Free USB Access Restrictions for Windows

Free USB Access Restrictions for Windows
• Anti – Data Theft  ≈  Anti – Data Copy/Modification •

usb-restriction_about

Free USB Access Restrictions for Windows
Created by Henry U.S.S.A
Copyright © 1998-2008 Henry Artworks Studio™ All rights reserved
https://henryussa.wordpress.com

☼ Keep Your privacy by making your computer more secure.

Description

Free USB Access Restrictions for Windows is a simple security tool created to make Windows based computer more private and secure to prevent Computer Data Theft, USB Drive Data Deletion/Modification/Access from a Local Computer. This tool had been made also to prevent malwares  (virus/trojan) attack by means of USB removable media. One well-known virus attacking technique is autorun.inf file usage created by some virus as a virus trigger in a USB removable drive (e.g flashdisk) when the drive is plugged into a local ‘victim’ computer.

This free program offers You Triple Protections for Local Computer:

1. USB WriteProtect : USB Removable Media Write/Modification/Delete Restriction
If USB WriteProtect is set/activated/On, Writing (Adding/Modifying/Deleting all data in USB Removable Drive is Disallowed in the protected local computer. The Process of Data Copying from local computer into plugged USB Removable Drive is totally blocked. By default, USB WriteProtect is not active/OFF.
USB WriteProtect Restriction offers Double Protections: (1) for local computer from Data Theft by means of USB Removable Drive, (2) for USB Removable Drive from Data Deletion/Modification in the protected local computer.
You need unplug the plugged USB Removable Drive first (if plugged) and re-plug it again to see the effect of USB WriteProtect.

2. USB Function (Port) Blocker USB Removable Media Function Disabler
If USB Storage Function is Blocked/Disabled, USB Removable Drive is totally inaccessible in local computer. System will notify user (with device connection failure sound by default) that the plugged USB device is failed to connect to the local computer. No recognition/initialization process of the plugged USB Removable Drive, as if the drive is damage or malfunction. This technique can be used as a protection for local computer from computer threats such as virus or trojan derived from USB Flash Drive that can infect and harm computer. On the contrary, virus may also block the USB Function from working properly. By default USB Storage Function is enabled.
You need unplug the plugged USB Removable Drive first (if plugged) and re-plug it again to see the effect of this kind of protection.

3. USB Removable Drive AutoPlay and AutoRun Blocker :
• Disable Autoplay feature for USB Removable Drive
• Disable AutoRun feature for All Drives

AutoPlay Restriction will Disable the AutoPlay feature for USB Removable Drive.
While AutoRun Restriction will disable the AutoRun feature for Drive.
This Program offers maximum protection to disable the AutoRun feature for all Drives.
When AutoRun is enabled, removable media will automatically started when inserted into the Computer Drive.
The AutoRun Restriction will disable the media to start.
This two kinds of Restrictions can be used to protect the local computer from computer threats (virus/trojan) attack by means of USB removable media such as flash disk or external hardrive.

Technical

• Category : Computer\Windows\Security
• Program name : USB Access Restrictions for Windows
• Version : 1.0.0.0
• Supported OS (Compatibility) : Microsoft Windows 98/ME/XP/Vista
• License : Freeware
• File Name : USB-Access-Restrictions.exe
• File Size : 201 KB (205,824 bytes)
• Size On Disk : 204 KB (208,896 bytes)
• CRC-32 Checksum : 4F48C3CF
• MD5 : D9924AE61F39EB32C97034AE95AB35DA
• SHA1 : CF0D47E8B4C383687D171FA520F6DF029AFDC4D5
• Created : Saturday, January 5th, 2008, 1:10:45 AM

download_button.jpg₪ NOTE : FILE HAD BEEN RE-UPLOADED and DOWNLOAD URL HAD BEEN RENEWED

Screenshot

usb-restriction_screenshot_thumbnail
This little-simple-Program may far from perfection, yet I hope it would be useful for everyone who need to increase a little bit computer security level.
Thank You for wise usage of this program.
Your comments, suggestions, or criticism would be whole-heartedly opened for me via my e-mail.
Spammers will never be invited! :p

Kind Regards,
• Henry A®tworks Studio™ •

Membuat Aplikasi U3 Smart Drive Dengan Package Factory

Membuat Aplikasi U3 Smart Drive Dengan Package Factory

Package Factory for U3 Smart Drive

Bagi para pengguna U3 Smart Drive (U3 Flash Disk), kini Anda bisa menggunakan Aplikasi Favorit atau Aplikasi Buatan Anda sendiri pada U3 SmartDrive Anda secara mudah dengan bantuan third-party application yang bernama Package Factory.

