Position: Home page » Equipment » How to determine whether the computer in the mining Trojan

How to determine whether the computer in the mining Trojan

Publish: 2021-05-16 12:12:13
1. Can try avast antivirus, occupy small, the 360 and computer housekeeper software such as deleted, this consumption of computer performance
2. You can open the Tencent Smart Security page
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
3. There are several obvious manifestations of mining virus in
1. The computer runs abnormally slowly
2. The computer crashes abnormally / gets stuck
3. Nothing is turned on, but the CPU occupancy rate is very high
4. The network is slow and a large number of network requests appear
4. Methods / steps
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<

2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly

3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<

4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area

5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it

6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
5. Just look at the CPU usage
6. How to view with anti-virus software and DOC command without software
first open start = > Run = > Enter "CMD" and then enter
the specific command format is: netstat - an this command can see all the IP connected with the local computer, which includes four parts: proto (connection mode), local
addres (local connection address), and Foreign
address (address to establish connection with local), state (current port state). Through the detailed information of this command, we can completely monitor the connection on the computer, so as to control the computer

many friends will find that the speed of the computer slows down one day after the system restarts, no matter how the optimization is slow, and you can't find problems with antivirus software. At this time, it is very likely that someone else has opened a special service to you after invading your computer, such as IIS information service, so that your antivirus software can't be found out. But don't worry. You can use "net
Start" to see what services are being opened in the system. If you find a service that is not open to you, you can disable it
the method is to directly enter "net start" to view the service, and then use "net stop server" to disable the service
first, enter net user in the command line to see what users are on the computer, and then use "net
user + user name" to see what permissions this user belongs to. Generally, except that the administrator is in the administrators group, others are not! If you find that a
built-in user belongs to the administrators group, it is almost certain that you have been hacked and someone else has cloned an account on your computer. Use "net
user name / del" to delete this user!
7. There is a way: in the computer to find a folder, general folder only file name, no other things in the above. If the end of the file name is. Exe, it may be a Trojan horse. If you don't remember, click in again (it usually disguises as an executable program). If the folder or other documents inside are modified to the EXE format, it is likely to be a Trojan horse In addition to applications, there is another way: start the task manager. Under normal circumstances, if you do not run any programs, the CPU load will be very low. If the CPU does not run any programs, the CPU load is still very high, then it is possible that you have been Trojan horse. Hope to help you!
8. Alipay experience gold freeze, you need to set up one of my artificial feedback to make a complaint to lift the ban freeze, basically in 3 to 5 working days to lift the freeze.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750