@@ -71,20 +71,21 @@ to select all files on your desktop. Then permanently delete them:
7171Empty your Recycle Bin afterward. This removes all visible leftovers from the malware.
7272
7373## Step 3 - Restore Your Theme & Desktop Background
74- 000.exe replaces your wallpaper and UI theme to make your system look corrupted or hacked.
75- To restore your theme:
76- 1 . Open ** Settings**
77- 2 . Go to ** Personalization → Themes**
78- 3 . Choose your preferred theme
79- 4 . Reapply your desktop background
74+ 000.exe replaces your wallpaper with a corrupted image.
8075
81- Your system should now visually return to normal.
76+ To restore your desktop appearance:
77+ - Open ** Settings**
78+ - Go to ** Personalization → Themes**
79+ - Select your original theme
80+ - Reapply your preferred wallpaper
81+
82+ Your system should now visually appear normal again.
8283
8384## Step 4 - Registry changes
8485> [ !CAUTION]
8586> Only modify the registry keys shown below. Editing unrelated values may corrupt Windows and cause boot failure.
8687
87- Open the run command by pressing the following keys :
88+ Open the run dialog :
8889<KbdGroup >
8990 <Kbd >⊞</Kbd >
9091 <span >+</span >
@@ -95,71 +96,90 @@ And type `regedit`. If prompted, click **Yes**.
9596### Registry Change 1 - Enable Task Manager
9697Navigate to:
9798```
98- HKEY_CURRENT_USER/ Software/ Microsoft/ Windows/ CurrentVersion/ Policies/ System
99+ HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Policies\ System
99100```
100- And delete ` DisableTaskMgr `
101+
102+ Right-click and ** delete** ` DisableTaskMgr `
103+
104+ Task Manager will work again after restarting your PC.
101105
102106### Registry Change 2 - Change the Icon of the Text files
103- Navigate to:
107+ 000.exe points .txt icons to a malicious file. Reset it to the Windows default by navigating to:
104108```
105109HKEY_CLASSES_ROOT/txtfile/DefaultIcon
106110```
107- Change the ** (Default)** entry:
111+ And changing the ** (Default)** entry:
108112| Before | After |
109113| ------------------------------------------------- | --------------------------------------- |
110114| ` C:\Users\<username>\AppData\Local\temp\icon.ico ` | ` C:\Windows\system32\imageres.dll,-102 ` |
111115
112- This will change the text icon back to the original place. It'll take effect after restart.
116+ This restores the normal text document icon.
117+ Changes take effect after a restart.
113118
114- ## Step 4 - Removing Startup Apps
115- Open the file explorer and navigate to:
119+ ## Step 5 - Remove Startup Entries
120+ Open File Explorer and go to:
116121```
117122%programdata%/Microsoft/Windows/Start Menu/Programs/Startup
118123```
119- and delete ` rniw.exe `
124+ Delete ` rniw.exe `
120125
121126> [ !NOTE]
122- > ` rniw.exe ` is an executable planted by 000.exe to spam message boxes every millisecond .
127+ > ` rniw.exe ` rniw.exe is a startup program created by 000.exe to re-enable its message boxes.
123128
124- ## Step 5 - Removing Temporary files
129+ ## Step 5 - Clear Temporary Files
125130Open the Run dialog:
126131<KbdGroup >
127132 <Kbd >⊞</Kbd >
128133 <span >+</span >
129134 <Kbd >R</Kbd >
130135</KbdGroup >
131136
132- Type ` %temp% ` , and clear every single temporary file in this folder .
137+ Type ` %temp% ` .
133138
134- ## Step 6 - Changing the username back.
135- Open the Run dialog:
136- <KbdGroup >
137- <Kbd >⊞</Kbd >
138- <span >+</span >
139- <Kbd >R</Kbd >
140- </KbdGroup >
139+ Select all files and delete everything inside the Temp folder.
140+ This removes leftover icons, scripts, and junk files dropped by 000.exe.
141141
142- Type ` control ` . Go to:
143- ```
144- User Accounts → User Accounts
145- ```
146- Change your account name back to the preferred name.
142+ ## Step 7 - Restore Your Username
143+ 000.exe may rename your Windows account to ** UR NEXT** .
147144
148- Now Restart your PC.
145+ To restore it:
146+ 1 . Press the following keys:
147+ <KbdGroup >
148+ <Kbd >⊞</Kbd >
149+ <span >+</span >
150+ <Kbd >R</Kbd >
151+ </KbdGroup >
152+ 2 . Type ` control `
153+ 3 . Navigate to: ` User Accounts → User Accounts `
154+ 4 . Click ** Change your account name**
155+
156+ Choose your preferred name and restart your PC.
149157
150158## Conclusion
151- And that's it! 000.exe has been completely removed from your system.
152- This malware modifies registry entries, themes, user accounts, wallpapers, and core Windows settings, so restoring everything manually is critical.
159+ And that’s it!
160+ The 000.exe virus has been completely removed from your system.
161+
162+ This malware mainly changes:
163+ - Registry values
164+ - Wallpaper & theme
165+ - Text icons
166+ - Startup programs
167+ - User account name
168+ - Temporary files
169+ - Message box spammers
170+
171+ So restoring everything ** manually** is essential.
153172
154- To prevent future infections:
173+ ** To prevent future infections:**
155174- Delete suspicious ` .exe ` files immediately
156175- Never run unknown programs
157176- Use a stronger antivirus
158177- Keep real-time protection enabled
159- - Always use a virtual machine for malware testing
160- - Follow safe browsing habits & avoid unknown downloads
178+ - Only test malware inside virtual machines
179+ - Avoid downloading from untrusted websites
180+ - Practice safe browsing habits
161181
162- Thanks for reading! If you want more malware removal guides and educational malware tests, check out my YouTube channel!
182+ Thanks for reading! For more malware removal guides and educational malware tests, check out my YouTube channel!
163183
164184> GitHub [ @ArsenTech ] [ github-url ]   ;· ;  ;
165185> YouTube [ @ArsenTech ] [ yt-url ]   ;· ;  ;
0 commit comments