亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cih英文介紹.txt

?? 該文件夾里面重點描述了CIH病毒的源碼和原理
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
發信人: triton (半顆勇敢的心), 信區: Virus 

標  題: 關于CIH病毒的英文說明(轉自清華) 

發信站: 武漢白云黃鶴站 (Thu Sep  3 21:52:43 1998) , 站內信件 

  

發信人: bluesea (藍海), 信區: Virus 

標  題: Win95.CIH 的詳細信息 

發信站: BBS 水木清華站 (Thu Aug 27 00:31:08 1998) 

  

Win95.CIH 

  

This is a Windows95 specific parasitic PE files (Portable Executable) infector 

about 1Kbyte of length. This virus was found "in-the-wild" in Taiwan in June 

1998 - it was posted by the virus author to a local Internet conference as a 

some utility. Within a week the virus was found in Austria, Australia, Israel, 

United Kingdom, and was also reported from several other countries (Switzerland, 

  

Sweden, USA, Russia, Chile and the list keeps growing). 

  

The virus installs itself into the Windows memory, hooks file access calls and 

infects EXE files that are opened. Depending on the system date (see below) the 

virus runs its trigger routine. The virus has bugs and in some cases halts the 

computer when an infected application is run. 

  

The virus' trigger routine operates with Flash BIOS ports and tries to overwrite 

  

Flash memory with "garbage". This is possible only if motherboard and chipset 

allow to write to Flash memory. Usually writing to Flash memory can be disabled 

by a DIP switch, however this depends on the motherboard design. Unfortunately, 

there are modern motherboards that cannot be protected by a DIP switch - also, 

some of them do not pay attention for switch position and this protection has no 

  

effect at all. Some other motherboard designs provide write protection that can 

be disabled/overriden by software. 

  

During tests in our lab the virus did not overwrite the Flash BIOS and just 

halted the computer. We do however have reports from other sources telling that 

the virus really is able to mess it up. 

  

The trigger routine then overwrites data on all installed hard drives. The virus 

  

uses direct disk write calls to achieve this and bypasses standard BIOS virus 

protection while overwriting the MBR and boot sectors. 

  

There are three virus versions known, which are very closely related and only 

differ in few parts of their code. They have different lengths, texts inside the 

  

virus code and trigger date: 

  

Length  Text              Trigger date           Found In-The-Wild 

  

1003    CCIH 1.2 TTIT     on April 26th          YES 

1010    CCIH 1.3 TTIT     on April 26th          NO 

1019    CCIH 1.4 TATUNG   on 26th of any month   YES - many reports 

  

Technical details 

  

While infecting a file the virus looks for "caves" in the file body. These caves 

  

are a result of the PE file structure: all file sections are aligned by a value 

that is defined in PE file header, and there are not used blocks of file data 

between the end of previous section and next one. The virus looks for these 

caves and writes its code into them. The virus then increases the size of 

sections by the necessary values. As a result the file length is not increased 

while infecting. 

  

If there is a cave of enough size, the virus saves its code in one section. 

Otherwise it splits its code into several parts and saves them to the end of 

several sections. As a result the virus code may be found as set of pieces, not 

as a single block in infected files. 

  

The virus also looks for a cave in the PE header. If there is a not used block 

not less than 184 bytes of length, the virus writes its startup routine to 

there. The virus then patches the entry address in the PE header with a value 

that points to the startup routine placed in the header. This is the same trick 

that was used in the "Win95.Murkry" virus: address of program entry points not 

to some file section, but to file header - out of loadable file data. Despite 

this, infected programs are run with no problems - Windows does not pay 

attention for such "strange" files, loads the file header into the memory, then 

file sections, and then passes control to the virus startup routine in PE 

header. 

  

When the virus startup routine takes control, it allocates a block of memory by 

using the PageAllocate VMM call, copies itself to there, locates other blocks of 

  

virus code and also copies them to allocated block of memory. The virus then 

hooks system IFS API and returns control to the host program. 

  

The most interesting thing in this part of the virus code is that the virus uses 

  

quite complex tricks to jump from Ring3 to Ring0: when the virus jumps to newly 

allocated memory its code is then executed as Ring0 routine, and the virus is 

able to hook the file system calls (it is not possible in Ring3, where all users 

  

applications are run). 

  

The IFS API virus handler intercepts only one function - file opening. When PE 

.EXE files are opened, the virus infects them, provided there are caves of 

enough size. After infection, the virus checks the file date and calls trigger 

routine (see above). 

