LANGALIST By Fred Langa A subscriber’s PC was commandeered by malware; even the administrator’s account is now inaccessible! How can this PC be safely
[See the full post at: Salvaging a fatally hacked PC]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Salvaging a fatally hacked PC
Home » Forums » Newsletter and Homepage topics » Salvaging a fatally hacked PC
- This topic has 7 replies, 7 voices, and was last updated 3 years, 2 months ago.
Tags: AskWoody Plus Newsletter Audio Google Remote Desktop LangaList Remote Desktop Connection System Recovery
AuthorTopicFred Langa
AskWoody MVPMarch 14, 2022 at 2:44 am #2431342Viewing 3 reply threadsAuthorReplies-
bbearren
AskWoody MVPMarch 14, 2022 at 9:23 am #2431434How can this PC be safely returned to service, especially now that Windows 11 is closing some of the old back-door admin-access workarounds?
The same methods I would use (after replacing a dead drive) if my drive(s) had gone belly up. If the drive(s) are merely compromised, I could skip the replacement steps.
I would restore my latest Image for Windows full drive image, which, although admittedly two to three months old, will effectively completely wipe the drive and restore my partitioning and all data, some of which (depending on the partition) has not changed in the intervening time period.
Then I would use my latest pertinent partition images (OS, Programs, User Data) which are never more than one week old. Any relevant new data (since the last weekly image) I can retrieve from my NAS or the cloud. The full process might take an hour, and leave me confident that I had no vestigial nastiness anywhere.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.We were all once "Average Users". -
Millwood
AskWoody Plus -
oldguy
AskWoody LoungerMarch 14, 2022 at 5:03 pm #2431640To recovery from a firmware based exploit you’d need to have a motherboard with the BIOS and network boot flash (if separate) in sockets, and to have taken images of those before hand and made and tested replacements as the soldering now is a bit mission impossible. (The network boot flash is seldom mentioned and separate, but just as vulnerable, with some designs that area can be hooked with a CMOS setting change or default on some systems though SMM / secure boot should catch that and stop the boot). Dealing with SOIC 8 (solder down) chips was difficult, the new chips are half that size again and you can’t socket the BGA chips easily so extreme measures are needed. Basically it can be done but you can see the literal scale in the work you’d be undertaking here (not a PC in this case; just for scale..): https://blog.quarkslab.com/flash-dumping-part-ii.html
It would seem sensible the main target for firmware attacks would be ransoming access to the system and the Windows license so they’re not going to leave the BIOS in a state where you can flash anything, and flashing in the usual context doesn’t usually alter the platform binary table or remove definition blocks which define drivers inserted into the memory by the UEFI firmware which could be / have been vehicles for firmware instigated malware. (https://uefi.org/specs/ACPI/6.4/05_ACPI_Software_Programming_Model/ACPI_Software_Programming_Model.html#definition-blocks)
And it might be the consumers they come after next year..
So what to do? Probably regular backups (as the software will have been compromised to leverage an attack), add your Windows license to a Microsoft account even if it’s OEM and have a spare motherboard and a device which doesn’t run Windows to find out how and when it might be safe to use that?
By the way, if you want to make an account inaccessible try setting read only on it’s NTUSER.DAT. The user profile service doesn’t like it. How the odd customer managed to achieve that state was always a mystery given the file normally has H and S attributes set… though I last saw that in about 2018..
Also not mentioned as a method for malware removal is the use of reg load (in the command prompt of the recovery options started from external media) to load the system and ntuser.dat hives into the registry of the recovery environment.
You can then use regedit to manually hunt and remove the hard to detect (self hiding) obfuscated code sometimes found in various run keys and shell open command areas of the mounted registries, and remove items such as Windows defender entries which sidestep that protection, to weaken the infection enough to be able to get the Windows protection running to clean up the mess, but to be honest I’ve only done that to get in to export browser settings and the like before backup and bare metal restore.
When attackers have written code to burry itself in and its that custom that malware scanning from a boot disk can’t find it, the time has arrived to declare the whole installation lost and only backup user files which are needed (and treat those as potentially infected after reinstalling / restoring the last backup).
Of course to know which backup to use you need to know when the problem actually arrived, as opposed to when it showed its hand (which could be any time thereafter) and to be honest in that situation the only backup I could really trust is the factory default, and only then if I patched all the software in that factory default before doing anything else so when I get there it’ll be time for the recovery media..
Windows is a case for creating your base install, adding software, sysprep preparing the software and taking a FFU image (for bare metal recovery), and then once finally set up your account, you can take incremental WIM backups of the partitions or use the usual backup candidates if you care to..
I don’t think “fatally hacked” is a situation unless it refers to something maintaining life which fails in its function. Perhaps “functionally irretrievable within the bounds of sensible economics and technical expertise”? Anyone good with acronyms?
-
bbearren
AskWoody MVPMarch 14, 2022 at 9:33 pm #2431700I recovered two installations (two PC’s) completely after a house fire destroyed the hardware by restoring my drive images to new hardware. By drive images, I mean as described in my reply #2431434 above. That method is the most time-efficient and fault free.
