本帖最后由 cjiabing 于 2011-11-18 23:44 编辑
做了些修改,部分增强和优化,但主体和构思没改,至于杀毒能力,我遇到过的该类病毒基本上都杀得,有可能对部分进程误杀,如发现其它问题请留言。
- @echo off&setlocal EnableDelayedexpansion
- ::by cjiabing 2010-05-28 CMD@XP
- ::from 甲兵时代: http://hi.baidu.com/cjiabing
- :甲兵时代同名文件夹病毒专杀工具
- title 甲兵时代同名文件夹病毒专杀工具(升级版V20100610)
- if not exist %SYSTEMDRIVE%\可疑文件隔离 md %SYSTEMDRIVE%\可疑文件隔离
- if not exist %SYSTEMDRIVE%\可疑文件隔离\%0 copy %0 %SYSTEMDRIVE%\可疑文件隔离>nul
- for /f "skip=1 " %%a in ('wmic logicaldisk where "drivetype='2'" get deviceid') do (set tvd=%%a)
- if not exist !tvd!\%0 copy %0 !tvd!>nul
- MODE con: COLS=80 LINES=30
- COLOR 3E
- cls
- echo ╭═══════════════╮
- echo ║ 甲 兵 时 代 ║
- echo ╭══════════┤ 同名文件夹病毒专杀工具 ├══════════╮
- echo ║ ║ http://hi.baidu.com/cjiabing ║ ║
- echo ║ ╰═══════════════╯ ║
- echo ║ ║
- echo ║ ★ 使用说明: ║
- echo ║ ◇ 中毒特征:1、移动盘和硬盘中的文件夹被隐藏; ║
- echo ║ 2、病毒伪装成带EXE结尾的同名“文件夹”; ║
- echo ║ 3、病毒扩展名为.EXE,大小为1MB左右; ║
- echo ║ 4、出现数字和字母随机组合的6位数进程; ║
- echo ║ 5、它潜伏在电脑和移动盘上伺机自动传播; ║
- echo ║ 6、新闻报道80%%%的办公电脑和移动盘中过该毒; ║
- echo ║ ◇ 本工具几经升级,能有效发现和清除病毒,修复被隐藏的文件夹。 ║
- echo ║ ◇ 适用于个人电脑,但并不适用于所有电脑系统,办公电脑请慎用。 ║
- echo ║ ◇ 本工具功能有限,使用须自担风险,否则请退出。 ║
- echo ║ ◇ 免费共享,敬请关注更新(甲兵时代: http://hi.baidu.com/cjiabing)。 ║
- echo ║ ║
- echo ╰═════════════════════════════════════╯
- :start
- echo.
- echo ★ 功能选项:
- echo 【1】杀毒模式:同时清除系统和优盘中的病毒(推荐)。
- echo 【2】修复模式:显示和隐藏文件,清除autoruns和desktop,禁用自动播放。
- echo 【3】清理模式:结束非系统进程和清理系统临时文件。
- echo 【4】一键模式:一键完全清理进程、启动项、U盘EXE文件(慎用)。
- echo 【0】退出。
- set /p inf= ◇ 请输入序号,并回车:
- if "%inf%" == "1" goto yjsd
- if "%inf%" == "2" goto auto
- if "%inf%" == "3" call :yjjsps
- if "%inf%" == "4" goto yjms
- if "%inf%" == "0" goto exit
- echo.
- goto 甲兵时代同名文件夹病毒专杀工具
- :yjsd
- cls
- echo ╭═══════════════╮
- echo ║ 甲 兵 时 代 ║
- echo ╭══════════┤ 同名文件夹病毒专杀工具 ├══════════╮
- echo ║ ║ http://hi.baidu.com/cjiabing ║ ║
- echo ║ ╰═══════════════╯ ║
- echo ║ ║
- echo ║ ║
- echo ║ ◇◇◇杀 毒 模 式◇◇◇ ║
- echo ║ ║
- echo ║ ★ 使用说明【请认真阅读】: ║
- echo ║ ║
- echo ║ ◇ 1、以提示和备份的交互方式执行杀毒,你可以知晓程序执行了哪些操作; ║
- echo ║ 2、本模式并非绝对安全,只是尽可能地避免误杀; ║
- echo ║ ◇ 3、为确保安全,可疑文件被隔离至“%SYSTEMDRIVE%\可疑文件隔离” ║
- echo ║ 4、如出现故障可从“可疑文件隔离”中恢复被隔离的文件; ║
- echo ║ ◇ 5、进程名称含有数字的除360tray.exe和rundll32.exe外都将被隔离; ║
- echo ║ 6、请关闭其它程序后再执行杀毒,杀毒结束后请检查是否存在误杀; ║
- echo ║ ◇ 7、启动项将全部清理,自动备份至隔离目录中; ║
- echo ║ ◇ 8、移动盘中与文件夹名字相同的EXE程序将被清理; ║
- echo ║ 9、移动盘中的EXE程序大小小于2M的将被清理; ║
- echo ║ 10、请备份好移动盘后再执行杀毒,杀毒结束后请检查是否存在误杀; ║
- echo ║ ║
- echo ╰═════════════════════════════════════╯
- echo.
- echo ◇ 确认开始杀毒请输入【 Y 】并回车
- echo ◇ 移动盘杀毒请输入【 U 】并回车
- set /p yqq= ◇ 返回请输入【 B 】并回车:
- if /i "%yqq%"=="b" goto 甲兵时代同名文件夹病毒专杀工具
- if /i "%yqq%"=="y" goto killxt
- if /i "%yqq%"=="u" goto killup
- if /i "%yqq%"=="" goto 甲兵时代同名文件夹病毒专杀工具
- goto yjsd
- :killxt
- call :killxp
- call :killup
- call :killex
- goto 甲兵时代同名文件夹病毒专杀工具
- :yjms
- cls
- echo ╭═══════════════╮
- echo ║ 甲 兵 时 代 ║
- echo ╭══════════┤ 同名文件夹病毒专杀工具 ├══════════╮
- echo ║ ║ http://hi.baidu.com/cjiabing ║ ║
- echo ║ ╰═══════════════╯ ║
- echo ║ ║
- echo ║ ║
- echo ║ ◇◇◇一 键 模 式◇◇◇ ║
- echo ║ ║
- echo ║ ★ 使用说明【请认真阅读】: ║
- echo ║ ║
- echo ║ ◇ 使用前请先阅读“杀毒模式”中的使用说明; ║
- echo ║ ◇ 本操作具有一定的风险,请慎用; ║
- echo ║ ◇ 一键模式包括以下内容: ║
- echo ║ ★一键清理U盘中的EXE、inf、vbe类型文件; ║
- echo ║ ★一键结束非系统进程; ║
- echo ║ ★一键清理系统临时文件; ║
- echo ║ ★一键清理自启动项; ║
- echo ║ ★一键清理任务计划: ║
- echo ║ ★一键清理常见同名文件夹病毒: ║
- echo ║ ★一键免疫(清除autoruns和desktop,禁用自动播放) ║
- echo ║ ◇ 请事先做好检查和备份再开始。 ║
- echo ║ ║
- echo ╰═════════════════════════════════════╯
- echo.
