0% found this document useful (0 votes)
224 views1 page

Disable SPPSVC - EXE Permanently

This document contains registry entries for the sppsvc Windows service that define settings like the service name, startup type, and security permissions. It specifies that the service should start automatically delayed, run as the NetworkService account, and have various security privileges. Trigger entries define actions that will occur based on certain conditions.

Uploaded by

salajauma media
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
224 views1 page

Disable SPPSVC - EXE Permanently

This document contains registry entries for the sppsvc Windows service that define settings like the service name, startup type, and security permissions. It specifies that the service should start automatically delayed, run as the NetworkService account, and have various security privileges. Trigger entries define actions that will occur based on certain conditions.

Uploaded by

salajauma media
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

1 Windows Registry Editor Version 5.

00
2
3 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sppsvc]
4 "DelayedAutoStart"=dword:00000001
5 "DependOnService"=hex(7):52,00,70,00,63,00,53,00,73,00,00,00,00,00
6 "Description"="@%SystemRoot%\\system32\\sppsvc.exe,-100"
7 "DisplayName"="@%SystemRoot%\\system32\\sppsvc.exe,-101"
8 "ErrorControl"=dword:00000001
9 "FailureActions"=hex:80,51,01,00,00,00,00,00,00,00,00,00,03,00,00,00,14,00,00,\
10 00,01,00,00,00,c0,d4,01,00,01,00,00,00,e0,93,04,00,00,00,00,00,00,00,00,00
11 "ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
12 74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
13 00,70,00,70,00,73,00,76,00,63,00,2e,00,65,00,78,00,65,00,00,00
14 "LaunchProtected"=dword:00000001
15 "ObjectName"="NT AUTHORITY\\NetworkService"
16 "RequiredPrivileges"=hex(7):53,00,65,00,41,00,75,00,64,00,69,00,74,00,50,00,72,\
17 00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,43,00,68,00,\
18 61,00,6e,00,67,00,65,00,4e,00,6f,00,74,00,69,00,66,00,79,00,50,00,72,00,69,\
19 00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,43,00,72,00,65,00,\
20 61,00,74,00,65,00,47,00,6c,00,6f,00,62,00,61,00,6c,00,50,00,72,00,69,00,76,\
21 00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,49,00,6d,00,70,00,65,00,\
22 72,00,73,00,6f,00,6e,00,61,00,74,00,65,00,50,00,72,00,69,00,76,00,69,00,6c,\
23 00,65,00,67,00,65,00,00,00,00,00
24 "ServiceSidType"=dword:00000001
25 "Start"=dword:00000004
26 "Type"=dword:00000010
27
28 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sppsvc\Security]
29 "Security"=hex:01,00,14,80,b8,00,00,00,c4,00,00,00,14,00,00,00,30,00,00,00,02,\
30 00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
31 00,00,02,00,88,00,06,00,00,00,00,00,14,00,ff,01,02,00,01,01,00,00,00,00,00,\
32 05,12,00,00,00,00,00,18,00,fd,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
33 20,02,00,00,00,00,14,00,9d,01,02,00,01,01,00,00,00,00,00,05,04,00,00,00,00,\
34 00,18,00,94,00,00,00,01,02,00,00,00,00,00,0f,02,00,00,00,01,00,00,00,00,00,\
35 14,00,9d,01,02,00,01,01,00,00,00,00,00,05,06,00,00,00,00,00,14,00,14,00,00,\
36 00,01,01,00,00,00,00,00,05,0b,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00,\
37 01,01,00,00,00,00,00,05,12,00,00,00
38
39 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sppsvc\TriggerInfo]
40
41 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sppsvc\TriggerInfo\0]
42 "Action"=dword:00000001
43 "Data0"=hex:39,00,34,00,33,00,35,00,63,00,63,00,35,00,36,00,2d,00,31,00,64,00,\
44 39,00,63,00,2d,00,34,00,39,00,32,00,34,00,2d,00,61,00,63,00,37,00,64,00,2d,\
45 00,62,00,36,00,30,00,61,00,32,00,63,00,33,00,35,00,32,00,30,00,65,00,31,00,\
46 00,00
47 "DataType0"=dword:00000002
48 "GUID"=hex:67,d1,90,bc,70,94,39,41,a9,ba,be,0b,bb,f5,b7,4d
49 "Type"=dword:00000006
50
51 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sppsvc\TriggerInfo\1]
52 "Action"=dword:00000001
53 "GUID"=hex:da,8a,52,f5,5f,be,14,4f,8a,ef,a9,5d,e7,28,11,61
54 "Type"=dword:00000014
55
56

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy