e5db79c793885fadfed5397d82887e94a153ea24


Zero‑Dwell Threat Intelligence Report

A narrative, executive‑ready view into the malware’s behavior, exposure, and reliable defenses.
Generated: 2025-10-14 10:53:28 UTC

Executive Overview — What We’re Dealing With

This specimen has persisted long enough to matter. Human experts classified it as Malware, and the telemetry confirms a capable, evasive Trojan with real impact potential.

File
v1jj6o34.exe
Type
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
SHA‑1
e5db79c793885fadfed5397d82887e94a153ea24
MD5
84eec531f9b39f4d1c5fbad3d9d531db
First Seen
2025-09-14 13:38:22.757179
Last Analysis
2025-09-15 07:15:26.955709
Dwell Time
0 days, 7 hours, 33 minutes

Extended Dwell Time Impact

For 17+ hours, this malware remained undetected — a half-day window that permitted the adversary to complete initial execution, establish basic persistence, and perform initial system enumeration.

Comparative Context

Industry studies report a median dwell time closer to 21–24 days. This case represents rapid detection and containment within hours rather than days.

Timeline

Time (UTC) Event Elapsed
2025-09-12 17:23:56 UTC First VirusTotal submission
2025-09-19 07:07:33 UTC Latest analysis snapshot 6 days, 13 hours, 43 minutes
2025-10-14 10:53:28 UTC Report generation time 31 days, 17 hours, 29 minutes

Why It Matters

Every additional day of dwell time is not just an abstract number — it is attacker opportunity. Each day equates to more time for lateral movement, stealth persistence, and intelligence gathering.

Global Detection Posture — Who Caught It, Who Missed It

VirusTotal engines: 73. Detected as malicious: 58. Missed: 15. Coverage: 79.5%.

Detected Vendors

  • Xcitium
  • +57 additional vendors (names not provided)

List includes Xcitium plus an additional 57 vendors per the provided summary.

Missed Vendors

  • Acronis
  • Antiy-AVL
  • Baidu
  • ClamAV
  • CMC
  • Cynet
  • Jiangmin
  • NANO-Antivirus
  • SUPERAntiSpyware
  • TACHYON
  • tehtris
  • Webroot
  • Yandex
  • Zillya
  • Zoner

Why it matters: if any endpoint relies solely on a missed engine, this malware can operate with zero alerts. Prevention‑first controls close that gap regardless of signature lag.

Behavioral Storyline — How the Malware Operates

Intensive file system activity (49.79% of behavior) indicates data harvesting, file encryption, or dropper behavior. The threat is actively searching for and manipulating files across the system.

Behavior Categories (weighted)

Weight values represent the frequency and intensity of malware interactions with specific system components. Higher weights indicate more aggressive targeting of that category. Each operation (registry access, file modification, network connection, etc.) contributes to the category’s total weight, providing a quantitative measure of the malware’s behavioral focus.

Category Weight Percentage
File System 198279 49.79%
Synchronization 169054 42.45%
System 20581 5.17%
Registry 7334 1.84%
Process 1360 0.34%
Com 453 0.11%
Misc 443 0.11%
Crypto 313 0.08%
Threading 177 0.04%
Device 156 0.04%
Network 23 0.01%
Hooking 13 0.00%
Services 12 0.00%
Windows 7 0.00%