- echo ◇ 确定使用一键模式杀毒并自担风险请输入【 OK 】并回车;
- echo ◇ 返回请输入【 B 】并回车;
- echo.
- set /p ikk= 请选择:
- if /i %ikk%==b (goto 甲兵时代同名文件夹病毒专杀工具)
- if /i %ikk%==ok (goto killyy) else (goto 甲兵时代同名文件夹病毒专杀工具)
- goto yjsd
- :killyy
- call :killxp1
- call :killtasks
- call :yxjcxf
- call :rwglq
- call :killup121
- goto 甲兵时代同名文件夹病毒专杀工具
- :killxp
- cls
- echo.
- echo.
- echo.
- echo ★ 以下部分是系统杀毒,请关闭其它程序后开始杀毒
- echo.
- echo ◇ 杀毒之后,可疑文件将被隔离至“%SYSTEMDRIVE%\可疑文件隔离”
- echo ◇ 如出现故障可从“可疑文件隔离”中恢复被隔离的文件
- echo ◇ 进程名称含有数字的除360tray.exe和rundll32.exe外都将被隔离
- echo.
- echo.
- echo.
- pause
- :killxp1
- if %inf%==4 call :killpr
- if %inf%==4 call :yjjsps
- if %inf%==1 call :killpr1
- call :killser
- call :killgl
- call :killwj
- call :killxpbd
- call :killyd
- call :killqd
- call :xsycdp
- goto :eof
- :killpr
- echo.
- echo ◇ 正在检查进程和结束可疑进程……
- for /f %%a in ('tasklist') do echo %%a |findstr "[0-9]" |findstr /i /v "360tray.exe rundll32.exe" >>_psyf.txt
- for /f %%a in (_psyf.txt) do echo 发现可疑进程:%%a &taskkill /f /im %%a
- echo.
- echo ◇ 正在关闭桌面进程,稍后为你重新打开……
- taskkill /f /im XP*
- tskill explorer
- taskkill /f /im explorer.exe
- taskkill /f /t /im IEXPLORE.EXE
- taskkill /f /t /im expl0rer.exe
- taskkill /f /t /im systen.exe
- goto :eof
- :killser
- echo.
- echo ◇ 正在停止可疑的服务项……
- sc stop DNSSystem
- net stop DNSSystem
- goto :eof
- :killpr1
- echo.
- echo ◇ 正在检查进程和结束可疑进程……
- echo.
- echo 常见同名病毒由字母和数字随机组成6位或8位的进程,形如:
- echo 60B650.EXE、96015E.EXE、XP-F84AA1B5.EXE
- echo 某些常见系统、驱动和程序的进程数字具有一定的规则和意义,类似:
- echo 360tray.exe、nvsvc32.exe、rundll32.exe、tsnpstd3.exe、Ati2evxx.exe
- echo.
- if exist _psyf1.txt del _psyf1.txt
- for /f %%a in ('tasklist') do echo %%a |findstr "[0-9]" |findstr /i /v "360tray.exe rundll32.exe" >>_psyf1.txt
- for /f %%a in (_psyf1.txt) do (
- echo.&echo 发现可疑进程:%%a &set /p ugh= 请检查是否病毒,结束并隔离【y】,忽略【n】:&if /i !ugh!==y (taskkill /f /im %%a&echo %%a >>_psyf.txt)&if /i !ugh!==n (echo 忽略 %%a)
- )
- if exist _psyf1.txt del _psyf1.txt
- echo.
- echo ◇ 正在关闭桌面进程,稍后为你重新打开……
- taskkill /f /im XP*
- tskill explorer
- taskkill /f /im explorer.exe
- taskkill /f /t /im IEXPLORE.EXE
- taskkill /f /t /im expl0rer.exe
- taskkill /f /t /im systen.exe
- goto :eof
- :killgl
- echo.
- echo ◇ 正在创建可疑文件隔离说明……
- if not exist %SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt (
- echo.>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo.>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo 可疑文件隔离说明>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo.>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo. >>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo 从系统根目录中搜索到的可疑文件被隔离到“%SYSTEMDRIVE%\可疑文件隔离”,它们很可能是病毒,也可能是其它程序文件,为防止误删特将它们备份。假如杀毒后系统出现故障,请重命名相关可疑文件(去掉“_重命名_日期”),根据以下记录的时间和路径拷贝该文件到文件原来所在的目录。>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo.
- echo 本程序将进程名称含有数字的进程视为可疑进程,除“360tray^.exe”和“rundll32^.exe”外都将被隔离。一些打印机、驱动等进程含有数字的不可避免的被隔离,杀毒前请手动结束这些进程,或者杀毒后手动恢复。假如用于办公电脑,请注意检查和备份驱动程序,并且慎用一键模式。>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo 可信进程举例:360tray.exe、nvsvc32.exe、rundll32.exe、tsnpstd3.exe、Ati2evxx.exe>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo 病毒名称举例:XP-F84AA1B5.EXE;XP-D89C5E64.EXE;XP-23520AE1.EXE……;96015E.exe;5E6694.exe;1F4B56.EXE……>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo 病毒通常位于C:\WINDOWS\system32,病毒自建一个文件夹,名称由六位数字和字母随机组成,比如 C:\WINDOWS\system32\5E6694\1F4B56.EXE……>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo 自愿使用本工具须自担风险,任何使用本工具造成的损失本人一概不负责。>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo by cjiabing>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo.>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo.>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- )
- goto :eof
- :killwj
- if not exist "%SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!" md %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!
- echo.
- echo ◇ 正在转移可疑文件,请注意弹出的说明……
- for /f %%a in (_psyf.txt) do (wmic process where name="%%a" get ExecutablePath |find /i ".exe")>>_fpath.txt
- for /f %%a in (_fpath.txt) do (
- if exist %%a (attrib -h -r -s -a %%a)&echo !date! !time!: %%a>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- set name001=%%~nxa
- set name002=%%~dpa
- set name003=!name001!_重命名_!date!
- if exist %%a ren "%%a" !name003!
- set name004="!name002!!name003!"
- move !name004! %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!
