Many friends are infected by moving the disk copy, especially the U disk, especially in the Internet café, when you copy the thing is, use DOS to enter your mobile disk dir/a display all files, if found in the Recruit, There are Sxs.exe and Autorun.inf. Create a notepad in a non-root directory, named Sxs.exe create a Autorun.inf content can be empty or add [autorun]shutdown= Sxs.exe replaces the Sxs.exe and Autorun.inf of the mobile disk. You won't be infected when you get home.
It's strange to
1, the driver has not been certified, resulting in high CPU resources occupied
A large number of beta drivers are flooding the web, causing difficult to find fault causes.
2, anti-virus software cause failure
As a result of some anti-virus and anti-virus software added to the Web page, plug-ins, mail random monitoring, undoubtedly increased the system burden, can be selected according to the circumstances of the open service.
3, virus, Trojan caused
A large number of worms are rapidly repli
1, run "regedit" Enter Registry Editor;
2, then expand to the "Hkey_local_machinesoftwaremicrosoftwindowscurrentversionexploreradvancedfolderhiddenshowall" branch in turn;
3, and then in the right window to find the binary Checked "" ", double-click" Checked value "and its key value modified to" 1 ";
4, then open the computer, click on the top of the window "Tools-Folder Options", and then find and check the "Show All Files and folders" Item, so you can display the hidden files in
software to see if there are any abnormal startup procedures. Update anti-virus software and firewalls regularly, strengthen anti-virus awareness, master the correct anti-virus knowledge.
4. System service
Control Panel-Admin tool-Service-rising Realtime MONITOR service Point right mouse button, change to Manual.
5. Startup item
Start->; run->;msconfig->; start, turn off unnecessary startup items, reboot.
6, view "Svchost" process
Svchost.exe i
process (not svchost, one letter), and then end it.
Second, show the hidden system files
Run--regedit
Hkey_local_machinesoftwaremicrosoftwindowscurrentversionexploreradvancedfolderhiddensuperhidden, Modify the CheckedValue key value to 1
It should be noted here that the virus will be a valid DWORD value CheckedValue deleted, a new invalid string value CheckedValue, and the key value to 0! It's no use to change this to 1. (Some of the virus varian
. Dll
8. Add wuauserv and bits to the Svchost process: Open regedit, browse to
Hkey_local_machinesoftwaremicrosoftwindowsntcurrentversionsvchost
Open the "Netsvcs" item. Under Value data, add Http://www.xitongzhijia.net "BITS" and "WUAUSERV" to the list of services. Reboot after modification. "Apply to error code 0x8007043b"
9, if the contents of the Datastore folder does not match, "apply to error code 0x80070002" may consider deleting
%windir%s
connections, which occurs when the load is overloaded. To solve this problem can be resolved by modifying the registry, open the registry, find Hkey-local-machnesystemcurrentcontrolsetserviceslanmanserver, and create a new name on the right; MaxWorkItems "; then double-click the value, if your computer has more than 512 memory, set to 1024, if less than 512, set to 256.
6, view "Svchost" process
Svchost.exe is a core process of the XP system. Svcho
Brief introduction
Windows NT system Backdoor to implement self-booting, there are many ways, such as the registry self-boot , image hijacking technology ,svchost self-booting and the introduction of this section of the Service self-initiated methods, The service self-priming is less likely to be discovered than the three other types of startup methods needed to modify the registry.
Examples of C + + codefilename:serviceautorundemo.cpp//
delex.bat, delete itself.
4, the use of svchost process reverse connection outside, accept remote control.
5, every once in a while to detect the existence of their own registry keys and files, if not in the regeneration.
Workaround:
1, download Sreng (can download to down.45it.com), and then restart the computer, press F8 into Safe mode.
2. Delete this service item with Sreng:
[Irat/irat] [Running/disabled]
{C:\windows\System32\svchost.exe-k
digital camera on Windows.Whether the process is a system process: Yes
Svchost.exeProcess file: svchost or svchost.exeProcess name: Service Host ProcessDescription: Service Host Process is a standard dynamic connection Database Host processing Service.Whether the process is a system process: Yes
SystemProcess file: system or systemProcess name: Windows System ProcessDescription: Microsoft Windows system process.Whether the process is a system process
, although the previous practice was successful, the iis stop still occurred every time after the computer was restarted.
