Service miner virus
It's a scam. Many Internet enterprises and network security enterprises believe that illegal "mining" has become a serious network security problem
with the rise of "cloud mining", the virtual machine has become the main use object of digital currency such as Monroe coin and Eli coin, and the situation of embezzling cloud computing resources for "mining" has also increased significantly; Security team monitoring found that "competing for mining machine" has become one of the important purposes of Botnet expansion; And found a new type of "mining" virus (mining XmR / Monroe), the virus spread wildly in two months, illegal "mining" profits of nearly one million yuan
extended information:
from a commercial point of view, the business model of mining can walk out of a "healthy road". As long as the "incentive money" is lower than the average cost of new users in the market, the business model will be reasonable and feasible
however, if the platform tempts users to participate with "no capital, no profit", it is worth being vigilant. The so-called "mining" opportunity provided by the platform is likely to be "digging a good hole" waiting for you to jump in
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
In fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g
it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses
moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline
normally, when a computer with high configuration is used for virus detection and garbage cleaning, it will have a partial impact on the system speed, but the impact will not be great. In particular, Tencent computer housekeeper, the anti-virus software is equipped with three powerful anti-virus engines, in the virus killing, scanning speed is very fast
in your case, it is recommended to optimize and clean up the system first, close the rendant processes, and then check and kill the whole system.
network virtual currency can be roughly divided into
the first category is familiar game currency. In the era of stand-alone games, the protagonist accumulates money by knocking down the enemy, entering the gambling house to win money, and using these to buy Herbs and equipment, but it can only be used in his own game console. At that time, there was no "market" between players. Since the establishment of Internet portal and community, the realization of game networking, virtual currency has a "financial market", players can trade game currency
the second type is the special currency issued by the portal website or instant messaging service provider, which is used to purchase the services in the website. The most widely used is Tencent's q-coin, which can be used to purchase membership, QQ show and other value-added services
the third kind of virtual currency on the Internet, such as bitcoin (BTC), Wright currency (LTC), etc. bitcoin is an electronic currency proced by open-source P2P software. Some people also translate bitcoin as "bitcoin", which is a kind of network virtual currency. It is mainly used for Internet financial investment, and can also be directly used in daily life as a new currency.
In short, your server is infected with a virus, and now it is used as a mining machine
How to confirm? The task manager of 2003 is relatively simple. You can use process explorer to view
finally, is the OA of the building owner Zhiyuan