电脑正常关机后在启动,到进入windows就一直无限重启,安全模式也进不去,求解决办法
4个回答
2013-09-25
展开全部
不用担心。吧你的重要的数据用启动盘启动,然后备份出来。安装杀毒软件。很有可能你连杀毒软件都没有。1.f8进入安全模式。然后在开始菜单,启动。是不是有什么东西,不管有什么,全部删除。2.重新启动电脑。看看能不能进入windows。如果不能进入。那么如下位置都要查看一下了。因为第一步最简单,也是最实用的方法,因为你说要进入到Windows的时候重启,启动项加载的最后位置就是那个地方。也是可能最大的地方常见自启动位置列表
1.Startup启动文件夹:(Windows9x、WinXP/2K)
c:/DocumentsandSettings/AllUsers/StartMenu/Programs/Startup
c:/DocumentsandSettings/username/StartMenu/Programs/Startup
C:/DocumentsandSettings/AllUsers/「开始」菜单/程序/启动
这里保存的是程序文件夹启动项(包括快捷方式),可直接删除此处的病毒启动项(注意有些是隐藏的)
2.注册表中RUN项添加自启动
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/RunOnce]
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run]
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/RunOnceEx]
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/RunEx]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/RunOnce]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/RunOnceEx]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/RunEx]
以上注册表中的病毒键名、键值可直接删除,去除自启动
3.计算机管理->服务列表->设置为自动的服务会随系统启动,这里可取消不常用服务的自启动
4.EXE可执行文件关联:HKEY_CLASSES_ROOT/exefile/shell/open/command"%1"%*
后面的"%1"%*被病毒改动,会在打开任何EXE程序文件时执行(病毒)。务必改回"%1"%*
5、其它文件关联列表,同样要注意是否被改动
[HKEY_CLASSES_ROOT/exefile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/comfile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/batfile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/htafile/Shell/Open/Command]=C:/WINDOWS/System32/mshta.exe"%1"%*
[HKEY_CLASSES_ROOT/piffile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/scrfile/shell/open/command]="%1"/S
[HKEY_CLASSES_ROOT/cmdfile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/chm.file/shell/open/command]="C:/WINDOWS/hh.exe"%1
[HKEY_CLASSES_ROOT/txtfile/shell/open/command]=%SystemRoot%
/system32/NOTEPAD.EXE%1
[HKEY_CLASSES_ROOT/regfile/shell/open/command]=regedit.exe
"%1"
[HKEY_CLASSES_ROOT/inifile/shell/open/command]=%SystemRoot%
/System32/NOTEPAD.EXE%1
以上对应[HKEY_LOCAL_MACHINE/Software/CLASSES/中相应键值
以上如果在"%1"%*前加入[病毒]文件位置如:c:/somefilename.exe"%1"%*,若执行该类文件即可启动
病毒c:/somefilename.exe,发现被改动,务必改回"%1"%*
6.病毒也可藏身于系统启动的autoexeabc.bat文件中
7.随系统启动的系统配置文件WIN.INI中的
"RUN="
"LOAD="
等号后面一般都为空,如有值就值得注意了。
8、随系统启动的系统配置文件SYSTEM.INI中的
[boot]项中
shell=explorer.exeC:/windows/filename
正常为shell=explorer.exe,后面不带任何内容,否则应予关注。
注:7和8文件其它内容不能随便改动,因为这里绝大部分为系统所需的配置,需谨慎修改。
9、计划任务
这里存放些定时作业可设置系统启动时等任意时间调用程序,前段时间有病毒会添加自己到这里
10.C:/EXPLORER.EXE被更改,注意此文件的大小和修改日期。还有加载在shell=explorer.exe后的病毒启动
11、其它值得注意的注册表项:
HKEY_CURRENT_USER/Software/Microsoft/WindowsNT/CurrentVersion/Windows/load
HKEY_LOCAL_MACHINE/Software/Microsoft/ActiveSetup/InstalledComponents
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Currentversion/explorer/Usershellfolders
[HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SessionManager/BootExecute]
[HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/WindowsNT/CurrentVersion/Winlogon/UserInit]
这里也能够使系统启动时自动初始化程序。通常该注册键下面有一个userinit.exe,如图一,但这个键允
许指定用逗号分隔的多个程序,例如“userinit.exe,OSA.exe”(不含引号)
[HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/WindowsNT/CurrentVersion/Winlogon/Shell]
HKCU/Software/Microsoft/Windows/CurrentVersion/Policies/System
HKCU/Software/Microsoft/Windows/CurrentVersion/Policies/Explorer
HKU/.DEFAULT/Software/Microsoft/InternetExplorer/Main
HKU/.DEFAULT/ControlPanel/desktop
HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/WinLogon
注册表修改
注册表编辑器已被管理锁定之解决办法:@@@@@@@@@@@@@@@@@
解决方法:打开记事本,严格按照以下格式编辑:
REGEDIT4
(这里一定空行)
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/System]
“DisableRegistryTools”=dword:00000000
(XP或者2000用户)
WindowsRegistryEditorVersion5.00)
(这里一定空行)
