|  | 
 
| qasa 高级用户
 
     
 
 
 积分 959
 发帖 311
 注册 2006-4-11
 来自 广东-LianJiang
 状态 离线
 | 
|  『楼 主』:
 [原创]处理常见病毒并自动免疫打补丁批处理改进版
 
使用 LLM 解释/回答一下 
 
 
我就原来的程序上改进了一下,加入了生成“拒绝访问”的假病毒文件。 
代码如下,望高人指点一二,谢谢
 
禁用病毒.bat
 @set dbg=@echo %dbg% off&&setlocal EnableDelayedExpansion
 ::code by qasa copyright@qknet 1:00 2007-1-23
 mode con cols=45 lines=20&color c
 set no_=0
 set ko_=0
 reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun /f >nul 2>nul
 reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v "DisallowRun" /t REG_DWORD /d 1 /f >nul 2>nul
 echo 正在检查进程中是否有可疑文件运行......
 for /f "delims=" %%e in (disable.ini) do (
 tasklist|find /i "%%e"&&echo 发现可疑进程 %%e
 taskkill /f /im %%e>nul 2>>nul&&echo 已经结束可疑进程 %%e
 )
 echo.&echo 进程检查结束, 开始导入禁止运行表......
 for /f "delims=" %%i in (disable.ini) do (
 if %%i neq setup.exe (reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun /v !no_! /d %%i /f >nul)
 set /a no_+=1
 )
 echo.&echo 有 !no_! 个怀疑病毒文件被列入禁止运行表。
 echo.&echo 正在创建病毒免疫文件......
 for /f "delims=" %%p in (logo.txt) do (
 if exist %%p (
 cacls %%p /e /t /p everyone:F >nul 2>nul
 attrib -r -s -h -a %%p >nul 2>nul
 del /q %%p >nul 2>nul
 rd /q %%p>nul
 )
 md %%p&attrib +s +r +h +a %%p >nul 2>nul
 cacls %%p /e /t /d everyone >nul 2>nul
 )
 echo.&echo 正在安装系统安全补丁包......
 for %%1 in (*.exe) do (
 %%1 /quiet /passive /norestart /nobackup
 set /a ko_+=1
 )
 echo.&echo 共有 !ko_! 个补丁安装完毕。
 ping/n 5 127.1>nul
 exit/b
 
disable.ini
 Netrobocop.execnnetcut151.exe
 netcut.exe
 wnad.exe
 bind_40235.exe
 gamesetup.exe
 FuckJacks.exe
 spoclsv.exe
 qq2007.exe
 intren0t.exe
 devgt.exe
 iexpl0re.exe
 svohost.exe
 svhost32.exe
 setup.exe
 svchqst.exe
 llssrv.exe
 qdoxjq.exe
 iedw.exe
 res.exe
 SVCH0ST.exe
 0Sy.exe
 1.com
 1Sy.exe
 2Sy.exe
 3Sy.exe
 5Sy.exe
 6Sy.exe
 EXP10RER.com
 finders.com
 kill.exe
 Logo1_.exe
 rundl132.exe
 7Sy.exe
 8Sy.exe
 9Sy.exe
 exerouter.exe
 4Sy.exe
 ePower.exe
 nvsc.exe
 finder.com
 pagefile.com
 rose.exe
 sxs.exe
 sys1.exe
 DebugProgramme.exe
 iexplore.com
 Exeroud.exe
 a.exe
 Mbbmanager.exe
 Mdm.exe
 Aboutagirl.exe
 Microsoft.exe
 Absr.exe
 Aplica32.exe
 Mprdll.exe
 Avconsol.exe
 Msabel32.exe
 Avp.exe
 Msblast.exe
 Avp32.exe
 Mschv.exe
 Avpcc.exe
 Msgsrv36.exe
 Avpm.exe
 Msgsvc.exe
 Avserve.exe
 Msgsvr16.exe
 Bbeagle.exe
 Msie5.exe
 Brainspy.exe
 Msstart.exe
 Cfiadmin.exe
 Mstesk.exe
 Cfiaudit.exe
 Netip.exe
 Cfinet32.exe
 Netspy.exe
 Checkdll.exe
 Notpa.exe
 Cmctl32.exe
 Odbc.exe
 Pcfwallicon.exe
 Diagcfg.exe
 Pcx.exe
 Dkbdll.exe
 Pw32.exe
 Dllclient.exe
 Dvldr32.exe
 Regscan.exe
 Esafe.exe
 Expiorer.exe
 Thing.exe
 Feweb.exe
 Flcss.exe
 Vp32.exe
 Frw.exe
 Vpcc.exe
 Icload95.exe
 Vpm.exe
 Icloadnt.exe
 Vsecomr.exe
 Icmon.exe
 Icsupp95.exe
 Rpcsrv.exe
 Sockets.exe
 Rundll.exe
 Something.exe
 Spfw.exe
 Runouce.exe
 Scanrew.exe
 Sysedit32.exe
 Intel.exe
 Syshelp.exe
 Internet.exe
 Sysprot.exe
 Internet.exe
 Sysrunt.exe
 Kernel16.exe
 Kernel32.exe
 System32.exe
 Kiss.exe
 Krn132.exe
 Syswindow.exe
 Libupdate.exe
 Task_Bar.exe
 Load.exe
 Lockdown2000.exe
 Taskmon.exe
 Tds2-98.exe
 Tds2-Nt.exe
 Tempinetb00st.exe
 Tempserver.exe
 Vshwin32.exe
 Vsstart.exe
 Vw32.exe
 Windown.exe
 Windows.exe
 Winfunctions.exe
 Wingate.exe
 Winl0g0n.exe
 Winmgm32.exe
 Winmsg32.exe
 Winprot.exe
 Winprotecte.exe
 Winrpc.exe
 Winrpcsrv.exe
 Winserv.exe
 Wubsys.exe
 Winupdate.exe
 Winver.exe
 Wqk.exe
 Wscan.exe
 Xx.Tmp.exe
 Zcn32.exe
 Zonealarm.exe
 
