"Snow float variant LZ" (win32.troj. dropper. lz.21920) is a snow float variant. The virus generates random virus files, which are generated under % SystemDir %, % drivers %, and % Temp % respectively.
Download the hidden software from the network through the generated Virus File. When the user starts the machine again, the desktop disappears because the virus process is disabling the system.
.
Worm. delf.114688 is a worm. When a user runs the virus, it quietly downloads a large number of viruses to the System Disk through the Internet.
Directory, including % WINDOWS % and % SystemDir %. The virus will make the famous anti-virus software and security software unable to start, and the user will not be able to kill the virus.
I. "Snow variant LZ" (win32.troj. dropper. lz.21920) Threat Level:★★
1. After the virus runs, all the virus files and service names generated on the machine are random.
2. After the machine is restarted, the desktop cannot be displayed (because the virus takes control of the rundll32.exe process ). Many system processes are prohibited from being started by viruses.
3. Use the hidden software scan again to find that existing hidden software has been downloaded to the system one after another.
Ii. "blocking soft 114688" (worm. delf.114688) Threat Level:★★
1. After the virus is run, several viruses run in the task manager, respectively, winforma9.exe1_kvmxcis.exe,
Cilpnoi.exe1_duvadvm.exe.
2. The famous anti-soft and security software cannot be opened, and the Sreng tool including scanning system logs cannot be opened.
3. Many virus batch files are generated on the system disk.
4. generate a large number of virus files in the % WINDOWS % and % SystemDir % directories.
Anti-Virus engineer suggestions
1. It is best to install professional anti-virus software for comprehensive monitoring. We recommend that you install anti-virus software to prevent the increasing number of viruses. After installing anti-virus software, you should upgrade the software frequently, enable some main monitoring frequently (such as email monitoring), and monitor the memory, report problems to ensure computer security.
2. users who play online games and use QQ chat will increase, so all types of Trojan horses will increase. We recommend that you develop good network usage habits and Upgrade anti-virus software in time, enable Firewall, real-time monitoring, and other functions to cut off the virus transmission path and leave the virus alone.