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/System]
“DisableRegistryTools”=dword:00000000
附加:
Windows 98/ME
启动目录
%windir%\Tasks
%windir%\win.ini
NT4
启动目录
%windir%\Tasks
Windows NT4/2000/XP/2003
启动目录
%windir%\Tasks
HKCU\SOFTWARE\Microsoft\Active Setup\Installed Components
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Run (Win2003)
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Runonce (Win2003)
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\RunonceEx (Win2003)
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\Shell
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices (Win98/ME)
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices (Win98/ME)
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce (Win98/ME)
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce (Win98/ME)
HKCU\Software\Policies\Microsoft\Windows\System\Scripts\Logon
HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Run (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Runonce (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\RunonceEx (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Appinit_Dlls
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AppSetup (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify (Win98/ME)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKLM\Software\Microsoft\Internet Explorer\Toolbar
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks
HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
HKLM\Software\Policies\Microsoft\Windows\System\Scripts\Logon
HKLM\System\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\StartupPrograms (Win2003)
HKLM\System\CurrentControlSet\Services (Win98/ME)
然后安装杀毒软件。更新最新数据库,彻底杀毒。 如果进不了Windows,备忘完重要的东西后,立刻重新安装系统。记住,联网前安装杀毒软件。不然病毒会入侵。。
1.Startup启动文件夹:(Windows9x、WinXP/2K)
c:/DocumentsandSettings/AllUsers/StartMenu/Programs/Startup
c:/DocumentsandSettings/username/StartMenu/Programs/Startup
C:/DocumentsandSettings/AllUsers/「开始」菜单/程序/启动
这里保存的是程序文件夹启动项(包括快捷方式),可直接删除此处的病毒启动项(注意有些是隐藏的)
2.注册表中RUN项添加自启动
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/RunOnce]
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run]
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/RunOnceEx]
[HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/RunEx]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/RunOnce]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/RunOnceEx]
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/RunEx]
以上注册表中的病毒键名、键值可直接删除,去除自启动
3.计算机管理->服务列表->设置为自动的服务会随系统启动,这里可取消不常用服务的自启动
4.EXE可执行文件关联:HKEY_CLASSES_ROOT/exefile/shell/open/command"%1"%*
后面的"%1"%*被病毒改动,会在打开任何EXE程序文件时执行(病毒)。务必改回"%1"%*
5、其它文件关联列表,同样要注意是否被改动
[HKEY_CLASSES_ROOT/exefile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/comfile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/batfile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/htafile/Shell/Open/Command]=C:/WINDOWS/System32/mshta.exe"%1"%*
[HKEY_CLASSES_ROOT/piffile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/scrfile/shell/open/command]="%1"/S
[HKEY_CLASSES_ROOT/cmdfile/shell/open/command]="%1"%*
[HKEY_CLASSES_ROOT/chm.file/shell/open/command]="C:/WINDOWS/hh.exe"%1
[HKEY_CLASSES_ROOT/txtfile/shell/open/command]=%SystemRoot%
/system32/NOTEPAD.EXE%1
[HKEY_CLASSES_ROOT/regfile/shell/open/command]=regedit.exe
"%1"
[HKEY_CLASSES_ROOT/inifile/shell/open/command]=%SystemRoot%
/System32/NOTEPAD.EXE%1
以上对应[HKEY_LOCAL_MACHINE/Software/CLASSES/中相应键值
以上如果在"%1"%*前加入[病毒]文件位置如:c:/somefilename.exe"%1"%*,若执行该类文件即可启动
病毒c:/somefilename.exe,发现被改动,务必改回"%1"%*
6.病毒也可藏身于系统启动的autoexeabc.bat文件中
