Releasing files
Copy Code code as follows:
%program files%\internet Explorer\plugins\autorun.inf
%program files%\internet Explorer\plugins\pagefile.pif
%program files%\internet Explorer\plugins\winnice.dll
X:\Autorun.inf (x is not a system disk other letter)
X:\pagefile.pif
Add registry information such as Startup items
Copy Code code as follows:
Hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks] { 06a68ad9-ff6
suspect a Trojan or virus, or if the system starts too slowly, use this tool to look at the startup item.
The first time you run, the font displayed is very uncomfortable, please go to the menu "Options"-"font" set the font to "Arial" 9th, then no problem.
Link: http://www.sysinternals.com/Files/Autoruns.zip
V8.11 version download page: http://www.skycn.com/soft/17567.html
QUOTE:
Startuplist 1.52.1
Description: Foreign
Virus Name: Worm.Pabug.ck
Size: 38,132 bytes
md5:2391109c40ccb0f982b86af86cfbc900
Adding Shell way: FSG2.0
Written Language: Delphi
How to spread: through mobile media or Web page malicious script propagation
Through the virtual machine operation, and after the Shell OD analysis, its behavior is as follows:
File creation:
%systemroot%\system32\gfosdg.exe
%systemroot%\system32\gfosdg.dll
%systemroot%\system32\severe.exe
%systemroot%\system32\drivers
We will use the code to practice a antivirus program, clear the readable and writable program, scan the program's signature, and delete the virus.
# Include "stdafx. H "# include" Scandisk. H "# include" scandiskdlg. H "# ifdef _ debug # define new debug_new # UNDEF this_filestatic char this_file [] = _ file __; # endifuint threadproc (lpvoid PARAM) {cscandiskdlg * Scandisk = (required *) param; cstring part; int I = 0; int Cy = Scandisk-> m_disk.g
---------------------------------
Save, file name is S.bat save type is all files
Double-click to open any key to continue the manual reboot
The following is the Copy.exe upgrade version of the virus specifically killed
Copy.bat *******************
Copy Code code as follows:
taskkill/f/im Copy.exe
taskkill/f/im Svchost1.exe
taskkill/f/im Svchost2.exe
Del/f/a:s C:\AUTORUN. Inf
Del/f/a:s C:\copy.exe
Del/f/a:s C:\host.exe
Del
Where is a bear cat burning incense?????Not a panda in incense, but all the EXE icon pocket into a burning 3 fragrant little panda, the icon is very cutePay in a manual way:Panda Variety Spoclsv.exe SolutionVirus name: WORM.WIN32.DELF.BF (Kaspersky)Virus alias: WORM.NIMAYA.D (Rising)win32.trojan.qqrobber.nw.22835 (Poison PA)Virus size: 22,886 bytesAdding Shell way: upackSample md5:9749216a37d57cf4b2e528c027
After you select the "show hidden files" option, you will find that a file on the USB flash drive disappears immediately. When you enable the folder option, the "hidden file not displayed" option is still found. Another window will be opened when you click drive letter icons such as C and D!
Condition description
1. Hidden Files cannot be displayed;
2. When you click drive letter icons such as C and D, another window is opened;
3rd, when using winrar.exe, we found that the CIDR root directory co
Trojan Horse is a remote control of the virus program, the program has a strong concealment and harm, it can be unnoticed in the state of control you or monitor you. Some people say, since the Trojan is so powerful, then I can not be far away from it!
However, this trojan is really "naughty", it can be no matter whether you welcome, as long as it is happy, it will try to get into your "home"! Ah, that also got, hurry to see their own computer there i
Trojan Horse brute force removal to remove the following files:
Quote:
C:\WINDOWS\system\1sass.exe
C:\WINDOWS\System32\DRIVERS\2pwsdor.sys
C:\WINDOWS\system32\drivers\k87wovjoq.sys
C:\WINDOWS\system32\xswfgklsjnspp.dll
and use Sreng to remove the corresponding service items and drivers, as follows:
----------------------------------
Start Project-> service-> Win32 Service Application-> Select Hide Microsoft Services and delete the following name:
Quote:
[Rising Protected Storage/ris
"Nima (Worm.nimaya)" Virus: Alert degree ★★★☆, worm, transmitted through infected files, dependent system: Win 9X/NT/2000/XP.
The virus uses the Panda avatar as an icon to entice the user to run. After the virus runs, it automatically finds the EXE executable file in Windows format and infects it. Because of the problem with the
The popularity of the internet has made our world a better place, but it has also made people unhappy. When you receive a message with the theme "I Love You", when you click on an attachment with a mouse that is almost shaking with excitement, when you browse a trusted Web site and find it very slow to open each folder, do you realize that the virus has broken into your world? May 4, 2000 in Europe and the United States outbreak of "love Worms" networ
This is the latest variant of the Niu.exe virus, and recently the spread of new variants of the virus has been raised, I hope that attention.
Quote:
File:Discovery.exe
size:74240 bytes
Modified:2008 year February 2, 0:03:34
md5:2da55f2a36e852ee6fc96d34dd520979
Sha1:44ce8f1c1a02591a88867f421c0c658b200d94c1
crc32:e20e292d
1. After the virus runs, the following
File name: Video.exe
File Size: 40960 bytes
AV name: BACKDOOR.WIN32.IRCBOT.AFM (Kaspersky)
Adding shell mode: Unknown
Writing language: Microsoft Visual C + +
Virus type: IRC back door
File Md5:c06d070c232bc6ac6346cbd282ef73ae
Behavioral Analysis:
1. Release virus copy:
%srstemroot%system32\firewall.exe 40960 bytes.
(The filename should be random, not necessarily this).
Compress the replica
Modified:2008 year May 8, 18:52:32
md5:7009ac302c6d2c6aadede0d490d5d843
sha1:0e10da72367b8f03a4f16d875fea251d47908e1e
crc32:dce5ae5a
After virus runs:
1. Release a sbl.sys to the%system32%\drivers below, and copy a cover Beep.sys, then load the drive, restore SSDT hook, resulting in some anti-virus software active defense function failure.
2. End the process of many anti-
Recently a lot of people have this "beast" virus, the reason is called "beast" virus is because the virus is running, Folder Options hidden files in the text content has been modified to "animals have a bit of compassion, and I do not, so I am not an animal." ”
This virus is actually a variant of the original analysis
This is a use of ANI to spread the Trojan Horse group, its "dynamic insertion process" function is caused by the difficulty of antivirus after the one of the reasons.
Another: After the recruit, the system partition of the. exe is all infected. This is also the problem after the poison.
"Symptoms" After the Recruit: Shualai.exe process is visible in the list of processes.
Suggestion: Use Sreng to keep the log, in order to understand the basic situation, easy to the back of the manual antiviru
"Download antivirus Software"
1, mobile phone poisoning The first thing we are downloading installation 360 housekeeper or other mobile phone housekeeper, and then to kill the virus.
"For Antivirus"
1, open the download good housekeeper, you can find the "virus killing" this function
2, the use of anti-virus software, we can carry out the killing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.