当前位置:网站首页>Using CMD to repair and recover virus infected files
Using CMD to repair and recover virus infected files
2022-07-01 13:59:00 【Meteorite cloud】
Go to the print shop and copy a document , Unexpectedly, I was infected with a virus ...
Use CMD Repair and recover virus infected files
1. Open as administrator cmd
2. see F disc
I am here F disc , take F Replace with delete / The drive letter of the device that lost the file
chkdsk F: /f
result :
The type of file system is FAT32.
The volume serial number is 1E52-D1E3
Windows Verifying files and folders ...
Finished verifying files and folders .
Windows The file system has been scanned and no problems have been found .
No further action is required .
All in all 31,440,848 KB disk space .
26 Hidden files contain 17,424 KB.
243 There are... In folders 3,952 KB.
1,969 There are 6,488,480 KB.
24,930,976 KB You can use .
There are... In each distribution unit 16,384 byte .
There are... On the disk 1,965,053 Distribution units .
There is... On the disk 1,558,186 Available distribution units .
3. File repair
take F: Replace with the drive letter of the infected pen drive
attrib -h -r -s /s /d F:/*.*
Refer to the website :
https://www.yodot.com/blog/zh/zh-recover-files-pen-drive-using-cmd
https://huifu.wondershare.cn/upanzhongduhuifu.html
边栏推荐
- After being laid off for three months, the interview ran into a wall everywhere, and the mentality has begun to collapse
- 【IoT毕设.下】STM32+机智云AIoT+实验室安全监控系统
- What "hard core innovations" does Intel have in the first half of 2022? Just look at this picture!
- QT学习管理系统
- 自定义注解实现验证信息的功能
- Several models of IO blocking, non blocking, IO multiplexing, signal driven and asynchronous IO
- SWT/ANR问题--如何捕获性能的trace
- 进入前六!博云在中国云管理软件市场销量排行持续上升
- Simplex, half duplex, full duplex, TDD and FDD
- 学会使用LiveData和ViewModel,我相信会让你在写业务时变得轻松
猜你喜欢
刘对(火线安全)-多云环境的风险发现
Admire, Ali female program undercover more than 500 black production groups
Etcd 概要 机制 和使用场景
逻辑是个好东西
一文读懂TDengine的窗口查询功能
玩转MongoDB—搭建MongoDB集群
Fiori 应用通过 Adaptation Project 的增强方式分享
How can we protect our passwords?
Scheme of printing statistical information in log
So programmers make so much money doing private work? It's really delicious
随机推荐
佩服,阿里女程序卧底 500 多个黑产群……
Distributed dynamic (collaborative) rendering / function runtime based on computing power driven, data and function collaboration
Solution to 0xc000007b error when running the game [easy to understand]
玩转gRPC—不同编程语言间通信
TexStudio使用教程
刘对(火线安全)-多云环境的风险发现
C language course design topic
Fiori applications are shared through the enhancement of adaptation project
陈宇(Aqua)-安全->云安全->多云安全
Chen Yu (Aqua) - Safety - & gt; Cloud Security - & gt; Multicloud security
The integration of computing and Internet enables the transformation of the industry, and the mobile cloud lights up a new roadmap for the future of digital intelligence
QT learning management system
A new book by teacher Zhang Yujin of Tsinghua University: 2D vision system and image technology (five copies will be sent at the end of the article)
MySQL日志
Error:Kotlin: Module was compiled with an incompatible version of Kotlin. The binary version of its
Explain IO multiplexing, select, poll, epoll in detail
研发效能度量框架解读
Benefiting from the Internet, the scientific and technological performance of overseas exchange volume has returned to high growth
04 redis source code data structure dictionary
【剑指Offer】54. 二叉搜索树的第k大节点