Position:home>Data disaster early warning> Each turned over information of early-warning of virus enterprise virus greatly
Each turned over information of early-warning of virus enterprise virus greatly
From;  Author:Stand originally

April 28, each turn over virus enterprise to remind computer user key the virus that be on guard is as follows greatly. (press sort of phonetic alphabet order)

Company of ● Jiang Min

Jiang Min reminds you to notice now: Varietal Y of ” of borer of the Exploit.JS.Real.y“Real in the virus today and mutation of ” of Trojan/Beep.Gen“ horn thief are worth to pay close attention to.

Virus name: Exploit.JS.Real.y
Chinese name: Varietal Y of “Real borer ”
Virus length: 3645 byte
Virus type: Script virus
Dangerous level: ★ ★
Influence platform: Win 9X/ME/NT/2000/XP/2003
Varietal Y of Exploit.JS.Real.y“Real borer ” is one of newest members with familial virus of script of “Real borer ” , use Javascript script language to write, and the course adds close processing, the flaw in using Real Player media player transmits other virus. Varietal Y of “Real borer ” is general inside embed in normal webpage, if user computer did not upgrade in time,repair the flaw patch with Real Player corresponding media player, so when the baleful webpage that contains varietal Y of “Real borer ” when visit of user use browser, can join in the tiring-room of current user computer be astonished guest appoints a site, download a large number of baleful programs and be being gone up to be called automatically by infection computer move. Downloads baleful program may is is a net program of You Mu horse, baleful advertisement, back door, bring the loss of different level to the user.

Virus name: Trojan/Beep.Gen
Chinese name: ” of “ horn thief is varietal
Virus length: 19720 byte
Virus type: Trojan
Dangerous level: ★ ★
Influence platform: Win 9X/ME/NT/2000/XP/2003
Mutation of ” of Trojan/Beep.Gen“ horn thief is one of newest members with familial trojan, use VC 6.0 to write, pass the processing that add case. After mutation of ” of “ horn thief moves, in be affected of all of computer science department baleful drive file and document of baleful DLL component are released below folder temporarily, it is file attribute setting conceal, file. these two baleful file duplicates to fall to systematic %SystemRoot%system32 catalog, at the same time file of will baleful drive names for “msosmsfpfis64.sys” , file of component of will baleful DLL names for “msosping00.dll” . File “msosmsfpfis64.sys” registers will baleful drive to serve for the system, use reductive system “SSDT HOOK” , the defence that avoids certain and safe software and check kill. Revise register a watch, implementation trojan switchs on the mobile phone to move automatically. The to load in the process that thrusts file of baleful DLL component limits of authority of all user class moves, conceal ego, prevent to be checked to kill. Game of technical purloin network waits in technology of the HOOK that be used by the tiring-room of all of infection computer science department and memory intercept " QQ an ancient name for China " area of measure of grade of password of game account of the player, game, storehouse password, part, money, place is taken wait for information, and on the long-range server that backstage sends player message be astonished guest to appoint, cause " QQ an ancient name for China " goods of game account of the player, equipment, money missing, bring huge loss to game player.
Previous12 Next