Double click on the C disk, D disk, E disk, F disk folder cannot be ejected but choose to open the way(双击C盘,D盘,E盘,F盘不能弹出文件夹而要选择打开方式)
Double click on the C disk, D disk, E disk, F disk folder cannot be ejected but choose to open the way(双击C盘,D盘,E盘,F
盘不能弹出文件夹而要选择打开方式)
The drive cannot be double opened, indicating that Windows cannot find * * *.Exe, but you can open it with the right button. It is often only after reloading C can normally open, while the other disk still. Method 1,
First of all, get ready:
1., turn on my computer tools folder options in turn to view, select, display all files and folders, and remove the "hidden protected operating system file (recommendation)" before the hook.
2. use the right - click button to enter the drive and delete the Autorun.inf from the root directory!!! If the problem has not been resolved at this point, try the following:
Method 2,
In order to open the "tools - Options - file folder type" in the "registered file type" find "driver", then click the "advanced", then click "new" button in the "operation" fill in "open", "application for operation" fill in "explorer.exe%1" and return to the "edit file type" window, select the "open" and then click the default button.
The drawback of this fix is that double clicking on the drive opens a new data manager window. To prevent this from happening,
run regedit and set the key value of the
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell] in the registry to open2 instead of 1 or none. If it still doesn't work, try the following.
Method 3,
1., enter "regedit" in "run", enter the registry editor, locate to "HKEY_CLASSES_ROOT\Drive\shell", and delete all the contents under shell.
2. in the "run", type "regedit", enter the location to open the registry editor,
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\, will be left all (each check to prevent missing) shell branch under the project (if any) deleted, as in "{ead14650-d693-11da-a6e1-00e04c8c3cf5}" and "shell" branch and subordinate branch, so even the "shell" branch together to delete.
After the above processing, should be able to solve 99% of the problem. Good luck to all of you!
This could be the result of viruses and antivirus in your machine. This virus has a label AutoRun.inf file on each drive, as long as you click the drive, will activate the virus, we need to manually delete the AutoRun.inf file, enter "attrib" command prompt "
"Autorun.inf -s -h -r" removes its "system", "read only", "hide" properties, so enter "del"
"Autorun.inf" can be deleted. Then go to the registry to find the "COMMAND.EXE" key key item, and when you find it, delete the entire shell subkey.
The concrete solution is as follows (take D disk as an example):
Start - run ---cmd (open the command prompt)
D: dir/a (no parameter A is invisible and A is all)
At this point, you will find a autorun.inf file,
Attrib autorun.inf -s -h -r removes the autorun.inf file system, reads and hides properties, or cannot delete autorun.inf,
Del autorun.inf
Here is not the end, because you double-click on the D disk drive is not open but get an error. Locating DESKTOP.exe,
At this point, the automatically run information has been added to the registry. The following clears the registry related information:
start
Function
Regedit
edit
lookup
DESKTOP.exe
The first thing to find is the automatic run of the D disk, and the entire shell subkey is removed
Complete.
Repeat the above several times to solve the problem of other drives. The information in the registry is all together, and the D disk is deleted
Shell\Open\Autorun, by the way, delete it.
Rose virus:
Double drive symptoms: unable to open, only through the right click open; a few days after the NTDETECT.COM delete system files, the system can not start.
Routes of communication: U disk, MP3, mobile hard disk
Check method: remove the folder options - check the hidden protected operating system file (recommendation) before the tag, and select "show all files and folders" below this item". Then open any letter, if it is found that the "rose.exe" and "AUTORUN.INF" files have been poisoning.
Resolvent:
Manual:
The end of the rose.exe process, and then delete the following files: the letter autorun.inf and rose.exe files (including U disk, c:\windows\system32\run.reg, etc. Their)
c:\windows\system32\systemdate.ini (which records to delete NTDETECT.COM files at a time), d:\ systemfile.com file; finally the DLL below
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run in the registry key to delete, and then restart.
Automatic:
Clear tool download address:
Antivirus method for rose virus:
Version 1:
Rose.exe virus is mainly manifested in:
1, take up a large amount of CPU resources in the system.
In 2, each partition set up rose.exe autorun.inf 2 files, display automatically double-click the letter, but cannot open the partition.
