Skip to main content

Remove Shortcut virus (USB pendrive virus) from infected PC

Learn an easy fix for the notorious shortcut virus that causes victim’s files on a removable drive or random computer volume to be replaced with shortcuts.
The contemporary malware environment is predominantly composed of threats whose objectives fit strictly into a commercialization context. In other words, today’s malicious programs tend to be written in order to further provide profit to their authors in one form or another. Here are just a few illustrations: the different variants of ransomware encrypt one’s files and employ smart extortion techniques to exchange the data for Bitcoins; rogue security tools report imaginary viruses on a PC and insist on the victim purchasing the worthless license so that the purportedly detected items can be eradicated; adware extensions forcibly change users’ web browsing defaults in order to serve ads and get paid for this by the interested parties. It’s all about money.
In this highly mercantile business framework, pests like the long-lived shortcut virus noticeably stand out because there seems to be no monetization background behind them. It’s like a comeback of the script kiddies’ prankish times, where the aspiration to break things was the number one priority. This, however, is a somewhat superficial and misleading first impression.
Peripherals displayed as shortcuts because of the malware
The shortcut virus, which has also been referred to as the Houdini worm, primarily affects removable media, including USB thumb drives, SD cards and other portable carriers of data. When plugged into a computer, the infected volume will be displayed in the system’s file hierarchy as a shortcut that’s only a few kilobytes large. Its contents, similarly, are going to be full of shortcuts other than the actual files. To top it off, the items usually cannot be opened in a regular way and, whenever clicked, launch the malicious program instead. The bug proper is a VBS (Visual Basic script) file, which does a few disruptive things when executed, aside from the apparent shortcut-related activity. It drops copies of itself to specific places in the affected operating system, in particular the startup configuration, temporary files folder, and the registry. Therefore, once the PC is booted up, the malware gets automatically executed, looks for removable devices plugged in, and distorts the file-level representation thereof.
Now, going back to the above-mentioned doubts regarding the shortcut virus’ purely mischief-driven goals, it turns out that the code communicates with remote attackers’ server and can thus facilitate an obscure compromise. This, in its turn, might lead to identity theft and suchlike adverse consequences. Although that’s a rare scenario, it’s worth mentioning. The malicious entity in question is also known to possibly affect the computer’s internal logical drives in the same way as it hits peripherals. Since the shortcut malware does a good job obfuscating itself, detecting it can be a challenge that not any AV can cope with. Therefore consider perusing and following the steps below to get rid of the ubiquitous annoying shortcuts and completely remove the virus itself.

Disable the shortcut virus using automatic security tool

Before you can proceed with getting the contorted files to be displayed in the regular way, execution of the shortcut virus needs to be halted. Follow these steps to prevent the malware from running:
  1. Download and install the featured security tool and launch an in-depth malware checkup by clicking Start Computer Scan buttonDownload Shortcut virus remover
  2. When the software returns a list of malicious and potentially unsafe items found on the PC, select Fix Threats in order to have the shortcut virus uninstalled from your machine. An additional virtue of this process is the elimination of other threats that may be active in the background.

Use Command Prompt to deploy the fix

  • Click the Windows Start button and type cmd in the Run fieldType cmd in the Run field
  • Make sure the cmd entry proper is highlighted (see image above) and hit Enter to access the Command Prompt tool
  • Type the following string: attrib -h -r -s /s /d f:\*.*, where ‘f’ stands for the name of the affected driveType attrib command
  • Hit Enter again to get the job done. The actual files will now be displayed.

Complete the shortcut virus removal process

Given the likely persistence of this adware sample, it’s recommended to repeatedly check the machine for its components after the cleanup procedure has been performed. Rescan your system with trusted security suite to make sure shortcut virus extermination has been successful.

Comments

Popular posts from this blog

USE HARDWARE ACCELERATION FOR VIDEO PLAYBACK | 4K HEVC 10bit | GPU DECODING GOOD or BAD ?

So as it seems that 4K is getting popular these days, but some people who have older computers may have some trouble playing 4K videos. Especially 10bit HEVC (x265) format. But the support for hardware decoding of HEVC 10 bit videos has been added few years ago. First of all lets see whether this hardware decoding is better than normal software(CPU) decoding compared with power. We won't be playing a game while watching a movie of course, at least not with a single monitor setup. So we can stop worrying about GPU usage going for 100% while watching a movie. But you could be doing many tasks with CPU while watching a movie. It is very practical. So lets turn into power consumption. This is very important for laptops. The following details are from a laptop with Intel Core i5 8250u with Intel HD graphics 620. File details. I used VLC media player latest version. All the Nvidia and Intel drivers used here are uptodate. Make sure you have the latest software and driv...

How To Move Blogger Inline Styles CSS to External CSS file with Google Drive Within 5 mins

Inline style are the major barrier between good SEO score and your blog.Inline styles make the code too big, so how long you write the code to text ration won't rise up.In blogger, inline styles are used by default.But most of the websites on internet use external style sheets as they are self hosted and the designers are very likely to use external CSS.Sometimes Blogger use internal styles.You can learn the difference between Internal CSS,Inline CSS and External CSS from W3 schools .Read this article on Inline VS External CSS . Probably you may have tried copying CSS between <b:skin> tags of your Blogger blog.If you tried that you already know that it doesn't work.Because Blogger has more CSS coding that won't show in Template>Edit.So to find the real exact CSS code of your blog follow these steps.For this tutorial you need a Google Drive account,if you have a Blogger account you may already have one.If you don't have a Google Drive account create one now...

DC Motor,Computer Cooling Fan Speed Controller Circuit DIY using Single Transistor And a Potentiometer

The circuit above can control speed of your DC motors or Computer Fans.If you use this to control speed of DC motors please use a diode to protect the Transistor,brush-less fans -OK.You can change the variable speed range by changing the value of R1 potentiometer.But don't use very high values,its pointless. The transistor used here is a NPN 2n3055,it can handle up to 15A and 115W of power.And this transistor can handle up to 60V.So if you're using this for PC fans you can add more in parallel.Normally a computer fan uses about 0.4W of power.Some powerful ones may use about 7W of power.If you don't use so much power then you can use a low power transistor like C1061,D313 etc. If you don't want to change the speed too often or hard to find a potentiometer or just willing to make this out of scrap you can use a Trim resistor for R1. The transistor may heat up very much and its essential to use a Heat sink.If you can,do not solder the transistor to the PCB s...