Shortcut virus is an easily spreadable and annoying combination of Worm and Trojan that hides all of your files and folders and then replaces them with shortcuts that look identical to replaced files and folders.
Once disguised it will wait patiently for a user's click and once that happens it will replicate itself and further infect the system. This rapid spread can lead to stolen personal data, some system hick-ups, and other system-related issues.
This malware mainly affects physical file transfer devices like for example and most USB drives, hard drives, and SD memory cards and it can easily transfer itself to the computer.
The advantage of this shortcut virus comparing it to others is that it is mostly undetected by a vast variety of antivirus software. So running just anti-virus software maybe not be enough to remove it from your system. Luckily for all unfortunate users that have caught this annoyance, it can be easily removed fully manually in a short time.
Firstly plugin USB, SD, or removable drive. The infection will transfer to your computer when the infected drive is plugged in so before we go to clean the computer itself, clean each removable drive that you have. Also know that infection will spread from computers into removable devices as well if it is not cleaned.
Open the File Explorer and remember under which letter is removable drive registered. Open Command prompt but with administrator privileges and go to infected rive by typing its letter followed with “:” (for example D:) and press ENTER
Once you have successfully gone to infected drive type in command prompt:
Attrib -s -r -h /s /d *.*
This will unlock all original files back into removable storage, next copy all files to your computer, and format the removable drive. Once the format is complete, unplug the removable device. Continue to clean all devices with the same method.
Now once we have cleaned all removable devices it is time to fully clean the PC
Firstly open the task manager ( CTRL + SHIFT + ESC ), in the process tab find wscript.exe or wscript.vbs, right-click on it (or both if present), and select End Task. Now close the task manager and press Start. Inside start typing in registry editor to search for it and once found open it.
Find the following key inside the registry editor:
HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run
In the right panel, look for any strange-looking key names, such as odwcamszas, WXCKYz, OUzzckky, etc. For each one, run a Google search to see if it's related to shortcut viruses.
If any returns a positive match, right-click on them and select Delete. !!! Accidentally deleting an important key can cause Windows to become unstable, so double-check everything !!!.
Close the Registry Editor
Now press ⊞ WINDOWS + R to open the run dialog and type in it Msconfig followed by ENTER. Once the System Configuration window opens go to the Startup tab. In the Startup tab, look for any strange-looking .EXE or .VBS programs, select each one and click Disable. Close the Window.
Once again open the run dialog and type inside %TEMP% and press ENTER in order to open the Windows temp folder. Inside this folder delete everything.
Next in the File explorer go to
C:\Users\[username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Look for any strange-looking .EXE or .VBS files and delete them.

0xC1900101 – 0x20017, The installation failed in the SAFE_OS phase error during Replicate_OC operationTo fix this issue, you need to follow the given options below. But before you do, you need to create a System Restore point first so that if anything goes wrong, you can always undo the changes you’ve made.
dism /Mount-Image /ImageFile:H:sourcesboot.wim /index:1 /MountDir:C:UsersUserDesktopmount
C:UsersUserDesktopmountWindowsSystem32mcupdate_GenuineIntel.dll
dism /Unmount-Image /MountDir:C:UsersUserDesktopmount /commit
Error Causes
Error Causes"Cannot find the file sqlite3.dll (or one of its components)"
Followed by:
"Error starting program.. A required .DLL file sqlite3.dll was not found."
Error Causes
Error CausesComing in October for insiders and in November for all in the update, Microsoft has prepared a series of updates which they call an "additional set of experiences"
These updates are looked upon by Panos Panay, a vice executive president at Microsoft & chief product officer for Windows and devices as sort of makeup tests. They will consist of new additions with the biggest one being a tabbed version of File Explorer.

File Explorer received a UI makeover in the last update but the tabbed interface was missing which was expected by many users so it will come in following the next update.
The rest of the features that we will receive are an updated Photos application, Suggested Actions in the Windows Shell, Overflow menu for the taskbar, and improved Nearby Share.
The tabbed File Explorer interface is essentially File Explorer’s version of Sets, the tabbed window interface that Microsoft tested out several years ago. In testing, the tabbed interface proved handy for moving and copying files, and we’d expect the same once the feature formally goes live. The difference between Sets and the tabbed File Explorer interface is Sets allowed for multiple applications to be clustered together via tabs.
Photos app will include a “new photos-managing experience that brings a gorgeous gallery, simplifying browsing, finding, management and consumption of your collection of photos.” It will allow “easy backup to OneDrive” and a “delightful Memories experience.”
As for other features, nothing specifically was said except giving just some tips on what will they bring, it is obvious that File Explorer and the photos app were the main focus for MS in this upcoming update.
Hive ransomware has been targeting Microsoft exchange servers lately vulnerable to ProxyShell security issues in order to deploy various backdoors. Once the backdoor has been placed various attacks can be performed including but not limited to network reconnaissance, stealing admin accounts, taking valuable data, and even installing and deploying file-encrypting algorithms.

ProxyShell is a set of three vulnerabilities in the Microsoft Exchange Server that allows remote code execution without authentication on vulnerable deployments. The flaw has been used in past by various ransomware like Conti, BlackByte, Babuk, Cuba, and LockFile.
Security vulnerabilities have been reported to be fully patched on May 2021 but how Hive was able to still be successful in exploiting PowerShell and infiltrating into the system there seems to be still some unpatched and open issues.
Hive has gone a long way since it was first observed in the wild back in June 2021, having a successful start that prompted the FBI to release a dedicated report on its tactics and indicators of compromise.
In October 2021, the Hive gang added Linux and FreeBSD variants, and in December it became one of the most active ransomware operations in attack frequency.
Last month, researchers at Sentinel Labs reported on a new payload-hiding obfuscation method employed by Hive, which indicates active development.
Gables is a browser extension developed by MindSpark Inc. This browser extension lets you create gifs and memes with a few simple clicks. This extension usually comes bundled up with the ASK toolbar.
While active this extension monitors your browser activity and records website visits, clicked links, and potentially personal data. This data is later forwarded to MindSparks ad servers where it is used to better target ads.
This extension hijacks your browser home screen, as well as your default search provider, and changes them to MyWay.com. This extension has been marked as a Browser Hijacker by several anti-virus scanners, and due to its behavior, it is not recommended to keep it on your computer for security reasons.