• USB Disk Security – protects your computer from viruses from USB flash drives. Several ways to clean a flash drive from viruses

    Modern antiviruses have already learned to block autorun.inf, which launches a virus when a flash drive is opened.
    It has been walking around the network and from flash drive to flash drive for quite some time. new type viruses of the same family, simply another Trojan. Infection with them can be immediately detected with the naked eye without any antiviruses, the main sign is this all folders on the flash drive turned into shortcuts.

    If the flash drive is very important files, first of all, you will rush to open all the folders (shortcuts) one by one to make sure there are files - This is not worth doing at all!

    The problem is that these shortcuts contain two commands, the first is to launch and install the virus on the PC, the second is to open your precious folder.

    We will clean the flash drive from such viruses step by step.

    Step 1: Show hidden files and folders.

    If you have Windows XP, then go to: “Start-My Computer-Tools Menu-Folder Options-View Tab”:

    On the “View” tab, find two parameters and execute:

    1. Hide protected system files (recommended) - uncheck the box
    2. Show hidden files and folders - select the switch.

    If you have Windows 7, you need to go a slightly different path: “Start-Control Panel-Appearance and Personalization-Folder Options-View Tab”.


    You need the same options and need to enable them in the same way. Now your folders on the flash drive will be visible, but they will be transparent.

    Step 2. Cleaning the flash drive from viruses.

    An infected flash drive looks like the image below:


    In order not to delete all files from the flash drive, you can see what any of the shortcuts launches (usually they launch the same file on the same flash drive). To do this, you need to look at the properties of the shortcut, there you will find a double launch - the first opens your folder, and the second launches the virus:

    We are interested in the “Object” string. It is quite long, but it is easy to find the path to the virus in it, most often it is something like 118920.exe in the Recycle folder on the flash drive itself. In my case, the double run line looked like this:

    %windir%\system32\cmd.exe /c “start %cd%RECYCLER\6dc09d8d.exe &&%windir%\explorer.exe %cd%support

    Here is the same path: RECYCLER\6dc09d8d.exe- a folder on a flash drive and a virus in it.
    We delete it along with the folder - now clicking on the shortcut is not dangerous ( if you haven't run it before).

    Step 3. Restore the previous appearance of folders.

    1. Delete all the shortcuts to our folders - they are not needed.
    2. Our folders are transparent - this means that the downloader virus has marked them as system and hidden. You cannot simply disable these attributes, so you need to use the attributes reset via the command line.

    There are 2 ways for this:

    Open “Start” - “Run” - Enter the CMD command - press ENTER. A black window will open command line you need to enter the following commands:

    • cd /d f:\ press ENTER, where f:\ is the letter of our flash drive (may differ from the example)
    • attrib -s -h /d /s press ENTER - this command will reset the attributes and the folders will become visible.

    1. Create text file to flash drives.

    2. Write a command attrib -s -h /d /s into it, rename the file to 1.bat and run it.

    3. If you are unable to create such a file, you can download mine: .

    If there are a lot of files, it may take time to execute the command, sometimes up to 10 minutes!

    4. After this, you can return to the first step and restore the previous appearance of the folders, that is, hide system hidden files.

    How to check if your PC is a virus carrier?

    If you suspect that it is your PC that is spreading this virus across flash drives, you can view the list of processes in the task manager. To do this, press CTRL+ALT+DEL and look for a process with a name similar to FS..USB..., instead of dots - some letters or numbers.

    The source of this process is not deleted by either AviraAntivir, DrWeb CureIT, or Kaspersky Removal Tool.

    I personally removed it with F-Secure with a trial version, but it is hidden in the form of a driver and you can find it using the utility Autoruns.

    If you delete a virus from a flash drive, and the folders become shortcuts again?

    I’ll say right away that I didn’t have such a situation. I don’t know exactly how to treat it. I see three ways out of the situation:

    • we demolish Windows (1.5-2 hours, the fastest way);
    • install F-Security, Kaspersky, Dr.Web ( trial versions) take turns and go through the computer with “full checks” until we find a virus (usually 3-4 hours, depending on the power of the PC and the number of files);
    • burn DrWeb LiveCD to a disk or flash drive, boot from it and study the computer.
    • F-Secure Online Scanner (will ask you to run Java module, you have to agree)

    You can download trial versions of these antiviruses for 1 month, update their databases and check your PC using them.

    It seems that’s it, contact me - I will always answer, sometimes with a delay.

    “I can add that there are also viruses such as Sality (Sector XX - where XX numbers like 05, 15, 11, 12 are modifications, it is not clear who creates them) corrupts executable exe file s... I invented my own way to combat such viruses using the same Dr.Web CureIt! having in hand a WinXPE system recorded on a 700 meter CD-R... loading the system from disk and using it is not hard memory, but operational.

    Works great. The disk inserted loading from the disk, turned on, put in a flash drive with a pre-recorded “FRESH” CureIt!... and voila.. I ran the entire hard drive for the presence of muck. What’s most interesting is that during this process, as with the Life CD from the Web, the viruses “sleep”, i.e. The system is not loaded, and it’s somehow more convenient with the operating system.

    class="eliadunit">

    Record ID: 32 does not exist!

    Nowadays they have gained enormous popularity Flash drives information or, as they are popularly called, flash drives. Virus writers rushed to take advantage of this circumstance. The ease of recording on a flash drive made it easy to transfer modern viruses from computer to computer. The funny thing is that not every antivirus program detects a virus in malicious files, this fact undoubtedly upsets you and me, ordinary users. In this short article, I will try to describe the principle of moving viruses from computer to computer using flash drives, and also give a couple of tips on combating malware. It should be noted that this article was first published on another site and has since been developed, that is, from time to time I have to supplement it. This time the article has a small addition, which touches on the Autoruns program, the main task of which is to work with autorun programs for the Windows operating system.

    The operating principle of the viruses described above is the same. The virus is written on the disk in the form of several separate files. One of which is called autorun.inf, the main task of which is to indicate the path to the executable file on disk. To make it a little clearer, I’ll give an example.

    Let's say we have drive C. On which there are two files: autorun.inf and autorun.exe. If we open the first file with standard program Notepad, we can read something like the following text:


    OPEN=AUTORUN.EXE
    ICON=icon.ICO

    What does this mean? A means the following: when you open drive C, the autorun.exe file should automatically start, which is presumably a virus. In fact, to destroy it, it is enough to delete these two files. However, not everything is so simple.

    The problem is that the virus files have the status of hidden or system files. That is, when viewed in standard Windows Explorer, they are not visible. Many people may know that in the Windows operating system it is possible to display hidden and system files. However, after the first launch of the virus, this option usually becomes unavailable.

    What to do in such cases? How to remove a hated virus? One option is to install an antivirus software and sit at the computer in the hope of solving the problem. As experience shows, this method does not provide a 100% guarantee of destruction malware. For example, I just recently watched how the famous Kaspersky Anti-Virus simply did not notice anything suspicious on the disk, despite the fact that there was a firm belief that the virus was on the flash drive.
    By the way, flash drives are not the only place where such programs live. These viruses necessarily settle on the computer’s hard drive. And they launch successfully when you enter your favorite drive C.

    We will begin the fight against viruses by finding out the following: does a virus exist on our computer or is it just a figment of our imagination.

    It is very easy to find out if there is something suspicious on a flash drive or computer hard drive. If we want to determine, for example, the presence of a virus on drive C, then open My Computer, hover the mouse cursor over drive C and right-click. A context menu will open. If the first item on top is “Open”, then you can breathe a sigh of relief. However, if there is something like “Autorun” (this does not apply to those cases when there is a completely legal distribution kit with autorun on the flash drive), “Auto” or some kind of gobbledygook, I recommend concentrating, because from now on we are declaring war on viruses.

    The problem with the appearance of the viruses described above is that once they settle on the computer’s hard drive, it becomes impossible to open local disks and flash drive simple double click. This circumstance really gets on the nerves and puts many novice users into a state of panic.
    Let's start by removing the virus files. One way is to use one of the file managers. Due to the fact that I have been a fan of the program for some time now Total Commander, I suggest using it. IN present moment I use Total Commander Ultra Prime, but everything written below will apply to other versions of this wonderful file manager.