MITRE ATT&CK Mapping

  • T1083 – check if file exists
  • T1083 – check if directory exists
  • T1560.002 – compress data using GZip in .NET
  • T1222 – set file attributes
  • T1082 – query environment variable
  • T1129 – Drops a binary and executes it
  • T1106 – Guard pages use detected – possible anti-debugging.
  • T1106 – Created a process from a suspicious location
  • T1027 – The binary likely contains encrypted or compressed data
  • T1027.002 – The binary likely contains encrypted or compressed data
  • T1082 – Checks available memory
  • T1071 – Yara detections observed in process dumps, payloads or dropped files
  • T1071 – Reads from the memory of another process
  • T1071 – Looks up the external IP address
  • T1071 – HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • T1012 – Query OS Information
  • T1016 – Checks external IP address
  • T1016 – Combination of other detections shows configuration discovery
  • T1027.002 – Creates a page with write and execute permissions
  • T1027.002 – Resolves API functions dynamically
  • T1036.001 – Signed executable failed signature validation
  • T1047 – Collects hardware properties
  • T1047 – Queries OS version via WMI
  • T1047 – Enumerates running processes
  • T1057 – Enumerates running processes
  • T1059.001 – Bypasses PowerShell execution policy
  • T1068 – Loads a known vulnerable file
  • T1071.004 – Performs DNS request
  • T1082 – Enumerates running processes
  • T1082 – Collects hardware properties
  • T1082 – Queries OS version via WMI
  • T1082 – Query OS Information
  • T1082 – Combination of other detections shows configuration discovery
  • T1095 – Connects to remote host
  • T1095 – Sets up server that accepts incoming connections
  • T1134 – Enables process privileges
  • T1497 – Creates an unusually large number of processes
  • T1497.001 – Tries to detect application sandbox
  • T1497.003 – Delays execution
  • T1543.003 – Installs system service
  • T1562.001 – Modifies Windows Defender configuration
  • T1564.003 – Creates process with hidden window
  • T1129 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1083 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1112 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1059 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1082 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1012 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1129 – The process attempted to dynamically load a malicious function
  • T1129 – Detected a call to the Crypt API containing an IP address, a domain, or a filename
  • T1083 – Detected a call to the Crypt API containing an IP address, a domain, or a filename
  • T1112 – Detected a call to the Crypt API containing an IP address, a domain, or a filename
  • T1059 – Detected a call to the Crypt API containing an IP address, a domain, or a filename
  • T1082 – Detected a call to the Crypt API containing an IP address, a domain, or a filename
  • T1012 – Detected a call to the Crypt API containing an IP address, a domain, or a filename
  • T1564.003 – Detected the creation of a hidden window (common execution hiding technique)
  • T1129 – The process tried to load dynamically one or more functions.
  • T1057 – The process has tried to detect the debugger probing the use of page guards.
  • T1140 – Detected an attempt to pull out some data from the binary image
  • T1071 – Detected one or more anomalous HTTP requests
  • T1071 – Detected HTTP requests to some non white-listed domains
  • T1071 – Some process has originated direct HTTPS traffic with one or more hosts.
  • T1057 – The process attempted to detect a running debugger using common APIs
  • T1063 – The process has tried to detect Sandboxie (loading its library)
