people), Yepeniu (male, 21 years old, Wenzhou, Zhejiang), Zhangshun (male, 23 years old, Zhejiang Lishui) by rewriting, spread "panda incense" and other viruses, build "zombie Network", Through the theft of various games and QQ accounts and other ways to profit illegally.
At present, 5 suspects such as Li June and Leilei have been detained for criminal detention.
This is the suspect Li June in the detention center wrote the "Panda Incense" anti-virus
The following is an analysis of the latest variants of the most rampant auto virus in two days:
A Behavior overview
The EXE is a virus downloader and it will:
1 Reference System C disk volume serial number to calculate the service name, EXE and DLL file name.
2 in each drive, place the auto virus autorun.inf and its own copy Auto.exe and add system and hidden at
Tool Type: Integrated tools
⊙ operating system: All Windows systems
⊙ Tool Size: 1.95 MB
⊙ Date of submission: 2007-1-1
⊙ number of visits: 1590
⊙ Download Address: Download address
⊙ Tools Introduction The symptoms of a computer infected with the ARP spoofing virus (Trojan) are as follows:
collect the site address for a rainy season. Frequently Asked Questions update log
How to use:
After downloading, put two files in the same directory, and then run. The component files required in the program are already included in the main program, and the first run is automatically released. If the kill several times there is a process can not be closed, restart the computer (recommended into Safe mode) to continue killing should be killed. Until the number of viruses is 0 o'clock.
Appli
Panda Burning Incense Virus Special Kill V1.6 Official edition:
The tool implements detection and removal, repair of infected panda incense virus files, unknown varieties of panda incense to detect and deal with the ability to deal with all the current family of panda incense virus and related variants. Download the ad
suspect a Trojan or virus, or if the system starts too slowly, use this tool to look at the startup item.
The first time you run, the font displayed is very uncomfortable, please go to the menu "Options"-"font" set the font to "Arial" 9th, then no problem.
Link: http://www.sysinternals.com/Files/Autoruns.zip
V8.11 version download page: http://www.skycn.com/soft/17567.html
QUOTE:
Symantec's latest Norton Antivirus Norton Antivirus 2007, this version retains the advantage of the previous generation, the resource occupancy is greatly improved, the memory footprint is effectively controlled in the 10m-15m, the new background scanning function only takes up very small resources, Can be scanned at the same time does not affect you to do your own thing.
Norton 2007 Products Integrated Veritas VXMS Technology for the first time, greatly improve the hidden in the system deep roo
This tool is a fully automated virus cleanup tool, and for the help of the caller, only one profile can be imported to complete the virus removal tool.
Very simple to use:
1. Import from clipboard or file import repair instructions
2. Restart execution to
The reason why there is no official version, because of its full automatic cleaning may contain bugs, Beta released three versions, after a certai
Rogue Software Phenomenon Description:
1, the browser home page was modified to "w**.3448.com", can not be modified.
2, the virus through the API Hook self protection.
3, can modify the registration form, infected QQ file import table.
4, search for the process name or the process where the window text contains a special string, and then turn off the computer after discovery.
Solution:
1, install the rising Card card 3.0
2, click the "Upgrade Now"
Panda defender, from Europe's top kill virus software developer Panda Software unique concept and quality, the most advanced easy-to-use anti-virus software, perfect block from the internet all kinds of threats to computer security factors.
Panda Antivirus 2008 Main new features:
1, to add new security early warning mechanism. By default, users are prevented from logging on to a known malicious site, rega
Code tree structure:
3. Operating Mechanism of malicious components:
After Reverse Analysis of the virus sample code, the operating principle of the virus has basically surfaced, registering Android components for malware and calling relationships between them.
The following are key malicious code:
(1) Automated On-Demand paid videos.
(2) automatically
PsKill Msns.exe
echo "Kill Msns the virus that paralyzed the network ... jb51.net"
echo "shuts down process 10 ..."
echo "shuts down process 9 ..."
echo "shuts down process 8 ..."
echo "shuts down process 7 ..."
echo "shuts down process 6 ..."
echo "Kill Msns the virus that paralyzed the network ... jb51.net"
Attrib-h-s-r-A%windir%\system32\msns.exe
Del%windir%\system32\msns.exe
regedit/s./msns.reg
echo "sh
Jet Robot (Jet Robot) game released Jet robot is a casual flying game, game screen or more interesting, the robot is very cute, click to fly, let the small robot fly higher the better. Game Introduction Jet bot: In this game, you have to use his jet pack to help as high as possible. But flying is not as simple as it looks. Avoid obstacles on the way, as well as avoiding deadly traps, collecting as much fuel as possible and exceeding everything. Post your score to the online High score table and
The Neon City (Neon) released Neon City is a very classic racing mobile phone game, the game has a new racing, cool special effects and beautiful game lighting screen design. Interested in the small partners to download the Neon City hand tour Try it! This is a good game yo! Game Introduction "Neon City" is a beautiful light-screen racing mobile phone games. In this game, you will be a pilot flying a space fighter. This game uses the famous film Tron'
Latest virus Combination Auto.exe, game theft Trojan download manual killing
The following is a virus-enabled code Microsofts.vbs
Copy Code code as follows:
Set lovecuteqq = CreateObject ("Wscript.Shell")
Lovecuteqq.run ("C:\docume~1\admini~1\locals~1\temp\microsofts.pif")
Trojan Name: TROJAN-PSW/WIN32.ONLINEGAMES.LXT
Path: C:\WINDOWS\sys
= 600;}">
At this time should use 360 security guards to the killing, or login to the 360 Security Center website (
www.360.cnDownload the Kill tool (download address:
Http://dl.360safe.com/killer_ati2evxx.exe)。 can also use the 360 kill Daquan, (download address:
Http://dl.360safe.com/360compkill.exe)。
At present, the use of web pages to hang horses and third-party software vulnerabilities intrusion co
virus detection and removal rate, eliminating virus threats: a large million-level virus database is used, and 360 cloud security technology is used to completely eliminate virus threats;5. heuristic technology to intercept unknown viruses: 360 Anti-Virus is the first heuri
Pandatv virus official version V1.6:
This tool detects, clears, and fixes files infected with the pandatv virus. It detects and processes unknown pandatv variants and can process all of the current pandatv family and related variants. As follows:
Download this file
The test is easy to use. The above software has two exclusive killing tools that can be used in tu
official Windows system.
Download link:
Http://www.microsoft.com/security_essentials/
(2) Avast
Avast is a well-known computer security software that can defend against viruses, spyware and other security threats. Last month, Vince Steckler, CEO of avast, said avast had already exceeded 0.13 billion of software users.We can see the popularity of avast. In terms of product operation, avast adopts the so-called "Free value-added" (freemium) m
01 1 17726.8)
7. Eight large monitoring system
8. Active vulnerability scanning, patching
9. Automatic Seamless Upgrade (Patent no: ZL 1 42155.X)
10. Support 64-bit operating system
11. File Crushing Technology
12. High-speed mail monitoring technology
13. Spam Smart White List
14. Mini Antivirus
15. Patent Data Repair (Patent no.: ZL 01 1 17730.6)
16.IE Execution Protection (ie leak-proof wall)
Note: Do not need any installation serial number, I hope you have fun!
Run the folder under the "Se
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.