    The Total Comander toolbar contains a button that allows you to enable/disable

    view hidden and system files

    By default Total Commander is the same as standard Windows Explorer will be blind to viruses, but it is enough to turn on the display of hidden and system files to see: the autorun.inf file is conveniently located on drive C or a flash drive. Before deleting, let's open it using Notepad. We see something like this:


    OPEN=AUTORUN.EXE
    ICON=icon.ICO

    That is, autorun.inf tells us that the true root of evil is AUTORUN.EXE. Now you can destroy both autorun.inf and autorun.exe without hesitation. By the way, autorun.exe may be replaced by a completely different file. For example, setup.exe.
    It happens that when you delete these two files, after some time they magically appear again on the disk. This indicates that the virus is working and monitoring the state of the disk. In this case, let's try to turn off all suspicious processes in RAM computer.

    This is done simply. Simultaneously press CTRL+ALT+DELETE on the keyboard, which will open the Manager Windows tasks. Go to the Processes tab. We begin the shutdown first with the processes that run on your behalf. This will be reported in the column called “Username”. If the value in it is not equal to “System”, rest assured - this process works on your behalf.

    To disable, click the button at the bottom of the “End Process” window.
    If the autorun.inf and autorun.exe files no longer appear mysteriously on your disk, it means that you have finally gotten to the desired process, which is actually a virus, and destroyed it from the computer’s RAM.

    There are times when there is no file manager at hand and at first glance it is not possible to remove the unfortunate virus files. What to do in such a situation?

    And we will solve this problem using the search function of a standard explorer. The fact is that Windows search allows you to search not only regular files, but also hidden and system ones.

    Open any folder and at the top of the window click on the Search button. A window will appear on the left side of the screen where we select Files and Folders as the search object. Now we lower our eyes and click on the item Additional options. And there we check the box next to “Search in hidden files and folders.” And finally, we will enter autorun.inf into the text field.

    Then you just have to wait until the computer finds the desired file. At the end of the search, all we have to do is open the autorun.inf file and, guided by its contents, find the virus file itself. You can do this in exactly the same way, using a standard search.

    The last stage of our fight against the virus will be working with autoloading. If your operating system located on drive C, you can open the following utility C:\WINDOWS\pchealth\helpctr\binaries\msconfig.exe For drive D and others, the path will change accordingly.

    There we go to the startup tab and uncheck the boxes. suspicious files. A best option– clear all checkboxes. I have rarely encountered programs for which there is a need to autostart with the operating system.
    After the above operation, you will need to restart your computer.

    Autoruns program

    Often features built into Windows MsConfig utilities turns out to be not enough. It does not allow you to remove many hidden processes from startup, as a result of which our virus is launched in the most remarkable way at system startup. To solve the problem of program autorun once and for all, we will turn to the autoruns program; you can download Autoruns from our website.

    A special feature of the program is that it does not require installation, which turns it into an excellent anti-malware tool. After downloading the archive with the program, we unpack autoruns to any folder, go to the directory with the program and run the autoruns.exe file.

    After launching the program, we will see a huge list of programs running on the system, various libraries and other components. We can, of course, spend another year studying what starts in our system and finally find out: what starts when our operating system starts. However, we will take a simpler route. We will trust our intuition and logic.
    But first let's take a quick look autoruns program, what is she like? At the top is the main menu, below are tabs with unclear names on English. In fact, switching to each of these tabs will open us to a specific startup section.

    So, in particular, switching to the “Services” tab will open to us a list of those launched in Windows Services (small programs, each of which is responsible for a specific function in the system). Switching to the "Everything" tab will reveal to us full list all programs, libraries and other components that are automatically launched when the operating system starts Windows systems.
    The program list is displayed in the form of a table, where each column has its own name.


    Autorun Entry
    - this is, in fact, the name of the program or process that runs when the system starts. The name can tell us a lot. A very large percentage of viruses have dissonant names. If you see something like klfdghri.exe in the list of programs, it makes sense to remove such a miracle from autorun.


    Description
    brief description programs, as a rule, it is written here what purposes this program serves.

    Publisher– the author of this program. This information is often useful when searching for malware. As it turns out, many virus authors have a peculiar desire to become famous, so this may very well be the pseudonym of the virus writer.


    Image Path
    – the path on your computer’s hard drive to the corresponding program. This is also an important line. For example, if the path to the program you found looks like this: “C:\Documents and Settings\admin\Local Settings\Temp”, then it makes sense to think about whether the program is useful for the system if it is launched from the temporary folder where it is usually stored various kinds software junk? If you look carefully, you can often see the inscription “File” in this column opposite the name of the program not found”, which translated into Russian will mean “File not found”. In such cases, it also makes sense to remove the program from startup.

