Jihu virus killing tool can solve the problem of arrogant hackers in the Year of the Tiger. It has customized a virus "Big Mac" package for netizens. One virus has four viruses - "Disk Drive" + "Super AV Terminator" + The dangers of "Chinese Vampire" + "Cat Ringworm Downloader". Because this virus can be spread by exploiting the IE Aurora ODAY vulnerability, it is also the first major malignant virus in the Year of the Tiger, so it is named "Extreme Tiger".
Basic introduction
2. The mode of transmission is diverse and is the most common among all viruses in history.
(1) Spread widely by exploiting vulnerabilities such as Aurora 0day through web page hooking.
(2) Taking advantage of LAN sharing flaws to penetrate the intranet through weak passwords
LAN sharing
(3) The virus will spread itself through mobile phones, digital cameras, USB flash drives and other mobile devices
(4) Use deceptive software to download and allow users to actively click on poisoning (such as porn players, etc.)
player
(5) Secondary spread by infecting web page files (such as novel files, etc.)
(6) Secondary propagation through infected executable files
(7) Secondary propagation by infecting rar compressed files (method one, infecting executable files in rar compressed files; method two, imposing the usp10.dll virus file into rar compressed files and spreading through system file hijacking)
rar
Three download viruses are rich in types, the most among all viruses in history.
(1) IE home page tampering virus
(2) Popular game account hacker
(3)Rogue software installer
(4) Other types of downloaders (rings within rings, many variations)
4. It is difficult to remove, and it is the most difficult virus in history.
(1) Infecting system files prevents anti-virus software from cleaning them. For example, the virus will infect more than 10 kinds of system files such as "appmgmts.dll mspmsnsv.dll Iprip.dll"
Antivirus software
(2) All compressed packages are infected, making manual removal difficult
(3) All webpage files are infected, making manual removal difficult
(4) Infecting the entire LAN, making it difficult to detect and kill the entire LAN
(5) Infection of mobile devices such as USB flash drives, and repeated infections accidentally. Difficult to completely remove
(6) Against anti-virus software, active defense and interception can easily be bypassed
(7) Updated daily, anti-virus software will not be able to protect you if you are not careful
(8) Self-protection driver and attack driver technology against anti-virus software
The impact on the system after five poisonings is the worst among all viruses in history.
(1) Anti-virus software cannot be used (except Kingsoft Antivirus). For example, active defense cannot be turned on, and security tools are turned off when turned on.
(2) When booting, it prompts that system files are missing.
(3) The system slows down significantly and the CPU usage is extremely high
(4) rar.exe and ping.exe appear inexplicably during the process and cannot be ended.
(5) A large number of exe files were infected and reported viruses repeatedly
exe
(6) The desktop IE icon is modified and the IE homepage is abnormal
it works
it works
it works