Method One:
1, delete the "Virus Component release" program:
"%WINDOWS%\SYSTEM32\LOADHW. EXE "(Window XP system directory is:" C:\WINDOWS\System32\LOADHW.) EXE ")
2, delete the "Send ARP Spoofing package driver" (and "Virus Daemon"):
"%windows%\system32\drivers\npf.sys" (Window XP system directory is: "C:\WINDOWS\System32\drivers\npf.sys")
A. In Device Manager, click View--> Show hidden devices
B. In
\microsoft\windows\currentversion\run/f
23413
Sc.exe start Diskregerl
Del "C:\WINDOWS\Media\Windows XP started. wav"
Del "C:\WINDOWS\Media\Windows XP Information Bar. wav"
Del "C:\WINDOWS\Media\Windows XP pop-up window blocked. wav"
REGSVR32.EXE/S C:\windows\system32\Programnot.dll
Ping 127.0.0.1-n 6
Del "C:\Documents and Settings\ lonely more reliable \ Desktop \oky.exe"/F
22483
17213
Date 2008-04-02
Time 08:21:33
Del%0
Exit
The second one:
25187
6133
226902537319477
2819720092
404
Ping 127.0.0
AV name:
Jinshan Poison PA (win32.troj.unknown.a.412826)
AVG (GENERIC9.AQHK)
Dr. Ann V3 (Win-trojan/hupigon.gen)
Shell way: not
Written Language: Delphi
File md5:a79d8dddadc172915a3603700f00df8c
Virus type: Remote control
Behavioral Analysis:
1, release the virus file:
C:\WINDOWS\Kvmon.dll 361984 bytes
C:\WINDOWS\Kvmon.exe 412829 bytes
2, modify the registry, boot:
HKEY_LOCAL_MACHINE\S
Download the Filemonnt software to do file operation monitoring.
Point the monitoring target to the temp directory, monitor the create to find which file generated the batch of TMP virus, and finally discover that the program file that generated them is: DWHwizrd.exe, this program file is Norton's Upgrade Wizard!!!
In the absence of words ....
No wonder today I deleted Norton, again reload when found that the status has been waiting for updates, p
\plugins\ directory, you should find New123.bak and new123.sys two files;
View your C:\Documents and settings\administrator\local settings\temp\ directory, Should find Microsoft.bat this file, you can use Notepad to open the Microsoft.bat file, found that mention an EXE file (the specific name will be different), you will also find this in the directory EXE file;
If the above two steps you do not find the appropriate file, please change your file view to do not hide the known file suffix, and in
The virus generates the following files:
Code:
C:\WINDOWS\system32\1.inf
C:\WINDOWS\system32\chostbl.exe
C:\WINDOWS\system32\lovesbl.dll
Create Autorun.inf and Sbl.exe under each partition and constantly detect whether the Chostbl.exe properties are hidden
Registration service ANHAO_VIP_CAHW Point to C:\WINDOWS\system32\chostbl.exe, the purpose of boot up.
Startup type: Automatic
Display Name: A good DownLoad cahw
Call the TerminateProcess function
Panda defender, from Europe's top kill virus software developer Panda Software unique concept and quality, the most advanced easy-to-use anti-virus software, perfect block from the internet all kinds of threats to computer security factors.
Panda Antivirus 2008 Main new features:
1, to add new security early warning mechanism. By default, users are prevented from logging on to a known malicious site, rega
Virus name: TROJAN.DELF.RSD MD5 216a3783443fc9c46fe4d32aa13c390f
After running the virus sample, automatically copy the copy to the%systemroot% directory
%systemroot%\flashplay.dll
%systemroot%\ge_1237.exe
X:\flashplay.dll
X:\readme.txt.exe
X:\autorun.inf
X refers to a non-system drive letter
%systemroot% is an environment variable,
What's inside Autorun.inf:
[Autorun]
Open=.\readme.txt.exe
Shell\1=open
About Rundll2000.exe, also do not know is a what the virus. In the computer also did not find other strange elephants, there is no abnormal, is a little uncomfortable in the heart. The machine is our ... You don't want any uninvited guests.
Rundll2000.exe Virus Manual cleanup
Reboot the computer and enter Safe Mode (press F8 when the computer starts)
Delete the following files:
C:\Program files\internet Exp
Releasing files
Copy Code code as follows:
%program files%\internet Explorer\plugins\autorun.inf
%program files%\internet Explorer\plugins\pagefile.pif
%program files%\internet Explorer\plugins\winnice.dll
X:\Autorun.inf (x is not a system disk other letter)
X:\pagefile.pif
Add registry information such as Startup items
Copy Code code as follows:
Hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks] { 06a68ad9-ff6
suspect a Trojan or virus, or if the system starts too slowly, use this tool to look at the startup item.
The first time you run, the font displayed is very uncomfortable, please go to the menu "Options"-"font" set the font to "Arial" 9th, then no problem.
Link: http://www.sysinternals.com/Files/Autoruns.zip
V8.11 version download page: http://www.skycn.com/soft/17567.html
QUOTE:
Startuplist 1.52.1
Description: Foreign
Characteristics:
1, after running Notepad.exe,%systemroot%system32 set up random naming folder 935f0d, Release C:\WINDOWS\system32\935F0D\96B69A. Exe
2, in the%userprofile%"Start menu \ program \ startup icon for the folder file name is a space shortcut, point to C:\windows\system32\935f0d\96b69a.exe
3, add boot to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, point to C:\windows\system32\935f0d\96b69a.exe
4, download the virus yun_qi_img/o.g
Behavior:
1. To release a file:
C:\WINDOWS\system\SERVICES. EXE 65536 bytes
C:\WINDOWS\system\SYSANALYSIS. EXE 65536 bytes
C:\WINDOWS\system\explorer.exe 976896 bytes
2. To delete a backup file:
C:\WINDOWS\system32\dllcache\explorer.exe
3. Overwrite system files: C:\WINDOWS\explorer.exe
When the system starts, execute the virus body first, then execute C:\WINDOWS\system\explorer.exe.
4. Rename file as: explorer.exe608924508094788, as Backup
5. Try
The program was originally 2000 system in the Rundll.exe, by rogue malicious program with it changed the name everywhere, became a person to see people hate things.
The virus behaves as follows:
IE home page is forced to change, the system automatically restarts for no reason at regular intervals, this process occurs in Task Manager, and so on.
Killing Method:
For Walalet services that appear in the system service, you can delete the registry location
After you select the "show hidden files" option, you will find that a file on the USB flash drive disappears immediately. When you enable the folder option, the "hidden file not displayed" option is still found. Another window will be opened when you click drive letter icons such as C and D!
Condition description
1. Hidden Files cannot be displayed;
2. When you click drive letter icons such as C and D, another window is opened;
3rd, when using winrar.exe, we found that the CIDR root directory co
Trojan Horse is a remote control of the virus program, the program has a strong concealment and harm, it can be unnoticed in the state of control you or monitor you. Some people say, since the Trojan is so powerful, then I can not be far away from it!
However, this trojan is really "naughty", it can be no matter whether you welcome, as long as it is happy, it will try to get into your "home"! Ah, that also got, hurry to see their own computer there i
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.