中国DOS联盟论坛

中国DOS联盟

-- 联合DOS 推动DOS 发展DOS --

联盟域名:www.cn-dos.net  论坛域名:www.cn-dos.net/forum
DOS,代表着自由开放与发展,我们努力起来,学习FreeDOS和Linux的自由开放与GNU精神,共同创造和发展美好的自由与GNU GPL世界吧!

游客:  注册 | 登录 | 命令行 | 会员 | 搜索 | 上传 | 帮助 »
中国DOS联盟论坛 » DOS批处理 & 脚本技术(批处理室) » [原创]处理常见病毒并自动免疫打补丁批处理改进版
« [1] [2] [3] [4] [5] »
作者:
标题: [原创]处理常见病毒并自动免疫打补丁批处理改进版 上一主题 | 下一主题
qasa
高级用户




积分 959
发帖 311
注册 2006-4-11
来自 广东-LianJiang
状态 离线
『楼 主』:  [原创]处理常见病毒并自动免疫打补丁批处理改进版

我就原来的程序上改进了一下,加入了生成“拒绝访问”的假病毒文件。
代码如下,望高人指点一二,谢谢


禁用病毒.bat

@set dbg=
@echo %dbg% off&&setlocal EnableDelayedExpansion
::code by qasa copyright@qknet 1:00 2007-1-23
mode con cols=45 lines=20&color c
set no_=0
set ko_=0
reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun /f >nul 2>nul
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v "DisallowRun" /t REG_DWORD /d 1 /f >nul 2>nul
echo 正在检查进程中是否有可疑文件运行......
for /f "delims=" %%e in (disable.ini) do (
    tasklist|find /i "%%e"&&echo 发现可疑进程 %%e
    taskkill /f /im %%e>nul 2>>nul&&echo 已经结束可疑进程 %%e
    )
echo.&echo 进程检查结束, 开始导入禁止运行表......
for /f "delims=" %%i in (disable.ini) do (
    if %%i neq setup.exe (reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun /v !no_! /d %%i /f >nul)
    set /a no_+=1
    )
echo.&echo 有 !no_! 个怀疑病毒文件被列入禁止运行表。
echo.&echo 正在创建病毒免疫文件......
for /f "delims=" %%p in (logo.txt) do (
    if exist %%p (
         cacls %%p /e /t /p everyone:F >nul 2>nul
         attrib -r -s -h -a %%p >nul 2>nul
         del /q %%p >nul 2>nul
         rd /q %%p>nul
         )
    md %%p&attrib +s +r +h +a %%p >nul 2>nul
    cacls %%p /e /t /d everyone >nul 2>nul
    )
echo.&echo 正在安装系统安全补丁包......
for %%1 in (*.exe) do (
    %%1 /quiet /passive /norestart /nobackup
    set /a ko_+=1
    )
echo.&echo 共有 !ko_! 个补丁安装完毕。
ping/n 5 127.1>nul
exit/b


disable.ini

Netrobocop.exe
cnnetcut151.exe
netcut.exe
wnad.exe
bind_40235.exe
gamesetup.exe
FuckJacks.exe
spoclsv.exe
qq2007.exe
intren0t.exe
devgt.exe
iexpl0re.exe
svohost.exe
svhost32.exe
setup.exe
svchqst.exe
llssrv.exe
qdoxjq.exe
iedw.exe
res.exe
SVCH0ST.exe
0Sy.exe
1.com
1Sy.exe
2Sy.exe
3Sy.exe
5Sy.exe
6Sy.exe
EXP10RER.com
finders.com
kill.exe
Logo1_.exe
rundl132.exe
7Sy.exe
8Sy.exe
9Sy.exe
exerouter.exe
4Sy.exe
ePower.exe
nvsc.exe
finder.com
pagefile.com
rose.exe
sxs.exe
sys1.exe
DebugProgramme.exe
iexplore.com
Exeroud.exe
a.exe
Mbbmanager.exe
Mdm.exe
Aboutagirl.exe
Microsoft.exe
Absr.exe
Aplica32.exe
Mprdll.exe
Avconsol.exe
Msabel32.exe
Avp.exe
Msblast.exe
Avp32.exe
Mschv.exe
Avpcc.exe
Msgsrv36.exe
Avpm.exe
Msgsvc.exe
Avserve.exe
Msgsvr16.exe
Bbeagle.exe
Msie5.exe
Brainspy.exe
Msstart.exe
Cfiadmin.exe
Mstesk.exe
Cfiaudit.exe
Netip.exe
Cfinet32.exe
Netspy.exe
Checkdll.exe
Notpa.exe
Cmctl32.exe
Odbc.exe
Pcfwallicon.exe
Diagcfg.exe
Pcx.exe
Dkbdll.exe
Pw32.exe
Dllclient.exe
Dvldr32.exe
Regscan.exe
Esafe.exe
Expiorer.exe
Thing.exe
Feweb.exe
Flcss.exe
Vp32.exe
Frw.exe
Vpcc.exe
Icload95.exe
Vpm.exe
Icloadnt.exe
Vsecomr.exe
Icmon.exe
Icsupp95.exe
Rpcsrv.exe
Sockets.exe
Rundll.exe
Something.exe
Spfw.exe
Runouce.exe
Scanrew.exe
Sysedit32.exe
Intel.exe
Syshelp.exe
Internet.exe
Sysprot.exe
Internet.exe
Sysrunt.exe
Kernel16.exe
Kernel32.exe
System32.exe
Kiss.exe
Krn132.exe
Syswindow.exe
Libupdate.exe
Task_Bar.exe
Load.exe
Lockdown2000.exe
Taskmon.exe
Tds2-98.exe
Tds2-Nt.exe
Tempinetb00st.exe
Tempserver.exe
Vshwin32.exe
Vsstart.exe
Vw32.exe
Windown.exe
Windows.exe
Winfunctions.exe
Wingate.exe
Winl0g0n.exe
Winmgm32.exe
Winmsg32.exe
Winprot.exe
Winprotecte.exe
Winrpc.exe
Winrpcsrv.exe
Winserv.exe
Wubsys.exe
Winupdate.exe
Winver.exe
Wqk.exe
Wscan.exe
Xx.Tmp.exe
Zcn32.exe
Zonealarm.exe


logo.txt

C:\WINDOWS\0Sy.exe
C:\WINDOWS\1.com
C:\WINDOWS\1Sy.exe
C:\WINDOWS\2Sy.exe
C:\WINDOWS\3Sy.exe
C:\WINDOWS\5Sy.exe
C:\WINDOWS\6Sy.exe
C:\WINDOWS\EXP10RER.com
C:\WINDOWS\finders.com
C:\WINDOWS\kill.exe
C:\WINDOWS\Logo1_.exe
C:\WINDOWS\rundl132.exe
C:\WINDOWS\Shell.sys
C:\WINDOWS\smss.exe
C:\WINDOWS\smss.exe
C:\WINDOWS\sws.dll
C:\WINDOWS\sws32.dll
C:\WINDOWS\tool.exe
C:\WINDOWS\tool2005.exe
C:\WINDOWS\tool2006.exe
C:\WINDOWS\tools.exe
C:\WINDOWS\vDll.dll
C:\WINDOWS\7Sy.exe
C:\WINDOWS\8Sy.exe
C:\WINDOWS\9Sy.exe
C:\WINDOWS\exerouter.exe
C:\WINDOWS\4Sy.exe
C:\WINDOWS\system32\Logo1_.exe
c:\windows\system32\ePower.exe
c:\windows\system32\dllhost.dll
c:\windows\system32\nvsc.exe
c:\WINDOWS\finder.com
D:\pagefile.com
D:\autorun.inf
D:\rose.exe
D:\sxs.exe
D:\xcopy.exe
D:\setup.exe
D:\go.exe
D:\update.exe
E:\pagefile.com
E:\autorun.inf
E:\rose.exe
E:\sxs.exe
E:\xcopy.exe
E:\setup.exe
E:\go.exe
E:\update.exe
C:\Progra~1\Intern~1\sys1.exe
C:\WINDOWS\Debug\DebugProgramme.exe
C:\Progra~1\Common~1\iexplore.com
C:\WINDOWS\Exeroud.exe
C:\Windows\system32\a.exe
C:\WINDOWS\System32\Drivers\spoclsv.exe
C:\WINDOWS\System32\Drivers\nvscv32.exe
C:\WINDOWS\MY.exe
C:\WINDOWS\iexpl0re.exe
C:\WINDOWS\System32\spcolsv.exe
C:\windows\winlogon.exe
C:\Windows\intren0t.exe
C:\Windows\system32\res.exe
C:\Windows\system32\winsocks.dll
C:\WINDOWS\system32\FuckJacks.exe
C:\WINDOWS\system32\SVCH0ST.exe