To find out whether the administrator tools> service item was read this timeUse fport to find out the program svchost.exe that occupies port 80 and the pid of the program.Pid Process Port Proto Path1396 svchost-> 80 tcp c: \ WINDOWS \ System32 \ svchost.exe
Although the task manager can directly Delete the svchost.exe file of the p
create the following mutex files during execution:
\BaseNamedObjects\Global\dklw\BaseNamedObjects\Global\cso\BaseNamedObjects\Global\qemyqvmyhiy\BaseNamedObjects\Global\eriwjjo\BaseNamedObjects\Global\etniisebehheq\BaseNamedObjects\Global\beetxado\BaseNamedObjects\Global\zhyzrjduosfptunf\BaseNamedObjects\Global\zzusnnzeqgzupeto\BaseNamedObjects\Global\onwmkwazrynpn\BaseNamedObjects\Global\nmtg\BaseNamedObjects\Global\helbibkzhruo\BaseNamedObjects\Global\opylrvflplgad\BaseNamedObjects\Global\zg
Cause of 100% CPU resource usage in Win7 and solution 1. the driver has not been certified, resulting in 100% CPU resource usage. A large number of Beta drivers are flooding the Internet, leading to hard-to-find fault causes. 2. faults caused by anti-DDoS and anti-virus software. Some anti-virus software has added random monitoring of web pages, plug-ins, and emails, which undoubtedly increases the burden on the system. You can choose to enable the Service as needed. 3. Viruses and Trojans. A la
Sample Analysis instanceThe sample is an executable file disguised as a wmv media file,
Using the wmvfile icon, because Windows does not display the extended name of the known file, the actual name of the target sample is wr.wmv.exe.
Analysis process:
1) create a Snapshot for restoration in the test environment. Ghost can be used in the test environment of the physical server for the same purpose.
2) Start InstallRite and ProcessMonitor in sequence, and configure Filter for ProcessMonitor first:
Svchost from executing non-Windows executable files
Process to be included: svchost.exe
Process to be excluded: None
Rule name: protects phone book files from password and email address thieves
Process to be included :*
Processes to be excluded: * \ ** \ Program Files (x86) \ **, * \ ** \ Program Files \ **, * \ ** \ Windows \**
Rule name: Disable registration of all file extensions
Process to be included :*
Processes to be excluded: * \ ** \ Progr
detected malware files in the list of running processes.To check if the malware process has been terminated, close Task Manager, and then open it again.Close Task Manager.* NOTE: On systems running Windows 95/98/ME, Task Manager may not show certain processes. you may use a third party process viewer to terminate the malware process. otherwise, continue with the next procedure, noting additional instructions.
Removing Autostart Entries from the Registry
Removing autostart entries from the regis
should not. Windows 2000 Resource kitlet us use a program called tlist.exe, which can list the services that run under svchost in each situation. Run this program to find some hidden services you want to know. The following message is displayed: Any service containing the words "daemon" may not be included in Windows and should not exist on the IIS server. To get a list of Windows Services and know their respective functions, click here.
6. strictly
Windows is used to listen to and send requests to the appropriate network section.Whether the process is a system process: Yes
Spool32.exeProcess file: spool32 or spool32.exeProcess name: Printer SpoolerDescription: Windows Print task control program, used for printer readiness.Whether the process is a system process: Yes
Spoolsv.exeProcess file: spoolsv or spoolsv.exeProcess name: Printer Spooler ServiceDescription: Windows Print task control program, used for printer readiness.Whether the pro
. | 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) | Microsoft Corporation |? | CSRSS. exe | CSRSS. exeC:/Windows/system32/CSRSS. dll | 7:59:31C:/Windows/system32/sh05004.dll |C:/Windows/system32/sh18027.dll |C:/Windows/system32/sh21017.dll |C:/Windows/system32/winlogon.exe * 524 | MICROSOFT (r) Windows (r) Operating System | 5.1.2600.2180 | Windows NT logon application | (c) Microsoft Corporation. all rights reserved. | 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) | Microsoft Corporation |? | Winlogon. e
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.