AV name:
Jinshan Poison PA (win32.troj.unknown.a.412826)
AVG (GENERIC9.AQHK)
Dr. Ann V3 (Win-trojan/hupigon.gen)
Shell way: not
Written Language: Delphi
File md5:a79d8dddadc172915a3603700f00df8c
Virus type: Remote control
Behavioral Analysis:
1, release the virus file:
C:\WINDOWS\Kvmon.dll 361984 bytes
C:\WINDOWS\Kvmon.exe 412829 bytes
2, modify the registry, boot:
HKEY_LOCAL_MACHINE\S
Download the Filemonnt software to do file operation monitoring.
Point the monitoring target to the temp directory, monitor the create to find which file generated the batch of TMP virus, and finally discover that the program file that generated them is: DWHwizrd.exe, this program file is Norton's Upgrade Wizard!!!
In the absence of words ....
No wonder today I deleted Norton, again reload when found that the status has been waiting for updates, p
in the case of the user does not remind users in the IE plug-in installed in the real Trojan ie Plug-ins. So that the general anti-virus and kill the horse program is not recognized.And when you run some programs that need to call IE, the Trojan is automatically invoked, so the situation described in "symptom description" appears. String 3
The Trojan's mother is New123.sys, belonging to the TROJAN-PSW.WIN32.DELF.MC, may steal some of your application
The popularity of the internet has made our world a better place, but it has also made people unhappy. When you receive a message with the theme "I Love You", when you click on an attachment with a mouse that is almost shaking with excitement, when you browse a trusted Web site and find it very slow to open each folder, do you realize that the virus has broken into your world? May 4, 2000 in Europe and the United States outbreak of "love Worms" networ
Characteristics:
1, after running Notepad.exe,%systemroot%system32 set up random naming folder 935f0d, Release C:\WINDOWS\system32\935F0D\96B69A. Exe
2, in the%userprofile%"Start menu \ program \ startup icon for the folder file name is a space shortcut, point to C:\windows\system32\935f0d\96b69a.exe
3, add boot to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, point to C:\windows\system32\935f0d\96b69a.exe
4, download the virus yun_qi_img/o.g
Behavior:
1. To release a file:
C:\WINDOWS\system\SERVICES. EXE 65536 bytes
C:\WINDOWS\system\SYSANALYSIS. EXE 65536 bytes
C:\WINDOWS\system\explorer.exe 976896 bytes
2. To delete a backup file:
C:\WINDOWS\system32\dllcache\explorer.exe
3. Overwrite system files: C:\WINDOWS\explorer.exe
When the system starts, execute the virus body first, then execute C:\WINDOWS\system\explorer.exe.
4. Rename file as: explorer.exe608924508094788, as Backup
5. Try
The program was originally 2000 system in the Rundll.exe, by rogue malicious program with it changed the name everywhere, became a person to see people hate things.
The virus behaves as follows:
IE home page is forced to change, the system automatically restarts for no reason at regular intervals, this process occurs in Task Manager, and so on.
Killing Method:
For Walalet services that appear in the system service, you can delete the registry location
Introduction to Anti-Virus engine design
1. Introduction
The main content of this article is as follows: Design and compile an advanced anti-virus engine. First, we need to explain the word "advanced". What is "advanced "? As we all know, traditional anti-virus software uses static Scanning Technology Based on signatures, that is, to find a specific hexadecimal
in fact, we only need to install a new poison tyrant, basically will not have the problem, if your computer has a problem, you must use the rising, rising in this aspect of the anti-virus ability is really limited, we recommend to Jinshan next poison PA, I used to rising often poisoned, since the use of poison PA has not seen such a situation. It's not advertising.
About Logo1_.exe Basic Introduction:
Virus
Virus and Anti-Virus products are born enemies. Due to the endless existence of viruses, this field of Anti-Virus products will naturally be divided by many vendors, as a result, multiple Anti-Virus engine technologies have been developed.
The Anti-Virus engine is the key to
Abstract: Bootkit virus refers to a virus that is stored in the main boot area of a disk and is activated by the system (this is referred to as the boot area virus). The primary boot area of a disk (the abbreviation MBR, hereinafter referred to as the boot area of the MBR), refers to the first sector of the computer that is set as the startup disk.
The Bootkit
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next let's take a look at some of the mistakes we encounter when dealing with computer viruses.1. the DIR operation on the infected floppy disk will cause the hard disk to be infected (wrong)
If the computer memory does not contain viruses, the computer w
1 computer virus Overview
Computer Virus (CV. It is a special program, and the problems caused by viruses are software faults. This program can infect itself to other programs and disrupt the normal operation of the computer system. If the system cannot be properly guided, the program cannot be correctly executed, and the files are lost, according to computer virus
USB flash drives, a mobile storage device, provide great convenience for people to store data due to its advantages such as small size, large capacity, and easy to carry. But thanks to this convenience, the virus also has a chance to take advantage of it. Have you ever taken a USB flash drive to print a photo outside and used it again, what happens when I find my computer poisoned?
The USB flash drive virus
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next, let's take a look at the top 15 mistakes we made in the face of computer viruses.
The DIR operation on the infected floppy disk may cause the hard disk to be infected.
If the computer memory does not contain viruses, the computer will be infected on
Linux-based virus data-general Linux technology-Linux technology and application information. For more information, see the following section. Although there are not many viruses spread in linux, there are also some. I have collected some information from some security sites for your reference:
Bytes -------------------------------------------------------------------------------------------------------------
Virus
Almost everyone who uses computers has ever experienced computer viruses and antivirus software. however, many people still have misunderstandings about viruses and anti-virus software. anti-virus software is not omnipotent, but it is never a waste. the purpose of this article is to allow more people to have a correct understanding of anti-virus software and use
Computer viruses generally have the following features:1. computer Virus procedural (executable) computer viruses, like other legal programs, are executable programs, but they are not a complete program, but parasitic on other executable programs, therefore, it enjoys the power available to all programs. When a virus is running, it competes with valid programs for control of the system. Computer viruses are
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.