Jiang Min's August 11 virus broadcast: Beware of the star lock virus stealing the login password of Web Pages browsed by users
Jiang min reminds you today that in today's virus, I-Worm/Locksky. ax star lock variants ax and Trojan/PSW. Moshou. aef "Warcraft" variants aef are worth noting.
Virus name: I-Worm/Locksky. ax
Virus program source code instance analysis-CIH virus [3] code, you need to refer to the jmp ExitRing0Init; exit Ring0 level
; Size of the merged code
CodeSizeOfMergeVirusCodeSection = offset $
; New IFSMgr_InstallFileSystemApiHook function call
InstallFileSystemApiHook:
Push ebx
Call @ 4
@ 4:
Pop ebx; get the offset address of the current command
Add ebx, FileSystemApiHook-@ 4; the offset diffe
Disk drive Trojans have recently become a hot topic in the field of security, it is reported that since the March, "Disk machine" Trojan Horse has been updated several times, infection rate and destructive power is gradually increased. The virus after the operation to shut down and prevent 360 security guards and Kabbah, rising, Jinshan, Jiangmin and other security software operation, in addition to delete the system contains "360" the words of the do
Software Introduction:
Chenoe Anit-virus Tools (short: C-AV) to restore the virus destroyed by the file and suppress the virus-oriented professional anti-virus software, the killing of some Trojan virus is also quite effective. With a strong pertinence and flexibility, the f
Next week (2007.09.24 ~ 09.30) a new Virus is particularly worth the user. It is the "LYW (Virus. Win32.LYW. a)" Virus. The virus automatically downloads other viruses and trojans from the Internet to steal users' privacy information.
Follow the virus this week: LYW
Vigila
Recently, a large number of Excel files in the company have discovered an office macro virus. They cannot be killed when using Kingsoft 360. Downloading Kingsoft version's macro virus excludes only part of the virus, another type of macro virus cannot be killed in any way.
Attack symptoms
Office macro
HDM.exe is a vicious u disk virus, its destructive power, mainly in the following areas:Quote:1. Use recovery SSDT to destroy antivirus software2.IFEO Image Hijacking3. Close the specified window4. Delete gho file5. Destroy Safe mode, and Show hidden file function6. Infection HTM and other Web files7. Guess the password is spread through LAN8. Through the U disk and other mobile storage transmission9.arp DeceptionThe specific analysis is as follows:Qu
What if you find a virus and can't clear it?
Q: Virus discovery, but what if it is not clear in safe mode or Windows?
A: Due to some directory and file specificity, can not directly eliminate (including the safe mode of anti-virus and other methods of anti-virus), and need some special means to clear the poison fil
Transfer from the original forum Jakee posts:
Recently many netizens reflect their machine is called a gray pigeon Trojan virus, this virus is very naughty, in different kill soft have different names such as: Gpigeon, Huigezi, Feutel, in the computer to clear it is very troublesome, especially its just opened issued 2005, Through the interception of Windows System API to achieve program file hiding, proces
Surfing on the internet is often unavoidable. After a professional antivirus program is used to clear these virus programs and restart the computer system, we sometimes find that the previous virus that has been cleared is making a comeback. What is the problem?Once started, many popular network viruses will automatically leave repair options in the Registry Startup item of the computer system, after the sy
I have been studying computer viruses for several years. I have found that many people may find strange and strange viruses. Many people say that he has installed professional anti-virus software and strictly followed their prompts. Why is there so many viruses? My work machine has been installing the system for two years. I have not installed any real-time virus monitoring software or any anti-spyware soft
I haven't met the virus yet. I don't know if it is popular. But I have never seen pandatv before.
Ps: My computer is streaking without even anti-virus
How to kill the popular virus igm.exe VirusIgm.exe virus poisoning symptoms:1. IGM. EXE found in the startup Item of MSconfig2. Automatic startupTo clear the igm.exe vir
Php webpage virus cleanup class, php webpage virus cleanup
This example describes the php webpage virus cleanup class. Share it with you for your reference. The details are as follows:
I believe that many people's webpages are often troubled by adding Trojans in the background of php, asp, html, js and other files for no reason! I used to have a website like this
"Panda incense" virus can not only damage the user system, the result is that a large number of applications are unusable, and all files with an extension of Gho can be deleted, resulting in the loss of a user's system backup file, resulting in a failure to restore the system, and the virus can terminate a large number of anti-virus software processes and greatly
In the computer configuration is not high on the machine, do not install anti-virus software will certainly be much higher efficiency. I do not have antivirus software for more than two years and there is no virus dye body reason. Frankly speaking is the user as the Internet! Instead of being an administrator. Let's say how to use the Internet in user mode.
1, after the installation of the system (includin
First, the preface
Virus class teacher threw us a copy of the VBS script virus code to try to analyze, here the analysis process sent out for everyone's reference, if found in what is wrong or what is suggested, you can leave a message to me, thank you!
Ii. Table of Contents
The entire analysis process can be divided into the following sections:
0x00 Preparation Work0x01 Decryption part0x02 function Ana
Recent outbreaks of malignant virus? More exaggerated than the "Sxs.exe virus", which was commonly infected last time, and has become a virus from the category of rogue software.
Virus phenomenon:IE Browser home can not be changed, was modified to www.my123.com, or automatically jump to 7255.Manual removal method i
Auto Virus is a dedicated to prevent and kill auto virus, u disk virus, Flash disk virus tools.
In addition to 30 seconds of lightning killing Ravmone, Rose, Sxs, Fun.xls, and other dozens of kinds of virus transmission through U disk, but also to the system to implement act
Auto Virus is a dedicated to prevent and kill auto virus, u disk virus, Flash disk virus tools.
In addition to 30 seconds of lightning killing Ravmone, Rose, Sxs, Fun.xls, and other dozens of kinds of virus transmission through U disk, but also to the system to implement act
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.