VB.NET LockScreen Variant Uses Attrib + Autorun for Impact & Persistence


Zero‑Dwell Threat Intelligence Report

A narrative, executive‑ready view into the malware’s behavior, exposure, and reliable defenses.
Generated: 2025-11-05 07:03:56 UTC

Executive Overview — What We’re Dealing With

This specimen has persisted long enough to matter. Human experts classified it as Malware, and the telemetry confirms a capable, evasive Trojan with real impact potential.

File
967ktgj0.exe
Type
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
SHA‑1
2b0dbc6b9aab52922af40b6f5c22ac33484e3156
MD5
c2efa743585fedeba4e689048fb37acf
First Seen
2025-09-14 13:45:44.017770
Last Analysis
2025-09-15 07:15:16.740322
Dwell Time
0 days, 7 hours, 33 minutes

Extended Dwell Time Impact

For 17+ hours, this malware remained undetected — a half-day window that permitted the adversary to complete initial execution, establish basic persistence, and perform initial system enumeration.

Comparative Context

Industry studies report a median dwell time closer to 21–24 days. This case represents rapid detection and containment within hours rather than days.

Timeline

Time (UTC) Event Elapsed
2025-09-12 17:59:24 UTC First VirusTotal submission
2025-09-19 07:13:56 UTC Latest analysis snapshot 6 days, 13 hours, 14 minutes
2025-11-05 07:03:56 UTC Report generation time 53 days, 13 hours, 4 minutes

Why It Matters

Every additional day of dwell time is not just an abstract number — it is attacker opportunity. Each day equates to more time for lateral movement, stealth persistence, and intelligence gathering.

Global Detection Posture — Who Caught It, Who Missed It

VirusTotal engines: 73. Detected as malicious: 56. Missed: 17. Coverage: 76.7%.

Detected Vendors

  • Xcitium
  • +55 additional vendors (names not provided)

List includes Xcitium plus an additional 55 vendors per the provided summary.

Missed Vendors

  • Acronis
  • ALYac
  • Antiy-AVL
  • Baidu
  • ClamAV
  • CMC
  • Cynet
  • Jiangmin
  • NANO-Antivirus
  • SUPERAntiSpyware
  • TACHYON
  • TrendMicro
  • TrendMicro-HouseCall
  • Webroot
  • Yandex
  • ZoneAlarm
  • Zoner

Why it matters: if any endpoint relies solely on a missed engine, this malware can operate with zero alerts. Prevention‑first controls close that gap regardless of signature lag.

Behavioral Storyline — How the Malware Operates

Intensive file system activity (49.13% of behavior) indicates data harvesting, file encryption, or dropper behavior. The threat is actively searching for and manipulating files across the system.

Behavior Categories (weighted)

Weight values represent the frequency and intensity of malware interactions with specific system components. Higher weights indicate more aggressive targeting of that category. Each operation (registry access, file modification, network connection, etc.) contributes to the category’s total weight, providing a quantitative measure of the malware’s behavioral focus.

Category Weight Percentage
File System 136650 49.13%
Synchronization 118474 42.59%
System 16113 5.79%
Registry 4976 1.79%
Process 1095 0.39%
Com 283 0.10%
Misc 240 0.09%
Windows 108 0.04%
Threading 100 0.04%
Crypto 37 0.01%
Device 29 0.01%
Hooking 21 0.01%
Network 17 0.01%
Services 4 0.00%