Package Factory merupakan aplikasi kecil berlisensi gratis yang digunakan untuk Mengkonversi Aplikasi Non-U3 (Non-U3 Application) dengan format .exe menjadi Aplikasi U3 (U3 ‘Ready’ Application) dengan format .u3p (hanya terjadi sedikit pembengkakan ukuran file/file size).

Aplikasi yang memerlukan instalasi singkat ini sangat mudah digunakan (user friendly). Package Factory menyediakan dua mode environment, yakni Simple Mode (Default) dan Advance Mode (for experienced user). Pada Simple Mode (Default), Anda tinggal bermain Drag and Drop Aplikasi yang akan Anda konversikan ke format U3 Application dari Windows Explorer ke Package Factory Dropper dan Klik tombol “Create” (seperti terlihat pada ScreenShot di atas. Mudah Bukan?

Sebagai Catatan, tentu saja tidak semua Aplikasi bisa dikonversikan ke format U3 Application dengan Package Factory. Silakan Anda melakukan Trial and Error dengan Aplikasi Favorit atau Buatan Anda. Harap dicoba Pengkonversian Aplikasi (.exe) dengan File Size kecil sampai menengah terlebih dahulu. Penulis sendiri telah mencoba beberapa Aplikasi setup kecil dan bisa diimplementasikan ke dalam U3 Smart Drive Penulis.

U3 Logo

DownloadButton.jpg

Download Package Factory for U3 Smart Drive

dari Package Factory Official Website (No Password) atau
dari 4Shared (Password: “henrique” -> Tanpa Tanda Kutip <” “> )

Selamat Mencoba dan Semoga Bermanfaat
Salam

Folder Options Recovery From Virus Attack

Folder Options Recovery From Virus Attack

Some Current Indonesian Windows Viruses that were reported had widely spread out around the world had unique characteristics of attacking techniques. One of the old popular techniques was Changing (I like to call it “making a Mess”) Windows Folder Options by modifying Windows Registry.
Some Indonesian virus programmers preferred to play “hide and seek” only by hiding files in the computer target without making a dangerous destructive action of the computer system. Commonly, the attackers tried to hide the files by changing their file attributes into “hidden” and “system”, so that the files status is not just hidden, yet super-hidden as simply protected Windows system files.
The Victims cried that they had lost their such files. Some of them had realized that their files had been super-hidden, but they could not get their hidden files back since they could not change the Folder Options settings to the normal previous state after the virus programmer had ‘frozen’ the Folder Options Settings. And the rest of them did not realize that their files had just been invisible and, frequently, replaced by fake files (files that contain malicious scripts — the virus itself). Mostly, in the case of the frozen Folder Options Settings, the virus had made registry modifications at “Checked Value” and “Unchecked Value” Check Box Options.
This article tells about How To:
1. Unfreeze The Frozen Folder Options
2. Recover Folder Options Settings that had been changed by Virus
3. Show The Files that had been hidden by Virus

1. Unfreeze The Frozen Folder Options
There are two ways to Unfreeze The Frozen Folder Options. First, Kill The Resident Virus with trusted AntiVirus, and second, Recover Folder Options by re-modifying the registry keys that had been changed by attacking Virus to their normal previous state.