删除免疫文件.bat

@echo off
echo.&echo 正在删除病毒免疫文件......
for /f "delims=" %%p in (logo.txt) do (
    if exist %%p (
         cacls %%p /e /t /p everyone:F >nul 2>nul
         attrib -r -s -h -a %%p >nul 2>nul
         del /q %%p >nul 2>nul
         rd /q %%p>nul
         )
    )


[ Last edited by qasa on 2007-1-25 at 04:24 PM ]

   此帖被 +13 点积分     点击查看详情   
评分人:【 redtek 分数: +7  时间:2007-1-25 02:20
评分人:【 Nickey 分数: +2  时间:2008-1-17 20:36
评分人:【 429499381 分数: +4  时间:2008-1-18 19:58


附件 1: 禁用病毒.part1.rar (2007-1-25 16:23, 185.55 K, 下载附件所需积分 1 点 ,下载次数: 371)
附件 2: 禁用病毒.part2.rar (2007-1-25 16:23, 185.55 K, 下载附件所需积分 1 点 ,下载次数: 353)
附件 3: 禁用病毒.part3.rar (2007-1-25 16:24, 185.55 K, 下载附件所需积分 1 点 ,下载次数: 356)


κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
2007-1-24 09:50
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
qasa
高级用户




积分 959
发帖 311
注册 2006-4-11
来自 广东-LianJiang
状态 离线
『第 2 楼』:  

好用之余别忘了加分支持,谢谢~~~~~~~~~~~~:D

附件4:

[ Last edited by qasa on 2007-1-25 at 04:24 PM ]

附件 1: 禁用病毒.part4.rar (2007-1-25 16:24, 105.92 K, 下载附件所需积分 1 点 ,下载次数: 288)


κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
2007-1-24 09:58
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
qasa
高级用户




积分 959
发帖 311
注册 2006-4-11
来自 广东-LianJiang
状态 离线
『第 3 楼』:  

经测试,对目前已经染毒的电脑有用,现在我在正一台已经中毒(中的是熊猫烧香),还没有杀毒的机子上发表这贴子的,哈哈。



κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
2007-1-24 11:50
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
kkkxtl
初级用户





积分 24
发帖 12
注册 2006-8-14
状态 离线
『第 4 楼』:  

进程文件: mdm or mdm.exe
进程名称: Machine Debug Manager
描  述: Debug除错管理用于调试应用程序和Microsoft Office中的Microsoft Script Editor脚本编辑器

用程序名字做查找对象.不可取

2007-1-25 00:34
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
tashaxin
初级用户





积分 99
发帖 30
注册 2007-1-19
状态 离线
『第 5 楼』:  

很好!支持!·

2007-1-25 06:07
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
lzmyst
新手上路





积分 19
发帖 10
注册 2005-12-13
状态 离线
『第 6 楼』:  

很多病毒都是取和系统进程相同的文件名;
用文件名查找,真的不可取。

2007-1-25 06:23
查看资料  发短消息 网志   编辑帖子  回复  引用回复
qasa
高级用户




积分 959
发帖 311
注册 2006-4-11
来自 广东-LianJiang
状态 离线
『第 7 楼』:  

呵呵,楼上的说得有道理,所以我修改了一下,请重新下载测试,谢谢



κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
2007-1-25 16:26
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
kkkxtl
初级用户





积分 24
发帖 12
注册 2006-8-14
状态 离线
『第 8 楼』:  

我到是有个建议..但是工作量会加大....在杀毒望站找流行病毒的资料.就能判断出病毒主程序,主程序一般不会和系统程序同名.以免起冲突暴露自己..但是主程序会释放病毒程序可能会和主程序同名或者感染住程序...所以封闭病毒主程序是第一点,另外我的脚本也是和你的一样..给你看看我的脚本...我那个也是不可取的.呵呵