3, mostly through the U disk, mobile hard disk and other storage devices to spread. The damage to the network is still in the
process of discovery.
4, may cause some of the operating system crash, performance in the boot self-test, directly and repeatedly restart, can not enter the system.
Because of some reasons, all kinds of anti-virus software have not provided the appropriate virus library, which can not kill the virus through antivirus software. Now the network center provides manual anti-virus methods, as follows:
1, call up the task manager, in the process page to end all the names of the Rose.exe process (recommended in the following operation repeated this operation, to ensure that the virus files will not be repeated attacks).
2, in the beginning - run, enter "regedit" (XP system), open the registry, find all the "rose.exe" key key item, found after the entire shell subkey delete.
3, in my computer tools folder options - View - show all files and folders, the "hidden protected system files" hook removed.
4, for each drive right click and open enter (remember not double-click), delete all rose.exe and autorun.inf files.
5, in the c:windowssystem32 search, there is no rose.exe file, if it exists, delete it directly.
Method two:
1, when the boot, press F8 to select safe mode
2, in the beginning - run, enter "regedit" (XP system), open the registry, find all the "rose.exe" key key item, found after the entire shell subkey delete.
3, in my computer tools folder options - View - show all files and folders, the "hidden protected system files" hook removed.
Find the contents of the TEMP and Temporary Internet Files folder below C:\Documents and Settings\Local Settings\, and delete all that can be deleted. In addition, the system Volume Information directory (folder) (WinXP), please turn off system restore.
System Volume Information directory (folder) (WinXP) is the directory used for system restore, if the virus hiding there, you need to shut down the system restore.
Turn off the Windows XP system restore
Click start". Right click my computer, and then click properties".
Click the system restore tab.
Select "turn off system restore" or "close system restore on all drives"".
Click apply, and then click ok".
4, for each drive right click and open enter (remember not
double-click), delete all rose.
Exe and autorun.inf files.
5, in the c:\windows\system32 search, there is no rose.exe file,
if it exists, delete it directly
Posts from moderators
Method three:
If any of the following documents are deleted
X:\autorun.inf
X:\rose.exe
C:\system32\rose.exe
C:\NTDETECT.COM
C:\NTDETECT.COM
C:\NTDETECT.COM
C:\system.sys
C:\windows\system32\run.reg
C:\windows\system32\systemdate.ini
D:\systemdate.ini
D:\systemfile.com
Registry key
Rose.exe
Shellexecute=rose.exe
Would like to ask whether you have been forced to switch off after changing the registry? Because there is this code......
Experience:
In addition to the rose virus said above
1, take up a large amount of CPU resources in the system.
In 2, each partition set up rose.exe autorun.inf 2 files, display automatically double-click the letter, but cannot open the partition.
3, mostly through the U disk, mobile hard disk and other storage devices to spread. The damage to the network is still in the process of discovery.
4, may cause some of the operating system crash, performance in the boot self-test, directly and repeatedly restart, can not enter the system.
In addition, you can copy the executable file and modify the file name, and save your registration information in every possible registration information, and may cause browser error
Resolvent:
Manual operation
1. Call up the task manager to end all processes with the name "Rose.exe" in the process page. (it is recommended that this operation be repeated in subsequent operations (to ensure that the virus files do not repeat attacks).
2, in the beginning - run, enter "regedit" (XP system), open the registry, find all the "rose.exe" key key item, found after the entire shell subkey delete.
3, in my computer tools folder options - View - show all files and folders, the "hidden protected system files" hook removed.
4, for each drive right click and open enter (remember not double-click), delete all rose.exe and autorun.inf files.
5, in the c:windowssystem32 search, there is no rose.exe file, if it exists, delete it directly.
