1, generating files
%windows%\win32ssr.exe
2, add Registry Startup entry
HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\WIN32SR "ImagePath" = "%windows%\win32ssr.exe"
3, other
Download the virus%systemroot%\docume~1\admini~1\locals~1\temporary the Internet Files folder and copy it to C:\U.exe and execute it.
4, the following virus files are generated after performing C:\U.exe:
%windows%\system32\d
The popularity of the internet has made our world a better place, but it has also made people unhappy. When you receive a message with the theme "I Love You", when you click on an attachment with a mouse that is almost shaking with excitement, when you browse a trusted Web site and find it very slow to open each folder, do you realize that the virus has broken into your world? May 4, 2000 in Europe and the United States outbreak of "love Worms" networ
Characteristics:
1, after running Notepad.exe,%systemroot%system32 set up random naming folder 935f0d, Release C:\WINDOWS\system32\935F0D\96B69A. Exe
2, in the%userprofile%"Start menu \ program \ startup icon for the folder file name is a space shortcut, point to C:\windows\system32\935f0d\96b69a.exe
3, add boot to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, point to C:\windows\system32\935f0d\96b69a.exe
4, download the virus yun_qi_img/o.g
Behavior:
1. To release a file:
C:\WINDOWS\system\SERVICES. EXE 65536 bytes
C:\WINDOWS\system\SYSANALYSIS. EXE 65536 bytes
C:\WINDOWS\system\explorer.exe 976896 bytes
2. To delete a backup file:
C:\WINDOWS\system32\dllcache\explorer.exe
3. Overwrite system files: C:\WINDOWS\explorer.exe
When the system starts, execute the virus body first, then execute C:\WINDOWS\system\explorer.exe.
4. Rename file as: explorer.exe608924508094788, as Backup
5. Try
The program was originally 2000 system in the Rundll.exe, by rogue malicious program with it changed the name everywhere, became a person to see people hate things.
The virus behaves as follows:
IE home page is forced to change, the system automatically restarts for no reason at regular intervals, this process occurs in Task Manager, and so on.
Killing Method:
For Walalet services that appear in the system service, you can delete the registry location
We will use the code to practice a antivirus program, clear the readable and writable program, scan the program's signature, and delete the virus.
# Include "stdafx. H "# include" Scandisk. H "# include" scandiskdlg. H "# ifdef _ debug # define new debug_new # UNDEF this_filestatic char this_file [] = _ file __; # endifuint threadproc (lpvoid PARAM) {cscandiskdlg * Scandisk = (required *) param; cstring part; int I = 0; int Cy = Scandisk-> m_disk.g
---------------------------------
Save, file name is S.bat save type is all files
Double-click to open any key to continue the manual reboot
The following is the Copy.exe upgrade version of the virus specifically killed
Copy.bat *******************
Copy Code code as follows:
taskkill/f/im Copy.exe
taskkill/f/im Svchost1.exe
taskkill/f/im Svchost2.exe
Del/f/a:s C:\AUTORUN. Inf
Del/f/a:s C:\copy.exe
Del/f/a:s C:\host.exe
Del
in fact, we only need to install a new poison tyrant, basically will not have the problem, if your computer has a problem, you must use the rising, rising in this aspect of the anti-virus ability is really limited, we recommend to Jinshan next poison PA, I used to rising often poisoned, since the use of poison PA has not seen such a situation. It's not advertising.
About Logo1_.exe Basic Introduction:
Virus
Abstract: Bootkit virus refers to a virus that is stored in the main boot area of a disk and is activated by the system (this is referred to as the boot area virus). The primary boot area of a disk (the abbreviation MBR, hereinafter referred to as the boot area of the MBR), refers to the first sector of the computer that is set as the startup disk.
The Bootkit
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next let's take a look at some of the mistakes we encounter when dealing with computer viruses.1. the DIR operation on the infected floppy disk will cause the hard disk to be infected (wrong)
If the computer memory does not contain viruses, the computer w
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next, let's take a look at the top 15 mistakes we made in the face of computer viruses.
The DIR operation on the infected floppy disk may cause the hard disk to be infected.
If the computer memory does not contain viruses, the computer will be infected on
Almost everyone who uses computers has ever experienced computer viruses and antivirus software. however, many people still have misunderstandings about viruses and anti-virus software. anti-virus software is not omnipotent, but it is never a waste. the purpose of this article is to allow more people to have a correct understanding of anti-virus software and use
Computer viruses generally have the following features:1. computer Virus procedural (executable) computer viruses, like other legal programs, are executable programs, but they are not a complete program, but parasitic on other executable programs, therefore, it enjoys the power available to all programs. When a virus is running, it competes with valid programs for control of the system. Computer viruses are
To carry on the infection, must leave the trace. Biomedical viruses are the same, so are computer viruses. Detection of computer viruses, it is necessary to go to the site of the virus to check, find abnormal situation, and then identify "in", confirm the existence of computer viruses. The computer virus is stored in the hard disk while it is active and resides in memory, so the detection of computer
Introduction to Anti-Virus engine design
1. Introduction
The main content of this article is as follows: Design and compile an advanced anti-virus engine. First, we need to explain the word "advanced". What is "advanced "? As we all know, traditional anti-virus software uses static Scanning Technology Based on signatures, that is, to find a specific hexadecimal
Purpleendurer NOTE: See the following in Sina:
Question 3: Has rising discovered a virus in the lab?(See: http://forum.tech.sina.com.cn/cgi-bin/viewone.cgi? Gid = 23 FID = 290 Itemid = 27156)Author: jinleiviva published on: 15:11:07
I think it is ridiculous that I wanted to refute the registration of Sina. Unfortunately, Sina cannot register the website. I would like to refute this point.
Such a superficial article has been refined, and it is actual
Virus and Anti-Virus products are born enemies. Due to the endless existence of viruses, this field of Anti-Virus products will naturally be divided by many vendors, as a result, multiple Anti-Virus engine technologies have been developed.
The Anti-Virus engine is the key to
Diagnostic principle of comparative method:The comparison method is used to compare the original or normal file with the file being detected.Including length, content, memory, interrupt and other comparison methods.Diagnostic principle of checksum method:The contents of the normal file are computed for verification and saved in the checksum written to the file or written to another file. During the use of the file, the regular or each use of the file before, check the file is now the contents of
Computer, improve our work efficiency, enrich our life, but at the same time, computer virus also brought us endless trouble. Once the computer infected with the virus, if it is general, simply by virtue of the market anti-virus software can be 32 under the "smooth", but if you encounter those difficult to deal with the virus
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.