Mining virus kills Linux
engine, so it can remove all kinds of stubborn Trojan viruses
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<
2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly
3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<
4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area
5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it
6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
at the same time, the official latest version of 360 security guard has the protection function of mining Trojan horse (which can be found on the main interface). After the function is turned on, it can effectively play a protective role to avoid the mining Trojan horse causing the system CPU and memory to run full, resulting in the phenomenon of slow heating of the computer card. We hope to adopt it.
Please do not visit strange websites. Browsing and downloading on strange websites may lead to poisoning
-
if there is a Trojan horse or virus program in the computer, install a security software (such as computer housekeeper, etc.). Use the security software to scan the whole disk to find the virus and delete it. If you can't handle it or there is an error, please try to back up important information and then re install the system
-
if there are trojans or virus programs in the mobile phone, install a security software (such as mobile phone housekeeper, etc.). Take the mobile phone housekeeper as an example, open the mobile phone housekeeper, click one key physical examination on the main interface to automatically detect the virus in the mobile phone, and click one key to remove it
you can download and install a Tencent Royal point
after opening it, you can directly check and kill this kind of computer virus by using the virus checking and killing function in it
the complete removal process of mining virus is as follows, please do it when the network is disconnected:
1. Stop and disable the hyper access protection agent service
2
3. Delete C: \% windows \% system32 \% vmichapagentsrv.dll. If the deletion fails, you can rename the file to another name
4. Restart the computer
5. Delete the directory C: (Windows) system32 (Sysprep themes) and C: (Windows) Sysprep themes
6. Delete C: / / Windows / system32 / secupdatehost.exe
7 https://docs.microsoft.com/zh-cn/security-updates/Securitybulletins/2017/ms17-010
8 strong>