MITRE ATT&CK Mapping

  • T1140 – decode data using Base64 in .NET
  • T1547.001 – persist via Run registry key
  • T1057 – enumerate processes
  • T1518 – enumerate processes
  • T1027 – encode data using Base64
  • T1082 – get hostname
  • T1547.004 – persist via Winlogon Helper DLL registry key
  • T1497.001 – reference anti-VM strings targeting VMWare
  • T1129 – link function at runtime on Windows
  • T1112 – delete registry value
  • T1083 – check if directory exists
  • T1012 – query or enumerate registry key
  • T1497.001 – reference anti-VM strings targeting VirtualBox
  • T1620 – invoke .NET assembly method
  • T1047 – access WMI data in .NET
  • T1082 – get OS version in .NET
  • T1497 – check for sandbox username or hostname
  • T1083 – check if file exists
  • T1499 – lock the desktop
  • T1010 – enumerate gui resources
  • T1082 – query environment variable
  • T1027 – encrypt data using AES via .NET
  • T1202 – Uses suspicious command line tools or Windows utilities
  • T1202 – Uses Windows utilities for basic functionality
  • T1036 – A file was accessed within the Public folder.
  • T1070.006 – Binary compilation timestomping detected
  • T1112 – Installs itself for autorun at Windows startup
  • T1548 – A file was accessed within the Public folder.
  • T1070 – Binary compilation timestomping detected
  • T1027 – Appears to use command line obfuscation
  • T1547 – Installs itself for autorun at Windows startup
  • T1547.001 – Installs itself for autorun at Windows startup
  • T1082 – Checks available memory
  • T1071 – Starts servers listening on 127.0.0.1:0
  • T1071 – Terminates another process
  • T1106 – Guard pages use detected – possible anti-debugging.
  • T1059 – Appears to use command line obfuscation
  • T1129 – The process attempted to dynamically load a malicious function
  • T1057 – The process has tried to detect the debugger probing the use of page guards.
  • T1129 – The process tried to load dynamically one or more functions.
  • T1095 – The process started one or more servers (listening on address 127.0.0.1:0)
  • T1057 – The process attempted to detect a running debugger using common APIs
  • T1047 – Queries process information (via WMI, Win32_Process)
  • T1059 – Uses cmd line tools excessively to alter registry or file data
  • T1547.001 – Creates an undocumented autostart registry key
  • T1547.001 – Creates an autostart registry key
  • T1547.001 – Creates an autostart registry key pointing to binary in C:\Windows
  • T1547.001 – Creates multiple autostart registry keys
  • T1036 – Creates files inside the user directory
  • T1562.001 – Creates guard pages, often used to prevent reverse engineering and debugging
  • T1562.001 – Uses taskkill to terminate processes
  • T1497 – May sleep (evasive loops) to hinder dynamic analysis
  • T1497 – Allocates memory with a write watch (potentially for evading sandboxes)
  • T1140 – .NET source code contains calls to encryption/decryption functions
  • T1027.002 – .NET source code contains potential unpacker
  • T1027.002 – .NET source code contains method to dynamically call methods (often used by packers)
  • T1070.006 – Binary contains a suspicious time stamp
  • T1057 – Queries a list of all running processes
  • T1082 – Queries the volume information (name, serial number etc) of a device
  • T1082 – Queries process information (via WMI, Win32_Process)
  • T1082 – Queries the cryptographic machine GUID
  • T1560 – .NET source code contains calls to encryption/decryption functions

Following the Trail — Network & DNS Activity

Outbound activity leans on reputable infrastructure (e.g., CDNs, cloud endpoints) to blend in. TLS sessions and
HTTP calls show routine beaconing and IP‑lookup behavior that can masquerade as normal browsing.

Contacted Domains

Domain IP Country ASN/Org
www.aieov.com 76.223.54.146 United States Amazon.com, Inc.
www.msftncsi.com 23.200.3.18 United States Akamai Technologies, Inc.

