Quietman7 and JohnC_21,
Thank you for your support, suggestions, and/or recommendations. They may very well have relevance to the effects of the ransomware that has hijacked this old XP machine of mine.
I'm pushing forward, working with SurfRight technical support believing that the effects of the infection have made it impossible to boot off a HitmanPro gen'd USB flash drive as I have not seen that option on any startup mens.
Currently SurfRight tech. support directed me to code called "xbootsidekick" ISO which when executed gens/burns a CD as bootable which, in turn, starts HitmanPro on the USB flash drive. It works on my Windows 7 and Windows XP (inftected) machines but fails when I respond direct HitmanPro to startup by bypassing the Master Boot Record. It tells me, "Non-NTFS partition or encrypted disk detected". If SurfRight can't help me move beyond this point I may be forced to reformat and reload the OS.
In preparation for rebuilding the XP machine I've been looking into cables/adapters to connect the XP's HDD to my Windows 7 machine in order to pull off MS Outlook files. With the right cable/adapter should I be able to read the infected HDD and if so, what pitfalls must I avoid?
Thanks again for your support.