Dr. Hossenfeffer: I think you nailed it. Prior to going to the site that mouse-trapped me, my AVG antivirus detected a trojan that I neglected to remember the name of. I just denied access and surfed on. Not one of the smartest things I've ever done...
As the mousetrapped site would not let me out, I powered down my system which apparently activated the trojan.
I ran scanreg from DOS and selected the previous day registry. Exploring the Symantec link(Thanx!) shows that it does this to the Registry : "DisableRegistryTools"
This critter is nasty ! Here's what else this thing does to the Registry:
Key:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\Explorer
Values:
RestrictRun
NoChangeStartMenu
NoClose
NoDrives
NoDriveTypeAutoRun
NoFavoritesMenu
NoFileMenu
NoFind
NoFolderOptions
NoInternetIcon
NoRecentDocsMenu
NoLogOff
NoRun
NoSetActiveDesktop
NoSetFolders
NoSetTaskbar
NoWindowsUpdate
Nodesktop
NoViewContextMenu
NoNetHooD
NoEntioeNetwork
NoWorkgroupContents
NoSaveSettings
Key:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\System
Values:
DisableRegistryTools
NoConfigPage
NoDevMgrPage
NoDispAppearancePage
NoDispScrSavPage
NoDispBackgroundPage
NoDispSettingsPage
NoFileSysPage
NoVirtMemPage
Key:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\WinOldApp
Values:
NoRealMode
Disabled
Note: Booting to safe to no avail. The only thing it didn't do was format the drive !
My cloned backup drive saved the day(and the data)... Format and reload was about all I could see fit to do, and did.
Question: As I could boot to my good drive, could I have gone into the infected drive and edited its Registry, or can one only edit the registry of the drive that's booted to ???
Thanx again, Raydeo