設為首頁 | 加入收藏 | 知識問答 | 電腦論壇 | RSS圖標
您當前位置:奇愛電腦網 >> 電腦安全 >> 系統安全 >> 瀏覽文章

如何正確有效清除jwgkvsq.vmx病毒

2012-7-14 0:30:33 奇愛電腦網 電腦小白 【字體: 查看評論 閱讀:

電腦染上這個可惡的病毒很長時間了,一直懶得弄。主要是除了每次插U盤都會在U盤下生成隱藏的RECYCLER文件夾和autorun.inf之外,好像并沒有危害過我別的東西。可每次拿我的U盤去別人電腦那里總被告知有毒,這實在不是一件光彩的事兒,于是下決心干掉它!

Google了一下,試了好幾種辦法都沒有效果(有的方法還很麻煩),下了n個u盤殺毒程序也不都管用。最后在德國殺毒軟件小紅傘的官方論壇找到了解決辦法(小紅傘其實根本就對這個病毒毫無反應-_-!!!)。

廢話少說,你先看看你中的毒是不是和我一樣,一樣的話按這個辦法去解決,保證簡單有效。

病毒描述: (本站推薦:軟件知識

1. U盤根目錄下生成了一個antorun.inf,還有一個文件夾RECYCLER,病毒被放在I:RECYCLERS-5-3-42-2819952290-8240758988-879315005-3665jwgkvsq.vmx
2. autorun.inf和RECYCLER都可以手動刪除,但重新拔插U盤,發現又有了 autorun.inf 和 RECYCLER 文件夾

解決辦法:

1. 點擊這里下載Symantec為這病毒研發的專殺工具,FixDownadup.exe;
2. 斷掉網絡,關閉全部程序;關閉系統還原;
3. 執行剛才下載的FixDownadup.exe;
4. 重啟電腦;再執行FixDownadup.exe 以確保病毒完全清除;
5. 開啟系統還原;鏈接網絡;點擊這里,尋找并安裝微軟系統安全補丁(KB958644)

大功告成!有任何問題歡迎在此頁留言。

P. S. 下面是原始的帖子的內容,懂英文的朋友可以自己看一下:

You have just to follow these instructions.

1. Download the FixDownadup.exe file from here
2. Save the file to a convenient location, such as your Windows desktop.

NOTE : If you are on a network or if you have a full-time connection to the Internet, disconnect the computer to the network or to the Internet connection.

3. Close all the running programs.
4. Turn off System Restore (this feature is not available in Windows 2000):

NOTE : Disabling System Restore will remove all your restore points. You can enable System Restore again after this procedure and create a new restore point.
- on Windows XP: right-click on My computer -> choose Properties -> go to System restore tab and check “Turn off System restore…”
- on Windows Vista: right-click on My computer and select Properties -> click on System protection then on the System protection tab -> uncheck all drives under “Available disks” -> press “Turn system restore off” when dialog appears

5. Locate the file that you just downloaded.
6. Double-click the FixDownadup.exe file to start the removal tool.
7. Click Start to begin the process, and then allow the tool to run.

NOTE: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again.

8. Restart the computer.
9. Run the removal tool again to ensure that the system is clean.
10. Reenable System Restore.
11. Install patch for the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability by choosing your operating system.
12. Ensure that user accounts have strong passwords that are not in the list used by the worm.
13. If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.

網友評論:

圖片廣告
传奇电子书
吉林快三全天精准追号计划 手机游戏推荐 黑龙江时时号码走势 管家婆王中王特网开奖结果出 山东时时官网下载 单机游戏斗牛下载 北京赛记录1比1 快乐十二走势图牛 陕西福彩20选8下载 pk10技巧5码选位置 推牌9的生死门科学吗 澳洲幸运8开奖数据 老时时后不定位胆 四肖期期准 3d开机号开1000期期走势图 江苏时时11选五