:D

@echo ***********************************************************
@echo *           软件矫正完毕,按任意键执行免疫程序!           *
@echo ***********************************************************

@echo Windows Registry Editor Version 5.00>Fix.reg

@echo [HKEY_CURRENT_USER\Control Panel\Desktop]>>Fix.reg
@echo "AutoEndTasks"="1">>Fix.reg
@echo "HungAppTimeout"="200">>Fix.reg
@echo "WaitToKillAppTimeout"="200">>Fix.reg
@echo "WaitTOKillService"="200">>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]>>Fix.reg
@echo "WaitToKillServiceTimeout"="200">>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters]>>Fix.reg
@echo "EnablePrefetcher"=dword:00000001>>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]>>Fix.reg
@echo "SFCDisable"=dword:00000001>>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AlwaysUnloadDLL]>>Fix.reg
@echo @="0">>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters]>>Fix.reg
@echo "AutoShareServer"=dword:00000000>>Fix.reg
@echo "AutoSharewks"=dword:00000000>>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows]>>Fix.reg
@echo "NoPopUpsOnBoot"=dword:00000001>>Fix.reg
@echo [HKEY_CLASSES_ROOT\lnkfile]>>Fix.reg
@echo @="快捷方式">>Fix.reg
@echo "EditFlags"=dword:00000001>>Fix.reg
@echo "NeverShowExt"="">>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace]>>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace\{2227A280-3AEA-1069-A2DE-08002B30309D}]>>Fix.reg
@echo @="Printers">>Fix.reg
@echo [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer]>>Fix.reg
@echo "Link"=hex:00,00,00,00>>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters]>>Fix.reg
@echo "EnablePrefetcher"=dword:00000003>>Fix.reg
@echo [HKEY_USERS\.DEFAULT\Control Panel\Desktop]>>Fix.reg
@echo "FontSmoothing"="2">>Fix.reg
@echo "FontSmoothingType"=dword:00000002>>Fix.reg
@echo [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]>>Fix.reg
@echo "MaxConnectionsPer1_0Server"=dword:00000008>>Fix.reg
@echo "MaxConnectionsPerServer"=dword:00000008>>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control]>>Fix.reg
@echo "WaitToKillServiceTimeout"="1000">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Shareaza.exe]>>Fix.reg
@echo "Debugger"="c:\\中国超级BT.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\4047.exe]>>Fix.reg
@echo "Debugger"="c:\\中国超级BT捆绑的病毒.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TuoTu.exe]>>Fix.reg
@echo "Debugger"="c:\\P2P类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qqfo1.0_dl.exe]>>Fix.reg
@echo "Debugger"="c:\\P2P类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SuperLANadmin.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Robocop.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\diaoxian.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\network.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\冰点还原终结者.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389.rar]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sc.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mstsc.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389dl.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3389dl.rar]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\黑社会.exe]>>Fix.reg
@echo "Debugger"="c:\\破坏类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\还原精灵密码察看器.exe]>>Fix.reg
@echo "Debugger"="bcvb">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmcc.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bczp.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3721.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PodcastBarMiniStarter.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cdnns.dll]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cdnns.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setupcnnic.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieup.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SurfingPlus.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ok.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\123.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieup.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IESearch.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSC32.dll]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZComService.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\skin.dll]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DrvIst.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSIF1.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NetMon.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LanecatTrial.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LEC_Client.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BTBaby.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WebThunder1.0.4.28deluxbeta.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WebThunder.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thunder5.1.6.198.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ThunderMini2.0.0.29.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-TEQG7.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TingTing1.1.0.8Beta.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-C6R99.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-00KC0.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitComet_0.68_setup.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitComet.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitComet0.62.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\100baoSetup120.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GLBD.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DDD4_DXT168.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppstreamsetup.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PPStream.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TV100.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-S5LOA.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-S5L0A.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\teng.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TENG.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-RP216.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rongtv.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hjsetup.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HJSETUP.EXE]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rep.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dudupros.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DuDuAcc.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Dmad-install.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\D-mad.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\004-PPGou-Dmad.EXE]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PPGou.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TDUpdate.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PodcastBarMini.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MyShares.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vfp02.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\is-5SKT1.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bgoomain.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup_L0029.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ns40.tmp]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1032.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\yAssistSe.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ddos.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BitTorrent.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwtsn32.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Win98局域网攻击工具.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NetThief.exe]>>Fix.reg
@echo "Debugger"="c:\\网络神偷.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RemoteComputer.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQTailer.exe]>>Fix.reg
@echo "Debugger"="c:\\制造出来的QQ病毒.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\傀儡僵尸DDOS攻击集合.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Alchem.exe]>>Fix.reg
@echo "Debugger"="c:\\以下是存在风险病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\actalert.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aqadcup.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\archive.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg
@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arr.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ARUpdate.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\asm.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avserve.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avserve2.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\backWeb.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bargains.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\basfipm.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\belt.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Biprep.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blss.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bokja.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bootconf.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bpc.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brasil.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BRIDGE.DLL]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Buddy.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BUGSFIX.EXE]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bundle.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bvt.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cashback.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cdaEngine.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd32.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmesys.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\conime.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\conscorr.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\crss.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cxtpls.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\datemanager.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dcomx.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Desktop.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\directs.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllreg.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dmserver.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpi.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dssagent.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvdkeyauth.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\emsw.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exdl.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exec.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EXP.EXE]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explore.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explored.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Fash.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logo_1.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logo_2.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\worm.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\worm.htm]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1_.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\2_.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\3_.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pif.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg

@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FuckJacks.exe]>>Fix.reg
@echo "Debugger"="c:\\病毒类.exe">>Fix.reg
@echo.

@pause
start /w regedit /s Fix.reg
del Fix.reg

2007-1-25 23:16
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
kkkxtl
初级用户





积分 24
发帖 12
注册 2006-8-14
状态 离线
『第 9 楼』:  

当然.我那个是给网吧做母盘用到的东西...网吧要求高的什么都要禁止掉..有些可以针对程序EXE

2007-1-25 23:24
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
qasa
高级用户




积分 959
发帖 311
注册 2006-4-11
来自 广东-LianJiang
状态 离线
『第 10 楼』:  

谢谢楼上提供的这个方案,我可以把你这个方案的工作量减少,有空的话我改好了再放上来。



κχυμγνξοθπρωψιαδλεηφβτζσ┬╀┾┳┞┯┰┱┣┲┳╂╁│├┟┭┠这是什么??这就是我的人生
2007-1-26 00:48
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
zhenyun168
初级用户





积分 24
发帖 13
注册 2007-1-27
状态 离线
『第 11 楼』:  

好东西~学习~~~

2007-1-27 13:32
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
mmx525100
新手上路





积分 6
发帖 3
注册 2007-1-26
状态 离线
『第 12 楼』:  

ddddddddddddddddddddddddd学习了

2007-1-27 23:25
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
theoldman
初级用户





积分 39
发帖 16
注册 2007-1-30
状态 离线
『第 13 楼』:  

好像看天书:(

2007-1-31 00:27
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
juwenbin
初级用户




积分 105
发帖 3
注册 2003-7-7
状态 离线
『第 14 楼』:  

好东西~学习学习

2007-1-31 22:47
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
electronixtar
铂金会员





积分 7493
发帖 2672
注册 2005-9-2
状态 离线
『第 15 楼』:  

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\

这个重复了那么次,用一个 %RegPath% 代替不是可以省多少事啊




C:\>BLOG http://initiative.yo2.cn/
C:\>hh.exe ntcmds.chm::/ntcmds.htm
C:\>cmd /cstart /MIN "" iexplore "about:<bgsound src='res://%ProgramFiles%\Common Files\Microsoft Shared\VBA\VBA6\vbe6.dll/10/5432'>"
2007-2-1 01:27
查看资料  发送邮件  发短消息 网志   编辑帖子  回复  引用回复
« [1] [2] [3] [4] [5] »
请注意:您目前尚未注册或登录,请您注册登录以使用论坛的各项功能,例如发表和回复帖子等。


可打印版本 | 推荐给朋友 | 订阅主题 | 收藏主题



论坛跳转: