• 禁止1200多种已知病毒的进程,做母盘必备!(

对现在有许多病毒连杀毒软件都束手无策,看到大家都在为病毒烦恼,所以我放出这个注册表,禁止病毒的进程运行.包括现在最火的logo_.exe

LSASS.EXE等许多病毒.大家如果发现新病毒进程,可以自己修改这个注册表对这个病毒进行免疫.

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USERControl PanelDesktop]
"AutoEndTasks"="1"
"HungAppTimeout"="200"
"WaitToKillAppTimeout"="200"
"WaitTOKillService"="200"
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControl]
"WaitToKillServiceTimeout"="200"
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementPrefetchParameters]
"EnablePrefetcher"=dword:00000001
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon]
"SFCDisable"=dword:00000001
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerAlwaysUnloadDLL]
@="0"
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceslanmanserverparameters]
"AutoShareServer"=dword:00000000
"AutoSharewks"=dword:00000000
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlWindows]
"NoPopUpsOnBoot"=dword:00000001
[HKEY_CLASSES_ROOTlnkfile]
@="快捷方式"
"EditFlags"=dword:00000001
"NeverShowExt"=""
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerRemoteComputerNameSpace]

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerRemoteComputerNameSpace{2227A280-3AEA-1069-A2DE-
08002B30309D}]
@="Printers"
[HKEY_USERS.DEFAULTSoftwareMicrosoftWindowsCurrentVersionExplorer]
"Link"=hex:00,00,00,00
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementPrefetchParameters]
"EnablePrefetcher"=dword:00000003
[HKEY_USERS.DEFAULTControl PanelDesktop]
"FontSmoothing"="2"
"FontSmoothingType"=dword:00000002
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings]
"MaxConnectionsPer1_0Server"=dword:00000008
"MaxConnectionsPerServer"=dword:00000008
[HKEY_LOCAL_MACHINESYSTEMControlSet001Control]
"WaitToKillServiceTimeout"="1000"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsShareaza.exe]
"Debugger"="c:\中国超级BT.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options4047.exe]
"Debugger"="c:\中国超级BT捆绑的病毒.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsTuoTu.exe]
"Debugger"="c:\P2P类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsqqfo1.0_dl.exe]
"Debugger"="c:\P2P类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsSuperLANadmin.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWinPcap30.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWinPcap.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsRobocop.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdiaoxian.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options etwork.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options冰点还原终结者.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options3389.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options3389.rar]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionssc.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsmstsc.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options3389dl.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options3389dl.rar]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options黑社会.exe]
"Debugger"="c:\破坏类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsPoco2004.exe]
"Debugger"="c:\下载类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsVagaa.exe]
"Debugger"="c:\下载类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsKamun.exe]
"Debugger"="c:\下载类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options黑社会.exe]
"Debugger"="c:\下载类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options还原精灵密码察看器.exe]
"Debugger"="bcvb"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsyuyuyu.exe]
"Debugger"="c:\下载类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsKuGoo.exe]
"Debugger"="c:\下载类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscmcc.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsczp.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options3721.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsPodcastBarMiniStarter.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscdnns.dll]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscdnns.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionssetupcnnic.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsieup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsSurfingPlus.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsok.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options123.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsieup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsIESearch.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWinSC32.dll]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsComService.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsskin.dll]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionszPlatform.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionszcomUpdate.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionshbhelper.dll]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWeather_24.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWeather.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsinkv3.dll]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsSDE.EXE]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsoba_super_setup-1.1.0.15.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsPodcastBarMini.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsPodcastBarMiniStarter.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionssogou_yahoo.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsSkypeClient.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution
Optionssetup_aHR0cDovL3d3dy5xeXVsZS5jb20v.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsQyule.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionslianmeng_sitesowang.EXE]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsiShare.Ver0.40.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsishare_user.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsassist4.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsbseesetup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsCrack.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsind_8286.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsRedVIP.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsVIP.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsiShare.Ver0.40.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsishare_user.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsassist4.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsbseesetup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsp2psvr.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsQQSSV20.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsQQSSV1.8.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsSixthSense.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options etrobocop_setup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsNetRobocop.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-8CIEP.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWinPca.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWinPca_3.1.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsP2P网络管理员.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsARPOver.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscnnetcut.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsINSEC.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options etcut.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsmsiexec.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsDrvIst.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsMSIF1.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsNetMon.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsLanecatTrial.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsLEC_Client.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBTBaby.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution
OptionsWebThunder1.0.4.28deluxbeta.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWebThunder.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsThunder5.1.6.198.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsThunderMini2.0.0.29.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-TEQG7.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsTingTing1.1.0.8Beta.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-C6R99.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-00KC0.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBitComet_0.68_setup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBitComet.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBitComet0.62.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options100baoSetup120.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsGLBD.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsDDD4_DXT168.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsppstreamsetup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsPPStream.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsTV100.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-S5LOA.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-S5L0A.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options eng.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsTENG.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-RP216.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options ongtv.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionshjsetup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsHJSETUP.EXE]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsmsiexec.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options ep.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdudupros.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsDuDuAcc.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsDmad-install.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsD-mad.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options04-PPGou-Dmad.EXE]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsPPGou.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionskugoo.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsKuGoo.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsTDUpdate.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsPodcastBarMini.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsMyShares.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsvfp02.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsis-5SKT1.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsgoomain.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionssetup_L0029.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options s40.tmp]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options1032.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsyAssistSe.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsddos.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBitTorrent.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdrwtsn32.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsWin98局域网攻击工具.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsNetThief.exe]
"Debugger"="c:\网络神偷.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsRemoteComputer.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsQQTailer.exe]
"Debugger"="c:\制造出来的QQ病毒.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options傀儡僵尸DDOS攻击集合.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsAlchem.exe]
"Debugger"="c:\以下是存在风险病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsactalert.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsadaware.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsalevir.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsaqadcup.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsarchive.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsarr.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsARUpdate.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsasm.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsav.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsavserve.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsavserve2.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsackWeb.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsargains.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsasfipm.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionselt.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBiprep.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionslss.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsokja.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsootconf.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionspc.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsrasil.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBRIDGE.DLL]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBuddy.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsBUGSFIX.EXE]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsundle.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsvt.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscashback.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionscdaEngine.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscmd32.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscmesys.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsconime.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsconscorr.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscrss.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionscxtpls.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdatemanager.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdcomx.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsDesktop.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdirects.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdivx.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdllreg.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdmserver.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdpi.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdssagent.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdvdkeyauth.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsemsw.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsexdl.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsexec.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsEXP.EXE]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsexplore.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsexplored.exe]
"Debugger"="c:\病毒类.exe"

