Abstract: Bootkit virus refers to a virus that is stored in the main boot area of a disk and is activated by the system (this is referred to as the boot area virus). The primary boot area of a disk (the abbreviation MBR, hereinafter referred to as the boot area of the MBR), refers to the first sector of the computer that is set as the startup disk.
The Bootkit
Today encountered a virus, the code is not much, but the use of a function of the small loophole, the lethality is really amazing.Reprint Please specify source: http://blog.csdn.net/u010484477 Thank you ^_^This virus is normal in front:Socket->bind->listen This process, we allBelow I would like to elaborate on its attack mode:while (1){Nsock =Accept(sock, (struct sockaddr *) v10, (socklen_t *) v9);//wait to
The recent website hangs the horse comparison verification, my computer also super card, proposed everybody next 360safe,File name: Image. Jpg-www.photobucket.comFile Size: 10752 bytesAV name: (No, haha ' because all over ')Adding shell mode: UnknownWritten Language: DelphiVirus type: IRCBotFile Md5:0e404cb8b010273ef085afe9c90e8de1Behavior:1. Release virus copy:%systemroot%\system32\rpmsvc.exe 10752 bytesC:\Documents and settings\%users%\local setting
1. Disconnect the network (necessary)
2. End the virus process
%system%\drivers\spoclsv.exe
3. Delete virus files:
C:\windows\system32\drivers\spoclsv.exe
Note: Open C disk to the right key-fight, otherwise the man will failed, repeat 2 steps!
4. Modify registry settings and restore the "Show All Files and folders" option:
[Copy to Clipboard] CODE:
[Hkey_local_machine\software\microsoft\windows\currentversi
\microsoft\windows\currentversion\run/f
23413
Sc.exe start Diskregerl
Del "C:\WINDOWS\Media\Windows XP started. wav"
Del "C:\WINDOWS\Media\Windows XP Information Bar. wav"
Del "C:\WINDOWS\Media\Windows XP pop-up window blocked. wav"
REGSVR32.EXE/S C:\windows\system32\Programnot.dll
Ping 127.0.0.1-n 6
Del "C:\Documents and Settings\ lonely more reliable \ Desktop \oky.exe"/F
22483
17213
Date 2008-04-02
Time 08:21:33
Del%0
Exit
The second one:
25187
6133
226902537319477
2819720092
404
Ping 127.0.0
AV name:
Jinshan Poison PA (win32.troj.unknown.a.412826)
AVG (GENERIC9.AQHK)
Dr. Ann V3 (Win-trojan/hupigon.gen)
Shell way: not
Written Language: Delphi
File md5:a79d8dddadc172915a3603700f00df8c
Virus type: Remote control
Behavioral Analysis:
1, release the virus file:
C:\WINDOWS\Kvmon.dll 361984 bytes
C:\WINDOWS\Kvmon.exe 412829 bytes
2, modify the registry, boot:
HKEY_LOCAL_MACHINE\S
Download the Filemonnt software to do file operation monitoring.
Point the monitoring target to the temp directory, monitor the create to find which file generated the batch of TMP virus, and finally discover that the program file that generated them is: DWHwizrd.exe, this program file is Norton's Upgrade Wizard!!!
In the absence of words ....
No wonder today I deleted Norton, again reload when found that the status has been waiting for updates, p
\plugins\ directory, you should find New123.bak and new123.sys two files;
View your C:\Documents and settings\administrator\local settings\temp\ directory, Should find Microsoft.bat this file, you can use Notepad to open the Microsoft.bat file, found that mention an EXE file (the specific name will be different), you will also find this in the directory EXE file;
If the above two steps you do not find the appropriate file, please change your file view to do not hide the known file suffix, and in
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next let's take a look at some of the mistakes we encounter when dealing with computer viruses.1. the DIR operation on the infected floppy disk will cause the hard disk to be infected (wrong)
If the computer memory does not contain viruses, the computer w
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next, let's take a look at the top 15 mistakes we made in the face of computer viruses.
The DIR operation on the infected floppy disk may cause the hard disk to be infected.
If the computer memory does not contain viruses, the computer will be infected on
Almost everyone who uses computers has ever experienced computer viruses and antivirus software. however, many people still have misunderstandings about viruses and anti-virus software. anti-virus software is not omnipotent, but it is never a waste. the purpose of this article is to allow more people to have a correct understanding of anti-virus software and use
Characteristics:
1, after running Notepad.exe,%systemroot%system32 set up random naming folder 935f0d, Release C:\WINDOWS\system32\935F0D\96B69A. Exe
2, in the%userprofile%"Start menu \ program \ startup icon for the folder file name is a space shortcut, point to C:\windows\system32\935f0d\96b69a.exe
3, add boot to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, point to C:\windows\system32\935f0d\96b69a.exe
4, download the virus yun_qi_img/o.g
Behavior:
1. To release a file:
C:\WINDOWS\system\SERVICES. EXE 65536 bytes
C:\WINDOWS\system\SYSANALYSIS. EXE 65536 bytes
C:\WINDOWS\system\explorer.exe 976896 bytes
2. To delete a backup file:
C:\WINDOWS\system32\dllcache\explorer.exe
3. Overwrite system files: C:\WINDOWS\explorer.exe
When the system starts, execute the virus body first, then execute C:\WINDOWS\system\explorer.exe.
4. Rename file as: explorer.exe608924508094788, as Backup
5. Try
The program was originally 2000 system in the Rundll.exe, by rogue malicious program with it changed the name everywhere, became a person to see people hate things.
The virus behaves as follows:
IE home page is forced to change, the system automatically restarts for no reason at regular intervals, this process occurs in Task Manager, and so on.
Killing Method:
For Walalet services that appear in the system service, you can delete the registry location
When you extract a large file with a WinZip, you can see that the system Idle Process system takes up CPU time changes. System Idle ... is to indicate the remaining CPU resources of your system! Don't want to end it! If he's got 0 CPU resources, you should reboot!
What is the System idle process?
I think every careful user who pays attention to the computer will find in Windows Task Manager that there is a system idle process, and when we see it, th
Computer viruses generally have the following features:1. computer Virus procedural (executable) computer viruses, like other legal programs, are executable programs, but they are not a complete program, but parasitic on other executable programs, therefore, it enjoys the power available to all programs. When a virus is running, it competes with valid programs for control of the system. Computer viruses are
To carry on the infection, must leave the trace. Biomedical viruses are the same, so are computer viruses. Detection of computer viruses, it is necessary to go to the site of the virus to check, find abnormal situation, and then identify "in", confirm the existence of computer viruses. The computer virus is stored in the hard disk while it is active and resides in memory, so the detection of computer
Introduction to Anti-Virus engine design
1. Introduction
The main content of this article is as follows: Design and compile an advanced anti-virus engine. First, we need to explain the word "advanced". What is "advanced "? As we all know, traditional anti-virus software uses static Scanning Technology Based on signatures, that is, to find a specific hexadecimal
Purpleendurer NOTE: See the following in Sina:
Question 3: Has rising discovered a virus in the lab?(See: http://forum.tech.sina.com.cn/cgi-bin/viewone.cgi? Gid = 23 FID = 290 Itemid = 27156)Author: jinleiviva published on: 15:11:07
I think it is ridiculous that I wanted to refute the registration of Sina. Unfortunately, Sina cannot register the website. I would like to refute this point.
Such a superficial article has been refined, and it is actual
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.