Windows image hijacking under the specific program can be redirected to a custom program, do not use the file to replace or set the file association.
Alternatively the system comes NotePad2 using Notepad, the following registry introduced:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe] "Debugger"="\"D:\\Program Files\\Notepad2\\Notepad2.exe\" /z"
Replace system task manager for the Process Explorer:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe] "Debugger"="D:\Program Files\processhacker\ProcessHacker.exe"