How to Use the built-in commands of the system to deal with manual antivirus, built-in commands to deal with manual

Source: Internet
Author: User

How to Use the built-in commands of the system to deal with manual antivirus, built-in commands to deal with manual

It is better to manually use the tool that comes with the system to kill viruses than to install those software, that is, to use the command that comes with the system to manually kill viruses. The specific steps are as follows:

1. Be sure to back up the system process with TaskList before you do it yourself.

All new viruses have learned to use processes to hide themselves, so we 'd better back up the computer process list while the system is normal, of course, it is best not to run any program when you first enter Windows to back up the data. If you feel that your computer is abnormal, you can compare the process list to find out the process that may be a virus.

Enter:

TaskList/fo: csv> g: zc.csv

The preceding command output is in the format of csvcsv to the latest zc.csv file. g: the disk you want to save. You can open the file in Excel.

2. When you do it yourself, you must be eye-catching-use FC to compare the process list file

If you feel that your computer is abnormal or you know that there is a virus recently, check the computer.

Enter the command prompt and enter the following command:

TaskList/fo: csv> g: yc.csv

Generate a previous yc.csv file list, and enter:

FC g: \ zccsv g: \ yc. csy

Abnormal process.

3. Make sure that the evidence is conclusive. Use Netstat to view open ports.

How can we determine whether a suspicious process is a virus? According to most viruses (especially Trojans), the virus is transmitted through external connections through the port. You can check the port occupation.

Enter:

Netstat-a-n-o

The parameter description is as follows:

A: displays information about all ports that are connected to the host.

N: displays the PID code of the port opening process.

O: Display address and port information in digital format

By viewing the network program running on the local machine, you can determine that this is an illegal connection!

The connection parameters are as follows:

LISTENINC: indicates that the listener is in the listener State. That is to say, the port is open and is waiting for connection, but it is not connected yet. Only the TCP Service port can be in the LISTENINC state.

ESTABLISHED means to establish a connection.

The two machines are communicating.

TIME-WAIT indicates that the connection has ended.

It indicates that the port has been accessed but the access is over. It is used to determine whether an external computer is connected to the local computer.

4. Be sure to stop the process with NTSD.

Although “Winion0n.exe is an illegal process, many virus processes cannot be terminated through the Task Manager. What should I do?

Enter the following command at the command prompt:

Ntsd-c q-p 1756

After you press enter, the virus process can be successfully ended.

Tip: "1756" is the process PID value. If you do not know the process ID, open the task manager and click "View> Select column> check PID (process identifier.

NTSD can forcibly terminate all processes except Sytem, SMSS. EXE, and CSRSS. EXE.

5. After determining the virus, you must cut the root and find the original file of the virus.

Find the hidden location of a virus file, and delete it by searching "all local partitions", "search system folders and hidden files and folders.

However, in this case, the main Virus File is deleted. By viewing its attributes, the file is searched again based on the Creation period and size of the file, and its associates are found and deleted.

If you are not sure that there are other files that are related to them, search for the virus information on the Internet for help.

6. the battlefield must be cleaned after viruses are cleared.

Manual repair of the Registry although the virus file is deleted, but the virus will leave a junk key value in the registry, you also need to clear the garbage.

1. Use reg export for backup.

Because of the large number of self-boot key values, it is inconvenient to manually search for viruses.

Here, we use reg export + Batch Processing Command for backup.

Start notepad and enter the following command:

Reg export HKLM \ software \ Microsoft \ Windows \

CurrentVersion \ Run fo: \ hklmrun. reg

Reg export HKCU \ Software \ Microsoft \ Windows \

CurrentVersion \ Policies \ Explorer \ Run f: \ hklcu. reg

Reg export HKLM \ SOFTWARE \ Microsoft \ Windows \

CurrentVersion \ Policies \ Explorer \ Run hklml. reg

Note: Only a few copies of common key values are listed here. For other key values, refer to the above method.

Save it as ziqidong. bat and run it at the command prompt to back up all the self-boot key values to the corresponding reg file, and then enter:

Copy f: \ *. reg ziqidong.txt

The command outputs all the corresponding regfiles to “ziqidong.txt. In this way, if you find that the virus has added a self-starting item, export the self-starting value the same time, and use the FC command described above to compare the two txt files before and after, you can quickly find the newly added auto.

2. Use reg delete to delete the new auto-START key value.

For example, in [HKER_CURRENT_USER \ SOFTWARE \ Microsoft \

Windows \ CurrentVersion \ Run], find a "Logon" auto-start item, start the program as "c: \ windows \ winlogon.exe", and enter the following command to delete the virus auto-START key value:

Reg delete HKLM \ software \ Microssoft \ Windows \

CurrentVersion \ Run/f

3. Use reg import to restore the registry.

Reg de-lete Delete is the entire RUN key value. Now you can use the backed up reg file to restore the registry quickly by entering the following command: reg import f: \ hklmrun. reg

The above describes several system commands for manual antivirus. In fact, as long as these commands are used, we can KILL most of the viruses. Of course, we must back up the virus at ordinary times.

Tip: the above operations can also be performed manually in the Registry Editor, but the REG command has the advantage that even if the Registry Editor is set to disabled by viruses, you can also use the preceding command to export, delete, or import data, which is faster!

7. Bind a wooden marker-FIND

The above section describes how to use system commands to kill common viruses. Next we will introduce a "FIND" command to detect bundled Trojans.

I believe that many online worms have suffered from bundling wooden knives. These "wolves with sheepskin" often hide behind pictures, FLASH files, and even music files.

When we open these files, although it is indeed an image (or FLASH) displayed in the current window, the hateful Trojan has been quietly running in the background.

For example, I received a Super Girl wallpaper from my friend from QQ, but when I opened the image, I found that the image was already opened with the "image and fax viewer, the hard drive indicator has been flashing.

Apparently, while I opened the image, some unknown programs were running in the background.

Now, run the FIND command to check whether the image is bound with a Trojan. at the command prompt, enter:

FIND/c/I 〝 This program 〞G: \ chaonv.jpe.exe, where:

G: \ chaonv.jpe.exe indicates the file to be detected.

The prompt returned by the FIND command is "___ G: CHAONV. EXE: 2", which indicates that "G:, CHAONV. EXE" is indeed bundled with other files.

Because the FIND command detects: if it is an EXE file, the return value should be "1" under normal circumstances; if it is a non-executable file, the return value should be "0" under normal circumstances ", pay attention to other results.

Tip: success. This file is fooled only when the JPG file icon is used.

Open "my computer", click "Tools> Folder Options", and click "View" to remove the marker before "hide the file extensions of known types, you can see the true colors of "Wolf.

VIII. Summary

Finally, let's summarize the manual virus process:

Back up the process list with TSKLIST → identify the virus through the FC comparison file → judge the process with NETSTAT → terminate the process with FIND → search for the virus and delete → use REG command to repair the registry.

In this way, you have learned how to discover, delete, and fix the registry? For more exciting tutorials, please stay tuned to the customer's home!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.