当前位置: 首页 > 知识 >正文

jwgkvsq.vmx病毒清除方法(附jwgkvsq.vmx专杀工具)

电脑感染这个可恶的病毒很久了,已经懒得做了。主要是除了我每次插u盘都会在u盘下生成一个隐藏的RECYCLER文件夹和autorun.inf,其他好像都没害过。

但是每次我把u盘拿到别人的电脑上,总是被告知它有毒。这真的不是什么光彩的事,所以我决定杀了它!

谷歌尝试了几种方法,都没用(有些很麻烦),下载N个杀毒程序后都没用。最后在德国杀毒软件antivir的官方论坛找到了解决方案(antivir其实对这个病毒完全没有反应-_-!)。

废话少说,先看看你是不是和我一样中毒,如果和我一样中毒,就这样解决,保证简单有效。

病毒描述:

病毒放在I:recyclers-5-3-42-2819952290-8240758988-879315005-3665 jwgkvsq . VM x2 . autorun . INF,回收器可以手动删除。

解决方案:

1.点击此处下载赛门铁克针对该病毒开发的查杀工具FixDownadup.exe;2.断开网络,

关闭所有程序;关闭系统还原;3.执行刚刚下载的FixDownadup.exe;4.重新启动计算机;再次执行FixDownadup.exe以确保病毒被完全清除;5.打开系统进行恢复;链接网络;点击这里,

查找并安装Microsoft系统安全修补程序(KB958644)

你完了!如果您有任何问题,请在本页留言。

P.S .以下为原帖内容。懂英语的朋友可以自己看一下:

You have just to follow these instructions.

1. Download the FixDownadup.exe file from here2. Save the file to a convenient location, such as your Windows desktop.

NOTE : If you are on a network or if you have a full-time connection to the Internet, disconnect the computer to the network or to the Internet connection.

3. Close all the running programs.4. Turn off System Restore (this feature is not available in Windows 2000):

NOTE : Disabling System Restore will remove all your restore points. You can enable System Restore again after this procedure and create a new restore point.- on Windows XP: right-click on My computer - choose Properties - go to System restore tab and check 'Turn off System restorehellip;'- on Windows Vista: right-click on My computer and select Properties - click on System protection then on the System protection tab - uncheck all drives under 'Available disks' - press 'Turn system restore off' when dialog appears

5. Locate the file that you just downloaded.6. Double-click the FixDownadup.exe file to start the removal tool.7. Click Start to begin the process, and then allow the tool to run.

NOTE: If you have any problems when you run the tool, or it does nor appear to remove the threat, restart the computer in Safe mode and run the tool again.

8. Restart the computer.9. Run the removal tool again to ensure that the system is clean.10. Reenable System Restore.11. Install patch for the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability by choosing your operating system.12. Ensure that user accounts have strong passwords that are not in the list used by the worm.13. If you are on a network or if you have a full-time connection to the Internet, reconnect the computer to the network or to the Internet connection.

相关文章:
  • 7月13日基金净值:鹏华环保产业股票最新净值3.989,涨0.3%
  • 5月18日基金净值:中泰星元灵活配置混合A最新净值2.3881,跌0.18%
  • 7月13日基金净值:广发招享混合A最新净值1.2822,涨0.46%
  • 一周ETF动态速览:宽基ETF继续获加仓,创业板ETF遭资金撤离
  • 6月19日基金净值:工银医药健康股票A最新净值2.1067,跌0.31%
  • 6月20日基金净值:华宝医疗ETF联接A最新净值0.7491,跌0.6%
  • 4月11日基金净值:华安优势企业混合A最新净值0.6599,跌0.15%_基金频道_证券之星
  • 6月29日基金净值:农银汇理研究驱动混合最新净值1.5205,跌0.31%
  • 4月20日基金净值:国联安沪深300ETF联接A最新净值1.0391,跌0.29%
  • 6月15日基金净值:招商蓝筹精选股票A最新净值0.673,涨2.23%