Destroy all files on the computer infected virus

Source: Internet
Author: User
Tags win32 root directory

Today, users are reminded to pay special attention to the following viruses: "Doom Shadow" (Win32.blackday and "Dream West Tour Bandit" variant nd (WIN32.TROJ.ONLINEGAMES.ND).

"Doom Shadow" (Win32.blackday) is an infected virus that destroys all files on a computer.

"Dream West Tour Thieves" variant nd (WIN32.TROJ.ONLINEGAMES.ND) is a steal online "dream West Tour" account of the Trojan virus.

First, "Doomsday Shadow" (Win32.blackday) Threat Level: Intermediate

Virus characteristics: The virus is the latest popular in the internet, another highly destructive virus, it will target the infected computer in the vast majority of files in the destruction of operations, including infected Web pages files, executables and other files deleted, and damaged files can not be restored. Results in loss of important information and data stored on the computer. When the file is infected, the computer will automatically pop up a virus author's message box: "Your computer were infect my worm! And if you are want to clear this worm ... ". In addition, the virus author will leave some of the other provocative text.

Seizure symptoms: After the virus runs, it traverses the local disk, removable disk, and network disk to infect the Web page files and executables, overwriting the target files, creating Autorun.inf and Black-day.exe virus files in each disk root directory so that they can be activated automatically. The virus author will also leave "I feeling free when I am not in prison." Can you feel my word? " and other words.

Second, "Dream West Tour Grand Theft" variant nd (WIN32.TROJ.ONLINEGAMES.ND) threat level: Low

Virus characteristics: The virus is a stolen Trojan, similar to the previous version, it will lurk in the computer system, waiting to get online games "dream West Tour" of the user Login window, and will steal the effective information through the site post way sent to the Trojan growers. Threats to the user's Network virtual property security, in addition, it also has the ability to close some anti-virus software to kill the window.

Seizure symptoms: After the virus runs, it copies itself to Iexpl0re.exe and releases LgSy0.dll virus files. Modify the registry to enable automatic startup with power-on. In the system to create information hooks, to achieve the purpose of stealing online games account.

Jinshan Anti-Virus Engineer recommends:
1. With the development of computer technology, more and more viruses will accompany, in order to protect your system and personal information security, please constantly update the virus of the poison to prevent the virus intrusion.

2. In the domestic network game in full swing after the emergence of a variety of game viruses will breed spread, players must do a good job related virus prevention, to avoid causing significant losses.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.