Heavy loading system of panda B3 miner
bitcoin was obtained by CPU in the early days. With the continuous development of GPU speed and the emerging advantages of GPU general computing, miners graally began to use GPU instead of CPU for mining. Bitcoin mining uses SHA-256 hash operation, which will carry out a large number of 32-bit integer cyclic right shift operation. Interestingly, this algorithm operation can be implemented by a single hardware instruction in AMD GPU, while it needs three hardware instructions to simulate in NVIDIA GPU. This one alone brings an additional 1.7 times of computing efficiency advantage for AMD GPU. With this advantage, amd GPU is favored by the majority of miners
advise the landlord not to dig up if the budget is not too much!!! This money is not earned if you want to
the difficulty of bitcoin is increasing. Mining with graphics card is a race against time. The main reason is that the difficulty of mining bitcoin is graally increasing (the reason of bitcoin algorithm design). If a set of platforms can get 1 bitcoin per day according to the current difficulty, then in one month, the platforms with the same computing power will only get 0.8 bitcoins, even the top graphics cards will get 18.2 days (which can't be shut down), and the lowest second-hand hd7750 will need more than 400 (it will take 214 days to get one). Just look at this figure (this is the data in May this year, Now it's more than 18 days)
people can earn money by buying several mining machines (mining machines with dozens of top graphics cards piled together)
I hope I can help you
I recommend two: ant G2 graphics card miner, panda B3 plus graphics card miner
ant G2 graphics card miner is used to mark panda's B3 plus graphics card miner. In terms of computing power, they are almost the same. On the one hand, they use the vest card, and on the other hand, they use the rx470 without the vest, both at 220mh / s
on September 25, Zhang Jianfeng, chief technology officer of Alibaba group and President of Alibaba cloud intelligence, announced that pingtouge released the world's highest performance AI reasoning chip, Hanguang 800 Hanguang 800 is Alibaba's first self-developed chip, which is said to be the most powerful AI chip in the world. It is mainly used for cloud vision processing scenes strong>
if you want to upgrade, you can only replace the graphics card with 8g memory.
"Wuhan boy", commonly known as "panda burning incense", is an infected worm virus. It can infect the system's exe, com, PIF, SRC, HTML, ASP and other files. It can also stop a large number of anti-virus software processes and delete files with the extension GHO, which is a backup file of ghost, a system backup tool, The system backup file of the user is lost. All. Exe executable files in the infected user's system were changed to look like pandas holding three sticks of incense
1: files
after the virus runs, it will itself to C: 92; WINDOWS\ System32\ Drivers\ Spoclsv.exe
2: add registry self boot
virus will add self boot key HKEY_ CURRENT_ USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Run svcshare -> C:\ WINDOWS\ System32\ Drivers\ Spoclsv.exe
3: virus behavior
A: look for the desktop window every 1 second, and close the program with the following characters in the window title:
qqkav, qqav, firewall, process, VirusScan, net dart, antivirus, drug bully, Ruixing, Jiangmin, Huangshan ie, super rabbit, optimization master, Trojan horse killer, Muma scavenger, QQ virus, registry editor System configuration utility, Kaspersky Anti-Virus, Symantec AntiVirus, Duba, esteem proces, green hawk PC, password anti-theft, phage, Trojan auxiliary finder, system safety monitor, wrapped gift killer, Winsock expert, game Trojan detection master, msctls_ Statebar32, pjf (USTC), icesword
and use the keyboard mapping method to close the security software icesword
add the registry to start HKEY automatically_ CURRENT_ USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Run svcshare -> C:\ WINDOWS\ System32\ Drivers\ Spoclsv.exe
and abort the following processes in the system:
mcshield.exe, vstskmgr.exe, naprdmgr.exe, updaterui.exe, tbmon.exe, scan32.exe, ravmond.exe, ccenter.exe, ravtask.exe, rav.exe, ravmon.exe, ravmond.exe, ravstub.exe, kvxp.kxp, kvcenter.kxp, kvsrvxp.exe, kregex.exe, uihost.exe, trojdie.kxp FrogAgent.exe、Logo1_. exe、Logo_ 1.exe, rundl132.exe
b: click the web page specified by the author of the virus every 18 seconds, and use the command line to check whether there is a share in the system. If there is a share, run the net share command to close the admin $share
C: download the file specified by the author of the virus every 10 seconds, and use the command line to check whether there is a share in the system, If it exists, run the net share command to close the admin $share
D: delete the key value of the security software in the registry every 6 seconds
and modify the following value to not show the hidden file HKEY_ LOCAL_ MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Advanced\ Folder\ Hidden\ SHOWALL CheckedValue -> 0x00
delete the following services:
navaspvc, wscsvc, kpfwsvc, sndsrvc, ccproxy, ccevtmgr, ccsetmgr, spbbcsvc, Symantec core LC, npfmtor mskservice, firesvc
e: infect the file
the virus will infect the file with the extension of exe, PIF, com, SRC, attach itself to the header of the file, and add it to the file with the extension of HTM, HTML, ASP, PHP, JSP, Aspx file to add a web address, once users open the file, ie will continue to click on the written web address in the background, to increase the number of hits, but the virus will not infect the following folder name files:
windows, WinNT, system volume information, recycled, Windows NT, windows update, Windows media player, Outlook Express Internet Explorer, NetMeeting, common files, complus applications, Messenger, InstallShield installation information, MSN, Microsoft frontpage, movie maker, MSN gamin zone
G: deleting files
viruses will delete files with the extension GHO, This file is a backup file of ghost, which makes the user's system backup file lost
at present, Wuhan boy, the founder of the virus, has been arrested by the police<
= = = = = =
virus code:
there is a new version of panda Shaoxiang somewhere.
