Incubation period of mining virus
Publish: 2021-04-27 04:41:52
1. You can install some anti-virus software on the computer, such as 360 security guard, and then keep it on all the time. In this way, you can prevent the virus from entering the computer. If it has been poisoned, use 360 first aid box to check it in the safe mode.
2. Can try avast antivirus, occupy small, the 360 and computer housekeeper software such as deleted, this consumption of computer performance
3. There are several obvious manifestations of mining virus in
1. The computer runs abnormally slowly
2. The computer crashes abnormally / gets stuck
3. Nothing is turned on, but the CPU occupancy rate is very high
4. The network is slow and a large number of network requests appear
1. The computer runs abnormally slowly
2. The computer crashes abnormally / gets stuck
3. Nothing is turned on, but the CPU occupancy rate is very high
4. The network is slow and a large number of network requests appear
4. Use the stubborn Trojan horse killer in the computer housekeeper toolbox to check and kill. The stubborn Trojan horse killer of the computer housekeeper is specially designed for malicious threats that cannot be removed or detected by ordinary killing software. It uses a very powerful search and kill index
engine, so it can remove all kinds of stubborn Trojan viruses
engine, so it can remove all kinds of stubborn Trojan viruses
5. Methods / steps
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<
2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly
3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<
4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area
5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it
6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<
2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly
3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<
4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area
5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it
6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
6. If you can't kill it completely, back up your data and then reload the system. Otherwise, it's really troublesome to delay your work
7. This kind of virus is mentioned by Tencent security
you can download and install a Tencent Royal point
after opening it, you can directly check and kill this kind of computer virus by using the virus checking and killing function in it
you can download and install a Tencent Royal point
after opening it, you can directly check and kill this kind of computer virus by using the virus checking and killing function in it
8.
the complete removal process of mining virus is as follows, please do it when the network is disconnected:
1. Stop and disable the hyper access protection agent service
2
3. Delete C: \% windows \% system32 \% vmichapagentsrv.dll. If the deletion fails, you can rename the file to another name
4. Restart the computer
5. Delete the directory C: (Windows) system32 (Sysprep themes) and C: (Windows) Sysprep themes
6. Delete C: / / Windows / system32 / secupdatehost.exe
7 https://docs.microsoft.com/zh-cn/security-updates/Securitybulletins/2017/ms17-010
8 strong>
Hot content