Current location - Plastic Surgery and Aesthetics Network - Plastic surgery and beauty - My computer has a process. What's on in dmsty.exe? Is it a Trojan horse?
My computer has a process. What's on in dmsty.exe? Is it a Trojan horse?
It is suspected to be a Trojan grey pigeon, and it is suggested to delete it.

Teach you to kill virus manually.

This is a stunt I have practiced n times!

First, you'd better try to download antivirus software from the following website. If it doesn't work, it's not too late to use tricks again (the downloaded antivirus software is much slower than the original update, so it is recommended to buy genuine ones. If you want to spend less money, you can buy Rising released before, because no matter when it is released, as long as it is not pirated, you can upgrade to the latest version: pay attention to the version before Qianxi.

/

/

Don't look, you can only install an antivirus software: otherwise it will conflict!

0, novice must see. If you can't find the virus file, you can try this method. Start-My Computer-Tools-Folder Options-View-(Select) Show All Files and Folders, Delete: Hide Protected Operating System Files: Select its check box, and then similarly delete its check box: Hide extensions of known file types: Make sure there is nothing hidden. haha,

1, Q: Is there a Trojan horse in this process of rundll32? This machine is slower than before.

, not necessarily many rogue software installed this Dongdong, but does not rule out the possibility that the virus disguised as software: rundll32 itself is not a virus (Rising's Kaka Internet Assistant is a sharp weapon against rogue software, which can be downloaded for free/).

2. Use software such as Windows Optimizer to see which programs will be started at startup (note that advanced viruses can be disguised as system services, so services cannot be spared). If yes: click once, start-search-enter the name of the suspicious process, and then search. After finding it, end the virus in the memory first. The method is to press the button once, and Ctrl+Alt+Delete= The task manager uses it to end the process and then delete the file.

3. If the above method doesn't work, it may be disguised as a normal file and then released by it. So sometimes viruses always appear when antivirus software can't be found. If the virus-related process cannot end, open the task manager-View-Select bar and check PID to confirm. The following methods refer to DOS commands, and click-Start-All Programs-Accessories-Command Prompt.

Ntsd -c q -p PID "command, you can use the specified PID to forcibly kill the virus process. For example, if the PID of a virus process is found to be "444", the command "ntsd -c q -p 444" can be executed.

4. (Note that some viruses will open two processes at the same time to deal with manual antivirus, and we can edit a batch file to deal with it.

ntsd -c q -p 444

ntsd-c q-p 333; -Copy these two commands into a text file, save it as *.BAT, and double-click it! )

5. If no suspicious process is found, the virus is *. DLL embeds viruses or Trojan horses, which are usually associated with svchost.exe and explorer.exe. Take a closer look at Windows process management using Windows Optimizer *. DLL is loaded by svchost.exe and explorer.exe. Please note that there are many things that are necessary for the svchost.exe system. Only when you have a better understanding of this process can you separate the things loaded on the svchost.exe. To kill viruses in explorer.exe and svchost.exe, you must quit explorer.exe or svchost.exe first, and then delete virus files. If the virus is still unstable after antivirus, it means that the system has been damaged and only needs to be repaired and installed.

6. Please note that it is best to clean up the relevant information in the registry as much as possible. Generally, I use the registry editor to search the file name of the virus and delete the corresponding stuff: don't delete it wrong.

Finally, I want to learn from the Tang Priest. There is a saying that long-term stability, so anti-virus software and firewall are essential.