Microsoft5Month29The upgrade package of No. is forcibly added to the genuine Windows system detectionProgram:Windows Genuine
Advantage notification.
PiratedWindowsWhen the system starts, it will warn you:"This copy of Windows is not genuine", (" Your windows system is not genuine "). You will also be asked if you want to buy expensive genuine systems immediately.
The results are often far from the original intention. This new device is missing24It was cracked within an hour. There are two or three methods that are generally considered to be more effective.
1)
This new program consists of several parts:
I.
Wgatray.exe:% Windir % \ system32 \ wgatray.exe (Refers to the system disk, generally in the C: disk)
II.
Wgalogon. dll:% Windir % \ system32 \ wgalogon. dll
III.
registry key value: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows
NT \ CurrentVersion \ Winlogon \ y Y \ wgalogon
IV.
download package: % WinDir % \ softwaredistribution \ Download \ 6c4788c9549d437e76e1773a7639582a
2)
The first method is very direct: After backing up the above files and folders (or the Registry), delete all the files and then restart the system.
3)
the second method is simplified by writing an execution program that is automatically completed. (Basic Code is as follows)
" % WINDIR % \ system32 \ wgatray.exe
/u "
Reg Delete" HKLM \ Software \ Microsoft \ Windows
NT \ CurrentVersion \ Winlogon \ y Y \ wgalogon "/F
Del /f/Q "% WINDIR % \ system32 \ wgatray.exe"
Del /f/q
"% WINDIR % \ system32 \ dllcache \ wgatray.exe"
Del /f/Q "% WINDIR % \ system32 \ wgalogon. DLL "
Del /f/q
"% WINDIR % \ system32 \ dllcache \ wgalogon. DLL "
rmdir/S/q
" % WinDir % \ softwaredistribution \ Download \ 6c4788c9549d437e76e1773a7639582a "
pause
4)
Method 3: (the most direct and effective method at present)
I.
Data. DAT: C: \ Documents ents
And Settings \ All Users \ Application Data \ Windows Genuine Advantage \ data (Used to store Registration Information)
II.
notepad, or other text editors) open the file.
III.
write something to overwrite the original content. (For example, "OK" )
IV.
Save and exit;
V.
Right-click the file and select "attribute ". (Properties) ", Click" Read-Only (Read-only) And hide (Hidden) ". (Note: I have not fully figured out the role of this article and have limited capabilities)
With these methods, you can basically pass the "genuine detection. It is worth noting that deleting an object may fail (Access is denied), Probably because the program is running, use the Task Manager(Task Manager)Find the program and force it to stop.
Conclusion:It is estimated that Microsoft's money policy has gradually expanded from large customers to retail investors. In the future, it will take a long time to use it, and there will be something like "Update, wait a few days until there is no bad feedback. Self-insurance and self-insurance!