Urgent! HOW DOES THE WINFILE VIRUS KILL IT COMPLETELY?

Updated on healthy 2024-04-19
12 answers
  1. Anonymous users2024-02-08

    The real name of the winfile virus is called: ", because the virus will generate a large number of useless winfile files in the folder during the attack, which will consume a lot of system resources. At the same time, the virus will call Outlook to send messages carrying the virus, which will further infect other machines.

    In addition to killing them with antivirus software, the author also tells you how to remove them manually.

    Note: "It has system and hidden properties, so when searching, you should select three options: "Search System Folder", "Search Hidden Files and Folders", and "Search Subfolders".

    Note: Some of them are original files of Windows, please distinguish them clearly before deleting the useless".

    3.Open the registry, look for ", and delete them all.

    At this point, the "winfile virus" has been swept away by us.

    If only the C disk is checked when reloaded, the poison will not be killed.

  2. Anonymous users2024-02-07

    Of course, reinstalling the system can kill it, unless the virus is still in another disk. Let's use Kaba to kill and kill viruses first.

  3. Anonymous users2024-02-06

    The old virus can be killed by a lot of soft killings. Killing tools.

  4. Anonymous users2024-02-05

    Happy Hour.

    Now just find an antivirus software, upgrade the virus database and you can get the top.

  5. Anonymous users2024-02-04

    As long as it can be detected, it can be killed, and the so-called can't be killed because the virus is running; Running programs cannot be modified or deleted.

    Start anew, press and hold F8, enter safe mode, and you can easily kill viruses with antivirus software.

  6. Anonymous users2024-02-03

    Use anti-virus software to scan

    Manual killing is more troublesome

    And if it's not done properly, the virus will be restarted every time you open a folder

  7. Anonymous users2024-02-02

    I've been hit by this virus before, and many antivirus software didn't recognize it at the time, but now I don't know it, and I just formatted my computer at the time.

  8. Anonymous users2024-02-01

    If more than one drive letter is generated at the same time, it must be deleted.

    To start --- run--- enter the cmd ---

    Enter cd and then del c: desktopini /f/s/a/qdel d:

    desktop_.ini /f/s/a/qdel e:\desktop_.

    ini /f/s/a/qdel f:\desktop_.ini /f/s/a/qdel g:

    desktop_.ini f s a qdel (all your disks): desktop

    ini f s a q I also have a little suggestion to create a new compressed file on the desktop After opening, press F4 to view the subfiles under any folder, and see if there are any other similar desktopsini's files! If so, it is still like the above

    The best way to find mStray is to create a new compressed file to check and view

  9. Anonymous users2024-01-31

    Install a 360-degree one. Kill plugins. Adware. .

    And then there's a Kaspersky in 360 degrees. This one works great...I haven't had a virus in my system for 4 months.

  10. Anonymous users2024-01-30

    It's a very ordinary virus, how can it run naked?

    Kaba has one or the other.

  11. Anonymous users2024-01-29

    Virus name]:

    Destruction Method]: This virus uses a folder icon, which is very deceptive. Once the virus runs, it replicates itself in large numbers to other directories.

    1. The virus will be displayed when it is run for the first time"this file has been damage!";

    2. Copy yourself to the windows directory and rename it.

    3. Modify the registry: hkey local machine software\Microsoft\Windows\CurrentVersion\Run

    to achieve its self-starting;

    4. Enumerate the disk directories and release the following files in each root directory:

    Virus host program.

    An IE vulnerability can be exploited to call the""and the property is hidden.

    The system is hidden. When browsing a folder in a web mode, the system calls the file, which is called.

    , thus activating the virus.

    5. Viruses modify the registry, hide system files, hide system-protected files, and hide known extension names.

    In this way, the user does not see the and, is hidden with the suffix, and is again a file.

    folder icon, the user is very likely to think that it is a folder and click on it.

    At the same time, the self-copy generated by the virus in the current path is named in the parent directory or the title of the current window to increase concealment.

    6. The virus calls Outlook to send a letter carrying the virus.

    Manual removal: (without anti-virus software).

    First things first: find the system that notices this.

    and hidden files, so everyone should know how.

    I can find it, under the system folder), delete it. Modify the registry to remove the corresponding startup items.

    Yes: , Note: View-> remove the system.

    system protection, remove the hidden)

    Delete! Be careful not to delete the wrong ones!

    Some are Windows original.

    Finally: Find all the [*.] files inside the hard driveexe] file, note: as above), you will find quite a few folders.

    Icon-shaped quick rent. exe file, delete all of them.

    these documents. Everything is ok!

  12. Anonymous users2024-01-28

    Remote maintenance services are available.

    If you are infected by the virus, find a bridge for me. I'll fix it for you. Fierce pants.

    If you don't update the virus database, no amount of good antivirus software will be able to kill the virus.

Related questions
10 answers2024-04-19

Hello: It is recommended that you do not use virus software, viruses will cause damage to your and other people's computers, if you have used such unsafe virus software, for the safety of your computer, it is recommended that you use Tencent Computer Manager to carry out a comprehensive anti-virus on your computer, open the anti-virus function in Tencent Computer Manager and choose lightning to kill or kill completely, you can click here**The latest version of Tencent PC Manager: The latest version of Tencent PC Manager**.

10 answers2024-04-19

Honey is a solution that contains a variety of nutrients such as glucose, fructose, and rice. As glucose has the property of being easy to crystallize. Therefore, the separated honey, left at a lower temperature, for a period of time, the glucose will gradually crystallize. >>>More

2 answers2024-04-19

There are many ways to upload a ** to the server, first of all, you must have the administrative rights of this server, the most commonly used is to upload to the server via FTP, 1Log in to the server remotely, create an FTP, FTP username and password to remember, in the local ** FTP software, open the software and enter the username and password established by the server, the general port is the default 21, upload it to the set directory below. >>>More

4 answers2024-04-19

The clothes can be washed with 84 disinfectant solution when they fade and dyed on other clothes, put the dyed clothes into a basin, pour some freshly boiled water and some 84 disinfectant solution (the amount of disinfectant should be determined according to the area and depth of the clothes), soak for 15 minutes, and gently rub the dyed parts of the clothes with your hands. >>>More

11 answers2024-04-19

Hello, I recommend you to do **spot investment for the following reasons. >>>More