2. Recover Folder Options Settings that had been changed by Virus

2.1. Download Program : Folder Options Recovery for Windows v1.0.0
folder-options-recovery_thumbnail
download_button.jpgNOTE : – Some Anti-Virus Programs had categorized this program as a computer threat (Trojan); that was just FALSE ALARM. I guarantee that this program does not contain any stupid malware and won’t harm Your computer. – FILE HAD BEEN RE-UPLOADED AND DOWNLOAD URL HAD BEEN RENEWED

– Category : Computer\Windows\Recovery Tools
– Program name : Folder Options Recovery for Windows
– Program Type : Portable Application
– Version  : 1.0.0.0
– Supported OS : Microsoft Windows 98/Me/XP/Vista
– License  : Freeware
– Developer : Henry U.S.S.A – Henry Artworks Studio
– File Name  : Folder-Options-Recovery.exe
– File Size : 45.5 KB (46,592 bytes)
Size On Disk : 48.0 KB (49,152 bytes)
– CRC-32 Checksum : A4B4949B
– MD5 : F1F60B1E84D8F1441AB59B92E347D22E
– SHA1 : 0E4D03F87A809D213C29300CADAFE2942577D80D
– Created : Monday, September 1st, 2008, 1:22:50 AM

2.2. Download Two Registry Entry Files below:
a. Download Show_FolderOptions_and_ControlPanel.reg (download here)
b. Download Folder_Options_Recovery_-_Show_All_Files.reg (download here)
—- and “Merge” it into Your Windows Registry Database, OR
2.3. Manual Recovery via Windows Registry by Creating Two Registry Entry Files:
a. Open Windows Notepad or other Text Editors
b. Copy these Registry Entry lines written below:

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
“NoFolderOptions”=dword:00000000
“NoControlPanel”=dword:00000000

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
“NoControlPanel”==dword:00000000

and save as Registry Entry File (.reg): “Show_FolderOptions_and_ControlPanel.reg“ -> this is useful for the condition if Folder Options had been hidden and Control Panel had been disabled by the Virus.

Yet, if Folder Options remains visible and Control Panel had not been disabled, then Copy and Paste into Your Notepad:
these Registry Entry lines written below:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder]
“Type”=”group”
“Text”=”@shell32.dll,-30498”
“Bitmap”=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\
00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,53,00,\
48,00,45,00,4c,00,4c,00,33,00,32,00,2e,00,64,00,6c,00,6c,00,2c,00,34,00,00,\
00
“HelpID”=”shell.hlp#51140”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\ClassicViewState]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30506”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”ClassicViewState”
“CheckedValue”=dword:00000000
“UncheckedValue”=dword:00000001
“DefaultValue”=dword:00000000
“HelpID”=”shell.hlp#51076”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\ControlPanelInMyComputer]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\HideMyComputerIcons”
“Text”=”@shell32.dll,-30497”
“Type”=”checkbox”
“ValueName”=”{21EC2020-3AEA-1069-A2DD-08002B30309D}”
“CheckedValue”=dword:00000000
“UncheckedValue”=dword:00000001
“DefaultValue”=dword:00000001
“HKeyRoot”=dword:80000001
“HelpID”=”shell.hlp#51150”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\DesktopProcess]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30507”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”SeparateProcess”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000000
“HelpID”=”shell.hlp#51079”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\DesktopProcess\Policy]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\DesktopProcess\Policy\SeparateProcess]
@=””

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\DisableThumbCache]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30517”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”DisableThumbnailCache”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000000
“HelpID”=”shell.hlp#51155”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\FolderSizeTip]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30514”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”FolderContentsInfoTip”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\FriendlyTree]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30511”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”FriendlyTree”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“HelpID”=”shell.hlp#51149”
“DefaultValue”=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden]
“Text”=”@shell32.dll,-30499”
“Type”=”group”
“Bitmap”=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\
00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,53,00,\
48,00,45,00,4c,00,4c,00,33,00,32,00,2e,00,64,00,6c,00,6c,00,2c,00,34,00,00,\
00
“HelpID”=”shell.hlp#51131”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“Text”=”@shell32.dll,-30501”
“Type”=”radio”
“CheckedValue”=dword:00000002
“ValueName”=”Hidden”
“DefaultValue”=dword:00000002
“HKeyRoot”=dword:80000001
“HelpID”=”shell.hlp#51104”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“Text”=”@shell32.dll,-30500”
“Type”=”radio”
“CheckedValue”=dword:00000001
“ValueName”=”Hidden”
“DefaultValue”=dword:00000002
“HKeyRoot”=dword:80000001
“HelpID”=”shell.hlp#51105”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30503”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”HideFileExt”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000001
“HelpID”=”shell.hlp#51101”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\NetCrawler]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30509”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”NoNetCrawling”
“CheckedValue”=dword:00000000
“UncheckedValue”=dword:00000001
“DefaultValue”=dword:00000000
“HelpID”=”shell.hlp#51147”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\NetCrawler\Policy]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\NetCrawler\Policy\NoNetCrawling]
@=””