7.随系统启动的系统配置文件WIN.INI中的
"RUN="
"LOAD="
等号后面一般都为空,如有值就值得注意了。
8、随系统启动的系统配置文件SYSTEM.INI中的
[boot]项中
shell=explorer.exeC:/windows/filename
正常为shell=explorer.exe,后面不带任何内容,否则应予关注。
注:7和8文件其它内容不能随便改动,因为这里绝大部分为系统所需的配置,需谨慎修改。
9、计划任务
这里存放些定时作业可设置系统启动时等任意时间调用程序,前段时间有病毒会添加自己到这里
10.C:/EXPLORER.EXE被更改,注意此文件的大小和修改日期。还有加载在shell=explorer.exe后的病毒启动
11、其它值得注意的注册表项:
HKEY_CURRENT_USER/Software/Microsoft/WindowsNT/CurrentVersion/Windows/load
HKEY_LOCAL_MACHINE/Software/Microsoft/ActiveSetup/InstalledComponents
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Currentversion/explorer/Usershellfolders
[HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SessionManager/BootExecute]
[HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/WindowsNT/CurrentVersion/Winlogon/UserInit]
这里也能够使系统启动时自动初始化程序。通常该注册键下面有一个userinit.exe,如图一,但这个键允
许指定用逗号分隔的多个程序,例如“userinit.exe,OSA.exe”(不含引号)
[HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/WindowsNT/CurrentVersion/Winlogon/Shell]
HKCU/Software/Microsoft/Windows/CurrentVersion/Policies/System
HKCU/Software/Microsoft/Windows/CurrentVersion/Policies/Explorer
HKU/.DEFAULT/Software/Microsoft/InternetExplorer/Main
HKU/.DEFAULT/ControlPanel/desktop
HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/WinLogon
注册表修改
注册表编辑器已被管理锁定之解决办法:@@@@@@@@@@@@@@@@@
解决方法:打开记事本,严格按照以下格式编辑:
REGEDIT4
(这里一定空行)
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/System]
“DisableRegistryTools”=dword:00000000
(XP或者2000用户)
WindowsRegistryEditorVersion5.00)
(这里一定空行)
[HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/System]
“DisableRegistryTools”=dword:00000000
附加:
Windows 98/ME
启动目录
%windir%\Tasks
%windir%\win.ini
NT4
启动目录
%windir%\Tasks
Windows NT4/2000/XP/2003
启动目录
%windir%\Tasks
HKCU\SOFTWARE\Microsoft\Active Setup\Installed Components
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Run (Win2003)
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Runonce (Win2003)
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\RunonceEx (Win2003)
HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\Shell
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices (Win98/ME)
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices (Win98/ME)
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce (Win98/ME)
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce (Win98/ME)
HKCU\Software\Policies\Microsoft\Windows\System\Scripts\Logon
HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Run (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\Runonce (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TerminalServer\Install\Software\MICROSOFT\Windows\CURRENTVERSION\RunonceEx (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Appinit_Dlls
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AppSetup (Win2003)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify (Win98/ME)
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKLM\Software\Microsoft\Internet Explorer\Toolbar
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks
HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
HKLM\Software\Policies\Microsoft\Windows\System\Scripts\Logon
HKLM\System\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\StartupPrograms (Win2003)
HKLM\System\CurrentControlSet\Services (Win98/ME)
然后安装杀毒软件。更新最新数据库,彻底杀毒。 如果进不了Windows,备忘完重要的东西后,立刻重新安装系统。记住,联网前安装杀毒软件。不然病毒会入侵。。
2013-09-25
展开全部
一直按进入F8安全模式,接着杀毒,更正错误或重装。
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
2013-09-25
展开全部
显卡换一个,我是搞电脑的,或者你从做个系统
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
2013-09-25
展开全部
可能程序坏了,再重装程序。
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询