    A summary of information about a specific object is displayed when you highlight the program at the bottom of Autoruns (circled in red)

    To remove a program from startup, simply uncheck the box next to its name. Here I would like to give advice: be careful - write down all your actions. Inept user actions can be worse than any virus.

    A USB drive is a “tidbit” for viruses. There is even a separate category of “digital strains.” They are aimed specifically at external drives. Trojans and worms secretly penetrate a flash drive, install their elements (startup modules, startup file, shortcuts) and carefully disguise them, delete or damage user folders and files. They also interfere with the operation of the USB drive: they do not allow you to open a partition and individual folders, they prevent safe removal devices imitate system errors(fake messages appear).

    Let's look at how to clean a flash drive from viruses using various methods.

    Method #1: antivirus cleaning

    Disabling autorun

    The first step is to secure the operating system of the computer on which the scan will be performed. Disable in Windows autorun. So that the virus, after connecting a USB flash drive, cannot automatically start and secretly penetrate the PC’s hard drive.

    This procedure is performed as follows:

    in Windows 7

    1. Press the key combination “Win” and “R”.

    2. In the Run panel line, enter the directive - gpedit.msc.

    3. Click OK.

    4. In the editor window group policy select the “Computer Configuration” section.

    5. Open the “Administrative Templates” subsection.

    6. From the list of options, select Windows Components.

    7. Go to “AutoPlay Policies” → “Disable AutoPlay” settings.

    8. In the settings window that opens:

    • by clicking the left mouse button, turn on the radio button next to the “Enable” add-on;
    • Click the "Apply" and "OK" buttons.

    in Windows 8.1

    1. Right-click on Windows icon on the taskbar.

    2. B context menu select Find.

    3. B search bar type - autorun.

    4. Click in the search results - “Enable or disable autorun”.

    5. In the “Computer and Devices” panel, go to the “Startup” section.

    6. In the block on the left, set the value “Do not perform any actions” in the “Removable media” and “Memory card” fields.

    Advice! If you want to completely disable the AutoPlay feature, click the slider at the top of the block to “Off.”

    Scanning a flash drive

    1. After disabling autorun, connect the USB flash drive to the PC.

    2. Press "Win+E".

    3. In the window that opens, right-click on the USB drive icon.

    4. To check the flash drive for viruses, select “Scan…” from the list of options. (IN in this case This ESET Smart Security).

    5. Remove all malicious objects found.

    Advice! You can perform cleaning using alternative anti-virus scanners - Dr.Web CureIT!, Free Anti-Malware or Kaspersky Virus Removal Tool. Before the scan is performed, do not forget to check the box next to the flash drive in the list of partitions.

    Method #2: formatting

    (removing all data - virus and user files)

    Note. This option is appropriate to use when there is no valuable information on the media or when it is not possible to remove the virus from the flash drive using other methods.

    1. Make sure that AutoPlay is disabled on your computer. And then connect the infected media.

    2. Press the “Win” and “E” keys simultaneously.

    3. Hover over the USB shortcut. Click the right button. IN system menu select "Format...".

    4. In “Formatting...” set the following values ​​in the settings:

    • “File system” - NTFS;
    • “Cluster size” - “Standard size...”;
    • “Volume label” - the name of the flash drive (optional; you don’t have to change it);
    • “Format methods”: in the “Quick” box, check the box to perform superficial (quick) cleaning.

    5. Click the "Start" button.

    6. B additional window confirm the action: click “OK”.

    7. When the procedure is complete, in the “Formatting...” window, click “OK” again.

    8. In the settings window, click “Close”.

    Now the flash drive is clean and ready for full use.

    Method #3: manually removing viruses

    (for advanced users only)

    This cleaning algorithm is advisable to use if you want to save as much useful data as possible located on an infected flash drive.

    1. Turn on Windows display hidden files and folders:

    • press "Win+E";
    • in the window that appears, press “Alt”;
    • V top panel open: Tools → Folder Options;
    • go to the “View” tab;
    • in the last paragraph of options, enable by clicking “Show hidden files...”;
    • Click the “Apply” and “OK” buttons.

    2. Check your autorun setting. It must be disabled (see Method #1).

    3. Connect and open the contents of the flash drive.

    4. Analyze the files. Elements of the malware may look like this:

    • files with extension .bat;
    • labels;
    • Recycler folder ( a clear sign presence of the virus).

