Win7PE uVS v3.74 (2012) PC

Reply to topic
 
Author Message

admin ®

Longevity: 3 years 11 months

Posts: 5758

Post 12-Nov-2021 08:59

[Quote]


Name: win7pe_uvs v3.74
Year: 2012
Platform: PC
Version: 3.74
Interface language: Russian+English
Tablet: Not required
System Requirements: Operating System: Win2k, WinXP x86/x64, Win2k3 x86/x64, Vista x86/x64, Win7 x86/x64, WinPE
Processor: Celeron 1.5 GHz
Memory: 512 MB
Video card: 16 bit
Free space on the railway: only when installed from a CD of 50 MB
Installation instructions: 1. Write the image to the disk (so that there are files in the root of the disk, and not the image (if you open the disk and there is a file in it Win7PE_uVS_374.iso that is NOT correct)
To write to USB, use UltraISO
1.1 Opening Win7PE_uVS_374.iso in UltraISO
1.2 Go to "Bootstrapping"
1.3 Select "Burn a Hard disk image ..."
1.4 If there is, remove the check mark from "Create Boot Partition" (otherwise the flash drive will be split into two parts and you will not be able to start from it)
1.5 In "Disk Drive" check if your flash drive // click "format->start"
1.6 After formatting, click "Burn"
All the flash drive is ready (does not work if the BIOS does not support booting from a flash drive)
The basic treatment procedure is available in the description.
Description:
(!) Only for treatment specialists!
(!) UVs is NOT a replacement for antivirus!
If your computer has blocked an sms banner, then this image will help you. The image is designed to simplify the process of dealing with unknown viruses /Trojans / rootkits, both specifically in infected Windows, and for the treatment of inactive and remote systems. The possibilities of UVs are quite enough: you can restore and defragment the registry; work with inactive systems; you can also work with remote computers.

Unique features:

01. Three main modes: working with active, inactive, remote systems.
Working with the registry in three modes: removing links to viruses, troubleshooting after the system is treated with an antivirus.
02. Creating autorun images. (for example, for a remote assistant).
03. The fourth mode of operation: simulation of work in a virtual system based on its image.
04. Automatic generation of scripts for the treatment of a real system (when working with the system image).
05. A unique set of filters and a built-in analyzer for quick detection of unknown malware.
06. Maintaining a user database of viruses, automatic extraction of signatures from executable files (including protected ones)
07. Automatic detection of active file viruses and removal of their signatures.
08. Quick detection and easy elimination of any file rootkits [reconciliation file + verification of digits. signatures under a clean system]
09. The ability to use the directory of external digital signatures (catroot) of an inactive system (including in WinPE 2.x-3.x)
10. Detection of hidden DLLs in the address space of the process.
11. Special immune (to nec. types of block.
12. Detection of hidden infection of MBR, Boot sectors and Windows boot loaders. [reconciliation file]
13. Convenient recovery of damaged/missing files from the Windows distribution.
14. Backup of the registry with its defragmentation and recovery.
15. Identification of executable file streams.
16. Registry virtualization.
17. Interaction with the registry editor, including in x64 and WinPE.
18. Creating images of bootable disks and flash drives directly from the program.
Embedded programs:
Total commander 7.56
Acronis backup recovery 10
Acronis disk director 10
Drive cloner Rx 5.0
Bootice 0.8.1
Basic treatment procedure (without knowledge of working with the program, do not go beyond the basic level, otherwise you can damage Windows)
In the BIOS menu, select either boot from a CD-DVD drive or from a Flash drive (only if the BIOS supports it)
After booting through the Bios, a window will appear:
Select TotalCommander in it and press GO
1.Next, we look for our flash drive (it is signed as Win7PE_32), and open the UVs folder on it. In the folder we are looking for a file start.exe and we launch it.
If you are loading from the disk, you do not need to go to the UVs folder. The thing is that the program creates temporary files, and they will not be able to write to the disk in any way, so it gives an error. To avoid this, you need to run the start.cmd file located in the root of the disk near the UVs folder
4. In the menu that appears, be sure to select the Windows directory (where your system is installed), after which an inscription in brackets will appear on the "Select Windows directory" button (C:WINDOWS is selected). Next, click "Run under the current user"
5. When the window opens, click the "Advanced" tab" select "Clear the trash and user profile directories from temporary files ", then "Tweaks " and click on button #12 "Reset Winlogon keys to the initial state. "It will remain to delete suspicious files, i.e. those that catch the eye, for example xxx_video_3242.exe or ~rdr813.tmp
There are banners replacing userinit.exe
1.After launching the program, select TotalCommander and click GO
2.go to the folder C:Windows
3. If you find a file (it consists of numbers and letters with a signature userinit.exe), then delete the C:Windows file userinit.exe
4.Then rename the found file to userinit.exe .
5.Restart the computer.
P.S You can insert the disk when the system is loaded and the banner is out. The program will collapse it and then follow the procedure described above.
[Profile] [PM]
Display posts:    
Reply to topic

Current time is: 03-Feb 06:44

All times are UTC - 8



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum