If I login into XP the regular way, every program generates an application error of the genre "memory could not be written" or "memory could not be read".
If I login through the recovery console, this does not occur. All programs and executable work as normal.
Every virus, spyware, malware, trojan scan says the system is clean. I also ran a registry cleaner.
How do I fix this problem without formatting and reinstalling XP?
Tagged with: application error • formatting • genre • memory • registry cleaner • reinstalling xp • trojan scan • virus
Filed under: Windows Repair Software
What anti-virus do you use?
If you do not want format your computer, you can try an antivirus called AVG, it can remove the trojan.
Also clean your corrupt registry with ErrorFix to move damage caused by the trojan .
http://www.make-pc-faster.com/
download kaspersky boot-able os disc burn it to a disc run it at start up i will load Lunx and get up to date def’s scan comp (virus cannot run on lunx so it will remove them easy)
download and run process explorer – there is no installation – then kill any processes highlighted in red, after this run something like malwarebytes
if you find the problem not to actually be a virus etc – try to run chkdsk /r
Sounds like your at the point of no return. I would recommend backing everything up and scanning the drive of everything you backed up multiple times on a different computer. Even if you clean your computer with a Program, many viruses and trojans are made to lay low and then re-attack. A clean install may be your only option. Sorry but Good Luck.
A Trojan horse, or trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user’s computer system. The term comes from the Trojan Horse story in Greek mythology. Trojan horses are not self-replicating which distinguishes them from viruses and worms. Additionally, they require interaction with a hacker to fulfil their purpose. The hacker need not be the individual responsible for distributing the Trojan horse. It is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installe.
http://trojan-horses-killer.com