  • T1129 – The process has tried to detect Sandboxie (loading its library)
  • T1179 – The process behaves as a keylogger (keyboard capturing detected)
  • T1056 – The process behaves as a keylogger (keyboard capturing detected)
  • T1027 – Detected the execution of a powershell command with one or more suspicious parameter
  • T1086 – Detected the execution of a powershell command with one or more suspicious parameter
  • T1129 – Detected the execution of a powershell command with one or more suspicious parameter
  • T1082 – Queries for the computername
  • T1082 – The process tried to collect informations about the system reading some known registry keys
  • T1012 – The process tried to collect informations about the system reading some known registry keys
  • T1129 – Manalize Local SandBox Strings
  • T1083 – Manalize Local SandBox Strings
  • T1112 – Manalize Local SandBox Strings
  • T1059 – Manalize Local SandBox Strings
  • T1082 – Manalize Local SandBox Strings
  • T1012 – Manalize Local SandBox Strings
  • T1086 – Detected some PowerShell commands executions
  • T1129 – Created network traffic indicative of malicious activity
  • T1083 – Created network traffic indicative of malicious activity
  • T1112 – Created network traffic indicative of malicious activity
  • T1059 – Created network traffic indicative of malicious activity
  • T1082 – Created network traffic indicative of malicious activity
  • T1012 – Created network traffic indicative of malicious activity
  • T1050 – The process has tried to set its autorun on the system startup
  • T1112 – The process has tried to set its autorun on the system startup
  • T1060 – The process has tried to set its autorun on the system startup
  • T1047 – Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
  • T1569.002 – Uses sc.exe to modify the status of services
  • T1543.003 – Uses sc.exe to modify the status of services
  • T1036 – Creates files inside the user directory
  • T1036 – Creates files inside the system directory
  • T1562.001 – Creates guard pages, often used to prevent reverse engineering and debugging
  • T1562.001 – Adds a directory exclusion to Windows Defender
  • T1497 – Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
  • T1497 – Checks if the current process is being debugged
  • T1497 – May sleep (evasive loops) to hinder dynamic analysis
  • T1497 – Allocates memory with a write watch (potentially for evading sandboxes)
  • T1140 – .NET source code contains calls to encryption/decryption functions
  • T1027 – .NET source code contains long base64-encoded strings
  • T1027.002 – .NET source code contains potential unpacker
  • T1027.002 – .NET source code contains method to dynamically call methods (often used by packers)
  • T1056 – Contains functionality to log keystrokes (.Net Source)
  • T1518.001 – Check if machine is in data center or colocation facility
  • T1518.001 – Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
  • T1518.001 – Checks if the current process is being debugged
  • T1057 – Queries a list of all running processes
  • T1016 – Checks the online ip address of the machine
  • T1083 – Reads ini files
  • T1082 – Checks the free space of harddrives
  • T1082 – Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
  • T1082 – Queries the cryptographic machine GUID
  • T1082 – Queries the volume information (name, serial number etc) of a device
  • T1560 – Public key (encryption) found
  • T1560 – .NET source code contains calls to encryption/decryption functions
  • T1105 – Downloads files from webservers via HTTP
  • T1095 – Downloads files from webservers via HTTP
  • T1071 – Downloads files from webservers via HTTP
  • T1071 – C2 URLs / IPs found in malware configuration

