Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}\InProcServer32]
@="C:\\DrWeb\\drwsxtn.dll"
"ThreadingModel"="Apartment"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}]
@="Shell Extension for DrWeb"
[HKEY_CLASSES_ROOT\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}\InProcServer32]
@="C:\\DrWeb\\drwsxtn.dll"
"ThreadingModel"="Apartment"
[HKEY_CLASSES_ROOT\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}]
@="Shell Extension for DrWeb"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\DrWeb32W.Exe]
@="C:\\DrWeb"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\DrWeb32W.Exe]
"Path"="C:\\DrWeb"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\DrWeb Quarantine Files]
@="{B8140181-C6E4-49C2-95D4-F93FE8D2BD6E}"
"Priority"=dword:000000C8
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{e7593602-124b-47c9-9f73-a69308edc973}]
@="Shell Extension for DrWeb"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DrWebEngine\Parameters]
"SpamModuleName"="vrcpp.dll"
"VdbPath"="C:\\DrWeb\\Bases"
"SpamPath"="%CommonProgramFiles%\\Doctor Web\\Scanning Engine\\"
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\DrWMenuHandlers]
@="{e7593602-124b-47c9-9f73-a69308edc973}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}\InProcServer32]
@="%CurDir%\\drwsxtn.dll"
"ThreadingModel"="Apartment"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}]
@="Shell Extension for DrWeb"
[HKEY_CLASSES_ROOT\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}\InProcServer32]
@="%CurDir%\\drwsxtn.dll"
"ThreadingModel"="Apartment"
[HKEY_CLASSES_ROOT\CLSID\{e7593602-124b-47c9-9f73-a69308edc973}]
@="Shell Extension for DrWeb"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\DrWeb32W.Exe]
@="%CurDir%"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\DrWeb32W.Exe]
"Path"="%CurDir%"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\DrWeb Quarantine Files]
@="{B8140181-C6E4-49C2-95D4-F93FE8D2BD6E}"
"Priority"=dword:000000C8
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{e7593602-124b-47c9-9f73-a69308edc973}]
@="Shell Extension for DrWeb"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DrWebEngine\Parameters]
"SpamModuleName"="vrcpp.dll"
"VdbPath"="%CurDir%\\Bases"
"SpamPath"="%CurDir%\\Scanning Engine\\"
_SUB DoLoop
READ %CurDir%\DrWeb.TXT,%CurLine%,CurLineText //读取一行到 CurLineText 中
WRIT %CurDir%\DrWeb.REG,$+0,%CurLineText% //将环境变量展开后写入 DrWeb.REG
CALC #CurLine = %CurLine% + 1 //到下一行了
_END
ENVI CurLine=1 //从第1行开始
READ %CurDir%\DrWeb.TXT,-1,LastLine //读取行数
LOOP #%CurLine%<%LastLine%,CALL DoLoop //通过循环转换各行的路径
以后正常系统中的绿色软件也可以用PECMD/WinCMD 来做了。
原帖由 coolg 于 2010-6-21 12:39 发表
谢谢九帅回复 !!!
我是在PE启动过程,把一些变量,用WRIT写在一个文本里,
待PE启动后,再用READ读出来应用。
试了好多次,没搞成,所以前来请教。
可能是便用环境问题。
我再试试。。
欢迎光临 无忧启动论坛 (http://wuyou.net/) | Powered by Discuz! X3.3 |