設為首頁 | 加入收藏 | 知識問答 | 電腦論壇 | RSS圖標
您當前位置:奇愛電腦網 >> 電腦安全 >> 系統安全 >> 瀏覽文章

如何正確有效清除jwgkvsq.vmx病毒

2012-7-14 0:30:33 奇愛電腦網 電腦小白 【字體: 查看評論 閱讀:

電腦染上這個可惡的病毒很長時間了,一直懶得弄。主要是除了每次插U盤都會在U盤下生成隱藏的RECYCLER文件夾和autorun.inf之外,好像并沒有危害過我別的東西。可每次拿我的U盤去別人電腦那里總被告知有毒,這實在不是一件光彩的事兒,于是下決心干掉它!

Google了一下,試了好幾種辦法都沒有效果(有的方法還很麻煩),下了n個u盤殺毒程序也不都管用。最后在德國殺毒軟件小紅傘的官方論壇找到了解決辦法(小紅傘其實根本就對這個病毒毫無反應-_-!!!)。

廢話少說,你先看看你中的毒是不是和我一樣,一樣的話按這個辦法去解決,保證簡單有效。

病毒描述: (本站推薦:軟件知識

1. U盤根目錄下生成了一個antorun.inf,還有一個文件夾RECYCLER,病毒被放在I:RECYCLERS-5-3-42-2819952290-8240758988-879315005-3665jwgkvsq.vmx
2. autorun.inf和RECYCLER都可以手動刪除,但重新拔插U盤,發現又有了 autorun.inf 和 RECYCLER 文件夾

解決辦法:

1. 點擊這里下載Symantec為這病毒研發的專殺工具,FixDownadup.exe;
2. 斷掉網絡,關閉全部程序;關閉系統還原;
3. 執行剛才下載的FixDownadup.exe;
4. 重啟電腦;再執行FixDownadup.exe 以確保病毒完全清除;
5. 開啟系統還原;鏈接網絡;點擊這里,尋找并安裝微軟系統安全補丁(KB958644)

大功告成!有任何問題歡迎在此頁留言。

P. S. 下面是原始的帖子的內容,懂英文的朋友可以自己看一下:

You have just to follow these instructions.

1. Download the FixDownadup.exe file from here
2. Save the file to a convenient location, such as your Windows desktop.

NOTE : If you are on a network or if you have a full-time connection to the Internet, disconnect the computer to the network or to the Internet connection.

3. Close all the running programs.
4. Turn off System Restore (this feature is not available in Windows 2000):

NOTE : Disabling System Restore will remove all your restore points. You can enable System Restore again after this procedure and create a new restore point.
- on Windows XP: right-click on My computer -> choose Properties -> go to System restore tab and check “Turn off System restore…”
- on Windows Vista: right-click on My computer and select Properties -> click on System protection then on the System protection tab -> uncheck all drives under “Available disks” -> press “Turn system restore off” when dialog appears

5. Locate the file that you just downloaded.
6. Double-click the FixDownadup.exe file to start the removal tool.
7. Click Start to begin the process, and then allow the tool to run.

NOTE: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again.

8. Restart the computer.
9. Run the removal tool again to ensure that the system is clean.
10. Reenable System Restore.
11. Install patch for the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability by choosing your operating system.
12. Ensure that user accounts have strong passwords that are not in the list used by the worm.
13. If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.

網友評論:

圖片廣告
传奇电子书
时时彩网站制作 宝盛娱乐app 贝通比牛牛手机版 京浦娱乐 时时彩后一稳赚不赔法 单双大小投注技巧大全 pt游戏的games 多宝娱乐一号平台 北京pk10冠军走势图 北京时时赛车微信群 重庆时时彩稳赚计划 pk10走势图杀码技巧怎么看 aa国际动漫靠谱吗 贝斯特全球最奢游戏手机app 6码中特免费公开资料 重庆时时五星全天计划