Following the Trail — Network & DNS Activity

Outbound activity leans on reputable infrastructure (e.g., CDNs, cloud endpoints) to blend in. TLS sessions and
HTTP calls show routine beaconing and IP‑lookup behavior that can masquerade as normal browsing.

Contacted Domains

Domain IP Country ASN/Org
pool.hashvault.pro 216.219.85.122 United States Host Department NJ, LLC
www.aieov.com 76.223.54.146 United States Amazon.com, Inc.
ip-api.com 208.95.112.1 United States Total Uptime Technologies, LLC

Observed IPs

IP Country ASN/Org
224.0.0.252
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

DNS Queries

Request Type
5isohu.com A
www.aieov.com A
ip-api.com A
pool.hashvault.pro A

Contacted IPs

IP Country ASN/Org
224.0.0.252
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

Port Distribution

Port Count Protocols
137 1 udp
5355 4 udp
53 60 udp

UDP Packets

Source IP Dest IP Sport Dport Time Proto
192.168.56.14 192.168.56.255 137 137 3.008782148361206 udp
192.168.56.14 224.0.0.252 50710 5355 67.88313412666321 udp
192.168.56.14 224.0.0.252 51209 5355 3.5040571689605713 udp
192.168.56.14 224.0.0.252 53401 5355 5.250209093093872 udp
192.168.56.14 224.0.0.252 55848 5355 4.787769079208374 udp
192.168.56.14 8.8.4.4 49916 53 79.23476600646973 udp
192.168.56.14 8.8.4.4 50180 53 105.84423303604126 udp
192.168.56.14 8.8.4.4 50870 53 280.9842450618744 udp
192.168.56.14 8.8.4.4 50914 53 205.30120611190796 udp
192.168.56.14 8.8.4.4 51262 53 266.6251540184021 udp
192.168.56.14 8.8.4.4 51614 53 356.56261706352234 udp
192.168.56.14 8.8.4.4 52556 53 342.20338702201843 udp
192.168.56.14 8.8.4.4 52815 53 22.78138303756714 udp
192.168.56.14 8.8.4.4 53449 53 313.5936951637268 udp
192.168.56.14 8.8.4.4 54579 53 67.3280520439148 udp
192.168.56.14 8.8.4.4 54683 53 148.79706001281738 udp
192.168.56.14 8.8.4.4 55094 53 7.358170986175537 udp
192.168.56.14 8.8.4.4 55827 53 219.6561861038208 udp
192.168.56.14 8.8.4.4 55914 53 101.34433698654175 udp
192.168.56.14 8.8.4.4 56399 53 130.5313241481781 udp
192.168.56.14 8.8.4.4 56864 53 519.531149148941 udp
192.168.56.14 8.8.4.4 57742 53 327.95322012901306 udp
192.168.56.14 8.8.4.4 59068 53 299.2347221374512 udp
192.168.56.14 8.8.4.4 59212 53 533.8910090923309 udp
192.168.56.14 8.8.4.4 60117 53 72.0623459815979 udp
192.168.56.14 8.8.4.4 60713 53 234.01624703407288 udp
192.168.56.14 8.8.4.4 62022 53 116.1099681854248 udp
192.168.56.14 8.8.4.4 62112 53 52.90702819824219 udp
192.168.56.14 8.8.4.4 62548 53 177.85967803001404 udp
192.168.56.14 8.8.4.4 62800 53 252.26540398597717 udp
192.168.56.14 8.8.4.4 63205 53 163.171648979187 udp
192.168.56.14 8.8.4.4 64452 53 370.9223561286926 udp
192.168.56.14 8.8.4.4 64753 53 81.78204607963562 udp
192.168.56.14 8.8.4.4 65148 53 37.28148913383484 udp
192.168.56.14 8.8.4.4 65283 53 505.1722960472107 udp
192.168.56.14 8.8.8.8 49916 53 78.24553513526917 udp
192.168.56.14 8.8.8.8 50180 53 104.85161900520325 udp
192.168.56.14 8.8.8.8 50870 53 279.9849121570587 udp
192.168.56.14 8.8.8.8 50914 53 204.30882501602173 udp
192.168.56.14 8.8.8.8 51262 53 265.62582516670227 udp
192.168.56.14 8.8.8.8 51614 53 355.56354212760925 udp
192.168.56.14 8.8.8.8 52556 53 341.2047781944275 udp
192.168.56.14 8.8.8.8 52815 53 21.782238006591797 udp
192.168.56.14 8.8.8.8 53449 53 312.594269990921 udp
192.168.56.14 8.8.8.8 54579 53 66.33042907714844 udp
192.168.56.14 8.8.8.8 54683 53 147.80336999893188 udp
192.168.56.14 8.8.8.8 55094 53 8.344003200531006 udp
192.168.56.14 8.8.8.8 55827 53 218.65721106529236 udp
192.168.56.14 8.8.8.8 55914 53 100.35492300987244 udp
192.168.56.14 8.8.8.8 56399 53 129.53572702407837 udp
192.168.56.14 8.8.8.8 56864 53 518.5332021713257 udp
192.168.56.14 8.8.8.8 57742 53 326.9536030292511 udp
192.168.56.14 8.8.8.8 59068 53 298.23528003692627 udp
192.168.56.14 8.8.8.8 59212 53 532.8913440704346 udp
192.168.56.14 8.8.8.8 60117 53 71.07403016090393 udp
192.168.56.14 8.8.8.8 60713 53 233.01605606079102 udp
192.168.56.14 8.8.8.8 62022 53 115.12036299705505 udp
192.168.56.14 8.8.8.8 62112 53 51.91369414329529 udp
192.168.56.14 8.8.8.8 62548 53 176.87357020378113 udp
192.168.56.14 8.8.8.8 62800 53 251.26603603363037 udp
192.168.56.14 8.8.8.8 63205 53 162.1864001750946 udp
192.168.56.14 8.8.8.8 64452 53 369.92217206954956 udp
192.168.56.14 8.8.8.8 64753 53 80.79368305206299 udp
192.168.56.14 8.8.8.8 65148 53 36.28981614112854 udp
192.168.56.14 8.8.8.8 65283 53 504.1746389865875 udp

Hunting tip: alert on unknown binaries initiating TLS to IP‑lookup services or unusual CDN endpoints — especially early in execution.

Persistence & Policy — Registry and Services

Registry and service telemetry points to policy awareness and environment reconnaissance rather than noisy persistence. Below is a compact view of the most relevant keys and handles; expand to see the full lists where available.