we have studied deeply according to the string combined with loveboom's article.
dare not enjoy it alone, share it as follows.
gamesetup.exe
1. Shelling:
FSG 2.0 - & gt; bart/xt
Borland Delphi 6.0 - 7.0
ep:
00400154 G> 8725 F4D24100 xchg dword ptr ds:[41D2F4],esp
0040015A 61 popad
0040015B 94 xchg eax,esp
0040015C 55 push ebp
0040015D A4 movs byte ptr es:[edi],byte ptr ds:[e> < br />0040015E B6 80 mov dh,80
00400160 FF13 call dword ptr ds:[ebx]
00400162 ^ 73 F9 jnb short GameSetu.0040015D
...
004001CC 40 inc eax
004001CD ^ 78 F3 js short GameSetu.004001C2
004001CF 75 03 jnz short GameSetu.004001D4
004001D1 - FF63 0C jmp dword ptr ds:[ebx+C] ; GameSetu.0040D278 ,OEP
004001D4 50 push eax
004001D5 55 push ebp
004001D6 FF53 14 call dword ptr ds:[ebx+14]
004001D9 AB stos dword ptr es:[edi]
004001DA ^ EB EE jmp short GameSetu.004001CA
OEP:
0040D278 55 push ebp ; URLMON.702B0000
0040D279 8BEC mov ebp,esp
0040D27B 83C4 E8 add esp,-18
0040D27E 53 push ebx
0040D27F 56 push esi
0040D280 33C0 xor eax,eax
0040D282 8945 E8 mov dword ptr ss:[ebp-18],eax
0040D285 8945 EC mov dword ptr ss:[ebp-14],eax
0040D288 B8 C8D14000 mov eax, Gamesetu.0040d1c8
0040d28d E8 5677ffff call gamesetu.004049e8
text string reference in gamesetu:
address disassembly text string
0040626a mov eax, gamesetu.004069d8 ASCII & quot; VirusScan" < br />00406296 mov eax,GameSetu.004069EC ASCII " NOD32" < br />004064B0 mov eax,GameSetu.00406AB4 ASCII " Symantec AntiVirus" < br />004064E2 mov eax,GameSetu.00406AD0 ASCII " Duba" < br />00406514 mov eax,GameSetu.00406AE0 ASCII " esteem procs" < br />0040660E mov eax,GameSetu.00406B44 ASCII " System Safety Monitor" < br />00406640 mov eax,GameSetu.00406B64 ASCII " Wrapped gift Killer" < br />00406672 mov eax,GameSetu.00406B80 ASCII " Winsock Expert" < br />0040670E push GameSetu.00406BC0 ASCII " msctls_ statusbar32" < br />00406748 mov eax,GameSetu.00406BDC ASCII " pjf(ustc)" < br />004067E4 push GameSetu.00406BE8 ASCII " IceSword" < br />00406826 mov eax,GameSetu.00406BFC ASCII " Mcshield.exe" < br />00406830 mov eax,GameSetu.00406C14 ASCII " VsTskMgr.exe" < br />0040683A mov eax,GameSetu.00406C2C ASCII " naPrdMgr.exe" < br />00406844 mov eax,GameSetu.00406C44 ASCII " UpdaterUI.exe" < br />0040684E mov eax,GameSetu.00406C5C ASCII " TBMon.exe" < br />00406858 mov eax,GameSetu.00406C70 ASCII " scan32.exe" < br />00406862 mov eax,GameSetu.00406C84 ASCII " Ravmond.exe" < br />0040686C mov eax,GameSetu.00406C98 ASCII " CCenter.exe" < br />00406876 mov eax,GameSetu.00406CAC ASCII " RavTask.exe" < br />00406880 mov eax,GameSetu.00406CC0 ASCII " Rav.exe" < br />0040688A mov eax,GameSetu.00406CD0 ASCII " Ravmon.exe" < br />00406894 mov eax,GameSetu.00406CE4 ASCII " RavmonD.exe" < br />0040689E mov eax,GameSetu.00406CF8 ASCII " RavStub.exe" < br />004068A8 mov eax,GameSetu.00406D0C ASCII " KVXP.kxp" < br />004068B2 mov eax,GameSetu.00406D20 ASCII " KvMonXP.kxp" < br />004068BC mov eax,GameSetu.00406D34 ASCII " KVCenter.kxp" < br />004068C6 mov eax,GameSetu.00406D4C ASCII " KVSrvXP.exe" < br />004068D0 mov eax,GameSetu.00406D60 ASCII " KRegEx.exe" < br />004068DA mov eax,GameSetu.00406D74 ASCII " UIHost.exe" < br />004068E4 