we must pay attention to these two viruses when using U disk:
Folder Imitators "(win32.troj.fakefoldert.yl.1407388), this is a USB disk spread through the advertising program, it will be disguised as a U disk folder, deceive users click. Once run, it will infect folders on other disks of your computer and eject the ad page.
"Malicious Auxiliary Theft Device" (win32.pswtroj.gameonline.49152), the poison for a theft Trojan. It is mainly through the bundle of some online plug to carry out the transmission, theft targets include the current mainstream of various types of online games.
One, win32.troj.fakefoldert.yl.1407388 (folder imitators) And its variants win32.troj.fakefoldert.yo.1406378 will hide the folder icon in the user's system and generate a virus file with the same name as the folder icon, and the user must click the virus file to enter the folder. This allows the virus to bypass the system or security software USB disk monitoring function. Once activated, it will pop up a lot of ad pages.
If you remove the virus directly, it may cause the hidden files to be found. However, as long as the use of Jinshan u disk dedicated kill, you can repair.
Second, the "malicious Auxiliary Theft Device" (win32.pswtroj.gameonline.49152) of the increase in the amount of infection, it is the use of transmission is bundled transmission. When entering the system, the user's network game account is obtained through memory injection and message interception.
Online games plug has been stolen Trojan is keen to bundle objects, and even some plug directly is the hacker carefully written out, the purpose is to deceive users to download the operation.
If the computer frequently reported that the virus, users can turn off the System automatic restore function, and then the killing once can be.
Note : More wonderful tutorials Please pay attention to the triple computer tutorial section, triple Computer office group: 189034526 welcome you to join