  

While running its trigger routine the virus uses direct access to Flash BIOS 

ports and VxD direct disk access calls (IOS_SendCommand). 

Detection and Disinfection tips can be found in the Win95.CIH FAQ 

Document history: 

  

Text originally posted: June-08-1998 

Text updated: June-30-1998 

Text updated: July-01-1998 

CIH FAQ added: July-14-1998 

  

(Detection for this virus was added in Weekly update 980607) 

  

  

  

-- 

上帝創造貓,是為了讓人類體驗撫摸老虎的快樂。 

發信人: bluesea (藍海), 信區: Virus 

標  題: Win95.CIH FAQ 

發信站: BBS 水木清華站 (Thu Aug 27 00:31:56 1998) 

  

Win95.CIH FAQ 

  

  

    What is this Win95.CIH virus, what does it do ? 

    I think my PC may be infected... how do I find out? 

    How can I disinfect my PC from Win95.CIH with build 120 

    Build 120 only: Why do I have to go into command line mode for proper 

    disinfection? 

    After disinfection, I still find traces of CIH in some files (notably the 

    "CIH" string), but a scan shows the files as clean. 

    Is Kaspersky Lab working on making it easier to remove this virus (without 

    having to go through e.g. command line mode) ? 

    Ouch - it's too late! Win95.CIH has left my machine in unbootable state. 

    What can I do? 

    How can I prevent the possible damages Win95.CIH may cause? 

  

  

  

What is this Win95.CIH virus, what does it do ? 

    A detailed description is available in the AVP Virus Encyclopedia 

    I think my PC may be infected... how do I find out? 

  

    NEW: if you use build 122 of AVP 3.0/32 you do no longer need to go 

        through the procedure of using the DOS version! 

        AVP32 build 122 has improved abilities to disinfect Windows viruses, 

        including the CIH virus. 

        First of all, AVP32 will detect and disinfect the CIH virus in system 

        memory. The virus code will stay in Windows memory, but will get patched 

  

        in such a way that the virus would not be able to infect new files or 

        prevent file disinfection. 

        AVP32 then scans itself for the virus infection. If it is infected, 

        AVP32 will disinfect itself, restart and re-scan the Windows memory - 

        this is necessary to be sure that the scanning procedure will be 

        processed under a disinfected system environment. 