There’s no need for overkill.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.We were all once "Average Users". -
Carl
AskWoody PlusMarch 14, 2022 at 10:25 pm #2431707I agree. I keep 40 generations of incremental backups and 30 image backups on multiple, ransomware protected, backup drives.
If the cost of restoration (my time is valuable) is more than the cost of replacement, guess which one wins. I’d still restore the BIOS from a known good BIOS image (I keep multiple gens of those too) just for peace of mind. I don’t think a sophisticated state actor would be attacking my firmware.
But, I’m looking at two of my backup drives sitting on my desk right now. After reading your comments, I think I’ll get off my lazy *** and put them in the fire proof safe where they belong ……
-
-
-
anonymous
GuestMarch 15, 2022 at 3:37 am #2431750Browsers routinely communicate their associated IP address and full user agent string with every site they visit. This data can include the browser family, type, mobile or desktop variant, version, OS brand, bittedness, current resolution, compatibility information, and numerous other platform, browser, and extension details.
But Remote desktop apps have access to every keystroke you press. And we know Google loves to try and analyze what we type to get information on us.
-
johnf
AskWoody LoungerMarch 16, 2022 at 12:14 am #2431950Browsers routinely communicate their associated IP address and full user agent string with every site they visit. This data can include the browser family, type, mobile or desktop variant, version, OS brand, bittedness, current resolution, compatibility information, and numerous other platform, browser, and extension details.
Here’s a good article on how to reduce your browser fingerprints
https://www.experte.com/it-security/browser-fingerprint
As far as rescuing some one else’s PC from a bad infection, it’s rare to find users who do regular backups on an external device. If a Windows 10/11 refresh isn’t possible because of the severity of the infection, and there are no good backups, I usually boot a Linux Live USB and transfer data ONLY to a new USB Hard Drive. Then I’ll do an initial scan with Clam on the USB hard drive. After that, I’ll put the USB hard drive aside, do a fresh format and new Windows install on the PC, and then run malware/anti virus scans on the USB drive before transferring the data back to the PC. If I’m feeling paranoid, I’ll replace the Hard drive on the PC itself before doing the new Windows install (probably a good idea anyway, as HD’s don’t last as long these days).
I’ll set up the user account as a NON ADMIN account, using strong passwords for both the User account and the Admin account (Windows users shouldn’t be running as admin!!). I’ll talk to them about not downloading email attachments, or accepting all the defaults when installing software (you don’t need multiple anti virus programs or nasty malware just to get a free program). I’ll also talk to them about using firewalls on the PC and the router, and not abuse them by using programs that create holes just to play games and such.
I’ll also suggest doing regular malware and virus scans, along with regular backups on removable media. Speaking of removable media, I’ll suggest scanning all flash or other drives you attach EVERY time you connect them to the PC, and NEVER use a flash drive that’s been used on another PC. Even new ones should be scanned before use!!
I’ll talk about using 2 factor authentication when possible, safe surfing, etc.
And after all that (and more), I’ll expect to hear back from the same user in a year or less complaining about an infection. Bad habits die hard, and Windows PC’s are a LOT of work to maintain, something people don’t want to hear.
-
Viewing 3 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
9 hours, 31 minutes ago -
Windows 11 Insider Preview build 26120.4161 (24H2) released to BETA
by
joep517
9 hours, 33 minutes ago -
AI model turns to blackmail when engineers try to take it offline
by
Cybertooth
2 hours, 17 minutes ago -
Migrate off MS365 to Apple Products
by
dmt_3904
5 hours, 42 minutes ago -
Login screen icon
by
CWBillow
57 minutes ago -
AI coming to everything
by
Susan Bradley
9 hours, 42 minutes ago -
Mozilla : Pocket shuts down July 8, 2025, Fakespot shuts down on July 1, 2025
by
Alex5723
1 day, 1 hour ago -
No Screen TurnOff???
by
CWBillow
1 day, 1 hour ago -
Identify a dynamic range to then be used in another formula
by
BigDaddy07
1 day, 2 hours ago -
InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
by
Alex5723
1 day, 13 hours ago -
How well does your browser block trackers?
by
n0ads
1 day ago -
You can’t handle me
by
Susan Bradley
11 hours, 33 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
16 hours, 37 minutes ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
2 days, 1 hour ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
1 day, 4 hours ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
2 days, 1 hour ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
2 days, 1 hour ago -
Lumma malware takedown
by
EyesOnWindows
1 day, 13 hours ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
2 days, 10 hours ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
2 days, 10 hours ago -
Meet Gemini in Chrome
by
Alex5723
2 days, 14 hours ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
2 days, 14 hours ago -
Trump signs Take It Down Act
by
Alex5723
2 days, 22 hours ago -
Do you have a maintenance window?
by
Susan Bradley
1 day, 3 hours ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
2 days ago -
Cox Communications and Charter Communications to merge
by
not so anon
3 days, 1 hour ago -
Help with WD usb driver on Windows 11
by
Tex265
12 hours, 58 minutes ago -
hibernate activation
by
e_belmont
3 days, 10 hours ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
3 days, 14 hours ago -
Windows 11 Insider Preview build 26200.5603 released to DEV
by
joep517
3 days, 17 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.