logo.txt
 C:\WINDOWS\0Sy.exeC:\WINDOWS\1.com
 C:\WINDOWS\1Sy.exe
 C:\WINDOWS\2Sy.exe
 C:\WINDOWS\3Sy.exe
 C:\WINDOWS\5Sy.exe
 C:\WINDOWS\6Sy.exe
 C:\WINDOWS\EXP10RER.com
 C:\WINDOWS\finders.com
 C:\WINDOWS\kill.exe
 C:\WINDOWS\Logo1_.exe
 C:\WINDOWS\rundl132.exe
 C:\WINDOWS\Shell.sys
 C:\WINDOWS\smss.exe
 C:\WINDOWS\smss.exe
 C:\WINDOWS\sws.dll
 C:\WINDOWS\sws32.dll
 C:\WINDOWS\tool.exe
 C:\WINDOWS\tool2005.exe
 C:\WINDOWS\tool2006.exe
 C:\WINDOWS\tools.exe
 C:\WINDOWS\vDll.dll
 C:\WINDOWS\7Sy.exe
 C:\WINDOWS\8Sy.exe
 C:\WINDOWS\9Sy.exe
 C:\WINDOWS\exerouter.exe
 C:\WINDOWS\4Sy.exe
 C:\WINDOWS\system32\Logo1_.exe
 c:\windows\system32\ePower.exe
 c:\windows\system32\dllhost.dll
 c:\windows\system32\nvsc.exe
 c:\WINDOWS\finder.com
 D:\pagefile.com
 D:\autorun.inf
 D:\rose.exe
 D:\sxs.exe
 D:\xcopy.exe
 D:\setup.exe
 D:\go.exe
 D:\update.exe
 E:\pagefile.com
 E:\autorun.inf
 E:\rose.exe
 E:\sxs.exe
 E:\xcopy.exe
 E:\setup.exe
 E:\go.exe
 E:\update.exe
 C:\Progra~1\Intern~1\sys1.exe
 C:\WINDOWS\Debug\DebugProgramme.exe
 C:\Progra~1\Common~1\iexplore.com
 C:\WINDOWS\Exeroud.exe
 C:\Windows\system32\a.exe
 C:\WINDOWS\System32\Drivers\spoclsv.exe
 C:\WINDOWS\System32\Drivers\nvscv32.exe
 C:\WINDOWS\MY.exe
 C:\WINDOWS\iexpl0re.exe
 C:\WINDOWS\System32\spcolsv.exe
 C:\windows\winlogon.exe
 C:\Windows\intren0t.exe
 C:\Windows\system32\res.exe
 C:\Windows\system32\winsocks.dll
 C:\WINDOWS\system32\FuckJacks.exe
 C:\WINDOWS\system32\SVCH0ST.exe
 
删除免疫文件.bat
 @echo offecho.&echo 正在删除病毒免疫文件......
 for /f "delims=" %%p in (logo.txt) do (
 if exist %%p (
 cacls %%p /e /t /p everyone:F >nul 2>nul
 attrib -r -s -h -a %%p >nul 2>nul
 del /q %%p >nul 2>nul
 rd /q %%p>nul
 )
 )
 
 Last edited by qasa on 2007-1-25 at 04:24 PM ]
 
 
 | 此帖被 +13 点积分  点击查看详情 | 评分人:【 redtek 】 | 分数: +7 | 时间:2007-1-25 02:20 |  | 评分人:【 Nickey 】 | 分数: +2 | 时间:2008-1-17 20:36 |  | 评分人:【 429499381 】 | 分数: +4 | 时间:2008-1-18 19:58 | 
 | 
 
 
 
 
附件
1:  禁用病毒.part1.rar (2007-1-25 16:23, 185.55 KiB, 下载附件所需积分 1 点
,下载次数: 371) 附件
2:
  禁用病毒.part2.rar (2007-1-25 16:23, 185.55 KiB, 下载附件所需积分 1 点
,下载次数: 353) 附件
3:
  禁用病毒.part3.rar (2007-1-25 16:24, 185.55 KiB, 下载附件所需积分 1 点
,下载次数: 356) 
 
 |  
                  |  κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
 |  | 
|  2007-1-24 09:50 |  | 
|  | 
 
| qasa 高级用户
 
     
 
 
 积分 959
 发帖 311
 注册 2006-4-11
 来自 广东-LianJiang
 状态 离线
 | 
| 『第 2 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
好用之余别忘了加分支持,谢谢~~~~~~~~~~~~:D
 附件4:
 
 Last edited by qasa on 2007-1-25 at 04:24 PM ]
 
 
 
 
 
附件
1:  禁用病毒.part4.rar (2007-1-25 16:24, 105.92 KiB, 下载附件所需积分 1 点
,下载次数: 288) 
 
 |  
                  |  κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
 |  | 
|  2007-1-24 09:58 |  | 
|  | 
 
| qasa 高级用户
 
     
 
 
 积分 959
 发帖 311
 注册 2006-4-11
 来自 广东-LianJiang
 状态 离线
 | 
| 『第 3 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
经测试,对目前已经染毒的电脑有用,现在我在正一台已经中毒(中的是熊猫烧香),还没有杀毒的机子上发表这贴子的,哈哈。 
 
 
 
 
 |  
                  |  κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
 |  | 
|  2007-1-24 11:50 |  | 
|  | 
 
| kkkxtl 初级用户
 
   
 
 
 
 积分 24
 发帖 12
 注册 2006-8-14
 状态 离线
 | 
| 『第 4 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
进程文件: mdm or mdm.exe进程名称: Machine Debug Manager
 描  述: Debug除错管理用于调试应用程序和Microsoft Office中的Microsoft Script Editor脚本编辑器
 
 用程序名字做查找对象.不可取
 
 
 
 
 |  | 
|  2007-1-25 00:34 |  | 
|  | 
 
| tashaxin 初级用户
 
   
 
 
 
 积分 99
 发帖 30
 注册 2007-1-19
 状态 离线
 |  | 
|  2007-1-25 06:07 |  | 
|  | 
 
| lzmyst 新手上路
 
  
 
 
 
 积分 19
 发帖 10
 注册 2005-12-13
 状态 离线
 |  | 
|  2007-1-25 06:23 |  | 
|  | 
 
| qasa 高级用户
 
     
 
 
 积分 959
 发帖 311
 注册 2006-4-11
 来自 广东-LianJiang
 状态 离线
 | 
| 『第 7 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
呵呵,楼上的说得有道理,所以我修改了一下,请重新下载测试,谢谢 
 
 
 
 
 |  
                  |  κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
 |  | 
|  2007-1-25 16:26 |  | 
|  | 
 
| kkkxtl 初级用户
 
   
 
 
 