- )
- for /f "delims=" %%a in (_psyf.txt) do (
- for /r %SYSTEMROOT%\system32 %%i in (%%a) do (
- if exist %%i (attrib -h -r -s -a %%i)&echo !date! !time!: %%i>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- set name001=%%~nxi
- set name002=%%~dpi
- set name003=!name001!_重命名_!date!
- if exist %%i (ren "%%i" "!name003!")
- set name004="!name002!!name003!"
- if exist !name004! move !name004! %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!
- )
- )
- goto :eof
- :killxpbd
- echo.
- echo ◇ 正在清理病毒,请稍候……
- for /r %SYSTEMROOT%\system32 %%i in (XP-*.EXE,winvcreg.exe,og.dll,ul.dll,og.EDT,21c0.EDT,21c0.inf,69fe.inf,com.run,dp1.fne,eAPI.fne,HtmlView.fne,internet.fne,krnln.fnr,RegEx.fnr,shell.fne,spec.fne,msdll.dll,Wsctf.exe,expl0rer.exe) do (
- if exist %%i (attrib -h -r -s %%i) & (DEL /F /Q /A %%i)
- )>nul
- for /r %temp% %%i in (XP-*.EXE,winvcreg.exe,og.dll,ul.dll,og.EDT,21c0.EDT,21c0.inf,69fe.inf,com.run,dp1.fne,eAPI.fne,HtmlView.fne,internet.fne,krnln.fnr,RegEx.fnr,shell.fne,spec.fne,msdll.dll,Wsctf.exe,expl0rer.exe) do (
- if exist %%i (attrib -h -r -s %%i) & (DEL /F /Q /A %%i)
- )>nul
- for /r %temp% %%i in (SuCH0ST.exe,Systen.exe,Systen32.exe,exl0rer.exe,SVCH0S.exe) do (
- if exist %%i (attrib -h -r -s %%i) & (DEL /F /Q /A %%i)
- )>nul
- attrib -h -r -s %TEMP%\E_4
- rd %TEMP%\E_4\
- attrib -h -s -r -a "%systemroot%\system32\down.exe" &del /q /f "%systemroot%\system32\down.exe"
- attrib -h -s -r -a "%systemroot%\system32\ativcox.dll" &del /q /f "%systemroot%\system32\ativcox.dll"
- attrib -h -s -r -a "%systemroot%\system32\mail3.vbe" &del /q /f "%systemroot%\system32\mail3.vbe"
- attrib -h -s -r -a "%systemroot%\system32\attusb.dll" &del /q /f "%systemroot%\system32\attusb.dll"
- attrib -h -s -r -a "%systemroot%\system32\autousb.bat" &del /q /f "%systemroot%\system32\autousb.bat"
- attrib -h -s -r -a "%systemroot%\system32\win.bat" &del /q /f "%systemroot%\system32\win.bat"
- attrib -r -h -s -a "C:\RECYCLER\S-1-5-21-796845957-1482476501-682003330-500\Dc9.exe"
- attrib -r -h -s -a "C:\RECYCLER\S-1-5-21-796845957-1482476501-682003330-500\Dc10.exe"
- attrib -r -h -s -a "C:\RECYCLER\S-1-5-21-796845957-1482476501-682003330-500\Dc11.exe"
- DEL /F /Q /A "C:\RECYCLER\S-1-5-21-796845957-1482476501-682003330-500\Dc9.exe"
- DEL /F /Q /A "C:\RECYCLER\S-1-5-21-796845957-1482476501-682003330-500\Dc10.exe"
- DEL /F /Q /A "C:\RECYCLER\S-1-5-21-796845957-1482476501-682003330-500\Dc11.exe"
- attrib -r -h -s -a %systemroot%\system32\wbem\.vbs
- del /a/f/q %systemroot%\system32\wbem\.vbs
- attrib -r -h -s -a %systemroot%\system32\.vbs
- del /a/f/q %systemroot%\system32\.vbs
- attrib -r -h -s -a c:\windows\system32\wbem\irjit.dll
- del /a/f/q c:\windows\system32\wbem\irjit.dll
- goto :eof
- :killyd
- echo.
- echo ◇ 正在全盘搜索同名文件,请稍候……
- For %%a In (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) Do (
- if exist %%a:\ (
- for /f "tokens=3,* delims= " %%i in ('"dir /a /l %%a:\"') do (
- if %%i==^<DIR^> (
- for /f "tokens=3 delims= " %%e in ('"if exist "%%a:\%%j.exe" dir /a/w "%%a:\%%j.exe""') do (
- if %%e lss 2000000 (
- if exist "%%a:\%%j.exe" attrib -h -a -s -r "%%a:\%%j.exe"
- if exist "%%a:\%%j.exe" ren "%%a:\%%j.exe" "%%j.exe_重命名_!date!"
- echo !date! !time!: "%%a:\%%j.exe">>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- if exist "%%a:\%%j.exe_重命名_!date!" move "%%a:\%%j.exe_重命名_!date!" %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!
- if exist "%%a:\%%j" attrib -h -a -s -r "%%a:\%%j"
- )
- )
- )
- )
- )
- )
- :killqpss
- echo.
- echo ◇ 正在全盘搜索可疑文件,请稍候……
- For %%a In (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) Do (
- if exist %%a:\autorun.inf del /a/f/q %%a:\autorun.inf
- if exist %%a:\ (
- for /f "tokens=4* delims= " %%i in ('"dir /a /l %%a:\"') do (
- set ppqq=%%i
- if "!ppqq:~-4,4!"==".vbe" (attrib -a -r -h -s "%%a:\!ppqq!" &move "%%a:\!ppqq!" %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!)
- )
- )
- )
- goto :eof
- :killqd
- echo.
- echo ◇ 正在清理启动项……
- set timecd=%time:~0,2%:%time:~3,2%
- REG EXPORT HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 启动项备份.reg
- move 启动项备份.reg %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!\
- ren "%SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!\启动项备份.reg" "启动项备份%timecd%.reg"
- attrib -r -h -s -a "%USERPROFILE%\「开始」菜单\程序\启动\ .lnk"
- del "%USERPROFILE%\「开始」菜单\程序\启动\ .lnk" /q /f
- for /f "delims=." %%a in (_psyf.txt) do (reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v %%a /f)
- Del "%ALLUSERSPROFILE%\「开始」菜单\程序\启动\*.*" /q /f
- Del "%USERPROFILE%\「开始」菜单\程序\启动\*.*" /q /f
- Del "C:\Docume~1\Default User\「开始」菜单\程序\启动\*.*" /q /f
- del _psyf.txt,_fpath.txt
- echo.
- echo ◇ 正在为你重新打开桌面,请注意阅读说明……
- start %SYSTEMROOT%\explorer.exe
- start %SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- goto :eof
- :killtasks
- echo.>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo !date!任务计划tasks路径:%SYSTEMROOT%\tasks>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- dir /b %SYSTEMROOT%\tasks\*.job>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- echo.>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- move %SYSTEMROOT%\tasks\*.job %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!
