How to delete this stubborn virus SYSTEM32\REG? EXE? Please explain "every step" in detail. ...
Unlocker V 1.8.5 Chinese version | Stubborn software deletion tool When you rename or delete a file/folder, a dialog box will pop up in Windows, prompting "xxx cannot be deleted: other users/programs are using it!" , what should I do? With Unlocker, you can solve this small and annoying problem easily, conveniently and effectively! I believe that many users have encountered the following problems when deleting files or directories, that is, they were told by the system that the files were occupied by a certain program and could not be deleted smoothly, but it is puzzling who occupied the files? Which process prevents users from deleting files? Let Unlocker help you solve it now! Unlocker is a free right-click extension tool. After installation, users can integrate it into right-click operation. When a user finds that a file or directory cannot be deleted, just press the right mouse button to "unlock", and the program will immediately show which programs occupy the directory or file. Then, just press "Unlock" in the pop-up window to unlock your file. Unlocker is different from other unlocking software. It unlocks files by releasing the relationship between files and programs, rather than forcibly closing those programs that occupy files, so it won't cause users possible data loss because of forcibly closing programs like other unlocking programs. The installation of the unlocking device is very simple. After downloading, users only need to double-click the file to install it. During the installation process, the program will let the user choose whether to integrate the unlocker directly into the right mouse button menu or "Send to ...". Item so that users can call it more flexibly. How dare you miss such convenient and free software? Download it now and try its power! /soft/32.htmlWelcome to my website to download the /AVG anti-spyware software you want (formerly known as Ewido anti-spyware software). V7.5. 1.43 China AVG Anti-Spyware Software-Ultimate Security and Perfect Protection. Effectively solve the new generation of security threats spread on the Internet. Ensure the security of your data, protect your privacy and resist the threats of spyware, adware, Trojan horses, dialers, keyloggers and worms. Under the simple and easy-to-use interface, it provides you with advanced scanning detection means and the most advanced technology at present. Anti-virus programs can only provide limited protection against key threats, such as Trojans, worms, dialers, hijackers, spyware and keyloggers. This is the starting point of AVG anti-spyware protection. It can complement existing security applications to create a complete security system-because only a complete security system can work effectively. /soft/6383. html Welcome to my website to download what you want/internationally popular anti-spyware Trojan: A square is free. Many domestic users are using the famous foreign anti-spyware Trojan AVG Anti-spyware (formerly Ewido) as an auxiliary security tool to assist professional anti-virus software to kill malicious programs such as spy Trojans, but its official has integrated AVG Anti-spyware into its next generation products. The update service of AVG anti-spyware will stop on June 5438+February 365438 +0, 2008, so many users are looking for an auxiliary security tool that can replace AVG anti-spyware software. /news1/eval _ virus/2008/123123113747he47g1j277db53ca. In addition, it can update the latest malware information online at any time. Not afraid of being infected by new malware. Remove malware from your computer. -Protect you from Trojan horses. Protect you from worms (worms). -Protect your dialer from being changed. -Protect your computer from harmful software. Allows you to control the anti-spyware toolkit on your computer. V3.5 specializes in killing trojans, rogue software, backdoor using Rootkit technology and other malicious codes (spyware, worms). Provide a variety of professional tools, system /IE repair, privacy protection, security optimization functions, and provide a comprehensive system monitoring function, so that you can know the changes of the system like the back of your hand, and with manual analysis, you can kill nearly 100% unknown malicious. Main features: 1), a universal automatic Rootkit solution, which can detect all kinds of trojans and backdoors hidden by Rootkit technology without using traditional feature codes. 2) Fully detect hidden processes, hidden services and hidden ports. 3) Automatically detect and repair related errors of Winsock SPI chain. 4) Restore the system kernel service description table, display and remove the kernel function of the hook, and automatically restore the kernel function of the inline hook. 5), the original fast matching algorithm, the fastest scanning detection under the minimum system resource occupation level. 6) The scanning module and the real-time monitoring * * * use the same copy of the engine and the library in the memory, which greatly reduces the occupation of system resources and enables the modules to work together efficiently. 7) The organic combination of memory scanning and static analysis early warning system. 8), based on the broad-spectrum characteristics of the Trojan family, vigorously improve the virus detection rate. 9) Forward-looking active defense monitoring system to comprehensively detect unknown Trojan horses. 10), the first in China to support NTFS data stream scanning, which makes the detection more thorough. Main functions: heuristic early warning, startup management, IE plug-in management, SPI chain automatic detection and repair, Rootkit detection, service management, hidden service detection, filtering Microsoft default service, service addition and deletion, SSDT (service description table) recovery, process management, hidden process detection, forced uninstallation of DLL module, hidden port detection, disconnection, remote IP location, WHOIS query, port closure and IE repair. Rogue plug-in immunization, malicious website shielding, system garbage cleaning, intelligent scanning, file shredder, software uninstallation, system optimization, system repair, right-click virus detection, vulnerability inspection and repair, system diagnosis report, forum rescue, heuristic scanning, NTFS data stream scanning, signature analysis, program execution authority, application firewall, comprehensive scanning, memory scanning, directory scanning, trust list, real-time monitoring and intelligent upgrade. /soft/7386.html