 积分 24
 发帖 12
 注册 2006-8-14
 状态 离线
 | 
| 『第 8 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
我到是有个建议..但是工作量会加大....在杀毒望站找流行病毒的资料.就能判断出病毒主程序,主程序一般不会和系统程序同名.以免起冲突暴露自己..但是主程序会释放病毒程序可能会和主程序同名或者感染住程序...所以封闭病毒主程序是第一点,另外我的脚本也是和你的一样..给你看看我的脚本...我那个也是不可取的.呵呵
 
 
 :D
 
 @echo ***********************************************************
 @echo *           软件矫正完毕,按任意键执行免疫程序!           *
 @echo ***********************************************************
 
 @echo Windows Registry Editor Version 5.00>Fix.reg
 
 @echo [HKEY_CURRENT_USER\Control Panel\Desktop]>>Fix.reg
 @echo "AutoEndTasks"="1">>Fix.reg
 @echo "HungAppTimeout"="200">>Fix.reg
 @echo "WaitToKillAppTimeout"="200">>Fix.reg
 @echo "WaitTOKillService"="200">>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]>>Fix.reg
 @echo "WaitToKillServiceTimeout"="200">>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters]>>Fix.reg
 @echo "EnablePrefetcher"=dword:00000001>>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]>>Fix.reg
 @echo "SFCDisable"=dword:00000001>>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AlwaysUnloadDLL]>>Fix.reg
 @echo @="0">>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters]>>Fix.reg
 @echo "AutoShareServer"=dword:00000000>>Fix.reg
 @echo "AutoSharewks"=dword:00000000>>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows]>>Fix.reg
 @echo "NoPopUpsOnBoot"=dword:00000001>>Fix.reg
 @echo [HKEY_CLASSES_ROOT\lnkfile]>>Fix.reg
 @echo @="快捷方式">>Fix.reg
 @echo "EditFlags"=dword:00000001>>Fix.reg
 @echo "NeverShowExt"="">>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace]>>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace\{2227A280-3AEA-1069-A2DE-08002B30309D}]>>Fix.reg
 @echo @="Printers">>Fix.reg
 @echo [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer]>>Fix.reg
 @echo "Link"=hex:00,00,00,00>>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters]>>Fix.reg
 @echo "EnablePrefetcher"=dword:00000003>>Fix.reg
 @echo [HKEY_USERS\.DEFAULT\Control Panel\Desktop]>>Fix.reg
 @echo "FontSmoothing"="2">>Fix.reg
 @echo "FontSmoothingType"=dword:00000002>>Fix.reg
 @echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]>>Fix.reg
 @echo "MaxConnectionsPer1_0Server"=dword:00000008>>Fix.reg
 @echo "MaxConnectionsPerServer"=dword:00000008>>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control]>>Fix.reg
 @echo "WaitToKillServiceTimeout"="1000">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Shareaza.exe]>>Fix.reg
 @echo "Debugger"="c:\\中国超级BT.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\4047.exe]>>Fix.reg
 @echo "Debugger"="c:\\中国超级BT捆绑的病毒.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TuoTu.exe]>>Fix.reg
 @echo "Debugger"="c:\\P2P类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qqfo1.0_dl.exe]>>Fix.reg
 @echo "Debugger"="c:\\P2P类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SuperLANadmin.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Robocop.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\diaoxian.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\network.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\冰点还原终结者.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389.rar]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sc.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mstsc.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389dl.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389dl.rar]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\黑社会.exe]>>Fix.reg
 @echo "Debugger"="c:\\破坏类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\还原精灵密码察看器.exe]>>Fix.reg
 @echo "Debugger"="bcvb">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmcc.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bczp.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3721.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PodcastBarMiniStarter.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cdnns.dll]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cdnns.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setupcnnic.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieup.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SurfingPlus.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ok.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\123.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieup.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IESearch.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSC32.dll]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZComService.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\skin.dll]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DrvIst.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSIF1.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NetMon.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LanecatTrial.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LEC_Client.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BTBaby.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WebThunder1.0.4.28deluxbeta.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WebThunder.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thunder5.1.6.198.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ThunderMini2.0.0.29.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-TEQG7.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TingTing1.1.0.8Beta.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-C6R99.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-00KC0.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitComet_0.68_setup.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitComet.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitComet0.62.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\100baoSetup120.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GLBD.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DDD4_DXT168.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppstreamsetup.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PPStream.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TV100.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-S5LOA.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-S5L0A.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\teng.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TENG.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-RP216.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rongtv.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hjsetup.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HJSETUP.EXE]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rep.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dudupros.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DuDuAcc.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Dmad-install.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\D-mad.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\004-PPGou-Dmad.EXE]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PPGou.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TDUpdate.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PodcastBarMini.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MyShares.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vfp02.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-5SKT1.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bgoomain.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup_L0029.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ns40.tmp]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1032.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\yAssistSe.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ddos.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitTorrent.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwtsn32.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Win98局域网攻击工具.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NetThief.exe]>>Fix.reg
 @echo "Debugger"="c:\\网络神偷.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RemoteComputer.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQTailer.exe]>>Fix.reg
 @echo "Debugger"="c:\\制造出来的QQ病毒.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\傀儡僵尸DDOS攻击集合.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Alchem.exe]>>Fix.reg
 @echo "Debugger"="c:\\以下是存在风险病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\actalert.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aqadcup.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\archive.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arr.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ARUpdate.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\asm.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avserve.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avserve2.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\backWeb.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bargains.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\basfipm.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\belt.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Biprep.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blss.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bokja.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bootconf.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bpc.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brasil.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BRIDGE.DLL]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Buddy.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BUGSFIX.EXE]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bundle.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bvt.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cashback.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cdaEngine.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd32.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmesys.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\conime.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\conscorr.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\crss.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cxtpls.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\datemanager.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dcomx.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Desktop.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\directs.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllreg.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dmserver.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpi.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dssagent.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvdkeyauth.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\emsw.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exdl.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exec.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EXP.EXE]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explore.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explored.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Fash.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logo_1.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logo_2.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\worm.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\worm.htm]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1_.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\2_.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3_.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pif.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 
 @echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FuckJacks.exe]>>Fix.reg
 @echo "Debugger"="c:\\病毒类.exe">>Fix.reg
 @echo.
 
 @pause
 start /w regedit /s Fix.reg
 del Fix.reg
 
 
 
 
 |  | 
|  2007-1-25 23:16 |  | 
|  | 
 
| kkkxtl 初级用户
 
   
 
 
 
 积分 24
 发帖 12
 注册 2006-8-14
 状态 离线
 | 
| 『第 9 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
当然.我那个是给网吧做母盘用到的东西...网吧要求高的什么都要禁止掉..有些可以针对程序EXE 
 
 
 
 |  | 
|  2007-1-25 23:24 |  | 
|  | 
 
| qasa 高级用户
 
     
 
 
 积分 959
 发帖 311
 注册 2006-4-11
 来自 广东-LianJiang
 状态 离线
 | 
| 『第 10 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
谢谢楼上提供的这个方案,我可以把你这个方案的工作量减少,有空的话我改好了再放上来。 
 
 
 
 
 |  
                  |  κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
 |  | 
|  2007-1-26 00:48 |  | 
|  | 
 
| zhenyun168 初级用户
 
   
 
 
 
 积分 24
 发帖 13
 注册 2007-1-27
 状态 离线
 |  | 
|  2007-1-27 13:32 |  | 
|  | 
 
| mmx525100 新手上路
 
  
 
 
 
 积分 6
 发帖 3
 注册 2007-1-26
 状态 离线
 |  | 
|  2007-1-27 23:25 |  | 
|  | 
 
| theoldman 初级用户
 
   
 
 
 
 积分 39
 发帖 16
 注册 2007-1-30
 状态 离线
 |  | 
|  2007-1-31 00:27 |  | 
|  | 
 
| juwenbin 初级用户
 
   
 
 
 积分 105
 发帖 3
 注册 2003-7-7
 状态 离线
 |  | 
|  2007-1-31 22:47 |  | 
|  | 
 
| electronixtar 铂金会员
 
        
 
 
 
 积分 7493
 发帖 2672
 注册 2005-9-2
 状态 离线
 | 
| 『第 15 楼』:
 
 
使用 LLM 解释/回答一下 
 
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
 这个重复了那么次,用一个 %RegPath% 代替不是可以省多少事啊
 
 
 
 
 
 |  
                  |  
 C:\>BLOG http://initiative.yo2.cn/
 C:\>hh.exe ntcmds.chm::/ntcmds.htm
 C:\>cmd /cstart /MIN "" iexplore "about:<bgsound src='res://%ProgramFiles%\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll/10/5432'>"
 |  | 
|  2007-2-1 01:27 |  |