Live Recovery OS and AntiVirus Media

All of the information, instructions, and recommendations on this Web site are offered on a strictly “as is” basis. Remember “Murphy’s Law.” You must take the proper precautions before attempting any of the tips or modifications listed here.

These are links to free ISO files that you can use to create bootable media that can diagnose and clean an Windows systems.



  • Once your system has been compromised, you can never be 100% certain that there isn’t anything still lurking in the OS, watching everything you do.
  • You should backup your data, format the drive, and do a clean installation of the OS and applications from CD/DVD/Flash Drives that you know are clean.
  • You can use a Live Bootable Media to backup your important personal files (documents, photos, etc.).
  • Read: Help: I Got Hacked. Now What Do I Do? and Help: I Got Hacked. Now What Do I Do? Part II

Live Utility Discs

These are links to free ISO files that you can use to create bootable discs.

Boot a PC from any of the following Live Discs to help you:

  • Test the hardware without needing a working OS already installed.
  • Partition, format, etc. the hard drive
  • Determine the name of devices so that you can download the correct Windows device driver
  • Fix or replace files to get Windows working again
  • Copy your data from a system that won’t boot, as long as the drive is still working.

ISO Downloads

To Scan and Clean Malware

From a computer that you know is free of any malware:

  1. Download the ISO
  2. Create/burn a bootable optical disc from the ISO

On the afflicted PC,

  1. Insert the Live disc into the affected PC
  2. Turn off the affected PC
  3. Turn on the affected PC and select the option to boot from the CD/DVD/Optical drive, and boot from the Live disc
    • For Dell systems: Press F12 when it’s just starting to display the “One-time boot menu,” then select “CD/DVD/CD-RW Drive” to boot from the CD
  4. Use the Live disc to scan and clean the system


Live Disc (CD/DVD)Home PageBased onUpdates?
BitDefender Rescue CDBitDefenderLinuxAutomatic
Windows Defender OfflineWindows
Comodo Cleaning Essentials (CCE)
Kaspersky Rescue Disk oKasperskyLinuxManual
F-Secure Rescue CDF-SecureLinuxAutomatic
AVG Rescue CDAVGLinuxManual
Avira AntiVir Rescue SystemAviraLinux?
Dr.Web LiveCD / Dr.Web LiveUSBDr.WebLinuxAutomatic

Note: Automatic means the disc will automatically start downloading the latest updates if Internet access is available. Manual means that you have to initiate the update process once the application has loaded, before you start scanning.

Unhide Files After Trojan/Malware Aftermath

This is how to recover after a malware infection that hides directories and files, and may also add shortcuts with the names of the hidden directories.

To un-hide the directories/folders and files:

  1. Insert your affected USB flash drive into the PC, and make a note of the drive letter assigned to it.
  2. Open a command prompt and type the following command, and then press ENTER:
attrib -h -r -s /s /d X:\*.* 

(Replace X: with the drive letter of your flash drive.)

  • -H Clears the hidden file attribute
  • -R Clears the Read-only file attribute
  • -S Clears the system file attribute
  • /S Process matching files in the current directory and all subdirectories
  • /D Process folders as well.

You’ll need to also delete all the bogus shortcuts using the following command, and then press ENTER:

X:\del /a /f *.lnk/s