- goto :eof
- :xsycdp
- echo.
- echo ◇ 正在恢复被隐藏的文件夹,请稍候……
- for /f "skip=1" %%i in ('wmic logicaldisk where "drivetype='3'" get caption') do (
- for /f "delims=" %%a in ('dir /b /a:d %%i') do if exist %%i\%%a (attrib -r -h -s -a /s /d "%%i\%%a")
- if exist "%%i\System Volume Information" (attrib +h +s +a /s /d "%%i\System Volume Information")
- if exist "%%i\RECYCLER" (attrib +h +s +a /s /d "%%i\RECYCLER")
- if exist "%%i\RECYCLEd" (attrib +h +s +a /s /d "%%i\RECYCLEd")
- )
- goto :eof
- :killup
- cls
- echo.
- echo.
- for /f "skip=1 " %%a in ('wmic logicaldisk where "drivetype='2'" get deviceid') do (set tvd=%%a&echo 你的移动盘是:!tvd!
- if not exist !tvd!\%0 copy %0 !tvd!>nul 2>nul
- )
- echo.
- echo.
- echo ★ 以下清理移动盘中的EXE病毒,请插入移动盘继续!
- echo.
- echo ◇ 移动盘中与文件夹名字相同的EXE程序将被清理。
- echo ◇ 移动盘中的EXE程序大小小于2M的将被清理。
- echo ◇ 请做好备份后继续。
- echo.
- echo.
- echo.
- pause
- :killup121
- echo.
- echo ◇ 正在检测移动盘……
- for /f "skip=1 " %%a in ('wmic logicaldisk where "drivetype='2'" get deviceid') do (set tvd=%%a&call :ydpf)
- if %inf%==4 call :killuexe
- if %inf%==4 call :clearauto1
- call :killex
- goto 甲兵时代同名文件夹病毒专杀工具
- :ydpf
- call :killxs
- call :killupbd
- goto :eof
- :killxs
- echo.
- echo 当前移动盘是:!tvd!
- echo.
- echo ◇ 正在恢复显示移动盘中的文件,请稍候……(移动盘文件过多可能会影响速度。)
- echo.
- for /f %%i in ("!tvd!") do attrib %%~di\*.* -s -r -h -a /d /s
- goto :eof
- :killupbd
- echo.
- echo ◇ 正在清理移动盘病毒……
- for /r %tvd% %%e in (.) do (
- set w2=%%~fe
- for /r %tvd% %%i in (*.exe) do (
- set w1=%%~dpni
- if !w1! == !w2! del /f/a/q %%i
- )
- )
- for /r %tvd% %%i in (*.exe) do (
- if %%~zi lss 2000000 (if exist %%i del /f/q/a %%i)
- )
- del /a/f/q %tvd%\Autorun.inf
- del /a/f/q %tvd%\Autorun.inf.exe
- del /a/f/q %tvd%\Autorun.exe
- del /a/f/q %tvd%\RECYCLER.exe
- del /a/f/q %tvd%\Recycled.exe
- del /a/f/q %tvd%\Recycle.exe
- del /a/f/q %tvd%\Notepad.exe
- del /a/f/q %tvd%\.vbs
- del /a/f/q %tvd%\Secret.exe
- del /a/f/q "%tvd%\NGUYEN TU QUANG.EXE"
- del /a/f/q %tvd%\Wsctf.exe
- del /a/f/q %tvd%\expl0rer.exe
- goto :eof
- :killuexe
- echo !date! !time!: >>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt
- for /r %tvd% %%a in (*.exe) do echo %%a>>%SYSTEMDRIVE%\可疑文件隔离\可疑文件路径.txt&move "%%a" %SYSTEMDRIVE%\可疑文件隔离\!date:~0,10!
- goto :eof
- :killex
- echo 甲.兵,时.代移动盘同名文件夹病毒专杀工具>!tvd!\autorun.inf
- attrib +a +h +r +s !tvd!\autorun.inf
- echo.
- echo ★ 杀毒完毕!
- echo.
- ping /n 5 127.0.1>nul
- goto 甲兵时代同名文件夹病毒专杀工具
- :yjjsps
- title !%0!
- echo.
- echo.
- echo.
- echo.
- echo 一键结束非系统进程 cmd@xp
- taskkill /f /im explorer.exe
- for /f "skip=3" %%a in ('tasklist') do echo %%a |findstr /i /v "System smss.exe csrss.exe winlogon.exe services.exe lsass.exe svchost.exe conime.exe cmd.exe explorer.exe wmiprvse.exe Userinit.exe taskkill.exe spoolsv.exe ctfmon.exe alg.exe tasklist.exe qq.exe">>_npslist.txt
- for /f %%a in (_npslist.txt) do taskkill /f /t /im %%a||NTSD -c q -P %%a
- start %windir%\explorer.exe
- del _npslist.txt
- for /f "usebackq skip=3 tokens=2" %%p in (`tasklist /fi "windowtitle eq !%0!"`) do set prs2=%%p
- for /f "usebackq skip=1 delims=" %%p in (`"wmic process where(name="cmd.exe") get ProcessId"`) do (
- echo %%p |findstr /v "!prs2!">>_prstkill.txt
- )
- for /f %%a in (_prstkill.txt) do taskkill /f /t /pid %%a
- del _prstkill.txt
- title 甲兵时代同名文件夹病毒专杀工具(升级版V20100610)
- :clean
- echo.
- echo ★ 清理系统垃圾
- del /f /s /q %systemdrive%\*.tmp
- del /f /s /q %systemdrive%\*._mp
- del /f /s /q %systemdrive%\*.gid
- del /f /s /q %systemdrive%\*.chk
- del /f /s /q %systemdrive%\*.old
- del /f /s /q %systemdrive%\recycled\*.*
- del /f /s /q %windir%\*.bak
- del /f /s /q %windir%\*.log
- del /f /s /q %windir%\*.tmp
- del /f /s /q %windir%\prefetch\*.*
- rd /s /q %windir%\temp & md %windir%\temp
- rd /s /q %temp% & md %temp%
- del /f /q %userprofile%\recent\*.*
- del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"
- del /f /s /q "%userprofile%\Local Settings\Temp\*.*"
- del /f /s /q "%userprofile%\recent\*.*"
- echo.
- echo 操作完毕!
- echo.
- goto :eof
- :yxjcxf
- echo.
