot
4. From the Snapshot folder, copy the following file to the c:\windows\system32\config folder
 _REGISTRY_MACHINE_SYSTEM
5. Rename _REGISTRY_MACHINE_SYSTEM to SYSTEM
6. Exit Bart PE, reboot and test

Use a fairly recent restore point from at least a day or two prior to problem occurring .

** you can add the other hives also with this procedure

http://www.nu2.nu/pebuilder/       BARTPE
http://www.ubcd4win.com/            UBCD4WIN
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

#SSL #TLS #Citrix #HTTPS #PKI #Compliance #Certificate #Encryption #StoreFront #Web Interface #Citrix XenApp
As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now