-
You didn't delete the worm cleanly, or you can just find a disk to see if the icon is clear, there must be blurry, especially QQ, Office series, Qianqian Jingting, realplayer, etc.
If you want to delete it manually, it's more troublesome, and it's not just this one program, but there are others. Here's how I deleted it:,logo1
exe two are also easier to delete.,As long as you use 360 security guards or other anti-virus software to search for it.,Display logo1 after searching.exe,,dll.dll.Three sources of disease But dll dll can't be deleted all the time, it's because of injection, so it can't be deleted
dll dll is more stubborn, and it can't be deleted directly, so I deleted it like this:
Go to the task manager first, delete it, and then the desktop disappears, don't be afraid! Select File (f) in Task Manager - New Task Then run the desktop and it will come out again!
This time find the dll again and you can delete it
Enter regedit to find the registry key in Run to remove it by typing the registry key: [hkey local machine software soft downloadwww].
Then press Ctrl+F to find the registry key and all the keys in this item to remove it.
There, leave it alone, check it once after turning it off to see if it's still there)
The virus will infect exe applications such as QQ, Office series, Qianqian Jingting, RealPlayer, and the general icon is discolored as it is infected, and the program should be reinstalled. It's best to try to open the program and find out if it's generated, if there is, it proves that the program is infected, so follow the above.
Then manually kill the poison and then reinstall the software. (There are not many programs that are generally infected, that is, logo1.)exe icon.
of that program)!Knowing that the program doesn't appear when you open it means you're done! @
After deleting, I check the virus with 360, and there is no more! After the restart, no trace was found.
The above is my manual antivirus process.
Good luck with a speedy deletion
-
I'm also depressed, your way is too troublesome, I have a headache.
-
You've been hit by a viking virus that's been crazy, vicious, and hard to get a handle lately! No antivirus will work against it!! Let me tell you about my practical experience with this virus!
At the beginning, I was also anxious about this virus, because whether you manually delete its generated files and registry, or the system disk, it is useless, and it will exist again!! Why? Messy?
Because it infects all your drive letters. exe file!! No matter what you do with the system disk, the other disks are infected. The exe file still exists, so it will happen again!
So the principle is: take the virus from. Strip off the exe file and remove the system disk in the grid!! But there are hundreds, if not thousands, of them in a computer. exe file, what should I do???
After I searched the Internet hard, I found that the latest version of Rising (the latest version of the virus database) can remove viruses from. exe file. But there is another problem, it will also break some executable files, for example, after I use it, many installation files of the setup are not used.
But it can't be helped, it's better than all the plates, right??
So, your workaround should be:
2。After the virus is killed, the system disk is removed for the fuse.
3。Kill again with a monopoly.
I have personally experimented with the above methods, and the effect is feasible, and the only unpleasant thing is that there is. The exe file may be corrupted (e.g., but not all, the corrupted rock file is going to be *** well).
-
It can be removed with a kaba.
-
I've already answered, and you did what the post said, yes.
-
It is mainly broadcast in the way of broadcasting within the local area network, which makes the entire local area network traffic increase greatly and leads to network gambling congestion.
-
The virus spreads and slowly invades the system.
-
As a computer program that is seriously harmful to the Internet, the destructive power and contagiousness of the network worm cannot be ignored. Unlike traditional viruses, worms use computers as carriers and networks as the object of attack! Adopt it.
-
I feel that worms are mainly used to send files through unlistening copying, which takes up bandwidth and system resources The day before yesterday I was hit by a worm, which caused a file to appear in all the disks of the computer, and immediately after deletion, it appeared again Maybe their principle is the same.
-
Isn't it okay for antivirus software to kill viruses directly?
Install a PC Manager on your computer.
Then use virus scanning and antivirus against your computer.
-
The steps to set up the router after the factory reset are as follows:
1. Open the browser of the computer, enter the IP of the router in the address bar, click the enter key to enter the settings page of the router, the username is admin, the password is blank, click to log in, and enter the settings home page of the router.
2. After logging in to the homepage, select Manual Settings. Then select Manual Internet Settings, and Home Dial-up users select the PPPoE connection type. In the username and user, enter the username and password given by the ISP provider (Netcom, Great Wall, Telecom, Tietong, Cable, etc.) correctly.
The connection mode selection is always filled in with the mtu value of 1492. The save is done.
3. The wireless router also has a wireless encryption to ensure the user's wireless security. Select the wireless settings on the main page of the router's settings, select an encryption method in the security mode, any one of WEP, WPA, or WPA2, and then enter 8 or more Chinese characters or numbers as the wireless password in the security key, and the router settings will be completed after saving the settings.
4. After the setting is completed, the router will automatically restart, and the external network cable can be used by connecting the external network cable to the WAN port of the router.
-
Account admin password admin you use this to change the settings inside after entering.
-
Was the recovery successful? Try to do it all over again as indicated.
-
You also need to have a network cable to connect the computer to the router!
You don't need to go online to log in to the route.
-
When the word system detects a grammatical error, it will draw a red line under the corresponding text, which can only be seen in the state of word, and will not be displayed when printing.
Removal method: Open the review menu in Word and remove "spelling and grammar".
-
Grammatical errors, there is a grammar check in the place below Word, just let it ignore all errors.
-
It's a check function in Word.,Suggest that there's something wrong with you.。
Don't worry about it, the red line doesn't appear when you print.
You use 360 Security Guard to kill you in safe mode, and then you use antivirus software to kill you (also in safe mode).
Local Area Network (LAN) Chinese is the abbreviation of "local area network", the full English name is "local area network", which mainly refers to a working group Internet network composed of servers and multiple computers in a small area, which belongs to a branch of computer network applications. Because every computer in the network is connected through the server, the transmission rate of information in the LAN is relatively high, and it also provides an effective channel for the spread of viruses, usually the viruses spread to each other in the LAN through the following ways: >>>More
Red Kids doesn't have a number one store because it doesn't have a physical store.
Nowadays, it is generally used to use the G-disk XP system. >>>More
Hello, what network do you use, is the mobile phone Mi-2 or Mi-1S? Don't worry just yet, try it: >>>More