What did the "disk drive" virus do after hacking into our computer?
In the C-packing directory release drive Netapi000.sys, remove the anti-virus software hook, so that its monitoring failure.
Download new viruses from the following Web sites:
Http://www.***.**/*.htm
Http://js.k***.**/**.asp
Http://js.k0****.**/**.asp
Http://js.***.**/***.asp
Http://js.***.**/****.gif Deletes registry startup key values so that all software outside the virus cannot be started. For example, QQ, MSN, etc. can start their own software will not get up.
Search window characters, forcibly shut down antivirus software and kill tools.
Add Autorun.inf and pagefile.pif to all disks, allowing the user to double-click on the disk while running the virus, which can be transmitted on U disk.
Starting the virus process with the CALCS command gives full control so that the process cannot be accessed by other processes, cannot be deleted, and cannot be terminated manually.
Infection executable file, the normal file encryption, if antivirus, it will cause these files damaged.
Double process guard, check if you exist every 0.2 seconds, reboot if not present.
Modify the registry so that users cannot enter Safe mode and cannot display hidden system files.
Check the registry, if the system does not allow you to automatically run the U disk, then modify it so that the virus in the U disk can automatically run.