Avatar billede tototo Nybegynder
26. januar 2002 - 21:37 Der er 5 kommentarer og
1 løsning

win32.ctx

Er der nogen der ved hvordan man bliver af med virusen win32.ctx og hvis ja med hvilket program.
Avatar billede prodic Mester
26. januar 2002 - 21:43 #1
Avatar billede madmann Nybegynder
27. januar 2002 - 07:55 #2
Her er de tekniske info om den og du har gothåbentlig en backup af data da den har en grim virkning,
Hvis du hat haft den længe kommer du til en reinstallation

Scan online fra www.housecall.antivirus.com

En nasty fætter:

Details:
Upon execution, this virus invokes its decryption algorithm. Since the virus employs multiple-layer polymorphic engine, it makes detection difficult. The number of decryption layers as well as the routine varies randomly.

The virus then locates the Windows application, EXPLORER.EXE, in the system memory and patches some of its code to it. Then the virus goes resident by placing its code in the system memory.

Once the infected EXPLORER.EXE is loaded into memory and the patched code is invoked, the virus gets control. At this time it scans all local drives and infects all EXE, SCR and CPL executables. The virus also deletes the following antivirus checksum files: AVP.CRC, ANTI-VIR.DAT, CHKLIST.CPS, CHKLIST.MS, and IVP.NTZ.

This virus implements Entry-point Obscuring technique to make detection by antivirus difficult. In this method, when the infected file is executed, the virus does not immediately get control; it gets control only when the patched code is executed. It also has several anti-debugged routines, which are capable of detecting both the application level as well as the system level debugger such as Soft-Ice.

The following text is part of the encrypted virus code:

<Dengue Hemorrhagic Fever BioCoded by Griyo / 29A> Disclaimer: This software has been designed for research purposes only.
The author is not responsibly for any problems caused due to improper or illegal usage of it
Details:
Upon execution, this virus invokes its decryption algorithm. Since the virus employs multiple-layer polymorphic engine, it makes detection difficult. The number of decryption layers as well as the routine varies randomly.

The virus then locates the Windows application, EXPLORER.EXE, in the system memory and patches some of its code to it. Then the virus goes resident by placing its code in the system memory.

Once the infected EXPLORER.EXE is loaded into memory and the patched code is invoked, the virus gets control. At this time it scans all local drives and infects all EXE, SCR and CPL executables. The virus also deletes the following antivirus checksum files: AVP.CRC, ANTI-VIR.DAT, CHKLIST.CPS, CHKLIST.MS, and IVP.NTZ.

This virus implements Entry-point Obscuring technique to make detection by antivirus difficult. In this method, when the infected file is executed, the virus does not immediately get control; it gets control only when the patched code is executed. It also has several anti-debugged routines, which are capable of detecting both the application level as well as the system level debugger such as Soft-Ice.

The following text is part of the encrypted virus code:

<Dengue Hemorrhagic Fever BioCoded by Griyo / 29A> Disclaimer: This software has been designed for research purposes only.
The author is not responsibly for any problems caused due to improper or illegal usage of it
Avatar billede tototo Nybegynder
27. januar 2002 - 10:19 #3
Det var et rigtigt godt tip - du er mesteren.
Tak
Avatar billede tototo Nybegynder
27. januar 2002 - 10:20 #4
Tak til Madmann
du har reddet min søndag
Avatar billede madmann Nybegynder
27. januar 2002 - 10:31 #5
Selv tak
Avatar billede madmann Nybegynder
27. januar 2002 - 11:00 #6
En lille husker en personlig firewall og et godt antivirus program
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester