Check whether the computer seems to be infected by mining virus
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
install a computer Housekeeper on your computer
then select the virus to check and kill, and then look at the anti-virus results to see whether it's a virus
bus line: Longgang line → Luobao line, the whole journey is about 17.0km
1. Walk about 120m from Yitian village to Yitian station
2. Take Longgang line, pass 2 stops, and reach the shopping Park Station
3. Walk about 180m, then transfer to Luobao line
4. Take Luobao line, pass 10 stops, and reach Taoyuan station
5. Walk about 600m, Arrive at Nanshan culture and Sports Center Theater
Hello,
1. If you can't see it just by looking at it, you can check it with anti-virus software
2, first download a computer housekeeper from Tencent's official website
3, and then turn on the computer Housekeeper - Antivirus - overall investigation and killing
4, computer housekeeper has a new generation of cloud killing engine and local anti-virus engine based on "cloud killing and micro feature technology", which can kill all kinds of popular and stubborn Trojan viruses. If the computer housekeeper shows that it is non-toxic after the test, it will prove that your computer is safe and there is no need to worry about it
if you have any other questions, please come to the computer manager enterprise platform again and we will try our best to solve them for you
the first thing to check is the process, the method is simple, after boot, do not start anything
Step 1: directly open the task manager to check whether there are suspicious processes. If you don't know any processes, you can Google or network them
PS: if the task manager disappears in a flash after it is opened, it can be judged that it has been poisoned; If the prompt has been disabled by the administrator, be alert
Step 2: open the ice blade and other software, check whether there are hidden processes (the ice blade is marked in red), and then check whether the path of the system process is correct
PS: if the ice blade cannot be used normally, it can be judged that it has been poisoned; If there is a red process, it can be judged that it has been poisoned; If there is a process with a normal system process name that is not in the normal directory, it can also be judged that it has been poisoned
Step 3: if all processes are normal, use tools such as wsyscheck to check whether suspicious threads are injected into the normal process
PS: wsyscheck will use different colors to mark the injected process and normal process. If any process is injected, don't worry, first determine whether the injected mole is a virus, because some killing software will also inject the process< 2. After checking the process of self starting items, if no exception is found, start checking the start items
Step 1: use msconfig to check whether there are suspicious services. Start, run, enter "msconfig", confirm, switch to the Services tab, check the "hide all Microsoft Services" check box, and then confirm whether the remaining services are normal one by one (you can identify by experience or use search engine)
PS: if any abnormality is found, it can be judged that it has been poisoned; If msconfig can't be started or automatically shut down after startup, it can also be determined that it has been poisoned
Step 2: use msconfig to check whether there are suspicious self startup items, switch to the "startup" tab, and check one by one
in the third step, use AutoRuns to view more detailed startup information (including service, driver and self startup, iebho, etc.)
PS: This requires some experience< Third, network connection
ADSL users can make virtual dialing and connect to the Internet at this time
then check whether there is a suspicious connection directly with the iceblade network connection, and the corresponding process and port information can be queried in Google or the network
If any abnormality is found, don't worry, turn off the programs that may use the network in the system (such as download software such as Thunderbolt, automatic update program of antivirus software, IE browser, etc.), and check the network connection information again
Fourth, security mode
Restart and directly enter the security mode. If you can't enter and blue screen appears, you should be alert. It may be the sequela of virus invasion, or the virus has not been cleared< 5. Image hijacking
open the registry editor and locate HKEY_ LOCAL_, Check whether there are suspicious image hijacking items. If suspicious items are found, they may have been poisoned< 6. CPU time
if the system runs slowly after power on, you can also use CPU time as a reference to find suspicious processes as follows:
open the task manager, switch to the Processes tab, click "view" and "select column" in the menu, check "CPU time", then confirm, and click the title of CPU time to sort, In addition to systemidleprocess and system, we need to be vigilant to find processes with large CPU time
at present, these methods are enough to deal with common viruses and Trojans