Hook program Q.dll too ruthless!
1, anti-installation of all anti-virus software and a variety of Trojan removal procedures (including 360, rising card, etc.), as long as a load on the restart, and then delete the main program of these programs.
2, modify the Hosts table, all point to a specific IP address, some download Trojan removal program site is not on.
3,
icon on the Trojan.
5, built into the registry
Due to the complexity of the registry, Trojans often like to hide in here merry, quickly check, what procedures in its next, open eyes carefully look, do not let the Trojan Oh:
Hkey_local_machinesoftwaremicrosoftwindowscurrentversion all the key values that begin with "run";
Hkey_current_usersoftwaremicrosoftwindowscurrentversion all the key values that be
Spread of ARP virus websites such as Trojan. psw. win32.onlinegames. gen
Original endurer1st-
The virus adds code to the webpage:/------/
1 hxxp: // A ** D *. 1 ** 02 ** 4.mo *. CN/Shui **/4.htmCode included:/------/
1.1 hxxp: // www. I ** mm ** M * QM. ***. CN/h.htm contains the Code:/------/
1.1.1 hxxp: // 0 ** 867*5. Se * r ** Vice-Google. ***. CN/VIP/cn3100.h
Virus Trojan scan: Reverse Analysis of pandatv incense (medium)I. Preface
The previous article explained the analysis at the entrance to the disassembly code of the "pandatv incense" virus sample. Although the core part of the virus has not been studied yet, our subsequent analysis is consistent with the previous thoug
Virus filename: Stup.exe
File path: C:\progra~1\tencent\adplus\stup.exe (in most cases)
(Note: There may be Soso address bar plug-ins, if found in the above path, it is the virus, to No, is Soso)
Note: This virus file may be through QQ, MSN, mail transmission, in most cases, the default is saved in the QQ Tencent folder; If the machine is through the company L
These days computer virus, C disk format reload also no use, put me depressed. A boot on the process of IEXPLORE.EXE, forced to terminate a will appear again, Kaspersky killed again did not find out, to the Internet to turn several laps, found such a solution.
Phenomenon:
1, the system boot, did not start IE in the case of the process has iexplore.exe run, note that the lowercase letters;
2, search the program iexplore.exe, located under C:\WINDOWS
Open the Office file to indicate whether to run macros then maybe this Office file is the carrier of the Trojan Horse.
There is a gadget called the VBA macro virus generation tool that enables you to convert an EXE executable file into an application that can be invoked by a macro in office. To run the VBA macro virus generation tool, I first select a
then click "OK ".
4. Find the Virus File
That is:
C:/Windows/system32/. EXE: Trojan. qqtail. AGC:/Windows/system32/notepad.exe: Trojan. qqtail. AGC:/Windows/system/rundll32.exe: Trojan. qqtail. AGC:/program files/Tencent/QQ/167486104/myrecvfiles/ (((((wor. jpg.exe is Worm. QQ. topfox.
As follows:
Delete them .....
If
Our win7 system often has some Trojan virus, and these stubborn virus in our system deeply rooted, it is difficult to completely clear. Sometimes, even anti-virus software does not do well. So what is the way to remove these annoying Trojan
Microsoft Word users should be cautious about downloading files because hackers are making waves from a bug that has not been fixed in this popular word processing software.
According to IDG, the U.S. local time in Thursday, security company McAfee warned users that a Trojan virus named Backdoor-ckb!cfaae1e6 would secretly install software on the computer.
However, to make the
Today, with the ever-changing nature of the virus, more and more camouflage and new variants are crazy one day after another. In the face of such a situation, many netizens can only restore or reinstall the system once and again. Security Software seems to be powerless at this time, because many virus and Trojan horses began to remove the security protection func
Disk drive Trojans have recently become a hot topic in the field of security, it is reported that since the March, "Disk machine" Trojan Horse has been updated several times, infection rate and destructive power is gradually increased. The virus after the operation to shut down and prevent 360 security guards and Kabbah, rising, Jinshan, Jiangmin and other security software operation, in addition to delete
Now, although we have a lot of anti-virus software choices, but still will encounter antivirus software are prompted to kill successfully, but the virus file has not been deleted, still remain in the system of the domineering. Small series has been spending a monthly subscription to a software but still poisoned the tragic lesson, so through long-term groping fin
Today encountered very strange problem, the normal development of the unit code, in a program compiled no problem, the same unit reference to the B program compiled by the small red umbrella virus tr/spy.banker.gen4 [Trojan], automatic isolation deletion.Today's anti-virus software, is really a struggle, today an afternoon of the troubleshooting code, and finally
Virus Specific analysis
File:SFF.exe
size:36864 bytes
File version:2.00.0003
md5:248c496dafc1cc85207d9ade77327f8b
sha1:b32191d44382ed926716671398809f88de9a9992
Crc32:8c51aaab
Writing language: Microsoft Visual Basic 5.0/6.0
The virus generates the following files
%system32%\svchost.com
Add under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Add key value Svchost point to%system32%\svcho
The internet is a lot of fake phenomenon, this is not in the author's computer, Trojan disguised as a normal security document, staged a "true Monkey King" farce. If you have the same situation at this time, may wish to follow the author to use digital signature technology, to find out the evil disguise Trojan Horse "."
Small knowledge: Simply called digital signature, is attached to the data unit some dat
Virus Information Archival:
========================================
Xinhuanet, Beijing, September 11, February 20, a camel Trojan download tool, CAP (Trojan. DL. win32.mnless. CAP) "the virus is worth noting this week. Its authors are a bit superstitious. Even the names of the released
ordinary software, whereas "path" is a direct selection of virus files or folders, and "file hashes" can be used to limit viruses by hashing, even if the virus replicates a lot to different places, it can be completely scrapped. Now small weave to "path" limit for example, enter the next step, click the "Browse File" button to select the virus file, and then cli
Down.exe/virus. win32.autorun. Z/Trojan. PWS. maran.262
EndurerOriginal2Added replies from Kaspersky.1Version
When you open a page that is occasionally used in the Forum, rising prompts you to download and run suspicious files.
Search by Google, and Google has already marked it:Http://www.google.cn/search? Complete = 1 HL = ZH-CN newwindow = 1 Q = % E8 % BF % 98% E7 % 8f % A0 % E5 % 8C % Ba + % E6 % 97%
Virus name: TrojanClicker. VB. gg
Chinese name: "video baby" variant gg
Virus length: 22528 bytes
Virus Type: Trojan clicks
Hazard level:★
Affected Platforms: Win9X/ME/NT/2000/XP/2003
This virus is one of the latest members of the "video baby"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.