Jump to content

Recommended Posts

Hello,

it would be great if ESET detected simple things how: @echo off

del/windows/system32/Recover

del/windows/system32/winlogon.exe

del/windows/system32/logonul.exe

This code deleted Windows and you must reinstall Windows.

Link to comment
Share on other sites

These files are protected by OS, aren't they? At least, you should first change their ownerwhip, add write permissions for yourself... Then bypass Windows File Protection somehow... Not so trivial task.

Link to comment
Share on other sites

Only a few files in System32 are protected. If you have Administration permissions, you can delete the files. 

Link to comment
Share on other sites

  • Administrators

Why would one create a batch file to delete those files if he or she could do it via Windows Explorer or a file manager for instance?

If such script is part of malware that got to your computer, report that malware to samples[at]eset.com and a detection for the malware will be added.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...