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsFash.exe]
"Debugger"="c:\病毒类.exe"

以上请自己复制到记事本,保存为.reg的文件,运行导入即可!

注意:本文件里有对讯雷软件的禁止,还有QQ音速,请大家把它找出来去掉,以避免这个不能运行。其他的你们可以自己加,直接修改最后一
个参数即可。

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/10294527/viewspace-123556/,如需转载,请注明出处,否则将追究法律责任。

转载于:http://blog.itpub.net/10294527/viewspace-123556/

禁止1200多种已知病毒的进程,做母盘必备!(转)相关推荐

  1. 禁止1200多种已知病毒的进程,做母盘必备!WINXP版

    禁止1200多种已知病毒的进程,做母盘必备!WINXP版 以前有个哥们发个WIN2000用的注册表,现在我发个XP用的,这样XP的用户也可以用了 Windows Registry Editor Ver ...

  2. fsck 修复文件系统_微软推出Win10 20H2 Build 19042.608测试版 修复多种已知错误

    虽然本周微软才推出Windows 10 20H2 RTM版 , 但这并不影响微软继续发布新的测试版用于修复各类已知问题.这个新测试版实际上是以可选更新形式提供的 , 只是当前仅面向Beta测试通道的用 ...

  3. 为什么微软账号被暂时停用_微软向Win10 20H2推出测试版更新KB4586853修复多种已知问题...

    微软目前已经开始向位于测试通道和发布预览通道的测试版用户们推送 Windows 10 20H2 Build 19042.662版.该版本实际是通过测试版累积更新的形式更新的,此更新包含多种修复程序解决 ...

  4. java实现米和厘米比较好_java如何根据实际经、纬度和已知经、纬度做对比,计算出具体偏差米数。(以米为单位)...

    首先我们要知道一个球面距离公式 R*arccos(cos(lat1*pi()/180 )*cos(lat2*pi()/180)*cos(lng1*pi()/180 -lng2*pi()/180)+ s ...

  5. matlab用已知二维数组做plot_Matlab二维数组及其应用

    MATLAB 画图入门篇 -- 各种基本图形绘制的函数与实例[来自网络] 一. 二维图形 (Two dimensional plotting) 1. 基本绘图函数 (Basic plotting fu ...

  6. matlab用已知二维数组做plot_matlab数组及画图操作大全.ppt

    matlab数组及画图操作大全 第11周 Matlab 一.二维数组 二.二维数组与绘图 1.二维数组的输入方法 10.与二维数组相关的函数 练习 二.二维数组与绘图 例:利用二维数组在同一坐标轴中同 ...

  7. 超 8 成软件存已知高危开源漏洞,奇安信发布《2021 中国软件供应链安全分析报告》

    编辑 | 宋 慧 出品 | CSDN云计算 头图 | 付费下载于东方IC 2020年底,SolarWinds 遭受的大规模网络攻击,使得美国和多国政府在内的 18000+ 机构被影响.几乎每个月,软件 ...

  8. matlab画曲面二次,如何用matlab绘制二次B样条三维曲面(已知控制点和节点矢量)?...

    该楼层疑似违规已被系统折叠 隐藏此楼查看此楼 小弟初来乍到,现在需要用matlaB绘制二次B样条曲面,现在已知信息: 小弟做这个已经一个星期了,现在无任何进展,现在是万分着急,希望高手们给小弟指点一二 ...

  9. matlab b样条曲面,如何用matlab绘制二次B样条三维曲面(已知控制点和节点矢量)?...

    该楼层疑似违规已被系统折叠 隐藏此楼查看此楼 小弟初来乍到,现在需要用matlaB绘制二次B样条曲面,现在已知信息: 小弟做这个已经一个星期了,现在无任何进展,现在是万分着急,希望高手们给小弟指点一二 ...

最新文章

  1. Android初始化过程
  2. 云未来、新可能 - 绿色、无处不在、可信的计算
  3. MapServer应用开发平台示例
  4. 前端学习(2631):git安装
  5. chkconfig: command not found
  6. 软件工程的 第二天贪吃蛇
  7. CUDA Fortran for Scientists and Engineers第二版翻译
  8. 自动驾驶_高精地图与车辆协同
  9. GB2312、GBK、UTF-8 如何转换
  10. 数据分析第二章课后习题解答
  11. python爬取谷歌学术_对于python抓取google搜索结果的一些了解
  12. 分享几个免费IP地址查询接口(API)
  13. TP5序列化和反序列化报错!缓存溢出
  14. vue 配置 微信SDK wifi功能
  15. docker容器访问宿主机的mysql
  16. iPhone手机使用:苹果新款手机(iPhone X、iPhone XS Max、iPhone XR等)关机、截屏等快捷键
  17. 【风马一族_php】常用的语句
  18. 坐标反算计算起始方位角_谁会坐标正算反算的公式,怎么计算两个坐标的方位角...
  19. MongoDB——分页排序聚合操作
  20. 上网行为管理功能概述及实现

热门文章

  1. catia V5 2020打开Feature Name:AF_CAT_AFPLUS_TWrong host license(-4)
  2. 树莓派刻录及更换软件源
  3. TensorFlow实战——验证码识别
  4. 微型计算机接口技术4732,自考微型计算机及接口技术课程考试说明
  5. 按精益生产方式进行现场管理(zt)
  6. 浅析游戏音效中的行为动作音效
  7. python设计模式名片_Python 设计模式 简单工厂(设计模式之禅)
  8. java计算机毕业设计交通非现场执法系统源码+mysql数据库+系统+lw文档+部署
  9. 餐讯:“中国特许经营大会”揭秘100+餐饮连锁企业后厨管理武器
  10. Android 10 + 适用于国内各大手机厂商的开放匿名设备标识(OAID),若不支持OAID则随机生成一个全局唯一标识(GUID)