Position: Home page » Equipment » Check whether the computer seems to be infected by mining virus

Check whether the computer seems to be infected by mining virus

Publish: 2021-05-02 16:33:43
1. You can open the Tencent Smart Security page
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
2. Whether it's a virus or not, the anti-virus software will know by killing a virus
install a computer Housekeeper on your computer
then select the virus to check and kill, and then look at the anti-virus results to see whether it's a virus
3.

bus line: Longgang line → Luobao line, the whole journey is about 17.0km

1. Walk about 120m from Yitian village to Yitian station

2. Take Longgang line, pass 2 stops, and reach the shopping Park Station

3. Walk about 180m, then transfer to Luobao line

4. Take Luobao line, pass 10 stops, and reach Taoyuan station

5. Walk about 600m, Arrive at Nanshan culture and Sports Center Theater

4. Just look at the CPU usage
5. In the process of normal use, does the CPU suddenly soar to 100% or GPU suddenly soar to 100%. If so, it may be poisoned. You can scan it with anti-virus software first
6. Download or use the anti-virus and Trojan software on your computer to check and kill, but it still can't be solved. It is recommended to restore the system or reload.
7.

Hello,


1. If you can't see it just by looking at it, you can check it with anti-virus software


2, first download a computer housekeeper from Tencent's official website


3, and then turn on the computer Housekeeper - Antivirus - overall investigation and killing


4, computer housekeeper has a new generation of cloud killing engine and local anti-virus engine based on "cloud killing and micro feature technology", which can kill all kinds of popular and stubborn Trojan viruses. If the computer housekeeper shows that it is non-toxic after the test, it will prove that your computer is safe and there is no need to worry about it

if you have any other questions, please come to the computer manager enterprise platform again and we will try our best to solve them for you

8. 1、 Process
9. 1、 Process

the first thing to check is the process, the method is simple, after boot, do not start anything

Step 1: directly open the task manager to check whether there are suspicious processes. If you don't know any processes, you can Google or network them

PS: if the task manager disappears in a flash after it is opened, it can be judged that it has been poisoned; If the prompt has been disabled by the administrator, be alert

Step 2: open the ice blade and other software, check whether there are hidden processes (the ice blade is marked in red), and then check whether the path of the system process is correct

PS: if the ice blade cannot be used normally, it can be judged that it has been poisoned; If there is a red process, it can be judged that it has been poisoned; If there is a process with a normal system process name that is not in the normal directory, it can also be judged that it has been poisoned

Step 3: if all processes are normal, use tools such as wsyscheck to check whether suspicious threads are injected into the normal process

PS: wsyscheck will use different colors to mark the injected process and normal process. If any process is injected, don't worry, first determine whether the injected mole is a virus, because some killing software will also inject the process< 2. After checking the process of self starting items, if no exception is found, start checking the start items

Step 1: use msconfig to check whether there are suspicious services. Start, run, enter "msconfig", confirm, switch to the Services tab, check the "hide all Microsoft Services" check box, and then confirm whether the remaining services are normal one by one (you can identify by experience or use search engine)

PS: if any abnormality is found, it can be judged that it has been poisoned; If msconfig can't be started or automatically shut down after startup, it can also be determined that it has been poisoned

Step 2: use msconfig to check whether there are suspicious self startup items, switch to the "startup" tab, and check one by one

in the third step, use AutoRuns to view more detailed startup information (including service, driver and self startup, iebho, etc.)

PS: This requires some experience< Third, network connection

ADSL users can make virtual dialing and connect to the Internet at this time

then check whether there is a suspicious connection directly with the iceblade network connection, and the corresponding process and port information can be queried in Google or the network

If any abnormality is found, don't worry, turn off the programs that may use the network in the system (such as download software such as Thunderbolt, automatic update program of antivirus software, IE browser, etc.), and check the network connection information again

Fourth, security mode

Restart and directly enter the security mode. If you can't enter and blue screen appears, you should be alert. It may be the sequela of virus invasion, or the virus has not been cleared< 5. Image hijacking

open the registry editor and locate HKEY_ LOCAL_, Check whether there are suspicious image hijacking items. If suspicious items are found, they may have been poisoned< 6. CPU time

if the system runs slowly after power on, you can also use CPU time as a reference to find suspicious processes as follows:

open the task manager, switch to the Processes tab, click "view" and "select column" in the menu, check "CPU time", then confirm, and click the title of CPU time to sort, In addition to systemidleprocess and system, we need to be vigilant to find processes with large CPU time

at present, these methods are enough to deal with common viruses and Trojans
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750