Add a new file association to the winfiles to point to C:\WINDOWS\ExERoute.exe
and tamper with EXE file association hklm\software\classes\.exe\: "Winfiles"
4. Revise
Quote:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
The {shell} value is Explorer.exe 1
5. Connect the network to steal the legendary world and other games account password
Purge method:
1. Decompression IceSword Icesword.exe renamed to icesword.com operation
Process one column ends%systemroot%\services. Exe
Click on the lower left corner of the file button to delete the following files
%systemroot%\debug\debugprogram.exe
%systemroot%\system32\command.pif
%systemroot%\system32\dxdiag.com
%systemroot%\system32\finder.com
%systemroot%\system32\msconfig.com
%systemroot%\system32\regedit.com
%systemroot%\system32\rundll32.com
%systemroot%\1.com
%systemroot%\exeroute.exe
%systemroot%\explorer.com
%systemroot%\finder.com
%systemroot%\services. Exe
D:\autorun.inf
D:\pagefile.pif
2. Change the Sreng extension to bat and run
System Repair-file association repair
3. Repair System
Open the system disk and run directly%systemroot%\system32\regedit.exe
Restore the registry that was modified by the virus
Delete Hklm\software\classes\winfiles entire subkey
Modify HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
The {shell} value is Explorer.exe
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.