批处理如何恢复Mcafee重命名的可疑病毒文件扩展名-创新互联
这篇文章主要为大家展示了“批处理如何恢复Mcafee重命名的可疑病毒文件扩展名”,内容简而易懂,条理清晰,希望能够帮助大家解决疑惑,下面让小编带领大家一起研究并学习一下“批处理如何恢复Mcafee重命名的可疑病毒文件扩展名”这篇文章吧。
成都创新互联,为您提供网站建设公司、成都网站制作、网站营销推广、网站开发设计,对服务成都纯水机等多个行业拥有丰富的网站建设及推广经验。成都创新互联网站建设公司成立于2013年,提供专业网站制作报价服务,我们深知市场的竞争激烈,认真对待每位客户,为客户提供赏心悦目的作品。 与客户共同发展进步,是我们永远的责任!Mcafee识别到可疑病毒文件,但病毒库里没有病毒定义,就会把文件扩展名命名为vir或vxe,固建立此批处理文件,用已恢复被修改掉的exe文件
MCAFEE更名原则:
Original Renamed | Description |
Not V?? V?? | File extensions that do not start with v are renamed with v as |
the initial letter of the file extension. For example, | |
MYFILE.DOC becomes MYFILE.VOC. | |
V?? VIR | File extensions that start with v are renamed as .VIR. For |
example, MYFILE.VBs becomes MYFILE.VIR. | |
VIR, V01-V99 | These files are recognized as already infected, and are not renamed again. |
Files with no extensions are given the extension, .VIR. |
@echo off echo On Error Resume Next >%temp%\filesystem.vbs echo Const wbemFlagReturnImmediately = ^&h20 >>%temp%\filesystem.vbs echo Const wbemFlagForwardOnly = ^&h30 >>%temp%\filesystem.vbs echo For Each strComputer In arrComputers >>%temp%\filesystem.vbs echo Set objWMIService = GetObject("winmgmts:\\.\root\CIMV2") >>%temp%\filesystem.vbs >>%temp%\filesystem.vbs echo Set colItems = objWMIService.ExecQuery("SELECT * FROM Win32_LogicalDisk", "WQL", _ >>%temp%\filesystem.vbs echo wbemFlagReturnImmediately + wbemFlagForwardOnly) >>%temp%\filesystem.vbs echo For Each objItem In colItems >>%temp%\filesystem.vbs echo if objItem.DriverType=3 Then WScript.Echo objItem.Caption ^& "\" End if >>%temp%\filesystem.vbs echo Next >>%temp%\filesystem.vbs echo Next >>%temp%\filesystem.vbs for /f %%i in ('cscript //nologo %temp%\filesystem.vbs') do call :change %%i goto end :change cd /d %1 for /f "delims=|" %%i in ('dir *.vxe /b /s /a') do (cacls "%%i" /e /g everyone:f & ren "%%i" *.exe) :end del %temp%\filesystem.vbs
以上是“批处理如何恢复Mcafee重命名的可疑病毒文件扩展名”这篇文章的所有内容,感谢各位的阅读!相信大家都有了一定的了解,希望分享的内容对大家有所帮助,如果还想学习更多知识,欢迎关注创新互联行业资讯频道!
新闻名称:批处理如何恢复Mcafee重命名的可疑病毒文件扩展名-创新互联
转载源于:http://cdiso.cn/article/eesjo.html