- echo ◇ 修复映像劫持
- cd.>_jcxflist.txt
- echo 360rpt.exe >>_jcxflist.txt
- echo 360Safe.exe >>_jcxflist.txt
- echo 360tray.exe >>_jcxflist.txt
- echo adam.exe >>_jcxflist.txt
- echo AgentSvr.exe >>_jcxflist.txt
- echo AppSvc32.exe >>_jcxflist.txt
- echo ArSwp.exe >>_jcxflist.txt
- echo AST.exe >>_jcxflist.txt
- echo autoruns.exe >>_jcxflist.txt
- echo AvastU3.exe >>_jcxflist.txt
- echo avconsol.exe >>_jcxflist.txt
- echo avgrssvc.exe >>_jcxflist.txt
- echo AvMonitor.exe >>_jcxflist.txt
- echo avp.exe >>_jcxflist.txt
- echo CCenter.exe >>_jcxflist.txt
- echo ccSvcHst.exe >>_jcxflist.txt
- echo cmd.exe >>_jcxflist.txt
- echo EGHOST.exe >>_jcxflist.txt
- echo FileDsty.exe >>_jcxflist.txt
- echo FTCleanerShell.exe >>_jcxflist.txt
- echo FYFireWall.exe >>_jcxflist.txt
- echo ghost.exe >>_jcxflist.txt
- echo HijackThis.exe >>_jcxflist.txt
- echo IceSword.exe >>_jcxflist.txt
- echo iexplore.exe >>_jcxflist.txt
- echo iparmo.exe >>_jcxflist.txt
- echo Iparmor.exe >>_jcxflist.txt
- echo irsetup.exe >>_jcxflist.txt
- echo isPwdSvc.exe >>_jcxflist.txt
- echo kabaload.exe >>_jcxflist.txt
- echo KaScrScn.SCR >>_jcxflist.txt
- echo KASMain.exe >>_jcxflist.txt
- echo KASTask.exe >>_jcxflist.txt
- echo KAV32.EXE >>_jcxflist.txt
- echo KAVDX.EXE >>_jcxflist.txt
- echo KAVPF.exe >>_jcxflist.txt
- echo KAVPFW.exe >>_jcxflist.txt
- echo KAVSetup.exe >>_jcxflist.txt
- echo KAVStart.exe >>_jcxflist.txt
- echo KISLnchr.exe >>_jcxflist.txt
- echo KMailMon.exe >>_jcxflist.txt
- echo KMFilter.exe >>_jcxflist.txt
- echo KPFW32.EXE >>_jcxflist.txt
- echo KPFW32X.EXE >>_jcxflist.txt
- echo KPFWSvc.EXE >>_jcxflist.txt
- echo KRegEx.exe >>_jcxflist.txt
- echo KRepair.com >>_jcxflist.txt
- echo KsLoader.exe >>_jcxflist.txt
- echo KVCenter.kxp >>_jcxflist.txt
- echo KvDetect.exe >>_jcxflist.txt
- echo KvfwMcl.exe >>_jcxflist.txt
- echo KVMonXP.kxp >>_jcxflist.txt
- echo KVMonXP_1.kxp >>_jcxflist.txt
- echo kvol.exe >>_jcxflist.txt
- echo kvolself.exe >>_jcxflist.txt
- echo KvReport.kxp >>_jcxflist.txt
- echo KVScan.kxp >>_jcxflist.txt
- echo KVSrvXP.exe >>_jcxflist.txt
- echo KVStub.kxp >>_jcxflist.txt
- echo kvupload.exe >>_jcxflist.txt
- echo kvwsc.exe >>_jcxflist.txt
- echo KvXP.kxp >>_jcxflist.txt
- echo KvXP_1.kxp >>_jcxflist.txt
- echo KWatch.EXE >>_jcxflist.txt
- echo KWatch9x.exe >>_jcxflist.txt
- echo KWatchX.EXE >>_jcxflist.txt
- echo loaddll.exe >>_jcxflist.txt
- echo MagicSet.exe >>_jcxflist.txt
- echo mcconsol.exe >>_jcxflist.txt
- echo mmqczj.exe >>_jcxflist.txt
- echo mmsk.exe >>_jcxflist.txt
- echo msconfig.exe >>_jcxflist.txt
- echo Navapsvc.exe >>_jcxflist.txt
- echo Navapw32.exe >>_jcxflist.txt
- echo NOD32.exe >>_jcxflist.txt
- echo nod32krn.exe >>_jcxflist.txt
- echo nod32kui.exe >>_jcxflist.txt
- echo NPFMntor.exe >>_jcxflist.txt
- echo PFW.exe >>_jcxflist.txt
- echo PFWLiveUpdate.exe >>_jcxflist.txt
- echo process exloprer.exe >>_jcxflist.txt
- echo procexp.exe >>_jcxflist.txt
- echo QHSET.exe >>_jcxflist.txt
- echo QQ.exe >>_jcxflist.txt
- echo QQDoctor.exe >>_jcxflist.txt
- echo QQKav.exe >>_jcxflist.txt
- echo QQSC.exe >>_jcxflist.txt
- echo Ras.exe >>_jcxflist.txt
- echo Rav.exe >>_jcxflist.txt
- echo RavMon.exe >>_jcxflist.txt
- echo RavMonD.exe >>_jcxflist.txt
- echo RavStub.exe >>_jcxflist.txt
- echo RavTask.exe >>_jcxflist.txt
- echo RegClean.exe >>_jcxflist.txt
- echo regedit.com >>_jcxflist.txt
- echo regedit.exe >>_jcxflist.txt
- echo rfwcfg.exe >>_jcxflist.txt
- echo rfwmain.exe >>_jcxflist.txt
- echo rfwProxy.exe >>_jcxflist.txt
- echo rfwsrv.exe >>_jcxflist.txt
- echo RsAgent.exe >>_jcxflist.txt
- echo Rsaupd.exe >>_jcxflist.txt
- echo rstrui.exe >>_jcxflist.txt
- echo runiep.exe >>_jcxflist.txt
- echo safelive.exe >>_jcxflist.txt
- echo scan32.exe >>_jcxflist.txt
- echo shcfg32.exe >>_jcxflist.txt
- echo SmartUp.exe >>_jcxflist.txt
- echo SREng.com >>_jcxflist.txt
- echo SREng.EXE >>_jcxflist.txt
- echo symlcsvc.exe >>_jcxflist.txt
- echo SysSafe.exe >>_jcxflist.txt
- echo TrojanDetector.exe >>_jcxflist.txt
- echo Trojanwall.exe >>_jcxflist.txt
- echo TrojDie.kxp >>_jcxflist.txt
- echo UIHost.exe >>_jcxflist.txt
- echo UmxAgent.exe >>_jcxflist.txt
- echo UmxAttachment.exe >>_jcxflist.txt
- echo UmxCfg.exe >>_jcxflist.txt
- echo UmxFwHlp.exe >>_jcxflist.txt
- echo UmxPol.exe >>_jcxflist.txt
- echo upiea.exe >>_jcxflist.txt
- echo UpLive.exe >>_jcxflist.txt
- echo USBCleaner.exe >>_jcxflist.txt
- echo vsstat.exe >>_jcxflist.txt
- echo webscanx.exe >>_jcxflist.txt
- echo WoptiClean.exe >>_jcxflist.txt
- echo zjb.exe >>_jcxflist.txt
- echo Windows Registry Editor Version 5.00>xfyxjc.reg
- echo.>>xfyxjc.reg
- echo [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DownloadManager]>>xfyxjc.reg
- for /f "tokens=*" %%a in (_jcxflist.txt) do echo [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%%a]>>xfyxjc.reg
- echo [-HKEY_USERS\S-1-5-21-1757745196-1676693376-65411059-500\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams\35]>>xfyxjc.reg
- start /w regedit.exe /s xfyxjc.reg
- del xfyxjc.reg,_jcxflist.txt
- goto :eof
- :rwglq
- echo.