Registry Opened

447

Registry Set

169

Services Started

2

Services Opened

3

Registry Opened (Top 25)

Key
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8645456f-d9a2-4b82-afec-58f0e8df0acf}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8645456F-D9A2-4B82-AFEC-58F0E8DF0ACF}
HKEY_LOCAL_MACHINE\Software\Microsoft\StrongName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\TrustLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\DllPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\ActivateAsUser
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\Diagnosis
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\AppId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\CommandLine
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\Server
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ExplicitPsmActivationType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\ActivateInSharedBroker
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\RemoteServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\TrustLevel
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\STE
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C53E07EC-25F3-4093-AA39-FC67EA22E99D}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4005801669-2598574594-602355426-1001\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\MDMEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\SKUs\default
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{657A8842-0B5E-40E1-B8CB-9AAFACC33AAB}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InprocHandler
HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsRuntime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\AppContext
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\RemoteServer
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize\AppsUseLightTheme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateAsUser
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{89bc3f49-f8d9-5103-ba13-de497e609167}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ServerType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{89bc3f49-f8d9-5103-ba13-de497e609167}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateOnHostFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateInSharedBroker
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\Release
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ExePath
Show all (447 total)
Key
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AF86E2E0-B12D-4c6a-9C5A-D7AA65101E90}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\ActivationType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{89BC3F49-F8D9-5103-BA13-DE497E609167}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\Server
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\OnlyUseLatestCLR
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ActivatableClasses
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AF86E2E0-B12D-4c6a-9C5A-D7AA65101E90}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\ActivateOnHostFlags
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|<USER>|Desktop|FREE PANEL.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AF86E2E0-B12D-4C6A-9C5A-D7AA65101E90}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateInBrokerForMediumILContainer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\Permissions
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\CustomAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\CustomAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\Identity
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\Threading
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ServiceName
Policy\Standards
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\UseRyuJIT
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FREE PANEL.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivationType
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4005801669-2598574594-602355426-1001\Installer\Assemblies\C:|Users|<USER>|Desktop|FREE PANEL.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\DllPath
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\FeatureSIMD
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8645456f-d9a2-4b82-afec-58f0e8df0acf}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\NGen\Policy\v4.0\OptimizeUsedBinaries
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{657A8842-0B5E-40E1-B8CB-9AAFACC33AAB}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\ActivateOnHostFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\Threading
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\Permissions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\IdentityType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\CustomAttributes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{657A8842-0B5E-40E1-B8CB-9AAFACC33AAB}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\LegacyWPADSupport
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RuntimeBroker\ImagePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\HWRPortReuseOnSocketBind
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones\W. Europe Standard Time\Dynamic DST
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones\W. Europe Standard Time\MUI_Dlt
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones\W. Europe Standard Time\MUI_Std
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\InstallationType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones\W. Europe Standard Time\MUI_Display
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT\DontOfferThroughWUAU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RuntimeBroker
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones\W. Europe Standard Time
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones\W. Europe Standard Time\TZI
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RuntimeBroker\Start
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\Global
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\C:|Users|azure|Downloads|FREE PANEL.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Numerics__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Servicing
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\UseLegacyIdentityFormat
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FrameMerging
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\IdentifierLimit
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\ForceLog
HKEY_CURRENT_USER\Software
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_CLASSES_ROOT\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\Standards\v4.0.30319
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\CreateUriCacheSize
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\EnableLog
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\OnlyUseLatestCLR
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0\OptimizeUsedBinaries
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\DisableMSIPeek
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\index9
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\TabProcGrowth
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default
HKEY_LOCAL_MACHINE\System\Setup\SystemSetupInProgress
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnablePunycode
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\KindMap
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\Latest
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseMillisecondsBetweenRetries
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs\default
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\CLRLoadLogDir
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\SpecialFoldersCacheSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\DownloadCacheQuotaInKB
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Microsoft Windows Search protocol Host.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\WMIDisableCOMSecurity
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseRetryAttempts
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\EnablePunycode
HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\Microsoft\Internet Explorer\Security
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework\Policy\Standards
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\FeatureSIMD
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\CacheLocation
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONES_CHECK_ZONEMAP_POLICY_KB941001
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\LegacyPolicyTimeStamp
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FrameTabWindow
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security\DisableSecuritySettingsCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FREE NEW PANEL.exe
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\Microsoft\Internet Explorer\Security\DisableSecuritySettingsCheck
HKEY_CLASSES_ROOT\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32\0x0
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|azure|AppData|Local|Temp|FREE NEW PANEL.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CreateUriCacheSize
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
HKEY_LOCAL_MACHINE\Software\Policies
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseRyuJIT
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogResourceBinds
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Realtek HD Audio Universal Service.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\System\Setup
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml__b77a5c561934e089
HKEY_CLASSES_ROOT\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\OleAut
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_INITIALIZE_URLACTION_SHELLEXECUTE_TO_ALLOW_KB936610
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\FeatureControl
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ContextLimit
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SessionMerging
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONES_DEFAULT_DRIVE_INTRANET_KB941000
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\DisableConfigCache
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|azure|Downloads|FREE PANEL.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System__b77a5c561934e089
HKEY_CLASSES_ROOT\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32\0x0
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\AdminTabProcs
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Numerics__b77a5c561934e089
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IGNORE_POLICIES_ZONEMAP_IF_ESC_ENABLED_KB918915
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\EnablePrivateObjectHeap
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LoggingLevel
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\SpecialFoldersCacheSize
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ProcessID
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ObjectLimit
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NoClientChecks
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\v4.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\C:|Users|azure|AppData|Local|Temp|FREE NEW PANEL.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ALLOW_REVERSE_SOLIDUS_IN_USERINFO_KB932562
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogFailures
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|azure|AppData|Local|Temp|FREE NEW PANEL.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|azure|Downloads|FREE PANEL.exe
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_PROTOCOL_LOCKDOWN
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\APTCA
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\LocalServer
HKEY_CURRENT_USER_Classes\exefile\DocObject
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1C1C45EE-4395-11D2-B60B-00104B703EFD}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\InprocHandler
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\KnownFolders
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\BrowseInPlace
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_CURRENT_USER_Classes\Directory\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\LocalServer32
HKEY_CURRENT_USER_Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\ShellFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\ShellEx\IconHandler
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9F6C78EF-FCE5-42FA-ABEA-3E7DF91921DC}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\CurVer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocHandler32
HKEY_CURRENT_USER_Classes\AllFilesystemObjects
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{423EC01E-2E35-11D2-B604-00104B703EFD}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|user|Desktop|FREE PANEL.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_CURRENT_USER_Classes\Drive\shellex\FolderExtensions
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocServer32
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AllowedEnumeration
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocHandler32
HKEY_CURRENT_USER_Classes\Folder\BrowseInPlace
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\
HKEY_CURRENT_USER_Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{423EC01E-2E35-11D2-B604-00104B703EFD}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\Microsoft Windows Search protocol Host.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\Realtek HD Audio Universal Service.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\InprocServer32
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\policy\v4.0
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\BrowseInPlace
HKEY_CURRENT_USER_Classes\exefile\CurVer
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\Clsid
HKEY_CURRENT_USER_Classes\Directory
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D4781CD6-E5D3-44DF-AD94-930EFE48A887}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\Elevation
HKEY_CURRENT_USER_Classes\exefile\Clsid
HKEY_CURRENT_USER_Classes\Directory\DocObject
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9F6C78EF-FCE5-42FA-ABEA-3E7DF91921DC}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{027947E1-D731-11CE-A357-000000000001}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\ShellFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\LocalServer32
HKEY_LOCAL_MACHINE\OSDATA\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9556DC99-828C-11CF-A37E-00AA003240C7}
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\DocObject
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\KnownFolderSettings
HKEY_CURRENT_USER_Classes\exefile\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocHandler
HKEY_CURRENT_USER_Classes\Directory\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\DocObject
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\policy\standards\v4.0.30319
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F309AD18-D86A-11D0-A075-00C04FB68820}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance\NULL
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Standards
HKEY_CURRENT_USER\Software\Microsoft\Fusion
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\NULL
HKEY_CURRENT_USER_Classes\CLSID\{59031a47-3f72-44a7-89c5-5595fe6b30ee}\ShellFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\LocalServer32
HKEY_CURRENT_USER_Classes\Folder\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance\InitPropertyBag
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F309AD18-D86A-11D0-A075-00C04FB68820}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\InprocHandler32
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
HKEY_CURRENT_USER_Classes\exefile\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9556DC99-828C-11CF-A37E-00AA003240C7}\ProxyStubClsid32
HKEY_CURRENT_USER_Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\ShellFolder
HKEY_CURRENT_USER_Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D4781CD6-E5D3-44DF-AD94-930EFE48A887}\ProxyStubClsid32
HKEY_CURRENT_USER_Classes\exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\InprocHandler
HKEY_CURRENT_USER_Classes\Folder\DocObject
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\ShellEx\IconHandler
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\ShellFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocHandler
HKEY_CURRENT_USER_Classes\Drive\shellex\FolderExtensions\{fbeb8a05-beee-4442-804e-409d6c4515e9}
HKEY_CURRENT_USER_Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance\InitPropertyBag
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum
HKEY_CURRENT_USER_Classes
HKEY_CURRENT_USER_Classes\Folder\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1C1C45EE-4395-11D2-B60B-00104B703EFD}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\InprocHandler
HKEY_CURRENT_USER_Classes\.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\TreatAs
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\DocObject
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|user|Desktop|FREE PANEL.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{027947E1-D731-11CE-A357-000000000001}\ProxyStubClsid32
HKEY_CURRENT_USER_Classes\Folder
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\LocalServer32
HKEY_CURRENT_USER_Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
HKEY_CURRENT_USER_Classes\Directory\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocHandler32
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\LocalServer32
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\BrowseInPlace
HKEY_CURRENT_USER\Control Panel\International\Geo
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\Elevation
HKEY_CURRENT_USER\Software\Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4DF0C730-DF9D-4AE3-9153-AA6B82E9795A}

