The backdoor of Mydoom. A exists as a DLL. By modifying the corresponding key value of the registry, you can load yourself into the process space of the resource manager.
Under normal circumstances, the Registry should look like this:Hkey_classes_root/CLSID/{E6FB5E20-DE35-11CF-9C87-00AA005127ED}/inprocserver32Threadingmodel REG_SZ apartment
Mydoom. A replaces % SystemRoot %/system32/webcheck. dll with its
Source: http://blog.csdn.net/sunwear/
Tombkeeper # whitecell.org
The backdoor of Mydoom. a exists as a dll. By modifying the corresponding key value of the registry, you can load yourself into the process space of the resource manager.
Under normal circumstances, the Registry should look like this:HKEY_CLASSES_ROOTCLSID {E6FB5E20-DE35-11CF-9C87-00AA005127ED} InProcServer32ThreadingModel REG_SZ Apartment
Mydoom
Recently, Jiangmin technology issued an emergency virus warning, a disguised as "panda incense" pattern of the virus is crazy crime, has dozens of of corporate LAN has been hit. Companies from different parts of the country reported to the Jiangmin Antivirus center that their company was being attacked by an unidentified virus, and that all of the executable. exe
Characteristics of the virus:
The biggest feature of the virus is self-replicating, from the classification of viruses there are many kinds, here we will introduce the most popular add-onVirus, which is adapted to the normal file to achieve its own replication purposes.From a procedural point of view, we have two things to do:
1, so that the program can be copied to other programs without affecting the wo
Through the U disk transmission of the virus Sxs.exe power has always been very large, once n a computer was his downfall ~ ~ Its variant is also increasingly refurbished, the pattern white ~ ~ Computer engine room and poisoned ... Each letter has hidden files, the icon is Conan head Sxs.exe and autorun, virus system into the xeklsk.exe.
Hidden files cannot be displayed through Folder options.
After repeate
In the middle of January this year, the network Supervision Department of Xiantao Public Security Bureau of Hubei Province conducted a survey on the producers of "panda incense" virus according to the unified deployment of the Security Supervision Bureau and provincial Police Department. After investigation, the producer of panda incense virus in Hubei province, Wuhan Li June, according to Li June, on Octob
First of all, no matter what virus you have, if you do not understand the meaning or suspected of a virus, please refer to my plan to try first:
4. Start = "Run =" Input: msconfig= "OK =" start = "all disabled (D) =" OK
5. Start = "Run =" Input: regedit= "OK =" hkey_local_machine\software\microsoft\windows\currentversion\run\= "Right can be deleted all
6. Start = "Run =" Input: regedit= "OK =" hkey_loca
With the rising of the virus can not be worse, with Kabbah upgrade to May 25 after the ability to find, but note that Kabbah will infect Word documents, pictures together delete!
Because a lot of documents are urgent and important, if lost on the problem is serious, so do not understand the computer do not use Kaspersky, because he is too professional.
Fortunately, the source file is not many, I deleted a few, the specific removal method on the Intern
Just repeatedly tested several versions, DF of the above version is all worn ...
Completely crazy ing .... Currently, only a few sites can be blocked on the route .... Look forward to the emergence of the master!
Sample sent up .... Say you can't penetrate yourself first Test
Overall protection, the system is completely open, without any restrictions! Now do not know why some systems do not wear ~
Immediately after running, look at the startup item.
The
This series of tutorials is copyright "I spring and Autumn" All, reproduced please indicate the source.For video tutorials, please visit "I Spring" (www.ichunqiu.com).PrefaceAfter several discussions, we have a certain understanding of the U disk virus, then this time we will be based on the characteristics of the virus behavior, to write needles for the U-disk virus
Autorun virus Defender is a special for the popular U disk virus development of the killing program. Its unique precision killing and expansion of the killing double killing mechanism can thoroughly remove viruses and trojans related files and registry entries, do not leave remnants. With a unique heuristic killing engine, the unknown U disk virus has more than 9
[%repeat_0 match= "/data/option"%][%= @title%] [%= @count%] ticket [[%= @percent%]%]
[%_repeat_0%]
SXS. EXE this is a theft of QQ account password Trojan virus, the characteristics can be transmitted through removable disk. The virus's main harm is to steal QQ account and password, the virus will also end a large number of anti-virus software, reduce the securi
Nowadays, Internet viruses are prevalent and worms are rampant. Last year's "shock wave" and "great promise", this year's Mydoom/Novarg and "net sky" viruses have made many computer users a flood of tricks. Computer viruses are not recommended, but anti-virus software is not free. However, if you have not purchased any of these Zhuge-bright antivirus software, you can go online to find some free anti-
Virus program source code instance analysis-example code of CIH virus [2] can be referred to push eax; block table size
Push edx; edx is the offset of the virus code block table
Push esi; buffer address
The total size of the merged virus code block and virus code block ta
Introduction to the typical "Valentine's Day" virus
1. Valentine's Day (VBS. Valentin) virus
Valentine's Day (VBS. Valentin) virus is a virus that can write love letters. It encrypts itself with the scripting encryption engine and inserts it into the HTML file, which produces a vir
Any viruses and Trojans exist in the system, can not completely and process out of the relationship, even if the use of hidden technology, but also can find clues from the process, therefore, viewing the process of the system activity is the most direct way to detect the virus Trojan. But the system runs at the same time so many processes, which is the normal system process, which is the process of Trojans, and often by
First, let the virus disappear from the directory
We start with the directory where the virus resides, and if the virus has a separate directory like normal software, then we can smile a little bit--the virus is weaker. When you check the directory's creation time, you can tell when you dyed the poison and you may fin
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.