mov eax,GameSetu.00406D88 ASCII " TrojDie.kxp" < br />004068EE mov eax,GameSetu.00406D9C ASCII " FrogAgent.exe" < br />004068F8 mov eax,GameSetu.00406D0C ASCII " KVXP.kxp" < br />00406902 mov eax,GameSetu.00406D20 ASCII " KvMonXP.kxp" < br />0040690C mov eax,GameSetu.00406D34 ASCII " KVCenter.kxp" < br />00406916 mov eax,GameSetu.00406D4C ASCII " KVSrvXP.exe" < br />00406920 mov eax,GameSetu.00406D60 ASCII " KRegEx.exe" < br />0040692A mov eax,GameSetu.00406D74 ASCII " UIHost.exe" < br />00406934 mov eax,GameSetu.00406D88 ASCII " TrojDie.kxp" < br />0040693E mov eax,GameSetu.00406D9C ASCII " FrogAgent.exe" < br />00406948 mov eax,GameSetu.00406DB4 ASCII " Logo1_. exe" < br />00406952 mov eax,GameSetu.00406DC8 ASCII " Logo_ 1.exe" < br />0040695C mov eax,GameSetu.00406DDC ASCII " Rundl132.exe" < br />00406966 mov eax,GameSetu.00406DF4 ASCII " regedit.exe" < br />00406970 mov eax,GameSetu.00406E08 ASCII " msconfig.exe" < br />0040697A mov eax,GameSetu.00406E20 ASCII " taskmgr.exe" < br />00406E44 mov eax,GameSetu.00407014 ASCII " Schele" < br />00406E4E mov eax,GameSetu.00407028 ASCII " sharedaccess" < br />00406E58 mov eax,GameSetu.00407040 ASCII " RsCCenter" < br />00406E62 mov eax,GameSetu.00407054 ASCII " RsRavMon" < br />00406E6C mov eax,GameSetu.00407060 ASCII " RsCCenter" < br />00406E76 mov eax,GameSetu.0040706C ASCII " RsRavMon" < br />00406E80 mov edx,GameSetu.00407080 ASCII " SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run\ RavTask" < br />00406E8F mov eax,GameSetu.004070C0 ASCII " KVWSC" < br />00406E99 mov eax,GameSetu.004070D0 ASCII " KVSrvXP" < br />00406EA3 mov eax,GameSetu.004070D8 ASCII " KVWSC" < br />00406EAD mov eax,GameSetu.004070E0 ASCII " KVSrvXP" < br />00406EB7 mov edx,GameSetu.004070F0 ASCII " SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run\ KvMonXP" < br />00406EC6 mov eax,GameSetu.00407130 ASCII " kavsvc" < br />00406ED0 mov eax,GameSetu.00407140 ASCII " AVP" < br />00406EDA mov eax,GameSetu.00407144 ASCII " AVP" < br />00406EE4 mov eax,GameSetu.00407148 ASCII " kavsvc" < br />00406EEE mov edx,GameSetu.00407158 ASCII " SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run\ kav" < br />00406EFD mov edx,GameSetu.00407194 ASCII " SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Run\ KAVPersonal50" < br />00406F0C mov eax,GameSetu.004071D8 ASCII " McAfeeFramework" < br />00406F16 mov eax,GameSetu.004071
http://rjzy.ylmf.net/1/%CF%B5%CD%B3%B9%A4%BE%DF/%C9%FD%BC%B6%B2%B9%B6%A1/WindowsXP-KB911562-x86-CHS.exe?9694941960003TFlag=1169645957&OPIN=@.exe
2. (if it's foreign currency, we don't know there is such currency objectively. If it's domestic currency, it's needless to say that a normal person has a clear total score. Does it look like currency)
3. Your daughter-in-law only has a simple design behavior, and she doesn't know the specific process and amount involved, and she doesn't know what is under her control, Because your daughter-in-law and others lack the subjective intention to commit a joint crime, so it does not constitute a joint crime and does not need to bear responsibility for other people's illegal and criminal acts
4. There are a lot of small details