Many of my friends are infected by copying objects through a mobile disk, especially a USB flash drive, especially in Internet cafes. When you finish copying objects, use DOS to access your Mobile Disk dir/category and autorun. inf replacement. You will not be infected when you go home.
It's strange to me that Kaspersky finds out that D and E have this thing under the root directory, and there are four or five other Trojans that cannot even hide folders, why can't
displayname = "IPSec Services" depend = RPCSS/TCPIP/IPSecDescription:SC description yyagent "provides client-to-server security on TCP/IP networks. If the service is disabled, the TCP/IP security between the client and the server on the network is unstable. If this service is disabled, any service dependent on it cannot be started. "
For more information about SC commands, see help SC
(Back up the registry before modification ),
special feature of the
Many friends are infected by moving the disk copy, especially the U disk, especially in the Internet café, when you copy the thing is, use DOS to enter your mobile disk dir/a display all files, if found in the Recruit, There are Sxs.exe and Autorun.inf. Create a notepad in a non-root directory, named Sxs.exe create a Autorun.inf content can be empty or add [autorun]shutdown= Sxs.exe replaces the Sxs.exe and Autorun.inf of the mobile disk. You won't be infected when you get home.
It's strange to
scanners and digital camera connections in Windows.[Svchost.exe]Process files: Svchost or Svchost.exeProcess Name: Service Host ProcessDescription: Service host process is a standard dynamic connection Library host processing services.Description: The Svchost.exe file is an ordinary host process name for services that run from a dynamic connection library. The Svhost.exe file is located under the system's%SystemRoot%\\
In addition, Trojan. psw. win32.qqpass, Trojan. psw. win32.gameol, etc. 1
Original endurer 2008-06-13 1st
A friend said that the real-time monitoring icons of the Rising anti-virus software and firewall software in his computer have disappeared recently, and the computer's response is very slow. Please help me with the repair.
Download pe_xscan to scan logs and analyze the logs. The following suspicious items are found:
Pe_xscan 08-04-26 by Purple Endurer2008-6-12 12: 20: 52 Windows XP Service
v1.99.1Scan saved at 12:36:52, on 2006-11-2Platform: Windows XP SP2 (winnt 5.01.2600)MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running Processes:C:/Windows/logocmd.exe
F3-Reg: win. ini: load = C:/Windows/rundl132.exe---------/
Anti-virus software is not installed on this computer, but it is restored with one click.
Download Rising Antivirus assistant aide4rav from http://endurer.ys168.com, use rising online free scan, found a lot:
/---------2006-11-2 13:42:34 Rising anti-virus Assistan
other is a svchost.exe shared by many services, while in WindowsXP, there are generally more than 4 Svchost.exe service processes. If the number of svchost.exe processes in XP and previous systems is more than 5, be careful, it is possible that the virus is counterfeit. But by the time of Vista and Windows7, 8-12 svchost processes are normal! It is also very simple to detect the normal process of the system, using some process management tools, such
The lpk. dll virus is believed to be familiar to everyone. It has been prevalent for some time, and the corresponding killing tool can also be searched and downloaded from the Internet, which is sufficient to indicate the extensiveness and danger of the virus. This article analyzes the behavior of the virus and presents you with all the manual processes.
Rising experts pointed out that not all lpk. dll files are viruses. The lpk. dll file exists in the normal system. It is a language pack for Mi
2000 is 2, and the number of Svchost.exe processes in Windows XP rises to 4 and more than 4.
How can you tell which are the normal Svchost.exe processes and which are the virus processes?
The Svchost.exe key value is in the "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost", Each key value represents a separate Svchost.exe group.
Microsoft also provides us with a way to see how the system is running services in the Svchost.exe
In addition to the access control list provided by the hisecws. inf template, there are also files protected by the "Member Server benchmark policy.
File baseline permission% Systemdrive %/boot. ini administrators: full controlSystem: full control% Systemdrive %/ntdetect.com administrators: full controlSystem: full control% Systemdrive %/ntldr administrators: full controlSystem: full control% Systemdrive %/IO. sys administrators: full controlSystem: full control% Systemdrive %/autoexec. Bat adm
face of the virus: the original "service" contains the "Windows login" column. The attribute shows that the service name is "flat", and the executable file path is "C: \ winnt \ system32 \ explored.exe-services ".
This explains why the process cannot be aborted, And it is useless to delete the system startup item in the registry. That is to say, you should stop the service in the service, instead of trying to delete it in the task manager.
Finall
EndurerOriginal1Version
A netizen's computer, which was reported by rising boot scanning in the past two daysBackdoor. gpigeon. uql. For example:-----------Virus name processing result found date path file virus sourceBackdoor. gpigeon. uqlCleared successfully iexplore. EXE> C:/program files/Internet Explorer/iexplore. EXE Local Machine-----------/
Scan the log using hijackthis (which can be downloaded to the http://endurer.ys168.com) to discover n more suspicious items:
/---------Logfile of hij
Encounter Trojan-Spy.Win32.Delf.uv, Trojan. psw. win32.xyonline, Trojan. psw. win32.zhengtu and so on 1
EndurerOriginal
1Version
Last night, a netizen said that his computer was infected with viruses. Kingsoft drug overlord kept prompting to find winform2.dll. After a period of time, the countdown shutdown dialog box will pop up, asking me to remotely assist him through QQ.
Let the netizens restart to the safe mode with network connection. The countdown shutdown dialog box appears just after the
automatically terminated. The following language settings will not be infected:
Russian, Kazakh, Ukrainian, Uzbek, Belarusian, Azeri, Armenian, Kyrgyz, Georgian.
Obviously, attackers want to exclude some areas from infection.
The infected process is described as follows:
Figure B
Starting from the "Delete all shadow copies" shown, CrytoWall4 has been injected into the svchost process. This process is injected to bypass UAC by obtaining higher permiss
view the services provided by the local process SVCHOST. EXE, enter the "tasklist/svc" command at the command prompt (Figure 3 ). You will be surprised to find that there are four SVCHOST. EXE processes, and a total of more than 20 services use this process.
For remote systems, viewing system services is also very simple. Use the "tasklist/s 218.22.123.26/u jtdd/P 12345678/svc" command, you can view the se
I. The functional role of the Svchost.exe process
Svchost.exe is a system program in the Windows operating system, which plays an important role in the normal operation of the system, it is an indispensable process of the system, so it cannot be concluded. The Svchost.exe file, which exists in the X:windows/system32 directory, is an important core process in Windows systems that can be used to run dynamic-link library DLL files to start the correspo
Kupqytu. dll/Trojan. win32.undef. fzq, kmwprnp. dll/Trojan. win32.agent. LMO 1
EndurerOriginal2008-06-031Version
Today, the last user who encountered gjlbj. vya/Trojan. win32.agent. Kle (for details, see gjlbj. vya/Trojan. win32.agent. Kle) said the virus has recursed ~
Pass pe_xscan and send it back to a netizen to scan logs, which is similar to the following:
Pe_xscan 08-04-26 by Purple endurer6.0.2900.2180MSIE: 6.0.2900.2180Administrator user groupNormal Mode [System process] * 0C:/Windows/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.