I did some search with Google and found out that there are many useful information about this virus. I tried the several suggestions from this link: http://www.pcrisk.com/removal-guides/6984-remove-computer-locked-ukash-virus. It is very good and provides many useful suggestions. Many thanks to the author.
First I tried to boot my machine with Safe Mode with Networking(Pressing key F8 during the stating process). It tured out that the UKASH virus I got affected seems smart enough. It will shutdown the machine automatically when trying Safe Mode with Networking.
The next thing I tried is to boot the machine with Safe Mode with Command Prompt. It was successful.
After that I did the system restore using the command:
C:\Windows\system32>cd restore
C:\Windows\system32\restore>rstrui.exe
Click on Next button.
Then I select one restore point since I knew when my laptop got affected. I chose the one that was before the affection time. Then click on Next button.
Make sure the restore point is correct. Then click on Finish button. There is a confimation and warning popup and click on Yes button. Then system restore is started. It will take a while.
After the system restore is done I boot my laptop again and this time it was successful to do so.
hi if u want delete ukash virus to visit turkish website
ReplyDeletehi can u check www.ukash.web.tr please
ReplyDeletehi yes before write i will say u ukash.web.tr but we will opening now http://www.ukashal.com.tr please check friends.
ReplyDeleteThis Website is very helpfully
ReplyDeletePlzz check this http://www.ukashkartbayi.com
help for your ukash sale http://www.ukash-al.gen.tr
ReplyDeleteThis problem can also clear on the information I have given below. http://www.ucuzaukash.com/ukash-kart-virusu-temizleme.html
ReplyDeleteThis is an excellent guide on recovering from a UKASH virus attack! For those managing containerized environments, Raw Accel is a great tool to isolate your development environments and test security measures in Docker containers, making it easier to prevent and recover from similar threats.
ReplyDelete