    5. Right-click on each of them and view the “Object” setting in the properties (click → item in the “Properties” menu). IN virus files, in “Object” is usually displayed executable file a “microbe” that attacked a USB drive.

    6. Delete everything malicious files and shortcuts, as well as the executable element of the virus to which they access (listed in the “Object” line).

    Vaccination of flash drives

    A vaccine for a flash drive is a kind of software protection in the form special file(Autorun.inf). It prevents the virus from “settling” on the flash drive: it blocks its functions. Used exclusively as a prophylactic and warning agent on “healthy” USB drives. Created manually and using special programs. We will get to know some of them better.

    Panda USB Vaccine

    A utility from the famous antivirus company Panda. Has a volume of less than 1MB. However, very useful. Available free of charge on the official website. After the first USB launcher Vaccine in the panel, check the boxes next to “Hide tray icon...” and “Enable NTFS...”. And then click “Next”. Connect the USB flash drive and click the “Vaccinate USB” button in the application window.

    Autostop

    Does not require installation. Runs in the MS-DOS console. At the request of the user, he can not only “vaccinate” the flash drive, but also disable autorun by changing the registry settings and prohibit writing data on the media.

    USB Defender

    An effective tool with graphical interface. Activates USB storage protection in one click (and disables it in the same way). Carefully hides the presence of the “grafting” AUTORUN.INF on the flash drive.

    Let your USB drives avoid viruses!

    From time to time it becomes necessary to remove a virus from a phone flash drive.

    A very simple situation arises - the phone begins to glitch, constantly freezes, some data may disappear from it and other disasters may occur. The reason for this is a virus.

    Employees can tell you this service center or you decide it yourself. This is very easy to do - the phone freezes when working with a flash drive and data disappears from it. In general, it will be clearly visible that the problem is in the removable storage media.

    There are 3 really working ways to solve this problem. We will look at all of them step by step.

    1. Antiviruses for phones

    There are quite a lot of good antivirus programs that work on smartphones and tablets.

    A prominent representative is Kaspersky Internet Security, which can be downloaded from Google Play And Apple Store. We will consider its operation using the example of a device running Android OS.

    Step-by-step instructions for using this antivirus program are as follows:

    • First, Kaspersky Internet Security needs to be downloaded and installed. To do this, go to the Google Play page and complete all the operations described above. There's nothing fancy here, and the app installs just like any other.
    • Then click on the icon to reveal additional functions. Initially, it is a circle with an upward arrow. After clicking, a down arrow appears. These same ones will appear additional features. From the entire list we will need “Verification”. So just click on the magnifying glass picogram with this inscription.

    • In the next window, you just need to click on “Check folder”. This will give us the opportunity to check the memory card and all the folders on it.

    • Now, in fact, a window will be displayed with options for checking a folder in the device’s memory or on the built-in card. We need a second option. Therefore on at this stage You should click on the magnifying glass next to the words “Built-in memory card.”

    That's all. If any viruses are detected on the memory card, you will be prompted to delete them or quarantine infected files.

    Everything happens exactly the same as when working with the version in Kaspersky Internet Security for personal computers.

    Clue: If no viruses were found on the memory card, run full check the entire device. This means that the problem is not with the built-in card.

    2. Computer help

    The second method is painfully simple and banal, but effective. And in most cases it is he who helps.

    To put it simply, in this case you need to remove the memory card from the phone and insert it into the computer. Next you will need to take one of the good anti-virus programs and scan the flash drive with it.

    Just simply taking and inserting a flash drive from your phone into a computer will not work - not a single PC or laptop has exactly the same connector.

    Two devices can come to the rescue: an adapter and a card reader. The first one usually comes bundled with microSD. The second one will have to be purchased additionally. Both devices are shown in Figure 4 - the adapter is on the left, and the card reader is on the right.

    Actually, the card from the phone is inserted into one of these devices, and then into the computer. The card reader works with a USB port. There is definitely one on every computer.

    After you have inserted your flash drive from your phone into your PC or laptop this way, it will detect it as regular card memory. After this, you need to launch the antivirus and select it to check there.

    For example, in Kaspersky Free to do this you need to do the following:

    • In the main program window, click “Check”. We get to the scan menu for this antivirus program.

