Advertisement
Guest User

WIN7_TWEAK-memory-security

a guest
Mar 16th, 2020
742
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
REG 2.87 KB | None | 0 0
  1. Windows Registry Editor Version 5.00
  2.  
  3.  
  4.  
  5. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\rdyboost]
  6. "Start"=dword:00000000
  7.  
  8. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters]
  9. "EnableSuperfetch"=dword:00000000
  10. "EnablePrefetcher"=dword:00000000
  11. "EnableBootTrace"=dword:00000000
  12.  
  13. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
  14. "DisablePagingExecutive"=dword:00000001
  15. "SystemCacheLimit"=dword:00000400
  16. "MapAllocationFragment"=dword:00020000
  17. "PhysicalAddressExtension"=dword:00000001
  18. "LargeSystemCache"=dword:00000001
  19. "SystemPages"=dword:00000000
  20.  
  21. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\PriorityControl]
  22. "Win32PrioritySeparation"=dword:00000015
  23.  
  24. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\EMDMgmt]
  25. "GroupPolicyDisallowCaches"=dword:00000001
  26. "AllowNewCachesByDefault"=dword:00000000
  27.  
  28. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DnsClient]
  29. "EnableMulticast"=dword:00000000
  30.  
  31. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters]
  32. "SMB1"=dword:00000000
  33.  
  34. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\WindowsFirewall\DomainProfile]
  35. "DisableStealthMode"=dword:00000001
  36.  
  37. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\WindowsFirewall\PrivateProfile]
  38. "DisableStealthMode"=dword:00000001
  39.  
  40. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\WindowsFirewall\PublicProfile]
  41. "DisableStealthMode"=dword:00000001
  42.  
  43. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\WindowsFirewall\StandardProfile]
  44. "DisableStealthMode"=dword:00000001
  45.  
  46. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VSSVC.exe\PerfOptions]
  47. "CpuPriorityClass"=dword:00000002
  48. "IoPriority"=dword:00000002
  49. "PagePriority"=dword:00000005
  50.  
  51. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chkdsk.exe
  52. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chkdsk.exe\PerfOptions]
  53. "CpuPriorityClass"=dword:00000002
  54. "IoPriority"=dword:00000002
  55. "PagePriority"=dword:00000005
  56.  
  57. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sechost.dll
  58. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sechost.dll\PerfOptions]
  59. "CpuPriorityClass"=dword:00000002
  60.  
  61. [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
  62. "DisallowRun"=dword:00000001
  63.  
  64. [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun]
  65. "syskey"="syskey.exe"
  66.  
  67. [HKEY_CLASSES_ROOT\Msi.Package\shell\runas]
  68. @="Install as administrator"
  69. "NoWorkingDirectory"=""
  70. "HasLUAShield"=""
  71.  
  72. [HKEY_CLASSES_ROOT\Msi.Package\shell\runas\command]
  73. "IsolatedCommand"="msiexec /  \"%1\" && icacls \"%1\" /grant administrators:F"
  74. @="msiexec /  \"%1\" && icacls \"%1\" /grant administrators:F"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement