What and how to remove: virus deletes EXE-files or blocks access to programs

Today, many users of the Network "picked up" several unusual viruses that affect executable files, and even so, not all anti-virus programs to cope with them.Try to figure out what you can do in such a situation, but at the same time consider the problem of how to remove the virus «EXE» with flash.

How do viruses infect EXE-files?

situation is a manifestation of an outbreak of this kind is not new.That was before.The most common today is considered a computer Trojan-wrecker called Virus.Win32.Expiro. (Version «w», «ao», «bc» etc.).

hook it on the Internet is completely elementary, and then think what to do and how to remove it.The virus deletes the EXE-files, rather, making them unavailable for execution.It is not surprising that when you try to open a program or application, due to the impact of malicious code of the virus, the system does not recognize the executable file and displays a message that such and such a file is not found.

What is most sad, it's not only installed programs, but the

first run the installer (meaning if the distribution is downloaded from the Internet and stored on the hard disk).In the case of installation with optical media impact threat may appear later, at the end of the installation process.You probably should not say that when you start the installation process with the USB-drive is automatically virus jumps on him and infects all files with the extension .exe.

recognize the effect of the virus, but only when running the executable file.That is why, until the file is not running, some antivirus packages do not identify the threats and the presence of the virus is not detected at all.

problems antivirus

Let's see how and what to delete.The virus destroys EXE-files or blocked, in this case irrelevant.But then, as it turns out, two-edged sword.On the one hand, we are dealing with a virus by blocking files with another - the wrong response of antivirus programs.

For example, today we know a lot of cases where the same package for a given user Avast scan (rather than the penetration threat originally) virus still qualifies.However, the definition is reduced only to the fact that it shows the infected EXE-files and because of the impossibility of treatment removes them himself indiscriminately.Here is the situation.It would seem that everything is simple: everyone knows how and what to delete.The virus deletes the EXE-files do not even himself, and (paradox!) Makes it hands the virus scanner.Naturally, such a pest capable of creating their own copies and even masked by system processes such as svchost.

How to remove the virus (EXE-files are infected)?

With regard to combating this threat is not that simple.First of all, the majority of users can be advised not to use the free antivirus programs and utilities such as Avast, AVG, etc.In the extreme case it would be better in the system was the type of cloud antivirus Panda.

The best option - a powerful anti-virus software "Kaspersky Lab" or corporation ESET.By the way, you can hire the services of utilities such as Kaspersky Virus Removal Tool, only the first program in a portable version to be written on the optical disk using the uninfected computer, and run it with a CD- or DVD-media.Otherwise, successful treatment can not be guaranteed.

You can also use a small program like CureIt, who was treated infected files, not delete them.

But because the virus usually "sitting" in memory, the best solution would be the use of the boot from the optical media programs with the general title Rescue Disc.

They test all system components before the start of its own.In most cases, this method is effective.Incidentally, this technique is suitable for flash drives, only the parameters of the scan storage devices will need to be extra tick on the USB-drive.

Conclusion In general, I think, are some tips to help most users to understand how to remove the virus.Removes EXE-files or the virus itself produces unauthorized blocking executable files at once and you do not understand.But if there is the slightest suspicion of his presence, it is not recommended to run any program before the end of the complete scanning process, the treatment of the files and remove the threat.

In addition, it is desirable to have a system in any type of package Internet Security, capable of preventing the penetration threat still at an early stage.