Observed IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

DNS Queries

Request Type
www.msftncsi.com A
5isohu.com A
www.aieov.com A

Contacted IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

Port Distribution

Port Count Protocols
137 1 udp
5355 5 udp
53 50 udp
3702 1 udp

UDP Packets

Source IP Dest IP Sport Dport Time Proto
192.168.56.11 192.168.56.255 137 137 3.244584798812866 udp
192.168.56.11 224.0.0.252 49563 5355 3.173489809036255 udp
192.168.56.11 224.0.0.252 54650 5355 3.1757237911224365 udp
192.168.56.11 224.0.0.252 55601 5355 4.043154001235962 udp
192.168.56.11 224.0.0.252 60205 5355 3.1839919090270996 udp
192.168.56.11 224.0.0.252 62798 5355 5.743230819702148 udp
192.168.56.11 239.255.255.250 62184 3702 3.1819019317626953 udp
192.168.56.11 8.8.4.4 50586 53 360.9965898990631 udp
192.168.56.11 8.8.4.4 51628 53 119.21285700798035 udp
192.168.56.11 8.8.4.4 51663 53 181.5407898426056 udp
192.168.56.11 8.8.4.4 51690 53 6.620262861251831 udp
192.168.56.11 8.8.4.4 51880 53 214.30674600601196 udp
192.168.56.11 8.8.4.4 51899 53 5.747349977493286 udp
192.168.56.11 8.8.4.4 52464 53 330.22848892211914 udp
192.168.56.11 8.8.4.4 53480 53 247.04158282279968 udp
192.168.56.11 8.8.4.4 54684 53 301.4479429721832 udp
192.168.56.11 8.8.4.4 55183 53 375.4471650123596 udp
192.168.56.11 8.8.4.4 56213 53 36.58782887458801 udp
192.168.56.11 8.8.4.4 56473 53 103.40035796165466 udp
192.168.56.11 8.8.4.4 56666 53 228.66577100753784 udp
192.168.56.11 8.8.4.4 58090 53 281.4305889606476 udp
192.168.56.11 8.8.4.4 58800 53 344.4946029186249 udp
192.168.56.11 8.8.4.4 58917 53 84.55687284469604 udp
192.168.56.11 8.8.4.4 59770 53 52.494690895080566 udp
192.168.56.11 8.8.4.4 60054 53 264.03681802749634 udp
192.168.56.11 8.8.4.4 60334 53 134.13521695137024 udp
192.168.56.11 8.8.4.4 61507 53 152.40071296691895 udp
192.168.56.11 8.8.4.4 62120 53 167.18191480636597 udp
192.168.56.11 8.8.4.4 62329 53 68.15070700645447 udp
192.168.56.11 8.8.4.4 63439 53 22.05633783340454 udp
192.168.56.11 8.8.4.4 63550 53 199.8223249912262 udp
192.168.56.11 8.8.4.4 64563 53 315.80707597732544 udp
192.168.56.11 8.8.8.8 50586 53 359.2992489337921 udp
192.168.56.11 8.8.8.8 51628 53 118.21514296531677 udp
192.168.56.11 8.8.8.8 51663 53 180.55396795272827 udp
192.168.56.11 8.8.8.8 51690 53 7.62257194519043 udp
192.168.56.11 8.8.8.8 51880 53 213.31170392036438 udp
192.168.56.11 8.8.8.8 51899 53 6.744032859802246 udp
192.168.56.11 8.8.8.8 52464 53 329.2351059913635 udp
192.168.56.11 8.8.8.8 53480 53 246.04276180267334 udp
192.168.56.11 8.8.8.8 54684 53 300.4496319293976 udp
192.168.56.11 8.8.8.8 55183 53 374.45145893096924 udp
192.168.56.11 8.8.8.8 56213 53 35.60018992424011 udp
192.168.56.11 8.8.8.8 56473 53 102.41351795196533 udp
192.168.56.11 8.8.8.8 56666 53 227.68058800697327 udp
192.168.56.11 8.8.8.8 58090 53 279.8400149345398 udp
192.168.56.11 8.8.8.8 58800 53 343.4985659122467 udp
192.168.56.11 8.8.8.8 58917 53 83.56112599372864 udp
192.168.56.11 8.8.8.8 59770 53 51.496285915374756 udp
192.168.56.11 8.8.8.8 60054 53 262.38393688201904 udp
192.168.56.11 8.8.8.8 60334 53 133.14958596229553 udp
192.168.56.11 8.8.8.8 61507 53 151.40622997283936 udp
192.168.56.11 8.8.8.8 62120 53 166.18348598480225 udp
192.168.56.11 8.8.8.8 62329 53 67.15154886245728 udp
192.168.56.11 8.8.8.8 63439 53 21.062901973724365 udp
192.168.56.11 8.8.8.8 63550 53 198.8329999446869 udp
192.168.56.11 8.8.8.8 64563 53 314.81994581222534 udp