Then refer to the moderator's zcp08765 post to delete
X:\autorun.inf
X:\rose.exe
C:\system32\rose.exe
C:\NTDETECT.COM
C:\NTDETECT.COM
C:\NTDETECT.COM
C:\system.sys
C:\windows\system32\run.reg
C:\windows\system32\systemdate.ini
D:\systemdate.ini
D:\systemfile.com
After this manually delete, using all of the letter will find
Jiangmin scanning
C:\System, Volume,
Information\_restore{716B96B6-B35C-4784-B6F8-A8F1C6954777}\
RP57, or RP56
D:\System, Volume,
Information\_restore{716B96B6-B35C-4784-B6F8-A8F1C6954777}\
RP57, or RP56
E:\System, Volume,
Information\_restore{716B96B6-B35C-4784-B6F8-A8F1C6954777}\RP57, or RP56
Delete all the rose.exe and autorun.inf files and the rose.exe and autorun.inf files that have changed the filename
The modified file name may be A0053***.exe A0053***.inf, and the virus file may be more than one
Sxs.exe virus manual deletion method (virus causes partition disk to double click and cannot open)
The virus causes the partition disk to double click and cannot open. The rising flag is automatically closed and cannot be opened.
Reinstall the system, double-click the partition disk again, depressed, rising automatically closed, unable to open, decided to manually delete it
Phenomenon: the hidden system files can not be displayed, double-click the letter without reflection, the task manager found that sxs.exe or svohost.exe (svchost.exe system and process yizizhicha),
Antivirus software real-time monitoring, automatic shutdown, and can not open
Many ways to find the Internet can not be effectively deleted, and there is no special killing tool
Manually remove the "sxs.exe virus" method:
You can't double-click the partition disk during the whole process, and you need to open it with the right mouse button
Shut down the virus process
The Ctrl + Alt + Del task manager looks for SXS or SVOHOST in the process (not SVCHOST, with a difference of letters) and, if anything, ends it
Two, show hidden system files
Run - regedit
HKEY_LOCAL_MACHINE\Software\Microsoft\windows\CurrentVersion\explorer\Advanced\
Folder\Hidden\SHOWALL, modify the CheckedValue key to 1
It should be noted that the virus will delete the already valid DWORD value CheckedValue, creating an invalid string value, CheckedValue, and changing the key to 0! It is useless for us to change this to 1. (some of the virus variants will delete the CheckedValue directly, just as you do, and you can build one yourself.)
Method: remove the CheckedValue keys, right click the new Dword, named CheckedValue, and then modify its value is 1, so you can choose "show all hidden files and file display system".
In the folder tools folder options, set system files and hidden files to display
Three, remove virus
Click the right mouse button on the partition disk to open, and see that each disk and directory have two files, autorun.inf and sxs.exe, deleted. You can also use the search for the entire hard disk, but remember to hook the search files and folders in the advanced options
Four, delete the virus automatically run items
Open registry run - regedit
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
Find the SoundMam key below, there may be two, delete the key value is C:\\WINDOWS\system32\SVOHOST.exe
Finally, delete the SVOHOST.exe or sxs.exe in the
C:\\WINDOWS\system32\ directory
Restart the computer, found antivirus software can be opened, the partition disk double-click, you can open it.
If rising computer monitoring can not be opened, or opened is received a red umbrella, and all have failed to open the monitor, then the "control panel", "management tools" - "service", find
"Rising Process Communication Center", should be disabled, right click the "properties", a startup type to "automatic", and enable the service.
According to some users, this autorun.inf file is different. It may be a variant. At least autorun.inf, this paragraph is the same. Some are: autorun.inf.****., this * * * may be different. Please add it below
2006-08-25 joins at 16:25
Delete the BAT of each disk virus file
The following code is saved as bat
CD
C:
Attrib, sxs.exe, -a, -h, -s
Del, /s, /q, /f, sxs.exe
Attrib, autorun.inf, -a, -h, -s
Del, /s, /q, /f, autorun.inf
D:
Attrib, sxs.exe, -a, -h, -s
Del, /s, /q, /f, sxs.exe
Attrib, autorun.inf, -a, -h, -s
Del, /s, /q, /f, autorun.inf
E:
Attrib, sxs.exe, -a, -h, -s
Del, /s, /q, /f, sxs.exe
Attrib, autorun.inf, -a, -h, -s
Del, /s, /q, /f, autorun.inf
F:
Attrib, sxs.exe, -a, -h, -s
Del, /s, /q, /f, sxs.exe
Attrib, autorun.inf, -a, -h, -s
Del, /s, /q, /f, autorun.inf
G:
Attrib, sxs.exe, -a, -h, -s
Del, /s, /q, /f, sxs.exe
Attrib, autorun.inf, -a, -h, -s
the / s / q / f autorun.inf