Mining virus card
Publish: 2021-03-27 07:07:22
1. You can install some anti-virus software on the computer, such as 360 security guard, and then keep it on all the time. In this way, you can prevent the virus from entering the computer. If it has been poisoned, use 360 first aid box to check it in the safe mode.
2. If there is a virus in the file, you can directly use the antivirus software to detect it.
use the computer Housekeeper - virus check and kill - specify the location to kill the virus - select the location of the file
and then directly kill the virus. The results show that if there is a virus, there is one, otherwise it is safe
use the computer Housekeeper - virus check and kill - specify the location to kill the virus - select the location of the file
and then directly kill the virus. The results show that if there is a virus, there is one, otherwise it is safe
3. Use the stubborn Trojan horse killer in the computer housekeeper toolbox to check and kill. The stubborn Trojan horse killer of the computer housekeeper is specially designed for malicious threats that cannot be removed or detected by ordinary killing software. It uses a very powerful search and kill index
engine, so it can remove all kinds of stubborn Trojan viruses
engine, so it can remove all kinds of stubborn Trojan viruses
4. Methods / steps
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<
2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly
3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<
4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area
5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it
6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<
2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly
3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<
4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area
5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it
6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
5. If you can't kill it completely, back up your data and then reload the system. Otherwise, it's really troublesome to delay your work
6.
the complete removal process of mining virus is as follows, please do it when the network is disconnected:
1. Stop and disable the hyper access protection agent service
2
3. Delete C: \% windows \% system32 \% vmichapagentsrv.dll. If the deletion fails, you can rename the file to another name
4. Restart the computer
5. Delete the directory C: (Windows) system32 (Sysprep themes) and C: (Windows) Sysprep themes
6. Delete C: / / Windows / system32 / secupdatehost.exe
7 https://docs.microsoft.com/zh-cn/security-updates/Securitybulletins/2017/ms17-010
8 strong>
7. If there is a virus in the mobile phone, there will be pop-up ads, slow running card, system crash and so on. You can use the antivirus software to scan the virus to see if there is a virus in the mobile phone. You can use the virus checking function of Tencent mobile manager to check and kill the virus. This software has a cloud virus checking library, It can quickly identify all kinds of viruses, enter the security interface and scan the viruses on the mobile phone. If the viruses are found, it can clean up all kinds of viruses on the mobile phone
8. Yes, such as this kind of call is a fraud call and so on. If you want to intercept it, generally speaking, it's better to use some relatively safe protection software. Like Tencent mobile phone housekeeper is very good, it can well identify some strange phone calls or SMS and so on, so you don't have to worry about receiving some inexplicable SMS or phone calls, a very practical one, I hope my answer can help you ha.
Hot content