"Nima (Worm.nimaya)" Virus: Alert degree ★★★☆, worm, transmitted through infected files, dependent system: Win 9X/NT/2000/XP.
The virus uses the Panda avatar as an icon to entice the user to run. After the virus runs, it automatically finds the EXE executable file in Windows format and infects it. Because of the problem with the
"Mail virus" is actually the same as common computer viruses, but it is called "mail virus" because they are mainly transmitted through email ", because they are generally spread by means of attachments in emails, it is vital to prevent mail viruses because emails are frequently used in daily work. It is a skill to deal with mail viruses. Now let me tell you a few tricks.1. Select a reliable anti-
1. Principles of Viruses
First of all, it seems that we should introduce what is virus, because many people are always confused with viruses and Trojans. No-this cannot blame them, because many Trojans now use virus-related technologies, there is no trojan virus. A virus is a group of computer commands or program code
Virus program source code instance analysis-example code of CIH virus [2] can be referred to push eax; block table size
Push edx; edx is the offset of the virus code block table
Push esi; buffer address
The total size of the merged virus code block and virus code block ta
Jiang Min's August 10 virus broadcast: Beware of the account and password of online game thieves "Perfect World International Edition" Players
Jiang min reminds you today that among today's viruses, Trojan/PSW. GamePass. tip "online game thieves" variants tip and TrojanDownloader. Small. lge "Small dot" variants lge deserve attention.
Virus name: Trojan/PSW. GamePass. tip
Chinese name: tip of the "Online Ga
Recently, some time ago, the 8749 virus on the user's IE homepage was tampered with to generate a new variant, variant B, with more destructive power. This not only can end anti-virus software on the user's computer, you can even delete files related to some anti-virus software. As a result, the anti-virus software is
Recently, some netizens reported that the computer was down and nothing except the mouse could be changed. In addition, almost none of the keyboard shortcuts are available (only the "Task Manager" is available). The most strange thing is the crazy pop-up of the optical drive.
In the past, there was a virus called "Crazy Optical Drive", but "Crazy Optical Drive" is a timed attack, and the optical drive pops up once every one minute, which is inconsiste
Virus symptoms:
Antivirus software is disabled, hidden files can not be displayed, start command msconfig can not run, a lot of assistive software also can not run, run EXE and SCR files after the virus infection
Manual killing of the software used:
Sreng Software and Xdelbox software
Quote:
Virus Name: trojan-downloader.win32.agent.****
Jiang Min's August 11 virus broadcast: Beware of the star lock virus stealing the login password of Web Pages browsed by users
Jiang min reminds you today that in today's virus, I-Worm/Locksky. ax star lock variants ax and Trojan/PSW. Moshou. aef "Warcraft" variants aef are worth noting.
Virus name: I-Worm/Locksky. ax
Virus program source code instance analysis-CIH virus [3] code, you need to refer to the jmp ExitRing0Init; exit Ring0 level
; Size of the merged code
CodeSizeOfMergeVirusCodeSection = offset $
; New IFSMgr_InstallFileSystemApiHook function call
InstallFileSystemApiHook:
Push ebx
Call @ 4
@ 4:
Pop ebx; get the offset address of the current command
Add ebx, FileSystemApiHook-@ 4; the offset diffe
Disk drive Trojans have recently become a hot topic in the field of security, it is reported that since the March, "Disk machine" Trojan Horse has been updated several times, infection rate and destructive power is gradually increased. The virus after the operation to shut down and prevent 360 security guards and Kabbah, rising, Jinshan, Jiangmin and other security software operation, in addition to delete the system contains "360" the words of the do
Software Introduction:
Chenoe Anit-virus Tools (short: C-AV) to restore the virus destroyed by the file and suppress the virus-oriented professional anti-virus software, the killing of some Trojan virus is also quite effective. With a strong pertinence and flexibility, the f
Surfing on the internet is often unavoidable. After a professional antivirus program is used to clear these virus programs and restart the computer system, we sometimes find that the previous virus that has been cleared is making a comeback. What is the problem?Once started, many popular network viruses will automatically leave repair options in the Registry Startup item of the computer system, after the sy
I have been studying computer viruses for several years. I have found that many people may find strange and strange viruses. Many people say that he has installed professional anti-virus software and strictly followed their prompts. Why is there so many viruses? My work machine has been installing the system for two years. I have not installed any real-time virus monitoring software or any anti-spyware soft
This is the latest variant of the Niu.exe virus, and recently the spread of new variants of the virus has been raised, I hope that attention.
Quote:
File:Discovery.exe
size:74240 bytes
Modified:2008 year February 2, 0:03:34
md5:2da55f2a36e852ee6fc96d34dd520979
Sha1:44ce8f1c1a02591a88867f421c0c658b200d94c1
crc32:e20e292d
1. After the virus runs, the following
File name: Video.exe
File Size: 40960 bytes
AV name: BACKDOOR.WIN32.IRCBOT.AFM (Kaspersky)
Adding shell mode: Unknown
Writing language: Microsoft Visual C + +
Virus type: IRC back door
File Md5:c06d070c232bc6ac6346cbd282ef73ae
Behavioral Analysis:
1. Release virus copy:
%srstemroot%system32\firewall.exe 40960 bytes.
(The filename should be random, not necessarily this).
Compress the replica
Recent outbreaks of malignant virus? More exaggerated than the "Sxs.exe virus", which was commonly infected last time, and has become a virus from the category of rogue software.
Virus phenomenon:IE Browser home can not be changed, was modified to www.my123.com, or automatically jump to 7255.Manual removal method i
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.