Skip to content

Commit 715e9f2

Browse files
authored
Corrected 000.exe removal post
1 parent 1951f6f commit 715e9f2

File tree

1 file changed

+58
-38
lines changed

1 file changed

+58
-38
lines changed

src/posts/remove-000-exe.mdx

Lines changed: 58 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -71,20 +71,21 @@ to select all files on your desktop. Then permanently delete them:
7171
Empty your Recycle Bin afterward. This removes all visible leftovers from the malware.
7272

7373
## Step 3 - Restore Your Theme & Desktop Background
74-
000.exe replaces your wallpaper and UI theme to make your system look corrupted or hacked.
75-
To restore your theme:
76-
1. Open **Settings**
77-
2. Go to **Personalization → Themes**
78-
3. Choose your preferred theme
79-
4. Reapply your desktop background
74+
000.exe replaces your wallpaper with a corrupted image.
8075

81-
Your system should now visually return to normal.
76+
To restore your desktop appearance:
77+
- Open **Settings**
78+
- Go to **Personalization → Themes**
79+
- Select your original theme
80+
- Reapply your preferred wallpaper
81+
82+
Your system should now visually appear normal again.
8283

8384
## Step 4 - Registry changes
8485
> [!CAUTION]
8586
> Only modify the registry keys shown below. Editing unrelated values may corrupt Windows and cause boot failure.
8687
87-
Open the run command by pressing the following keys:
88+
Open the run dialog:
8889
<KbdGroup>
8990
<Kbd>⊞</Kbd>
9091
<span>+</span>
@@ -95,71 +96,90 @@ And type `regedit`. If prompted, click **Yes**.
9596
### Registry Change 1 - Enable Task Manager
9697
Navigate to:
9798
```
98-
HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/System
99+
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
99100
```
100-
And delete `DisableTaskMgr`
101+
102+
Right-click and **delete** `DisableTaskMgr`
103+
104+
Task Manager will work again after restarting your PC.
101105

102106
### Registry Change 2 - Change the Icon of the Text files
103-
Navigate to:
107+
000.exe points .txt icons to a malicious file. Reset it to the Windows default by navigating to:
104108
```
105109
HKEY_CLASSES_ROOT/txtfile/DefaultIcon
106110
```
107-
Change the **(Default)** entry:
111+
And changing the **(Default)** entry:
108112
| Before | After |
109113
| ------------------------------------------------- | --------------------------------------- |
110114
| `C:\Users\<username>\AppData\Local\temp\icon.ico` | `C:\Windows\system32\imageres.dll,-102` |
111115

112-
This will change the text icon back to the original place. It'll take effect after restart.
116+
This restores the normal text document icon.
117+
Changes take effect after a restart.
113118

114-
## Step 4 - Removing Startup Apps
115-
Open the file explorer and navigate to:
119+
## Step 5 - Remove Startup Entries
120+
Open File Explorer and go to:
116121
```
117122
%programdata%/Microsoft/Windows/Start Menu/Programs/Startup
118123
```
119-
and delete `rniw.exe`
124+
Delete `rniw.exe`
120125

121126
> [!NOTE]
122-
> `rniw.exe` is an executable planted by 000.exe to spam message boxes every millisecond.
127+
> `rniw.exe` rniw.exe is a startup program created by 000.exe to re-enable its message boxes.
123128
124-
## Step 5 - Removing Temporary files
129+
## Step 5 - Clear Temporary Files
125130
Open the Run dialog:
126131
<KbdGroup>
127132
<Kbd>⊞</Kbd>
128133
<span>+</span>
129134
<Kbd>R</Kbd>
130135
</KbdGroup>
131136

132-
Type `%temp%`, and clear every single temporary file in this folder.
137+
Type `%temp%`.
133138

134-
## Step 6 - Changing the username back.
135-
Open the Run dialog:
136-
<KbdGroup>
137-
<Kbd>⊞</Kbd>
138-
<span>+</span>
139-
<Kbd>R</Kbd>
140-
</KbdGroup>
139+
Select all files and delete everything inside the Temp folder.
140+
This removes leftover icons, scripts, and junk files dropped by 000.exe.
141141

142-
Type `control`. Go to:
143-
```
144-
User Accounts → User Accounts
145-
```
146-
Change your account name back to the preferred name.
142+
## Step 7 - Restore Your Username
143+
000.exe may rename your Windows account to **UR NEXT**.
147144

148-
Now Restart your PC.
145+
To restore it:
146+
1. Press the following keys:
147+
<KbdGroup>
148+
<Kbd>⊞</Kbd>
149+
<span>+</span>
150+
<Kbd>R</Kbd>
151+
</KbdGroup>
152+
2. Type `control`
153+
3. Navigate to: `User Accounts → User Accounts`
154+
4. Click **Change your account name**
155+
156+
Choose your preferred name and restart your PC.
149157

150158
## Conclusion
151-
And that's it! 000.exe has been completely removed from your system.
152-
This malware modifies registry entries, themes, user accounts, wallpapers, and core Windows settings, so restoring everything manually is critical.
159+
And that’s it!
160+
The 000.exe virus has been completely removed from your system.
161+
162+
This malware mainly changes:
163+
- Registry values
164+
- Wallpaper & theme
165+
- Text icons
166+
- Startup programs
167+
- User account name
168+
- Temporary files
169+
- Message box spammers
170+
171+
So restoring everything **manually** is essential.
153172

154-
To prevent future infections:
173+
**To prevent future infections:**
155174
- Delete suspicious `.exe` files immediately
156175
- Never run unknown programs
157176
- Use a stronger antivirus
158177
- Keep real-time protection enabled
159-
- Always use a virtual machine for malware testing
160-
- Follow safe browsing habits & avoid unknown downloads
178+
- Only test malware inside virtual machines
179+
- Avoid downloading from untrusted websites
180+
- Practice safe browsing habits
161181

162-
Thanks for reading! If you want more malware removal guides and educational malware tests, check out my YouTube channel!
182+
Thanks for reading! For more malware removal guides and educational malware tests, check out my YouTube channel!
163183

164184
> GitHub [@ArsenTech][github-url] &nbsp;&middot;&nbsp;
165185
> YouTube [@ArsenTech][yt-url] &nbsp;&middot;&nbsp;

0 commit comments

Comments
 (0)