Versy Tyle said:
Thanks, Vanguard. Have done dozens of online scans.
I take it an IDS is not specifically an online thing, like a
firewall, and
that it would yield something comprehensible to the likes of my
computer-illiterate self? Given the history I have reported, I don't
know
how another application, whatever readings it comes up with, will
really
help....
Think it's a virus?
Hard to say. You mentioned repairing your system (which presumably
meant doing an in-place upgrade of Windows XP to step atop the instance
already on the hard drive; see ) but then said that the file system was
too screwed up to perform a recovery. Well, if the file system is so
screwed up that files cannot be copied onto hard drive then why would
you expect anything to behave on that partition? You mentioned
"transferring" the hard drive "data" to another system and the problem
followed. I don't know by "tranferring" if you meant that you saved a
drive image and then restored it on the other test system. I also don't
know if by "data" you meant you moved over data files (which are not
executable but only read by some application although their content
could affect the behavior of applications) or the move included all
files, including executables.
At this point, and since it sounds like you have multiple hard drives,
it sounds like you should move the drive so it is the second drive or
move its contents via an image or even a file copy to the second drive,
and then do a fresh install of Windows XP on the primary drive. Be sure
to do the following before doing the fresh install: (1) Create a
bootable floppy in another good host which includes the FDISK utility;
(2) Boot using the floppy and run "FDISK /MBR" to overwrite the
bootstrap area of the MBR (master boot record) on the first physical
drive found by the BIOS (and which gets used to load the bootstrap
program and read the partition tables in that MBR); and, (3) Reboot
using the Windows XP installation CD and lay down a fresh copy of the OS
(this will also overwrite the boot sector of that partition). Then
you'll have a clean install of Window XP on the first drive and nothing
on the second drive gets executed but you can start migrating your
data-only files back to the first drive (or cleaning off their non-data
only files from it). If your applications expect that data to be on C:
then you can move it singly from D: to C:. Otherwise, if the
applications expect the data to be on D: then I'd repartition the second
drive to have 2 partitions (logical drives in an extended partition) to
end up with a blank formatted D: and E: where are the files and then
move them singly from E: to D:. Obviously you are then in control of
what data files you are moving over.
The procedure I noted should eliminate getting reinfected with a root
kit, something that can usurp the MBR bootstrap program and embed itself
into the OS so it can hide itself from any application running under
that infected OS, like an anti-virus scanner. The reboots are needed to
ensure something nasty doesn't stick around in memory. However, it
might not be a virus at all but just a corrupted OS that is misbehaving.
Just be careful what you install thereafter as applications to prevent
getting the trojan, virus, or whatever malware. If your data files
contain macros then configure your applications to block them or prompt
you regarding letting them execute. When reinstalling the applications,
be sure to use read-only media. If they come on CD then they are
read-only. If they came on 3-1/2" floppy, be sure the tab is missing or
moved so the hole is exposed (and that they were always this way to
prevent getting written onto and infected). Because programs exist to
flash your BIOS (to update it to a new version), I suppose it is
possible that someone wrote some nasty program that would modify the
routines stored in the EEPROM for the BIOS that would continually screw
up your system. A fresh install of Windows from read-only media would
expose that problem if the defect exhibited itself again but for the
freshly installed OS.
It can take so much time and experimentation to get rid of an
undetectable nasty that it is more economical to start with a fresh
install of the OS and fresh install of the applications (and all from
read-only media). You said this problem has been around for months or
years so you've probably wasted more than the 2 to 4 evenings to do a
fresh install of OS and apps and migrate over the data-only files. In
one case, it sounds like you did just that and the problem went away so
that may be your best and easiest solution. Just remember to install
what you really need to have and not every piece of software you have
ever accumulated on your system. It is likely that the malware, if
present, is part of some fluffware. You might then consider getting
Drive Image, TrueImage, or another drive imaging program to save
periodic snapshots of your system to which you can restore. Do NOT rely
on the Windows XP System Restore. It's okay but not trustworthy.