Skip to main content

Remove 'Shortcut Virus' and 'Automatically creating undeleteable Folder Virus' Without any anti-virus

Being a hosteler I can understand how capable is a computer virus in spreading like a plague in a society. Many people who do not have a deep knowledge about working of a computer feel helpless in front of such viruses even after having some paid anti-virus softwares.
Its time that we take matter into our own hands..

  • Open task manager as administrator. To do this you can open command prompt as admin by typing 'cmd' at the start menu and then right click and choose 'Run as Admin' and type taskmgr and press enter.
  • Go to processes tab and find a process 'wscript.exe'. It is a process which execute the scipts on your windows computer. Its presence shows that a script is running on your computer.
  • To delete a shortcut virus you need to end this wscript.exe process.
  •  Now go to My computer or windows explorer and click organize on top left corner, Go to folder options and then View tab, and click on 'Show hidden files' and UNCHECK 'hide protected OS files', click yes and Ok. This is because mostly all the virus files are hidden using system attribute.
  • Go to the drive which has stored your Windows files (generally C:/). Search for any file with .vbs extension, you can do this by searching '*.vbs'. The virus file would GENERALLY be named according to the name of folder being created or some useless name like asdfgdnjd or csdafdsacd etc. inside C:/Users/Username/AppData folder. Beware of interfering with any wrong file, if you are suspicious about one, google its name.
  • Once you find a suspicious file, right click on it and select 'open file location', You will be redirected to the folder which contain that file with another file with .exe extension. Permanently delete both .vbs and .exe file by pressing shift+del keys.
After deleting the virus file to be able to see the infected files you need to set the attribute of 'infected' files back to normal, for this:

  • Open command prompt as admin.
  •  Go to the path where the files were infected by typing 'cd pathname.
 For eg: cd f:/folder

  • Now type 'attrib *.* -s -h'  and press enter. This will convert all your hidden system files back to normal. If a folder or file is left you can use attrib folder/filename -s -h -r
  •  Now delete all the shortcuts from the location by using command del *.lnk
Any other query or suggestions are welcomed as comments.




Comments

Popular posts from this blog

Testing React loader with React Testing Library

 I have came across this situation so many times where I need to write a unit test for a component pattern I have developed so many times that I can write the code with my eyes closed. BUT what about unit testing! That's something my mind thought is the best candidate to get rid of in order to store more cat memes. Even when these patterns are used almost everywhere and we write the tests for each one of them (I hope you do) but still we (it can't be just me) tend to forget them and get even more confused with those pesky `act` warnings. So I decided to curate a recipe book for some common unit tests which I come across and might be useful for future me. Happy to share the github repo and also would love to see if anyone has more such common unit testing patterns which they can add or suggest. https://github.com/Charchit26/react-testing-library-recipes Now, let's talk about the one I have coded a dozen times and still take half an hour to struggle with its unit tests - Load...

Send Anonymous Mails!

Ever thought of a mischievous act like sending a mail with  a fake identity or using someone else's identity?? Sure, if you have that naughty prankster hidden in you! So there are ACTUALLY two common sites which may help you in such pranks.. They are... 1: http://www.sendanonymousemail.net/ Its got a pretty easy and user-friendly interface which makes it so special.. 2:   https://emkei.cz/ It can be considered as the advanced version for sending fake mails.. Its got a good variety of options for "geeks" as well as an html editor for cutomizing the mails! But Do Remember that  these tools would let you   send anonymous emails   free of cost   and let you be  hidden   at the same time, but they Do store your IP addresses, just in case your anonymous email indulges in illegal activities! So, Do NOT even try to send scary threats or spam like messages because you may get caught very easily and can be charged with fr...

Connect 2 Computers using USB to USB cable

A very easy way to connect two PCs is to use a USB-USB cable. By connecting two PCs with a cable like this, you can transfer files from one PC to another, and even build a small network and share your Internet connection with a second PC. The first thing you should be aware of is that there are several different kinds of USB-USB cables on the market. The one used to connect two PCs is called “bridged” (or “USB networking cable”), because it has a small electronic circuit in the middle allowing the two PCs to talk to each other. Cable without a bridge connector are called A/A USB cables and cannot be used to connect two PCs. In fact, if you use an A/A USB cable, you can burn the USB ports of your computers or even their power supplies . So, these A/A USB cables are completely useless. A/B USB cables are used to connect your computer to peripherals such as printers and scanners, so they also won’t meet your needs. As for speed, the bridge chip can be USB 2.0 (480 Mbps). The stand...