If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email http://softwaredownload4.com/sbdm/user/login

Hide>>

Send to email:news@onlinedown.net

Hide>>

Location: front pagePC softwaresecurity softwareAntivirus software Jihu virus killing tool
Jihu virus killing tool

Jihu virus killing tool v3.5 official version

QR code
  • Software licensing: free software
  • Software size: 9.6MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2024-11-01
  • Application platform: WinAll
  • Software language: Simplified Chinese
  • Version: v3.5 official version

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Basic introduction
Jihu virus killing tool section first LOGO
Jihu virus killing tool can solve the problem of arrogant hackers in the Year of the Tiger. It has customized a virus "Big Mac" package for netizens. One virus has four viruses - "Disk Drive" + "Super AV Terminator" + The dangers of "Chinese Vampire" + "Cat Ringworm Downloader". Because this virus can be spread by exploiting the IE Aurora ODAY vulnerability, it is also the first major malignant virus in the Year of the Tiger, so it is named "Extreme Tiger".
Basic introduction
2. The mode of transmission is diverse and is the most common among all viruses in history.
(1) Spread widely by exploiting vulnerabilities such as Aurora 0day through web page hooking.
(2) Taking advantage of LAN sharing flaws to penetrate the intranet through weak passwords
LAN sharing
(3) The virus will spread itself through mobile phones, digital cameras, USB flash drives and other mobile devices
(4) Use deceptive software to download and allow users to actively click on poisoning (such as porn players, etc.)
player
(5) Secondary spread by infecting web page files (such as novel files, etc.)
(6) Secondary propagation through infected executable files
(7) Secondary propagation by infecting rar compressed files (method one, infecting executable files in rar compressed files; method two, imposing the usp10.dll virus file into rar compressed files and spreading through system file hijacking)
rar
Three download viruses are rich in types, the most among all viruses in history.
(1) IE home page tampering virus
(2) Popular game account hacker
(3)Rogue software installer
(4) Other types of downloaders (rings within rings, many variations)
4. It is difficult to remove, and it is the most difficult virus in history.
(1) Infecting system files prevents anti-virus software from cleaning them. For example, the virus will infect more than 10 kinds of system files such as "appmgmts.dll mspmsnsv.dll Iprip.dll"
Antivirus software
(2) All compressed packages are infected, making manual removal difficult
(3) All webpage files are infected, making manual removal difficult
(4) Infecting the entire LAN, making it difficult to detect and kill the entire LAN
(5) Infection of mobile devices such as USB flash drives, and repeated infections accidentally. Difficult to completely remove
(6) Against anti-virus software, active defense and interception can easily be bypassed
(7) Updated daily, anti-virus software will not be able to protect you if you are not careful
(8) Self-protection driver and attack driver technology against anti-virus software
The impact on the system after five poisonings is the worst among all viruses in history.
(1) Anti-virus software cannot be used (except Kingsoft Antivirus). For example, active defense cannot be turned on, and security tools are turned off when turned on.
(2) When booting, it prompts that system files are missing.
(3) The system slows down significantly and the CPU usage is extremely high
(4) rar.exe and ping.exe appear inexplicably during the process and cannot be ended.
(5) A large number of exe files were infected and reported viruses repeatedly
exe
(6) The desktop IE icon is modified and the IE homepage is abnormal

FAQ

closure