Shortcut virus is intolerable virus which infects our pendrives and computer systems and produces the cutting corners for each file it infects. It may spread in one computer to computer so easily, Usually through pendrive, If you’re searching a method to eliminate this shortcut virus and recover your files that are infected in your pendrive then do as instructed that I will be part of this publish.
You are able to eliminate this shortcut virus out of your pendrive just by formatting the pendrive, but that’s not solution when there’s important data in your pendrive. So within this publish I will highlight the best way to remove the shortcut virus and recover your files securely without formatting.
How To Remove Shortcut Virus from Pendrive with CMD
Open your Home windows command prompt window (Home windows R and CMD striking on Enter).
Now take note of your Pen Drive Letter within my situation it’s f
Now go into the following command in your Command Screen.
attrib -h -r -s /s /d f:*.*
Remember to alter the drive letter “f” within the above command together with your drive letter
This can take a moment to accomplish the execution from the command in line with the size the files in your pendrive.
After completing the execution open your pendrive and duplicate all of the files to rut.
Only copy the files you realize. Don’t copy again the shortcut files and files with us dot extension.
Sahil Shah is B.E passed out. He loves to do write and do experiments with online tools, software, and games. When he is not doing anything, he will be sleeping for sure. Eating, being online in the night is what he usually does.
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.