Skip to main content

How To Remove Shortcut Virus From Drives And Memory Card Easily

Have you plugged in your external harddrive or flash in your computer only to see all your files showing up as a shortcut? Well what's your feeling if you've had such a experience before? Not good I suppose.

Virus when allowed to run for a long time grows stronger and gives birth to new ones, they multiply and spreads like worms, that is why you need to control them, yes it's true that having anti-virus is not 100% gurantee that virus won't enter in our computer, to do our part we need to be updating them, as a preventive measure, the truth is prevention is always better than cure.

There are many virus common in computers amongst these many viruses, there is this virus which can change or turn folders of very large Megabytes and Gigabytes (MBs/GBs) into small kilobytes (KBs) they are usually named “regsvr virus” (Note: It's important not to confuse it with the System fileregsvr32as they are two files which are entirely different.) So this virus has struck your computer or external storage and you'v found out you can't open or run those shortcut, what can you do?

This tutorial deals with this really good, not overly technical for non technical readers to get confused it's simple and easy to implement read on and apply this tips so that you'll fix this virus shortcut problems on you computer and storage devices.

Ways to Get Rid of Shortcut viruses on Removable devices and Computer

There are two ways here either you download softwares which are created for just this purpose or you become a software and do it yourself. Lets talk about the first way which is downloading softwares, you can download this softwares to help you kill this shortcut viruses once and for all.

Before downloading this software maybe you should just update your existing anti-virus. Alright here is a list of anti-virus that will help you and your computer take care of this virus for good.
Wnload Combofix shortcut remove"
autorun exterminator
smadav shortcut virus remover. Download any one then follow the instructions on their site.

Second way is a bit technical, it can also be called manual way.

Steps to remove shortcut virus on Computer and RD

step 1. Insert whichever drive is infected by this virus into your Pc and check the drive's extension that is A: to Z: from ‘My Computer’ ClickStart » Run / Winkey+R and type cmd in the textbox provided, then press Enter.

2. Copy and paste the code below into the command prompt and press 'Enter'. attrib -h -r -s /s /d E:\*.* (Change E: to your drive's extension.)

3. Next is to,check and confirm whether this virus has been completely cleared off. If you succeed good for you, if you didn't there is another manual alternative

4. Find and locate control panel and untick“Hide protected operating system files”or you use the search box, in the Start menu,

Go now to “C:\Windows\System32” and manually deleteregsvr

5. If you can't find the file in System32, then try locating it in “C:\program files” If you still didn't find it there, then try looking for it in the “Processes”tab in Task Manager

With all this options open for you, you can now remove that shortcut virus to avoid corrupting your files.


  1. We do repairs for customers nationwide, so you can board us your computer or driblet it off at our localized fix facility in Cary, NC. We do all types of repairs from virus separation to altering dashed LCD screens. See the our tilt of services here: managed IT services. We engage whatsoever types of repairs that can forestall significantly over the "modal" method. For illustration, we do laptop Commonwealth Knave repairs instead of replacing the intact motherboard. We palm all types of computers from Apple to Toshiba. We handgrip desktops, laptops, netbooks and tablets. Due to the mammoth symbol misused in the group, we are especially acknowledged for our Lenovo / IBM Thinkpad repairs. Literally thousands of ThinkPad laptops have on accumulation exploit - whether it is photos of your grandchildren or your organization's QuickBooks data - we couple it is central: managed IT services We also conceive in action you money, so we give suitable values on both new and utilised (refurbished) computers. Cease by and see what we bed in soup, it is constantly changing but you can ever acquire few Thinkpads in accumulation.


Post a Comment

Drop your comments please

Popular posts from this blog

8 Best Nigerian Skin Bleaching And Whitening Creams

By Elizbeth Lizzy ABeauty Therapist

Check this collection of creams that's currently hot in the market right now this creams will make your skin fair and white, it doesn't matter if you are dark like charcoal or if you are already fair. What matters is they will lighten your skin to the desired color. There are many reasons why you might want to bleach, there also many benefits of bleaching. For some.

Reasons for Bleaching You may have spots on your face or old body caused by freckles, age spots, liver spots, birthmarks, burns, sun burn scars, accident scars and any other scars. Also condition like hyper-pigmentation, hypo-pigmentation, or any one of many embarrassing skin conditions that may be making you feel self-conscious thus having low-confidence.

 About this skin bleaching creams Most of this skin whitening treatments act by blocking melanin production.
Their main action is to inhibit the enzyme tyrosinase. Several treatments use a combination of gels or lotions alo…

Simple Way To View Private Twitter Accounts

Update: If you rather you do it the easy way, there is an app that will help you do this, they offer one view per user, if you'll like to view more then you have to upgrade. you'll also have to endure some adverts or survey though, here is the site megaview

There is no feeling greater than the feeling you get when you finally get to see what someone has been hiding from you, yes catching someone at their game is a great feeling.

A lot of tools has come and gone, like TwtRoulette, an online tool that let's you view private tweets. A lot twitter holes has been patched, but then there is one that's not patchable , one hole that still remains. Privacy is all about what you can't see, when one make a thing private he believes others can't see it, that he or she is the only one that can see it, this includes some certain things he thought might be private thereby taking it for granted. Well this might shock you not everything on your profile is private. One could for…

Full Nigerian Internet Configuration Codes/Settings For Smartphones

Here are the full list of internet configuration codes for automatic configuration and settings for manual configurations, each platform is taken care of, that is each of Android, Java, Symbian and Apple (iOS) has its own personalized settings and codes so that you don't have to worry about looking for each one.
There are about 4 major network carriers in Nigeria that provides internet services to its customers. Those networks provides many services from non-internet services like; Voice calls, SMS, Multimedia to internet services like; Web (Access points, GPRS, 3G, 4G etc), Data bundles for browsing, Live streaming and downloads. Although there a host of other network providers in the country but this four networks which are MTN, Glo (Globacom), Airtel, Etisalat are the biggest and also they are used by majority and as such they are those we will at.