        Select all disks and run AVP32 scanning procedure. While scanning AVP32 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲国产欧美在线人成| 91免费看片在线观看| 成人三级伦理片| 欧美午夜电影网| 国产喷白浆一区二区三区| 亚洲一二三专区| 从欧美一区二区三区| 欧美日韩一区 二区 三区 久久精品| 日韩欧美aaaaaa| 亚洲一区二区在线观看视频| 国产成a人亚洲| 日韩精品一区二区三区三区免费| 亚洲免费资源在线播放| 国产精品18久久久久久久久| 欧美肥妇毛茸茸| 亚洲综合色区另类av| 波多野结衣中文一区| 精品999久久久| 蜜臀av性久久久久蜜臀aⅴ流畅| 欧美体内she精视频| 成人免费在线视频观看| 高清久久久久久| 久久天堂av综合合色蜜桃网| 青青草精品视频| 在线电影一区二区三区| 午夜精彩视频在线观看不卡| 色狠狠桃花综合| 亚洲精品国产品国语在线app| 风流少妇一区二区| 国产日韩欧美综合一区| 国产伦精品一区二区三区免费迷 | 久久电影网站中文字幕| 69堂精品视频| 美女诱惑一区二区| 日韩午夜中文字幕| 另类综合日韩欧美亚洲| 日韩一区二区三| 久久99在线观看| 日韩精品一区二区三区老鸭窝| 蜜桃视频一区二区三区| 日韩精品一区二区三区在线播放| 蜜桃视频一区二区| 久久―日本道色综合久久 | 一区二区三区免费观看| 91精品福利视频| 亚洲一区二区三区四区的| 欧美色国产精品| 久久国产乱子精品免费女| 国产亚洲精品福利| 99麻豆久久久国产精品免费| 亚洲狼人国产精品| 在线不卡免费欧美| 国产美女娇喘av呻吟久久| 中文在线一区二区| 欧美亚日韩国产aⅴ精品中极品| 性久久久久久久| 久久综合五月天婷婷伊人| 高清久久久久久| 亚洲韩国一区二区三区| 日韩欧美国产一区在线观看| 国产精品一二二区| 亚洲在线视频一区| 久久伊99综合婷婷久久伊| 成人免费看片app下载| 亚洲制服欧美中文字幕中文字幕| 日韩美女一区二区三区四区| 国产成人av一区二区三区在线| 亚洲欧美日本在线| 欧美一卡二卡三卡| www..com久久爱| 男人的j进女人的j一区| 中文字幕成人在线观看| 欧美人动与zoxxxx乱| 丰满放荡岳乱妇91ww| 性欧美疯狂xxxxbbbb| 日本一区二区不卡视频| 91精品国产综合久久久蜜臀图片| 国产成人av网站| 视频一区国产视频| 国产精品久久久久毛片软件| 91.com在线观看| 91香蕉视频在线| 狠狠色狠狠色合久久伊人| 一区二区成人在线| 国产日产欧美精品一区二区三区| 欧美四级电影网| av电影天堂一区二区在线| 久久精品久久久精品美女| 亚洲精品国产a久久久久久| 26uuu亚洲综合色欧美| 欧美日韩一区国产| 一本大道久久a久久精品综合| 久久精品国产久精国产爱| 亚洲成人午夜影院| 亚洲三级电影网站| 国产婷婷色一区二区三区在线| 欧美久久免费观看| 欧美性猛片aaaaaaa做受| av在线播放不卡| 粉嫩高潮美女一区二区三区| 久久99蜜桃精品| 午夜电影久久久| 亚洲大片在线观看| 亚洲专区一二三| 亚洲精品乱码久久久久久 | 夜夜夜精品看看| 日韩毛片在线免费观看| 欧美国产精品一区二区| 久久九九国产精品| 久久精品一级爱片| 久久精品欧美日韩精品| 精品福利一二区| 久久久精品国产99久久精品芒果| 日韩女优制服丝袜电影| 日韩精品在线一区| 精品区一区二区| 久久影视一区二区| 欧美国产精品v| 一区在线播放视频| 亚洲日穴在线视频| 亚洲第一激情av| 日本系列欧美系列| 国产一区二区在线观看免费| 韩国av一区二区| 国产成人午夜精品5599 | 国产精品全国免费观看高清| 日本一区二区三区国色天香| 国产欧美日韩精品一区| 国产精品国产成人国产三级 | 亚洲精品在线电影| 国产欧美一区二区精品性| 中文字幕精品一区二区三区精品| 中文在线免费一区三区高中清不卡| 国产精品久久久久毛片软件| 亚洲综合久久av| 免费人成黄页网站在线一区二区| 黑人巨大精品欧美黑白配亚洲| 国产不卡视频在线播放| 91在线一区二区三区| 欧美日韩精品专区| 日韩三级在线观看| 国产精品无码永久免费888| 亚洲欧美色综合| 免费一级片91| 成人app软件下载大全免费| 欧美三级日韩三级国产三级| 欧美tickle裸体挠脚心vk| 国产精品成人免费在线| 亚洲成精国产精品女| 国产精品一区二区你懂的| 99精品热视频| 精品国内二区三区| 亚洲另类色综合网站| 久久电影网站中文字幕| 91一区一区三区| 日韩限制级电影在线观看| 国产精品福利影院| 日本欧美一区二区在线观看| 成人精品gif动图一区| 欧美区一区二区三区| 中文成人综合网| 人人爽香蕉精品| 97精品国产97久久久久久久久久久久| 欧美精品三级日韩久久| 国产精品久久久久久久久免费丝袜 | 1024精品合集| 国产中文字幕精品| 欧美片在线播放| 日韩一区中文字幕| 国产精品一区二区黑丝| 欧美日韩三级在线| 亚洲人成在线观看一区二区| 久久国产精品露脸对白| 欧美日韩dvd在线观看| 国产精品女主播av| 国产一区中文字幕| 欧美一区二区成人| 亚洲午夜在线视频| 91捆绑美女网站| 日本一区二区三级电影在线观看| 麻豆精品一区二区| 欧美日韩三级一区| 亚洲成人在线观看视频| 色综合久久天天| 综合av第一页| 免费高清在线视频一区·| 欧美三级蜜桃2在线观看| 亚洲三级久久久| 99久久国产综合精品色伊| 久久久91精品国产一区二区精品 | 亚洲一区二三区| 99精品久久99久久久久| 国产精品情趣视频| 国产成人精品亚洲日本在线桃色| 日韩欧美成人一区| 久久99精品久久久久久动态图| 欧美一级黄色片| 亚洲成av人片一区二区三区| 欧美三级资源在线| 日韩电影在线观看网站|