Registry Set (Top 25)

Key Value
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\SessionIdHigh
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\SessionIdLow
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\AutoLogger\Circular Kernel Context Logger\Status 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASAPI32\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASAPI32\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASAPI32\EnableFileTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASAPI32\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASAPI32\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASAPI32\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASMANCS\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASMANCS\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASMANCS\EnableFileTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASMANCS\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASMANCS\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Google Chrome_RASMANCS\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\EnableFileTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\EnableFileTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\EnableFileTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\EnableFileTracing 0
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\MaxFileSize 1048576
\\Registry\Machine\COMPONENTS\ServicingStackVersions\6.1.7601.24537 (win7sp1_ldr_escrow.191114-1547)
\\Registry\Machine\SOFTWARE\Policies\Microsoft\MRT\DontOfferThroughWUAU
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\EnableFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\EnableAutoFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\FileTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\ConsoleTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\EnableFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\EnableAutoFileTracing 0
Show all (169 total)
Key Value
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\FileTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\ConsoleTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\EnableFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\EnableAutoFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\FileTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\ConsoleTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\EnableFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\EnableAutoFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\FileTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\ConsoleTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\EnableFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\EnableAutoFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\FileTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\ConsoleTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\EnableFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\EnableAutoFileTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\EnableConsoleTracing 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\FileTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\ConsoleTracingMask 18446744073709486080
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\MaxFileSize 1048576
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\FileDirectory %windir%\tracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\FileTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\ConsoleTracingMask 4294901760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\FileTracingMask 4294901760
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect 1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet 0
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT\DontOfferThroughWUAU
HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\RuntimeBroker\Start DWORD (0x00000002)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\RuntimeBroker\ImagePath C:\ProgramData\CC\RuntimeBroker.exe
HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\WinRing0_1_2_0\Start DWORD (0x00000003)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\WinRing0_1_2_0\ImagePath \??\C:\Windows\TEMP\iwfkfljvgcxe.sys
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids\exefile Binary Data
HKEY_LOCAL_MACHINE\SYSTEM\Software\Microsoft\TIP\AggregateResults\data D9 A7 A8 01 01 00 03 00 EC 03 F4 6F 00 00 00 00 07 00 00 00 12 00 00 00 D1 A8 A8 01 01 00 04 00 FB 3
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\FileTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASAPI32\ConsoleTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\FileTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Microsoft Windows Search protocol Host_RASMANCS\ConsoleTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT\DontOfferThroughWUAU 1
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\FileTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32\ConsoleTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\FileTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS\ConsoleTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\FileTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32\ConsoleTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\FileTracingMask -65536
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS\ConsoleTracingMask -65536
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\ProgramId 0006e0633d6fd05ca5cbd9cc2707340a796200000000
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\FileId 0000fb7349c0b33fad099bc542391d0bb994f8e18ad2
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\LowerCaseLongPath c:\users\user\appdata\local\temp\microsoft windows search protocol host.exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\Name Microsoft Windows Search protocol Host.exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\OriginalFileName microsoft windows search protocol host.exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\Version 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\BinFileVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\BinaryType pe32_clr_il
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\ProductVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\LinkDate 09/12/2025 14:05:25
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\BinProductVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\Size 00 40 01 00 00 00 00 00
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\Language 0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\microsoft window|935b5c8915be8280\Usn 68 3A B6 0F 00 00 00 00
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\ProgramId 00068d3406b66b0a8635ee99debc62f61c2600000000
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\FileId 000041cdea99641e483cc3aff8490efba5f52df08ec5
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\LowerCaseLongPath c:\users\user\appdata\local\temp\realtek hd audio universal service.exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\Name Realtek HD Audio Universal Service.exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\OriginalFileName realtek hd audio universal service.exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\Version 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\BinFileVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\BinaryType pe32_clr_il
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\ProductVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\LinkDate 08/27/2025 18:10:54
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\BinProductVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\Size 00 A0 00 00 00 00 00 00
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\Language 0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\realtek hd audio|d59d2dfb64c97634\Usn 18 48 B6 0F 00 00 00 00
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6\Blob 03 00 00 00 01 00 00 00 14 00 00 00 2C 85 00 6A 1A 02 8B CC 34 9D F2 3C 47 47 24 C0 55 FD E8 B6 20 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C\Blob 03 00 00 00 01 00 00 00 14 00 00 00 B6 8D 8F 95 3E 55 19 14 32 4E 55 7E 61 64 D6 8B 99 26 65 0C 20 0
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02rabqgnbgpxtmsq\Reason -2147187453
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02rabqgnbgpxtmsq\AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\ValidDeviceId
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\ProgramId 000654245c03f187a04da27bf2a164e04e2700000000
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\FileId 00001e4a10add407f416a96b804f258be1fd2a28c51e
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\LowerCaseLongPath c:\programdata\google chrome..exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\Name Google Chrome..exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\OriginalFileName google chrome..exe
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\Version 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\BinFileVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\BinaryType pe32_clr_il
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\ProductVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\LinkDate 09/09/2025 07:12:21
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\BinProductVersion 1.0.0.0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\Size 00 06 03 00 00 00 00 00
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\Language 0
\REGISTRY\A\{899cd467-6f8d-bbf4-7e95-a78b6fd47080}\Root\InventoryApplicationFile\google chrome..e|524202e131ba97f7\Usn B8 61 B6 0F 00 00 00 00

Services Started (Top 15)

Service
BITS
WSearch

Services Opened (Top 15)

Service
SSTPSVC
VaultSvc
clipsvc

What To Do Now — Practical Defense Playbook

  • Contain unknowns: block first‑run binaries by default — signatures catch up, containment works now.
  • EDR controls: alert on keyboard hooks, screen capture APIs, VM/sandbox checks, and command‑shell launches.
  • Registry watch: flag queries/sets under policy paths (e.g., …\FipsAlgorithmPolicy\*).
  • Network rules: inspect outbound TLS to IP‑lookup services and unexpected CDN endpoints.
  • Hunt broadly: sweep endpoints for the indicators above and quarantine positives immediately.

Dwell time equals attacker opportunity. Reducing execution privileges and egress shrinks that window even when vendors disagree.

Scroll to Top