Question:
i cant view my hidden files..?
Uma
2008-02-15 09:08:59 UTC
in my window xp ,i cant view my hidden files...i tried changing the folder options in control panel and in the view option in the menu bar but it doesnt work..how can i reslove that?'
Nine answers:
BunX
2008-02-15 10:00:02 UTC
Most probably a virus has override your settings through registry settings.

But its simple to revert the settings through registry editor.

first of all use a good antivirus software like Symantec or Mcaffe. After removing the virus follow the steps

1. open Start- Run (Window Key+R)

2. Type regedit in the textbox & click on the ok button

3. Registry Editor will be open.

4. On the left pane, there are 5 root keys under My Computer, browse to the following key

+HKEY_LOCAL_MACHINE

+SOFTWARE

+Microsoft

+Windows

+CurrentVersion

+Explorer

+Advanced

+Folder

+Hidden -> SHOWALL



5. On the right pane, read the value of CheckedValue, if it is 0 then changed it to 1 by right clicking on it and modify.

6. Close the Registry Editor

Now try to change settings for Show Hidden Files & Folders in Folder Options.

It must work.
The Phlebob
2008-02-15 09:25:02 UTC
If by "doesn't work" you mean it keeps switching back to not showing them, that's a sign of malware hiding itself.



If you have an anti-virus, I suggest you make sure it has the latest virus definitions and run a scan with it. If you don’t have one, many people here swear by AVG (it’s free).



I suggest you also download Ad-Aware 2007 and Spybot S&D (they’re free), install them, update them and run them. If any of the above (or any anti-malware, for that matter) doesn’t seem to be able to get rid of everything it reports finding, try running it again in Safe Mode. Safe Mode often prevents malware from protecting itself.



Also, turn off System Restore to evict any copies of bad stuff that might be lurking there.



To get into Safe Mode:



1. Log out and reboot your machine.

2. When the machine starts the reboot sequence, press the F8 key repeatedly.

3. Select Safe Mode from the resulting menu.

4. When the login screen comes up, log in as Administrator. By default, Administrator has no password.

5. The machine will continue booting, but the Windows desktop will look different. You won't be able to see the Internet, for instance.

6. When you're finished, log out and reboot back into normal mode.



Note that even if the anti-malware programs get rid of the malware, they may not be able to reverse the effects.



Update and run everything regularly.



Good luck.
Shwaa
2008-02-15 09:14:44 UTC
System files are also hidden files, have you unchecked the option to hide protected operation system files?



Also, if you know the name of a file or folder, you can access it by name from a run prompt or just typing the folder into the address bar of explorer.



You can also type in the names directly in the command prompt.
anonymous
2008-02-15 09:13:33 UTC
Scan for viruses. I have seen a virus that runs a program that keeps all hidden files, permanently hidden. The reason for this, is that the virus is most likely set to "hidden" and wants to remain as such. The problem is, such viruses are hard to find, since they are hidden. Try your standard virus software, then AVG, I have had much luck with AVG.
anonymous
2008-02-19 07:26:07 UTC
thanks a lot BunX it worked for me , i was facing a similar problem , i was infected by some virus , which appeared at the startup on windows n disallowed me to view my hidden files , the virus was soemthing named amvo.exe also known as NIDEIECT.COM



The filename is associated with the malware group Covert.Sys.Exec.Some files using the name NIDEIECT.COM are also associated with the malware group:



* KAVKOP:Trojan-A



These files may have the following Vendor, Product, Version Information in the file header Microsoft Corporation; Utilidad de ayuda de la línea de comandos; 5.1.2600.0



* The following Vendor, Product, Version Information has also been reported:



Microsoft Corporation; Command Line Help Utility; 5.1.2600.0



NIDEIECT.COM has been seen to perform the following behavior(s):



* The Process is packed and/or encrypted using a software packing process

* This Process Creates Other Processes On Disk

* This Process Deletes Other Processes From Disk

* Loads and Executes a System Driver File

* Writes to another Process's Virtual Memory (Process Hijacking)

* Registers a Dynamic Link Library File

* The Process is polymorphic and can change its structure

* Violates Prevx File Security Settings

* Executes a Process

* Adds a Registry Key (RUN) to auto start Programs on system start up

* The process hooks code into all running processes which could allow it to take control of the system or record keyboard input, mouse activity and screen contents

* Modifies Windows Initialization And System Settings Used On Start up



NIDEIECT.COM has been the subject of the following behavior(s):



* Created as a process on disk

* Executed as a Process

* Executed from Temporary Folders

* Deleted as a process from disk

* Executed by Internet Explorer

* Writes to another Process's Virtual Memory (Process Hijacking)

* Terminated as a Process

* Added as a Registry auto start to load Program on Boot up



NIDEIECT.COM can also use the following file names:



* HELP[1].EXE

* HELP.EXE

* HELP[2].EXE

* AMVO.EXE

* N1DEIECT.COM

* 50150025.EXE

* 83552644.EXE

* 82025395.DAT

* SAMPLE.COM

* 50440177.DAT

* 19209699.SVD

* U.BAT

* 19391225.SVD

* 19494435.EXE

* 77413359.EXE

* DE2.BAT

* 27532653.EXE

* 88314671.BAT

* HELP[7].EXE

* 23415841.EXE

* 91512667.EXE

* 97397848.EXE

* 27320641.EXE

* YLR.EXE

* HELP.EXE.TMP

* 33696698.EXE

* 45661038.EXE

* 22382451.SVD

* 59059933.EXE

* 64971974.EXE

* 66270456.DAT

* 81864045.SVD

* USDEIECT.COM

* 21320259.EXE

* 56636631.EXE

* HELP[4].EXE

* MGG[1].EXE

* MGG.EXE

* 12307825.COM

* A0056765.COM

* A0056766.COM

* A0057758.COM

* A0057761.COM

* 77288131.SVD

* 38522214.EXE

* 62754831.DAT

* 79188269.EXE

* 02846852.EXE

* DOSOCOM.COM

* 33888159.DAT

* 46346561.DAT

* 68270529.COM

* 21602715.EXE

* 09239156.EXE

* 03516526.COM

* 95253272.COM

* 79837464.SVD

* 38254215.DAT

* 29276564.COM

* 36898313.DAT



First of all i deleted the virus using kaspersky antivirus n then i followed your procedure of tweaking the registry ...
?
2016-10-19 06:24:04 UTC
this is rather basic incredibly. Open up any folder and bypass to strategies>Folder techniques and then click on the View tab. below Hidden records and folders, exchange the placing to "coach hidden records and folders".
gangstaa1603 h
2008-02-15 09:47:19 UTC
there is a simple way use winrar you can see a lot of hidden files . but this problem i am sure it is caused by virus check your system
Shree...
2008-02-15 20:49:29 UTC
Hey BunX,



the method u showed is still not working.
odie b
2008-02-15 09:15:01 UTC
Go into safe mode and use the junk AVG software

you have and run it,,,,,,,,,,,,,,,,,,


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...