There are many other places in the registry that can hide the "Trojan" program, such: "HKEY-CURRENT-USER/software/Microsoft/Windows/CurrentVersion/run", "HKEY-USERS/***/software/Microsoft/Windows/CurrentVersion/run" directories are all possible, the best way is to find the file name of the Trojan program under HKEY-LOCAL-MACHINE/software/Microsoft/Windows/CurrentVersion/run, and then search the entire registry.
Knowing how a trojan works, it is easy to scan and kill a trojan. If a trojan exists, the safest and most effective method is to immediately disconnect the computer from the network and prevent hackers from attacking you through the network.
Edit win. INI file. Under [windows], change "run =" Trojan "program" or "load =" Trojan "program" to "run =" and "load =". Edit System. in the INI file, change "shell = 'Trojan 'file" under [boot] To mongoshell‑policer.exe ". In the registry, use Regedit to edit the registry, first find the trojan file name under HKEY-LOCAL-MACHINE/software/Microsoft/Windows/CurrentVersion/run, then search and replace the trojan in the entire registry.
Note that: some trojan programs do not directly Delete the trojan key value under HKEY-LOCAL-MACHINE/software/Microsoft/Windows/CurrentVersion/run, because some "Trojans" such as bladerunner "Trojans" are automatically added immediately if you delete them. What you need is to write down the name and directory of the "Trojan, then return to the MS-DOS, find the trojan and delete it.
Restart the computer and then delete the key values of all trojan files in the registry. So far, we have achieved success.
TIPS:
A Trojan originally refers to the story of an ancient Greek soldier hiding in a trojan entering an enemy city to occupy an enemy city. On the Internet, a "Trojan Horse" refers to an application or game that some programmers can Download from the Internet, including programs that can control users' computer systems, it may cause damage or even paralysis of the user's system.