- echo ◇ 修复任务管理器
- echo REGEDIT4 >>_xfrwglq.reg
- echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] >>_xfrwglq.reg
- echo "DisableTaskmgr"=dword:00000000. >>_xfrwglq.reg
- echo.>>_xfrwglq.reg
- start /w regedit.exe /s _xfrwglq.reg
- del _xfrwglq.reg
- goto :eof
- :exit
- exit
- :auto
- Rem 杀进程
- taskkill /F /IM SocksA.exe /IM SVOHOST.exe /IM AdobeR.exe /IM ravmone.exe /IM wincfgs.exe /IM doc.exe /IM rose.exe /IM sxs.exe /IM autorun.exe /IM KB20060111.exe /IM tel.xls.exe>nul 2>nul
- :clearauto
- cls
- Echo.
- Echo Autorun 病毒清除与免疫工具
- rem By Phexon。本文做了部分的修改,敬请原谅。
- Echo.
- Echo [1] 一键免疫(推荐!)
- Echo [2] 禁用系统的 Autorun 机制以避免 Autorun 病毒的再次感染
- Echo [3] 仅仅删除所有盘符下的 Autorun 病毒
- Echo [4] 删除并免疫指定盘符的 Autorun 病毒
- Echo [5] 取消免疫指定盘符
- Echo [6] 取消所有盘符的 Autorun 病毒免疫
- Echo [7] 恢复相关注册表项默认值
- Echo [8] 显示被隐藏的文件
- Echo [9] 不显示被隐藏的文件
- Echo [10] 恢复文件的显示隐藏设置功能
- Echo [11] 显示盘符下被隐藏的文件夹(如D盘)
- Echo [12] 映像劫持修复
- echo [13] 任务管理器修复
- echo [14] 恢复显示指定路径的文件
- Echo [0] 返回
- Echo.
- Set /p clearslt= 请输入您的选择(1/2/3/4/5/6/7/8/9/10/0):
- If "%clearslt%"=="" Goto clearauto
- If "%clearslt%"=="1" call :clearauto1
- If "%clearslt%"=="2" call :clearauto2
- If "%clearslt%"=="3" Goto clearauto3
- If "%clearslt%"=="6" Goto clearauto4
- If "%clearslt%"=="4" Goto clearauto5
- If "%clearslt%"=="5" Goto clearauto6
- If "%clearslt%"=="7" Goto clearauto7
- if "%clearslt%"=="8" goto xians
- if "%clearslt%"=="9" goto yinc
- if %clearslt%==10 goto hhsz
- if %clearslt%==11 call :xsycdp
- If %clearslt%==12 call :yxjcxf
- If %clearslt%==13 call :rwglq
- If %clearslt%==14 call :hfxslj
- If "%clearslt%"=="0" cls&goto start
- goto clearauto
- :clearauto1
- cls
- echo.
- echo.
- echo ★ 一键免疫,预防病毒自动传播。
- echo.
- echo ★ 清除Autorun.inf和_desktop.ini病毒并免疫,禁用自动播放。
- echo.
- echo ★ 假如弹出对话框提示“WINDOWS-没有软盘”,请点取消即可。
- echo.
- echo.
- taskkill /F /IM SocksA.exe /IM SVOHOST.exe /IM AdobeR.exe /IM ravmone.exe /IM wincfgs.exe /IM doc.exe /IM rose.exe /IM sxs.exe /IM autorun.exe /IM KB20060111.exe /IM tel.xls.exe>nul 2>nul
- For %%a In (C D E F G H I J K L M N O P Q R S T U V W X Y Z) Do (
- fsutil fsinfo drivetype %%a: |find /i "固定驱动器" && (
- For /f "tokens=2 delims==" %%b In (%%a:\autorun.inf) Do Del /a /f /q "%%a:\%%b" & md "%%a:\%%b\免疫目录不要删除!...\" & attrib +s +h +r "%%a:\%%b" & Echo Y|cacls "%%a:\%%b" /T /C /P everyone:N >nul 2>nul
- Del /a /f /q %%a:\autorun.inf & md "%%a:\autorun.inf\免疫目录不要删除!...\" & attrib +s +h +r %%a:\autorun.inf & Echo Y|cacls "%%a:\autorun.inf" /T /C /P everyone:N >nul 2>nul
- ) >nul 2>nul
- fsutil fsinfo drivetype %%a: |find /i "可移动驱动器" && (
- For /f "tokens=2 delims==" %%b In (%%a:\autorun.inf) Do Del /a /f /q "%%a:\%%b" & md "%%a:\%%b\免疫目录不要删除!...\" & attrib +s +h +r "%%a:\%%b" & Echo Y|cacls "%%a:\%%b" /T /C /P everyone:N >nul 2>nul
- Del /a /f /q %%a:\autorun.inf & md "%%a:\autorun.inf\免疫目录不要删除!...\" & attrib +s +h +r %%a:\autorun.inf & Echo Y|cacls "%%a:\autorun.inf" /T /C /P everyone:N >nul 2>nul
- ) >nul 2>nul
- )
- :desk
- echo ★ 全盘删除所有文件夹下的_desktop.ini
- @echo off
- setlocal enabledelayedexpansion
- for /f "delims=\" %%i in ('fsutil fsinfo drives^|find /v ""') do (
- set var=%%i
- set drive=!var:~-2!
- fsutil fsinfo drivetype !drive!|find "固定">nul && del /a /f /s !drive!\_desktop.ini
- )
- echo.
- :clearauto2
- cls
- echo.
- Echo.
- echo ★ 禁用自动播放,正在停止相关服务……
- echo.
- echo.
- reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer" /v NoDriveTypeAutoRun /t REG_DWORD /d 0x000000ff /f >nul 2>nul
- reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer" /v NoDriveTypeAutoRun /t REG_DWORD /d 0x000000ff /f >nul 2>nul
- net stop ShellHWDetection >nul 2>nul
- sc config ShellHWDetection start= disabled >nul 2>nul
- Rem 添加防止从回收站或仿回收站的目录中直接运行可执行文件的策略
- Set REGPATH=HKLM\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths
- Set SFLAG=/v SaferFlags /t REG_DWORD /d 0x00000000 /f
- Set IDATA=/f /v ItemData /d "?:\Recyc?
- reg add %REGPATH%\{00ffa5bf-abe7-4901-aacf-4f58aa31217a} %SFLAG%>nul
- reg add %REGPATH%\{00ffa5bf-abe7-4901-aacf-4f58aa31217a} %IDATA%\*\*\*\*.*">nul
- reg add %REGPATH%\{41fe7eed-c47a-46f6-840a-240796fd03cf} %SFLAG%>nul
- reg add %REGPATH%\{41fe7eed-c47a-46f6-840a-240796fd03cf} %IDATA%\*\*\*.*">nul
- reg add %REGPATH%\{4e93c91c-a40e-462e-9b89-3b0832d222d9} %SFLAG%>nul
- reg add %REGPATH%\{4e93c91c-a40e-462e-9b89-3b0832d222d9} %IDATA%\*.*">nul
- reg add %REGPATH%\{5bfc100b-d3fb-450e-88ec-6819ab56a9ff} %SFLAG%>nul
- reg add %REGPATH%\{5bfc100b-d3fb-450e-88ec-6819ab56a9ff} %IDATA%\*\*\*\*.*">nul
- reg add %REGPATH%\{5c5e2bcd-7057-43f4-830c-e4361d2afadd} %SFLAG%>nul
- reg add %REGPATH%\{5c5e2bcd-7057-43f4-830c-e4361d2afadd} %IDATA%\*.*">nul
- reg add %REGPATH%\{5f8ff865-0638-4c6e-98de-923e7bc6b330} %SFLAG%>nul
- reg add %REGPATH%\{5f8ff865-0638-4c6e-98de-923e7bc6b330} %IDATA%\*\*\*.*">nul
- reg add %REGPATH%\{649c1429-0e79-453c-abe9-b5682e035ae7} %SFLAG%>nul
- reg add %REGPATH%\{649c1429-0e79-453c-abe9-b5682e035ae7} %IDATA%\*\*.*">nul
- reg add %REGPATH%\{718f54b2-c669-4d7b-aeff-18d69f100034} %SFLAG%>nul
- reg add %REGPATH%\{718f54b2-c669-4d7b-aeff-18d69f100034} %IDATA%\*\*.*">nul
- reg add %REGPATH%\{8385d9d2-80c9-4ac1-a100-ed3e62863d97} %SFLAG%>nul
- reg add %REGPATH%\{8385d9d2-80c9-4ac1-a100-ed3e62863d97} %IDATA%\*.*">nul
- reg add %REGPATH%\{af2a4fcf-441c-421e-9663-52cd3502cfd7} %SFLAG%>nul
- reg add %REGPATH%\{af2a4fcf-441c-421e-9663-52cd3502cfd7} %IDATA%\*\*\*.*">nul
- reg add %REGPATH%\{b997f4b2-c037-4e97-b051-31f5d86df802} %SFLAG%>nul
- reg add %REGPATH%\{b997f4b2-c037-4e97-b051-31f5d86df802} %IDATA%\*\*.*">nul
- reg add %REGPATH%\{d4e7b6ff-d76f-407f-b8bb-ea0835f5babc} %SFLAG%>nul
- reg add %REGPATH%\{d4e7b6ff-d76f-407f-b8bb-ea0835f5babc} /f /v ItemData /d "RECYC*.*">nul
- Rem 清除喜欢利用回收站的移动磁盘自动运行病毒
- For %%a In (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) Do (
- For %%b In (exe pif com) Do (
- Echo Y|cacls "%%a:\Recycler\*.%%b" /C /T /P everyone:F>nul 2>nul&Echo Y|cacls "%%a:\Recycled\*.%%b" /C /T /P everyone:F>nul 2>nul&Echo Y|cacls "%%a:\Recycled\Recycled\*.%%b" /C /T /P everyone:F>nul 2>nul
- Del /A /F /S /Q "%%a:\Recycler\*.%%b">nul 2>nul&Del /A /F /S /Q "%%a:\Recycled\*.%%b">nul 2>nul&Del /A /F /S /Q "%%a:\Recycled\Recycled\*.%%b">nul 2>nul
- )
- )>nul 2>nul
- cls
- Echo.
- echo.
- echo ★ 相关服务已停止并禁用,任意键返回……
- echo.
- echo.
- goto :eof
- :clearauto3
- taskkill /F /IM SocksA.exe /IM SVOHOST.exe /IM AdobeR.exe /IM ravmone.exe /IM wincfgs.exe /IM doc.exe /IM rose.exe /IM sxs.exe /IM autorun.exe /IM KB20060111.exe /IM tel.xls.exe>nul 2>nul
- For %%a In (C D E F G H I J K L M N O P Q R S T U V W X Y Z) Do (
- fsutil fsinfo drivetype %%a: |find /i "固定驱动器" && (
- For /f "tokens=2 delims==" %%b In (%%a:\autorun.inf) Do Del /a /f /q "%%a:\%%b" >nul 2>nul
- Del /a /f /q %%a:\autorun.inf >nul 2>nul
- ) >nul 2>nul
- fsutil fsinfo drivetype %%a: |find /i "可移动驱动器" && (
- For /f "tokens=2 delims==" %%b In (%%a:\autorun.inf) Do Del /a /f /q "%%a:\%%b" >nul 2>nul
- Del /a /f /q %%a:\autorun.inf >nul 2>nul
- ) >nul 2>nul
- )
- cls
- Echo Autorun 病毒清除完毕,任意键返回……
- pause>nul
- Goto clearauto
- :clearauto4
- For %%a In (C D E F G H I J K L M N O P Q R S T U V W X Y Z) Do (
- fsutil fsinfo drivetype %%a: |find /i "固定驱动器" && (
- cacls "%%a:\autorun.inf" /T /C /P everyone:F&Del /a /f /q "%%a:\autorun.inf" & rd /s /q "%%a:\autorun.inf">nul 2>nul
- )>nul 2>nul
- fsutil fsinfo drivetype %%a: |find /i "可移动驱动器" && (
- cacls "%%a:\autorun.inf" /T /C /P everyone:F&Del /a /f /q "%%a:\autorun.inf" & rd /s /q "%%a:\autorun.inf">nul 2>nul
- )>nul 2>nul
- )
- cls
- Echo.
