When an anti-virus quarantines a file by moving it into a virus vault (chest), that file is essentially disabled and prevented from causing any harm to your system. The quarantined file is safely held there and no longer a threat
until you take action to delete it. One reason for doing this is to prevent deletion of a crucial file that may have been flagged as a "False Positive
". If that is the case, then you can restore the file. Doing this also allows you to view and investigate the files while keeping them from harming your computer. Quarantine is just an added safety measure
. When the quarantined file is known to be bad
, you can delete
it at any time.
"Understanding AVG7 Free Virus Vault
"AVG FAQ #647: I have some files in the AVG Virus Vault. What next?
The infected RP***\A00*****.exe file(s) identified are in the System Volume Information Folder
(SVI) which is a part of System Restore
. This is the feature that allows you to set points in time to roll back your computer to a clean working state. The SIV folder is protected by permissions that only allow the system to have access and is hidden by default
unless you have reconfigured Windows to show it.
System Restore will back up the good as well as the bad files
so when malware is present on the system it gets included in any restore points as an A00***** file. If not removed, they sometimes can reinfect your system if you accidentally use an old restore point. The easiest thing to do is Create a New Restore Point
to enable your computer to "roll-back
" to a clean working state and use Disk Cleanup
to remove all but the most recent restore point.
She plugged in a usb memory stick into her laptop after it has been in a uni computer to print some documents
Probably a Flash drive infection. They usually involve malware that loads an autorun.inf
file into the root folder of all drives (internal, external, removable). When the removable media is inserted, autorun looks for autorun.inf and automatically executes another malicious file to run on your computer. When a flash drive becomes infected, the Trojan will infect a system when the removable media is inserted if autorun has not been disabled.
Please insert your flash drive.
by sUBs and save it to your desktop.
Note: Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that is plugged in when you ran it. Don't delete this folder...it will help protect your drives from future infection.
- Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
- The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
- Wait until it has finished scanning and then exit the program.
- Reboot your computer when done.