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\PersistBrowsers]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30513”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”PersistBrowsers”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“HelpID”=”shell.hlp#51152”
“DefaultValue”=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\ShowCompColor]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30512”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”ShowCompColor”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000001
“HelpID”=”shell.hlp#51130”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\ShowFullPath]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30504”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\CabinetState”
“ValueName”=”FullPath”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000000
“HelpID”=”shell.hlp#51100”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\ShowFullPathAddress]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30505”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\CabinetState”
“ValueName”=”FullPathAddress”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000001
“HelpID”=”shell.hlp#51107”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\ShowInfoTip]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30502”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”ShowInfoTip”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“DefaultValue”=dword:00000001
“HelpID”=”shell.hlp#51102”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30508”
“WarningIfNotDefault”=”@shell32.dll,-28964”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”ShowSuperHidden”
“CheckedValue”=dword:00000000
“UncheckedValue”=dword:00000001
“DefaultValue”=dword:00000000
“HelpID”=”shell.hlp#51103”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden\Policy]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden\Policy\DontShowSuperHidden]
@=””

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Thickets]
“Text”=”Managing pairs of Web pages and folders”
“Type”=”group”
“Bitmap”=”C:\\WINDOWS\\System32\\\\SHELL32.DLL,4”
“HelpID”=”TBD”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Thickets\AUTO]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer”
“Text”=”Show and manage the pair as a single file”
“Type”=”radio”
“CheckedValue”=dword:00000000
“ValueName”=”NoFileFolderConnection”
“DefaultValue”=dword:00000000
“HKeyRoot”=dword:80000001
“HelpID”=”TBD”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Thickets\NOHIDE]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer”
“Text”=”Show both parts but manage as a single file”
“Type”=”radio”
“CheckedValue”=dword:00000002
“ValueName”=”NoFileFolderConnection”
“DefaultValue”=dword:00000000
“HKeyRoot”=dword:80000001
“HelpID”=”TBD”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Thickets\NONE]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer”
“Text”=”Show both parts and manage them individually”
“Type”=”radio”
“CheckedValue”=dword:00000001
“ValueName”=”NoFileFolderConnection”
“DefaultValue”=dword:00000000
“HKeyRoot”=dword:80000001
“HelpID”=”TBD”

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\WebViewBarricade]
“Type”=”checkbox”
“Text”=”@shell32.dll,-30510”
“HKeyRoot”=dword:80000001
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“ValueName”=”WebViewBarricade”
“CheckedValue”=dword:00000001
“UncheckedValue”=dword:00000000
“HelpID”=”shell.hlp#51148”
“DefaultValue”=dword:00000000

— 2.3. Save Text Lines above as a Registry Entry File (file format: .reg) : “Fix_Folder_Options.reg
— 2.4. “Merge” it into Windows Registry Database:

3. Show The Files that had been hidden by Virus
After The Registry Entry Files had been merged successfully into Windows Registry Database, Folder Options will be ‘Your own’, and All Hidden Files (including Hidden System Files) will be shown with their unchanged file attributes (hidden and system attributes).
Then, finally You can simply manually change their file attributes back to their original attributes by a free recommended software named Attribute Changer that can be downloaded from here or directly from here.

NOTE:
The Resident Virus must be killed first with trusted AntiVirus (as the easiest way) before You can merge the Registry Entry File above into the Windows Registry Database to Recover Folder Options, or It won’t Work since the Virus will put the Folder Options Setting back to the wrong way…

Related and Supported Topic:
Memunculkan File Yang Disembunyikan Virus

Gracias