GoliatHD 0 Posted May 7, 2016 Share Posted May 7, 2016 Hello, it would be great if ESET detected simple things how: @echo off del/windows/system32/Recover del/windows/system32/winlogon.exe del/windows/system32/logonul.exe This code deleted Windows and you must reinstall Windows. Link to comment Share on other sites More sharing options...
SagePtr 1 Posted May 7, 2016 Share Posted May 7, 2016 These files are protected by OS, aren't they? At least, you should first change their ownerwhip, add write permissions for yourself... Then bypass Windows File Protection somehow... Not so trivial task. Link to comment Share on other sites More sharing options...
GoliatHD 0 Posted May 8, 2016 Author Share Posted May 8, 2016 Only a few files in System32 are protected. If you have Administration permissions, you can delete the files. Link to comment Share on other sites More sharing options...
Administrators Marcos 4,720 Posted May 8, 2016 Administrators Share Posted May 8, 2016 Why would one create a batch file to delete those files if he or she could do it via Windows Explorer or a file manager for instance? If such script is part of malware that got to your computer, report that malware to samples[at]eset.com and a detection for the malware will be added. Link to comment Share on other sites More sharing options...
GoliatHD 0 Posted May 8, 2016 Author Share Posted May 8, 2016 Ok I will report that malware and it gives some people who use the script for fun... (hxxp://virenhackstrolls.weebly.com/) Link to comment Share on other sites More sharing options...
Recommended Posts