. So sometimes we can't just identify the file type by viewing the file extension, and some virus files may pretend to be normal system file names to confuse everyone. How can this problem be identified? Simply open the file in notepad and check the file header to find out the file type.
Figure 8: IDA view ~ The Exports of % PHENOVECNYE. ini are DLLEntryPoint.
Virus Behavior Analysis
In this
Situation
All the right keys are running, each disk will appear random 8-bit XXXXXXXX.exe and Autorun.inf files
Internet search virus, Trojan, etc will be virus turned off, can not open nod32 and other anti-virus
Software
Unable to view hidden files, workaround:
Method One: Modify the registry file (the following file save bit ok.reg) to run
Copy Code code
Autorun virus Defender is a special for the popular U disk virus development of the killing program. Its unique precision killing and expansion of the killing double killing mechanism can thoroughly remove viruses and trojans related files and registry entries, do not leave remnants. With a unique heuristic killing engine, the unknown U disk virus has more than 9
Recently, some time ago, the 8749 virus on the user's IE homepage was tampered with to generate a new variant, variant B, with more destructive power. This not only can end anti-virus software on the user's computer, you can even delete files related to some anti-virus software. As a result, the anti-virus software is
same time ).
Misunderstanding 9: Install anti-virus software and personal firewall.
Many people regard the Real-time Monitoring Program of anti-virus software as a firewall, and some anti-virus software calls real-time monitoring as a "virus firewall". In fact, the real-time monitoring program of anti-
the current system date. If the main file to which the virus is attached is a PE file, and the following message is displayed on May 1, March or May 10, September 17:
If the main file is in the ELF format, the virus will output a text message similar to the following to the control panel on April 8, March 17 or April 8, May 14:
The
Virus program source code instance analysis-CIH virus [3] code, you need to refer to the jmp ExitRing0Init; exit Ring0 level
; Size of the merged code
CodeSizeOfMergeVirusCodeSection = offset $
; New IFSMgr_InstallFileSystemApiHook function call
InstallFileSystemApiHook:
Push ebx
Call @ 4
@ 4:
Pop ebx; get the offset address of the current command
Add ebx, FileSystemApiHook-@ 4; the offset diffe
Software Introduction:
Chenoe Anit-virus Tools (short: C-AV) to restore the virus destroyed by the file and suppress the virus-oriented professional anti-virus software, the killing of some Trojan virus is also quite effective. With a strong pertinence and flexibility, the f
continuously, compete with normal programs for system control and disk space, constantly damaging the system, resulting in paralysis of the entire system. The virus code is well-designed and short.10. Virus vigilanceThis feature provides some good idea with a shortcut to create new viruses.According to the analysis of the computer
Game.exe, Game.dll, Game_hook.dll, and Gamekey.dll files in the Windows directory in Safe mode, and then restart the computer. At this point, Gray pigeon VIP 2005 service End has been cleared clean.
The methods described above apply to most of the grey pigeon Trojans and their variants that we see, but there are still a handful of variants that are not detectable and cleared by this method. At the same time, with the new version of the Gray Pigeon, the author may add some new hidden methods, an
Some people think that anti-virus is a simple task. Isn't it just by clicking the "anti-virus" button of anti-virus software?
Yes, anti-virus software is required for anti-virus, but it doesn't mean that it is a good thing to do when you click anti-
Introduction to the typical "Valentine's Day" virus
1. Valentine's Day (VBS. Valentin) virus
Valentine's Day (VBS. Valentin) virus is a virus that can write love letters. It encrypts itself with the scripting encryption engine and inserts it into the HTML file, which produces a vir
This article is not an article about horizontal evaluation of n types of anti-virus software, but an article about building a platform based on my own user experience. For now, good anti-virus software has its own characteristics, but they are all the same. Therefore, there is no universal anti-virus software. The key is to choose a suitable anti-
Any viruses and Trojans exist in the system, can not completely and process out of the relationship, even if the use of hidden technology, but also can find clues from the process, therefore, viewing the process of the system activity is the most direct way to detect the virus Trojan. But the system runs at the same time so many processes, which is the normal system process, which is the process of Trojans, and often by
First, let the virus disappear from the directory
We start with the directory where the virus resides, and if the virus has a separate directory like normal software, then we can smile a little bit--the virus is weaker. When you check the directory's creation time, you can tell when you dyed the poison and you may fin
be released from the body to the system directory during runtime, which will be damaged by the released new viruses. Such as Dropper. BingHe2.2C and Dropper. Worm. Smibag.
8. destructive program viruses
The prefix of the destructive program virus is Harm. The public feature of these viruses is that they have good-looking icons to entice users to click. When users click these viruses, the virus will directl
attractive icon to entice users to click, when users click on such viruses, the virus will do a variety of destructive operations to scare users, in fact, the virus did not do any damage to the user's computer. such as: Female Ghost (joke.girlghost) virus.
10. Bundle Machine
1. What is the virus?
What is computer virus? The standard definition should refer to the compilation or insertion of computer commands or program code that damage computer functions or data and affect computer use. Computer viruses, like biological viruses, can spread, multiply, and attach to normal computer programs to cause damage. Therefore, we call it computer viruses. It is contagious, destructive, c
With the U disk, mobile hard disk, memory card and other mobile storage devices, USB disk virus also flooded up. U disk virus as its name implies is transmitted through U disk virus. Since the discovery of U disk Autorun.inf loophole, the number of U disk virus is increasing day by day.
1. USB Disk
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.