-
Isn't an executable file?
-
You can add a password to the software you want to encrypt.
Stay safe.
-
Why use the ghost system? It is recommended to install the official original system.
-
Extracting it and killing it doesn't feel like a good thing.
-
C: Windows System32 WBEM Repository is a storage file of Windows Management Instrumentation service, if this file is damaged, there will be application initialization failure and memory cannot read error, this screenshot is the solution to this problem.
1. Stop the Windows Management Instrumentation service.
2. Delete the contents of C: Windows System32 WBEM Repository.
3. When you enable the Windows Management Instrumentation service, the system will regenerate the C: Windows System32 WBEM Repository file.
-
The things in the C drive are the system protection software of the computer.,You don't care about it.,C disk we generally don't change it.,As for the disk that you pay attention to changing the path when you play a movie game.,Don't put it in the C disk.。
-
That's too much. lz, what do you want to do with this? I don't want to remember them all. Tell you, remember the meaningless.
-
Win7 System32 file description.
Not very comprehensive, too many documents.
Calculator. Character Map.
Disk Cleanup. SQL Server customer check end-to-end network utility.
Command symbols. Color management.
Computer management.
Set the default values for program access and this computer.
Control panel. Stored username and password.
ClearType text tuner.
Display color calibration.
Add a device. Disk Defragmenter.
Dialer program.
Display toggle. Change the size of the text on the screen.
DirectX Diagnostic Tool.
Dedicated character program.
Event Viewer.
Cover - Fax cover page.
Add hardware. iSCSI initiator property.
Install or uninstall the display language.
Screen magnifier.
Windows Mobility Center.
Windows Memory Diagnostics.
Console 1 - Console root node].
Sync Center. System configuration.
Microsoft supports diagnostic tools.
System Information. Drawing. Windows Remote Assistance.
Remote desktop connection.
Microsoft Narrator.
Use a change of hand to match the account.
Connect to a network projector.
Notepad. ODBC Data Source Manager.
Windows features.
On-screen keyboard. Performance Monitor.
Demo settings. Printer migration.
Printer user interface.
Problem Steps Record Potato Brigade.
Create a system repair disc.
Registry. Encrypt the file system.
Resource Monitor.
System Restore. Backup and restore.
Create a shared file wizard.
File signature verification.
Windows activation.
Volume Synthesizer - Speaker (High Definition Audio device).
Snipping Tool. Recorder. Memo.
Keep your Windows account database secure.
System Properties - Advanced.
System Properties - The name of the computer.
System Properties - Hardware.
System Properties - System Protection.
System Properties - Remote.
Performance options. Performance Options - Visuals.
Digital calibration tools.
Windows Task Manager.
Initialize the TPM security hardware.
User account control settings.
Easy access to the hub.
Driver Verifier Manager.
Windows Fax and Scan.
Windows Anytime Upgrade results.
About "Windows".
Clipboard. Windows script host settings.
Windows Update standalone installer.
Extensible wizard host process.
-
You're going to do the rhythm of the virus and know but don't want to tell you.
Solution: Change the name of the system disk to the system32 directory under Windows or Winnt, double-click, and type assoc in the command window that comes outexe=exefile issue solved. >>>More
You are talking about the range of icons in the exe file of Windows, if this exe file is compiled by VC, you can use VC to open this exe file to find out all kinds of resources inside, including icons, **, toolbars, dialog boxes, strings, etc. The location of the resource in each exe file is different, you can call the windows system call to find out the location of the resource, when using VC development, the system call is: HEX = loadlibrary("");Open the exe file you want to find hrsrc hresinfo = findresource(hexe,"idr_test","test");Locate the location of the resource in the exe file, where"idr_test"It's an ID number"test"is the resource type. >>>More
It should be that all the corresponding entries in the executable file in your registry have been modified to correspond to the Trojan program, so clicking on it has no response.
You may have been infected with a virus that infects your antivirus software, causing it to not work properly and infecting you*exe file, I've come across it before. You can try it like this, enter the security mode with the network, change the name of the 360 and Rising execution file, that is, one less English letter, for example, the execution file of the 360-degree security guard is, you can change it to, one less "e", see if it can run, if you can modify the Rising execution file, and then antivirus, you think it's safe, don't shut down or restart, and then go to the network**windows cleaning assistant, this software is very good at dealing with viruses such as Trojans, If no virus is found after the three software are checked and killed at the same time, you can change the name and restart it. >>>More
If we display the currently accessed folders in a different color, it will not only make daily file management more convenient, but also personalize Explorer. >>>More