瑞星卡卡安全论坛技术交流区系统软件 关于注册表的,这个咋修复

«23456789   6  /  9  页   跳转

关于注册表的,这个咋修复

就在后面加了个e本来把这些写好后导入成了logouni.ex少了个exe的e,偶加上去好了

附件附件:

下载次数:211
文件类型:image/pjpeg
文件大小:
上传时间:2006-7-7 14:36:33
描述:



gototop
 

引用:
【偶是高达的贴子】偶在后面加了个e好了
...........................

是的从你给的那个图表看是少一个E字符,所以我给的是这个键值的全部内容,导入它应该能修复它的,要在安全模式下全面杀毒哦,
gototop
 

偶导入你给偶的这些发现少了个E,偶在安全下杀过了没毒,加了个E好了谢谢zgr稳得起 兄
gototop
 

另外问下为啥会少个E,
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"UIHost"=hex(2):6c,00,6f,00,67,00,6f,00,6e,00,75,00,69,00,2e,00,65,00,78,00,65,\
偶把这些保存导入的
gototop
 

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AutoRestartShell"=dword:00000001
"DefaultUserName"="User"
"LegalNoticeCaption"=""
"LegalNoticeText"=""
"PowerdownAfterShutdown"="1"
"ReportBootOk"="1"
"Shell"="Explorer.exe"
"ShutdownWithoutLogon"="0"
"System"=""
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"VmApplet"="rundll32 shell32,Control_RunDLL \"sysdm.cpl\""
"SfcQuota"=dword:ffffffff
"PreloadFontFile"="simsun"
"allocatecdroms"="0"
"allocatedasd"="0"
"allocatefloppies"="0"
"cachedlogonscount"="10"
"forceunlocklogon"=dword:00000000
"passwordexpirywarning"=dword:0000000e
"scremoveoption"="0"
"AllowMultipleTSSessions"=dword:00000001
"UIHost"=hex(2):6c,00,6f,00,67,00,6f,00,6e,00,75,00,69,00,2e,00,65,00,78,00,65,\
  00,00,00
"LogonType"=dword:00000001
"DebugServerCommand"="no"
"SFCDisable"=dword:00000000
"WinStationsDisabled"="0"
"HibernationPreviouslyEnabled"=dword:00000001
"ShowLogonOptions"=dword:00000000
"AltDefaultUserName"="User"
"AltDefaultDomainName"="72D801BA937E41F"
"Background"="0 0 0"
"DefaultDomainName"="72D801BA937E41F",正常后导出的
gototop
 

"UIHost"=hex(2):6c,00,6f,00,67,00,6f,00,6e,00,75,00,69,00,2e,00,65,00,78,00,65,\
00,00,00
"UIHost"=hex(2):6c,00,6f,00,67,00,6f,00,6e,00,75,00,69,00,2e,00,65,00,78,00,65,\
偶的和你的不同偶的多了00,00,00
gototop
 

引用:
【偶是高达的贴子】"UIHost"=hex(2):6c,00,6f,00,67,00,6f,00,6e,00,75,00,69,00,2e,00,65,00,78,00,65,\
00,00,00
"UIHost"=hex(2):6c,00,6f,00,67,00,6f,00,6e,00,75,00,69,00,2e,00,65,00,78,00,65,\
偶的和你的不同偶的多了00,00,00
...........................

哦,是我的错,是我在复制时少复制了一行的原固,所以少了“00,00,00”它也就少了一个E字符,其实如果对注册表了解的话,可以直接在注册表修改最好,也就是找这“UIHost”个键值双击它再将它的值改为“logonui.exe”即可。
gototop
 

现在没WT了吧,刚才又在安全摸是下杀了一遍毒,没有毒,那两个蓝的是啥啊,

附件附件:

下载次数:164
文件类型:image/pjpeg
文件大小:
上传时间:2006-7-7 16:36:42
描述:



gototop
 

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{AEB6717E-7E19-11d0-97EE-00C04FD91972}"=""
"{32CD708B-60A7-4C00-9377-D73EAA495F0F}"="Rising Execute File Exts hook"
"{D157330A-9EF3-49F8-9A67-4141AC41ADD4}"=""
-------------------------------------------------------------------------------
先在注册表中找到“ShellExecuteHooks”这项击右键将其项删除,再按下面的操作,
将以上全部保存为比如“ShellExecuteHooks.reg”的文件名,再将它导入你的注册表中即可修复你电脑中受损注册表的键值。
好像是这上面的两个是啥啊
gototop
 

zgr稳得起兄还在吗
gototop
 
«23456789   6  /  9  页   跳转
页面顶部
Powered by Discuz!NT