- Echo 已经解除全部盘符的免疫,任意键返回……
- pause>nul
- Goto clearauto
- :clearauto5
- cls
- Echo.
- Set /p pf= 请输入盘符,如"F:"(不包括引号)
- Echo 即将免疫%pf%盘……|find /i ":"||Set pf=%pf%:&&Echo 即将免疫%pf%盘……
- taskkill /F /IM SocksA.exe /IM SVOHOST.exe /IM AdobeR.exe /IM ravmone.exe /IM wincfgs.exe /IM doc.exe /IM rose.exe /IM sxs.exe /IM autorun.exe /IM KB20060111.exe /IM tel.xls.exe>nul 2>nul
- fsutil fsinfo drivetype %pf% |find /i "固定驱动器" && (
- For /f "tokens=2 delims==" %%a In (%pf%\autorun.inf) Do Del /a /f /q "%pf%\%%a" & md "%pf%\%%a\免疫目录不要删除!...\" & attrib +s +h +r "%pf%\%%a" & Echo Y|cacls "%pf%\%%a" /T /C /P everyone:N >nul 2>nul
- Del /a /f /q %pf%\autorun.inf & md "%pf%\autorun.inf\免疫目录不要删除!...\" & attrib +s +h +r %pf%\autorun.inf & Echo Y|cacls "%pf%\autorun.inf" /T /C /P everyone:N >nul 2>nul
- Goto DoneclearAuto
- ) >nul 2>nul
- fsutil fsinfo drivetype %pf% |find /i "可移动驱动器" && (
- For /f "tokens=2 delims==" %%a In (%pf%\autorun.inf) Do Del /a /f /q "%pf%\%%a" & md "%pf%\%%a\免疫目录不要删除!...\" & attrib +s +h +r "%pf%\%%a" & Echo Y|cacls "%pf%\%%a" /T /C /P everyone:N >nul 2>nul
- Del /a /f /q %pf%\autorun.inf & md "%pf%\autorun.inf\免疫目录不要删除!...\" & attrib +s +h +r %pf%\autorun.inf & Echo Y|cacls "%pf%\autorun.inf" /T /C /P everyone:N >nul 2>nul
- Goto DoneclearAuto
- ) >nul 2>nul
- Echo.
- Echo 您所输入的盘符不存在或者是只读设备,
- Echo 请重新输入
- Goto clearauto5
- :DoneclearAuto
- cls
- Echo.
- Echo 指定的磁盘 %pf% 已经成功进行了 Autorun 病毒的清除及免疫
- Echo.
- Echo [1] 继续免疫其他磁盘
- Echo [0] 返回主菜单
- Set /p choice= 请输入您的选择(1/0):
- If %choice%="" Goto DoneclearAuto
- If %choice%="1" Goto clearauto5
- If %choice%="0" Goto clearauto
- :clearauto6
- cls
- Echo.
- Set /p pf= 请输入盘符,如"F:"(不包括引号)
- Echo 即将取消免疫%pf%盘……|find /i ":"||Set pf=%pf%:&&Echo 即将取消免疫%pf%盘……
- fsutil fsinfo drivetype %pf% |find /i "固定驱动器" && (
- cacls "%pf%\autorun.inf" /T /C /P everyone:F&Del /a /f /q "%pf%\autorun.inf" & rd /s /q "%pf%\autorun.inf">nul 2>nul
- Goto DoneUnauto
- )>nul 2>nul
- fsutil fsinfo drivetype %pf% |find /i "可移动驱动器" && (
- cacls "%pf%\autorun.inf" /T /C /P everyone:F&Del /a /f /q "%pf%\autorun.inf" & rd /s /q "%pf%\autorun.inf">nul 2>nul
- Goto DoneUnauto
- )>nul 2>nul
- Echo.
- Echo 您所输入的盘符不存在或者是只读设备,
- Echo 请重新输入
- Goto clearauto6
- :DoneUnauto
- cls
- Echo.
- Echo 指定的磁盘 %pf% 已经成功解除了 Autorun 病毒免疫
- Echo.
- Echo [1] 继续解除免疫其他磁盘
- Echo [0] 返回主菜单
- Set choice=
- Set /p choice= 请输入您的选择(1/0):
- If %choice%="" Goto DoneUnauto
- If %choice%="1" Goto clearauto6
- If %choice%="0" Goto clearauto
- :clearauto7
- cls
- Rem 防止在资源管理器中彻底隐藏文件、禁止文件等
- reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t REG_DWORD /d 0x00000001 /f>nul 2>nul
- reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2" /f>nul 2>nul
- reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun" /f>nul 2>nul
- reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v DisallowRun /f>nul 2>nul
- Rem 防止转移启动组位置
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Startup /d "%USERPROFILE%\「开始」菜单\程序\启动" /f>nul 2>nul
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Common Startup" /d "%ALLUSERSPROFILE%\「开始」菜单\程序\启动" /f>nul 2>nul
- Echo.
- Echo 相关注册表恢复完毕,任意键返回……
- pause>nul
- Goto clearauto
- :xians
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t reg_dword /d 1 /f
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 0 /f
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t reg_dword /d 1 /f
- cls&echo.
- Echo 操作完毕,任意键返回……
- pause>nul
- Goto clearauto
- :yinc
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t reg_dword /d 00000000 /f
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 00000001 /f
- reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t reg_dword /d 00000000 /f
- cls&echo.
- Echo 操作完毕,任意键返回……
- pause>nul
- Goto clearauto
- :hhsz
- echo.
- echo 恢复注册表中不给设置显示隐藏文件的项目,请稍侯......
- echo.
- echo.
- ECHO Windows Registry Editor Version 5.00>SHOWALL.reg
- ECHO [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]>>SHOWALL.reg
- ECHO "CheckedValue"=->>SHOWALL.reg
- ECHO [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]>>SHOWALL.reg
- ECHO "CheckedValue"=dword:00000001>>SHOWALL.reg
- cls&echo.
- Echo 操作完毕,任意键返回……
- pause>nul
- Goto clearauto
- :hfxslj
- cls
- echo.
- echo 恢复显示指定路径下的文件
- echo.
- echo.
- set /p hfxsljj= 输入路径或拖入文件,退出【b】:
- echo.
- if %hfxsljj%==b Goto clearauto
- attrib -h -s -a -r /s /d "%hfxsljj%"
- attrib -h -s -a -r "%hfxsljj%"
- echo.
- pause
- Goto hfxslj
复制代码
[ 本帖最后由 cjiabing 于 2010-9-24 19:53 编辑 ] |