    • In the menu on the left we see everything possible options checks. Select "Check" external devices" A large area appears on the right where you can select which device we will check. If we only connected a flash drive, there will only be one device there. All you have to do is click the “Run scan” button next to it and wait for the end of this process.

    • After this, as usual, when a virus is detected, several options for solving the problem will be offered. Or maybe there will be only one. In any case, you will delete the infected file or virus from your phone’s flash drive, and this is the most important thing.

    In addition to full-fledged antivirus programs, you can also use small utilities to remove viruses.

    Here is a list of good similar programs:

    • Dr.Web CureIt;
    • Kaspersky Virus Removal Tool;
    • AdwCleaner;
    • Anti-Malware;
    • Spybot Search & Destroy;
    • HitmanPro.

    3. Formatting a flash drive

    If the methods described above do not help, there is only one thing left to do - format removable media information. Then all settings and files on it will be deleted along with the virus.

    Therefore, before performing this procedure, copy all necessary files to the computer. To do this, use the above-mentioned card reader or adapter.

    Advice: After copying files from the flash drive, check the folder where you copied them with your antivirus. It is possible that the virus will be transferred to the computer, but it will be much easier to detect and remove it there.

    • Go to This PC. Find us your removable storage device.
    • Right-click on it. In the drop-down list, select “Format...”.

    • Uncheck the “Quick...” item if it is there. Click the "Start" button.

    • Then just wait for the operating system to do its job.

    Once formatting is complete, the removable media will be completely clean and free of viruses.

    The most popular threat to flash drives is Trojans, which are distributed using Autorun ( automatic start ). It is transferred to a flash drive from your computer as soon as the media is inserted and hides your folders and files. Turns them into shortcuts and thereby blocks access.

    Deal with it to the average user problematic, especially if deletion is required without data loss.

    Typically, such viruses are harmless in themselves. They simply hide files and spread to other media.

    Almost anyone can remove a virus from a flash drive. antivirus program, and infection most likely occurs due to its absence. This also applies to the memory card.

    Here are a number of signs that your device is infected:

    1. Labels instead of folders.
    2. Missing information.
    3. Can't open flash drive ( but most likely another reason).
    4. Unknown files with .exe extension.
    5. File autorun.
    6. Hidden RECYCLER folder.

    Remember that these problems can occur not only if the virus is on a flash drive, but also on a computer or other device. Other unpleasant things can also happen. In this instruction I will show 2 ways to remove this virus, but of course the fastest and easiest way is this. Only suitable if you do not have valuable information on it.

    Manual removal method

    The virus disguises itself as system file (hidden by default) and therefore you need to enable and then switch to the USB flash drive. Here you need to delete the RECYCLER, autorun and exe file. Their names may differ.

    Usually this is enough, but the virus may appear again if it is located in another location. If the situation repeats, go to the next method.

    Removal by antivirus

    It's worth checking your computer and flash drive with any free or shareware free antivirus. For example, try downloading NOD32 ( 30 days free). After trial period you can continue to use it, but without updates. I myself actively use it.

    Perform a detailed scan of your computer. All viruses will be automatically removed when found. Once completed, you can view the report.


    Problems after removing the virus

    Most likely, the virus will make all data hidden. Instead, there will be shortcuts that will display an error when opened. After all, they pointed to a virus that had already been removed. They can be safely deleted.

    You need to make the files visible. Using them on other devices will be inconvenient since you will have to turn on the display all the time hidden folders, and sometimes even this cannot be done.

    To fix this, go to the folder properties and uncheck the “hidden” attribute as in the image below ( show hidden folders must be enabled).

    If the attribute is not available ( highlighted in gray), then download the executable .bat file, which will automatically fix everything.

    Move it to the USB flash drive and run ( on behalf of administrator). Specify the media letter and press Enter. You can see the letter by going to My Computer.



    If this doesn't help, use free program USB Hidden Recovery. Download it from the official website and install. Run and scan the flash drive, and then start recovery.


    If a virus constantly appears, it means it is on the computer ( or another device) and constantly infects the flash drive after its removal. Look for it using an antivirus.

    This information should be enough to solve this problem. If something doesn’t work out, I’ll be happy to answer in the comments.

    How did you get rid of a virus on a flash drive?

    Poll Options are limited because JavaScript is disabled in your browser.