cmd.exe无法运行 50
在cmd下运行vim,然后卡主了,强行关掉之后,再想运行cmd的时候就会出现死机状态,试过重启,磁盘修复,都不行。尝试从别人那考过来一个cmd.exe,可以用,但无法拷贝...
在cmd下运行vim,然后卡主了,强行关掉之后,再想运行cmd的时候就会出现死机状态,试过重启,磁盘修复,都不行。尝试从别人那考过来一个cmd.exe, 可以用,但无法拷贝到windows/system32下,提示需要trustedinstaller。有什么其他方法可以修复吗
展开
展开全部
你把我下面的代码复制下来,然后另存为.bat文件,然后搜索到你C盘下的cmd.exe这个文件,把它复制出来放到桌面上,改名为 命令.exe ,双击 "命令.exe" ,然后把你保存的 .bat文件拖放到这个黑色窗口中,然后回车,就可以把你的这个病毒解决掉了,呵呵
@echo off
title 忆林子
color 0a
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
echo 病毒说明
echo 该病毒会在C:\windows\ 目录下建立以下文件
echo cmd.exe.exe,lsass.exe,setuprs1.pif
echo 然后在每个盘建立autorun.inf 和runauto..文件
echo autorun.inf这个文件用文本编辑器打开后的代码是
echo [AutoRun]
echo open=RUNAUT~1\autorun.pif
echo shell\1=打开(&O)
echo shell\1\Command=RUNAUT~1\autorun.pif
echo shell\2\=浏览(&B)
echo shell\2\Command=RUNAUT~1\autorun.pif
echo shellexecute=RUNAUT~1\autorun.pif
echo 这个inf文件就是用来再次引发在runauto..目录下的autorun.pif
echo 这个病毒文件的,并且因为当用户用右键打开盘符时看到的第一项是
echo “打开”,所以用户根本不会怀疑自己的电脑已经中了这个病毒了。
echo 并且这个runauto..的目录是用命令建立的,因为用了“.”这个特殊的
echo 字符,所以在资源管理下,是无法删除这个文件夹的。但是本人已经把
echo 删除这段代码的内容写在这里了,你将能轻易的删除这个文件夹。
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
set /p k=按回车键开始杀毒...
taskkill /fi "services eq kkdc" /f
taskkill /im cmd.exe.exe /f
taskkill /im regedit.exe.exe /f
taskkill /im r.exe /f
sc stop kkdc
net stop kkdc
sc delete kkdc
attrib -s -h -r c:\windows\cmd.exe.exe
attrib -s -h -r c:\windows\lsass.exe
attrib -s -h -r c:\windows\setuprs1.pif
attrib -s -h -r c:\autorun.inf
attrib -s -h -r c:\r.exe
rd c:\runauto...\ /s /q
del c:\windows\cmd.exe.exe /q
del c:\windows\lsass.exe /q
del c:\windows\setuprs1.pif /q
del c:\autorun.inf /q
del c:\windows\r.exe /q
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe" /v Debugger /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe" /v Debugger /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe" /v Debugger /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe" /v Debugger /f
reg delete "HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\ControlSet001\Services\kkdc" /f
reg delete "HKLM\SYSTEM\ControlSet002\Services\kkdc" /f
reg delete "HKLM\SYSTEM\ControlSet003\Services\kkdc" /f
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\kkdc" /f
reg delete "HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 1 /f
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf attrib -s -h -r %%d:\autorun.inf
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf del %%d:\autorun.inf /q
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf rd %%d:\autorun.inf /s /q
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\runaut~1 rd %%d:\runauto...\ /s /q
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf.tmp attrib -s -h -r %%d:\autorun.inf.tmp
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf.tmp del %%d:\autorun.inf.tmp /q
cls
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
echo 病毒清除完毕,按回车键开始解决分区无法双击打开的问题.
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
set /p test=
cls
@echo off
title 忆林子--解决分区无法打开
color 0a
echo 例如:D盘无法打开则输入 d,你也可以
echo 输入d,e,f这样来同时对d,e,f等多个分区操作.
set /p input=[请输入无法打开的分区的盘符]
if /i "%input%"=="c" goto :特殊
for /d %%i in (%input%) do cacls %%i:\autorun.inf /c /e /p everyone:f
for /d %%i in (%input%) do attrib -s -h -r %%i:\autorun.inf
for /d %%i in (%input%) do del %%i:\autorun.inf /q
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v SVOHOST /f
cls
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 1 /f
cls
chkdsk %input%: /f
cls
set /p tmp=操作结束,按回车键退出该程序。
:exit
exit
:特殊
attrib -s -h -r %input%:\autorun.inf
del %input%:\autorun.inf /q
echo 操作成功结束,请重启,然后就可以双击就可以打开了。
echo 如果重启之后,还是无法双击打开的话,说明你的电脑
echo 里还有病毒,请先杀毒。然后再运行该程序。
set /p tmp=操作结束,按回车键退出该程序。
@echo off
title 忆林子
color 0a
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
echo 病毒说明
echo 该病毒会在C:\windows\ 目录下建立以下文件
echo cmd.exe.exe,lsass.exe,setuprs1.pif
echo 然后在每个盘建立autorun.inf 和runauto..文件
echo autorun.inf这个文件用文本编辑器打开后的代码是
echo [AutoRun]
echo open=RUNAUT~1\autorun.pif
echo shell\1=打开(&O)
echo shell\1\Command=RUNAUT~1\autorun.pif
echo shell\2\=浏览(&B)
echo shell\2\Command=RUNAUT~1\autorun.pif
echo shellexecute=RUNAUT~1\autorun.pif
echo 这个inf文件就是用来再次引发在runauto..目录下的autorun.pif
echo 这个病毒文件的,并且因为当用户用右键打开盘符时看到的第一项是
echo “打开”,所以用户根本不会怀疑自己的电脑已经中了这个病毒了。
echo 并且这个runauto..的目录是用命令建立的,因为用了“.”这个特殊的
echo 字符,所以在资源管理下,是无法删除这个文件夹的。但是本人已经把
echo 删除这段代码的内容写在这里了,你将能轻易的删除这个文件夹。
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
set /p k=按回车键开始杀毒...
taskkill /fi "services eq kkdc" /f
taskkill /im cmd.exe.exe /f
taskkill /im regedit.exe.exe /f
taskkill /im r.exe /f
sc stop kkdc
net stop kkdc
sc delete kkdc
attrib -s -h -r c:\windows\cmd.exe.exe
attrib -s -h -r c:\windows\lsass.exe
attrib -s -h -r c:\windows\setuprs1.pif
attrib -s -h -r c:\autorun.inf
attrib -s -h -r c:\r.exe
rd c:\runauto...\ /s /q
del c:\windows\cmd.exe.exe /q
del c:\windows\lsass.exe /q
del c:\windows\setuprs1.pif /q
del c:\autorun.inf /q
del c:\windows\r.exe /q
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe" /v Debugger /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe" /v Debugger /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe" /v Debugger /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe" /v Debugger /f
reg delete "HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\ControlSet003\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_KKDC" /f
reg delete "HKLM\SYSTEM\ControlSet001\Services\kkdc" /f
reg delete "HKLM\SYSTEM\ControlSet002\Services\kkdc" /f
reg delete "HKLM\SYSTEM\ControlSet003\Services\kkdc" /f
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\kkdc" /f
reg delete "HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v C:\WINDOWS\lsass.exe /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 1 /f
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf attrib -s -h -r %%d:\autorun.inf
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf del %%d:\autorun.inf /q
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf rd %%d:\autorun.inf /s /q
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\runaut~1 rd %%d:\runauto...\ /s /q
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf.tmp attrib -s -h -r %%d:\autorun.inf.tmp
for /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf.tmp del %%d:\autorun.inf.tmp /q
cls
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
echo 病毒清除完毕,按回车键开始解决分区无法双击打开的问题.
echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
set /p test=
cls
@echo off
title 忆林子--解决分区无法打开
color 0a
echo 例如:D盘无法打开则输入 d,你也可以
echo 输入d,e,f这样来同时对d,e,f等多个分区操作.
set /p input=[请输入无法打开的分区的盘符]
if /i "%input%"=="c" goto :特殊
for /d %%i in (%input%) do cacls %%i:\autorun.inf /c /e /p everyone:f
for /d %%i in (%input%) do attrib -s -h -r %%i:\autorun.inf
for /d %%i in (%input%) do del %%i:\autorun.inf /q
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v SVOHOST /f
cls
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 1 /f
cls
chkdsk %input%: /f
cls
set /p tmp=操作结束,按回车键退出该程序。
:exit
exit
:特殊
attrib -s -h -r %input%:\autorun.inf
del %input%:\autorun.inf /q
echo 操作成功结束,请重启,然后就可以双击就可以打开了。
echo 如果重启之后,还是无法双击打开的话,说明你的电脑
echo 里还有病毒,请先杀毒。然后再运行该程序。
set /p tmp=操作结束,按回车键退出该程序。
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询