About Sxs.exe virus killing articles please see the link below
Http://www.jztop.com/net/bdzq/du/20060813/26006.html
Before antivirus, please disconnect the network, run the Kill tool after the restart of the computer
Download Address:
Download Sxs.exe virus Kill tool
***************************************
Some days ago the computer in the "Sxs.exe virus", an
file is the "C:\Windows" directory, in addition to the virus.
Iexplore.exe
The process names that are often posed by viruses are: Iexplorer.exe, The Iexploer.exeiexplorer.exe process is very similar to the Explorer.exe process name above, so it's easier to mix, but Iexplorer.exe is a process generated by Microsoft Internet Explorer, That is, we usually use IE browser. Know the role of identification should be easier, Iexplorer.exe process name at t
First, let the virus disappear from the directory
We start with the directory where the virus resides, and if the virus has a separate directory like normal software, then we can smile a little bit--the virus is weaker. When you check the directory's creation time, you can
": \autorun.inf") u.attributes=0 U.delete End If Next -----------------traversal deletes the Fugen directory virus file module termination-----------------
"-----------------Registry operation module----------------- set CreateObject ("Scripting.FileSystemObject") Set Reg=wscript.createobject ("Wscript.Shell") Reg.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Nt\currentversion\winlog
Panda Burning Incense Virus Special Kill V1.6 Official edition:
The tool implements detection and removal, repair of infected panda incense virus files, unknown varieties of panda incense to detect and deal with the ability to deal with all the current family of panda incense virus and related variants. Download the address below
Download this file
testing easy
randomly named itself, so this location needs to be removed. Then look at the file monitoring:Figure 8 File MonitoringSimilarly, the name of the virus file in my virtual machine system is inconsistent with the name in it, but it's OK, after all, it's fixed. However, you should first use the Task Manager to end the virus process and then remove the virus ontology
Some friends may think that anti-virus is a simple task. Isn't it just by clicking the "anti-virus" button of anti-virus software? Anti-virus really requires anti-virus software, but it
)
Some people think that setting the file to read-only through the external DOS command ATTRIB can effectively defend against viruses. In fact, you only need to call a few DOS interruptions to modify the attributes of a file. Therefore, the ATTRIB command is almost powerless to prevent virus infection and spread.
3. The virus can infect the write-protected disk (error)
Because the
in HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun.
Files involved in HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServices.
Open the Win. ini file and record the files involved in the "load =" and "run =" lines in the file.
Determine the file names and their directories Based on the above information, and compress these files into a zip file.
4. introduce several virus tool software
setting the file to read-only through the external DOS command ATTRIB can effectively defend against viruses. In fact, you only need to call a few DOS interruptions to modify the attributes of a file. Therefore, the ATTRIB command is almost powerless to prevent virus infection and spread.
A virus can infect a write-protected disk.
Because the virus can infect re
Characteristics of the virus:
The biggest feature of the virus is self-replicating, from the classification of viruses there are many kinds, here we will introduce the most popular add-onVirus, which is adapted to the normal file to achieve its own replication purposes.From a procedural point of view, we have two things to do:
1, so that the program can be copied to other programs without affecting the wo
curiosity, the worm spread speed is no more than 2 years ago, "MSN Sexy Chicken" bad.
The above briefly recalls the MSN worms that I know. Using MSN to spread, has become a common malware technology, a wide variety of backdoor, worms, Trojans have been able to spread through MSN samples. In fact, to avoid the infection of MSN Worm, reduce the degree of harm after infection, it is not difficult to do, summed up into the following 4 points, want to share with the reader:
1, for the friend sent
file offsets. The structure is as follows:#define Namelen 20#define signlen 32typedef struct sign{ char Szvirusname[namelen]; LONG Lfileoffset; BYTE Bvirussign[signlen + 1];} _sign, *psign;Use this data structure to define a global variable that holds the signatures of the two viruses, defined as follows:Sign Sign[2] = {{ //setup.exe "setup.exe", 0x0c040, "\x2a\x2a\x2a\xce\xe4\x2a\xba\xba\x2a\xc4\xd0 \x2a\xc9\xfa\x2a\xb8 " " \xd0\x2a\xc8\xbe\x2a\xcf\xc2\x2a\xd4\xd8\x2a\
Introduction to Anti-Virus engine design
1. Introduction
The main content of this article is as follows: Design and compile an advanced anti-virus engine. First, we need to explain the word "advanced". What is "advanced "? As we all know, traditional anti-virus software uses static Scanning Technology Based on signat
.
8 Delete the previous version of the virus Legacy registry information.
9) "Random name. dll" will be injected into all processes in the system process remotely
Two Execution process
1. Reference C volume serial number to calculate the 8-bit random service name, EXE and DLL file name. (Remember the AV terminator?) The first to come out is random 8-digit file name EXE)
2. Search for the current file name is not Auto.exe, if you call Explorer.exe She
computer infected with the boot zone virus will not disappear due to the updating of the operating system, but the newly installed system will be re-infected again. Therefore, some anti-virus software manufacturers dubbed these viruses as "ghost" and "Mordor" virus, take this to see the people-the
Jiang Min's October 3 virus broadcast: Beware of "nilag" virus stealing equipment information of online game heaven
Jiang min reminds you today: In today's virus, TrojanDropper. HTML. r "HTML messenger" variants r and Trojan/
PSW. Nilage. bql "nilag" variant bql is worth noting.
Virus name: TrojanDropper. HTML. r
Chine
Today, users are reminded to pay special attention to the following viruses: "Kiss of Death" Variant AA (WORM.DEATH.AA) and "Song of Sadness" Variant A (WIN32.TONE.A).
The "Kiss of Death" Variant AA (WORM.DEATH.AA) is an infected virus that infects files on a computer.
"Song of Sadness" Variant A (WIN32.TONE.A) is an infected virus that uses infected files to download other viruses.
The "Kiss of Death" V
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.