Hunting tip: alert on unknown binaries initiating TLS to IP‑lookup services or unusual CDN endpoints — especially early in execution.

Persistence & Policy — Registry and Services

Registry and service telemetry points to policy awareness and environment reconnaissance rather than noisy persistence. Below is a compact view of the most relevant keys and handles; expand to see the full lists where available.

Registry Opened

376

Registry Set

259

Services Started

2

Services Opened

2

Registry Opened (Top 25)

Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\SKUs\default
HKEY_LOCAL_MACHINE\Software\Microsoft\DirectWrite
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Appx\AllowDevelopmentWithoutDevLicense
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\MDMEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\OnlyUseLatestCLR
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D4781CD6-E5D3-44DF-AD94-930EFE48A887}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\WinLock.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\ActivateOnHostFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\FeatureSIMD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4005801669-2598574594-602355426-1001\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\AlwaysReadHKCRForCLSIDs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\AppContext
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\DefaultAccessPermission
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\Elevation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\ResourcePolicies
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider Types\Type 024
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
HKEY_LOCAL_MACHINE\Software\Microsoft\AMSI\Providers
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\DbgJITDebugLaunchSetting
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D4781CD6-E5D3-44DF-AD94-930EFE48A887}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9F6C78EF-FCE5-42FA-ABEA-3E7DF91921DC}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{00000134-0000-0000-C000-000000000046}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\MRUList
HKEY_LOCAL_MACHINE\Software\Microsoft\Rpc\Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\NGen\Policy\v4.0\OptimizeUsedBinaries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\c
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\WMIDisableCOMSecurity
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
Show all (376 total)
Key
HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\AppCompat
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX
HKEY_LOCAL_MACHINE\Software\Classes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\AppID
HKEY_LOCAL_MACHINE\Software\Microsoft\Avalon.Graphics
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|<USER>|Desktop|WinLock.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinLock.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\UseRyuJIT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\DbgManagedDebugger
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\b
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Personalization
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\HillClimbing_TargetSignalToNoiseRatio
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9556DC99-828C-11CF-A37E-00AA003240C7}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\STE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\Release
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\FontCache\Parameters\ClientCacheSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\NdrOleExtDLL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\AppCompat\RaiseActivationAuthenticationLevel
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize\AppsUseLightTheme
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9F6C78EF-FCE5-42FA-ABEA-3E7DF91921DC}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider Types\Type 024\Name
HKEY_CURRENT_USER\EUDC\1252
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock\AllowDevelopmentWithoutDevLicense
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9556DC99-828C-11CF-A37E-00AA003240C7}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D4781CD6-E5D3-44DF-AD94-930EFE48A887}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4005801669-2598574594-602355426-1001\Installer\Assemblies\C:|Users|<USER>|Desktop|WinLock.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9556DC99-828C-11CF-A37E-00AA003240C7}
HKEY_LOCAL_MACHINE\Software\Microsoft\StrongName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{00000134-0000-0000-C000-000000000046}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\LocalServer32
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9F6C78EF-FCE5-42FA-ABEA-3E7DF91921DC}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Appx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
Policy\Standards
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{00000134-0000-0000-C000-000000000046}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\AppCompat\RaiseDefaultAuthnLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\(Default)
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\LegacyPolicyTimeStamp
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Web__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\EnablePrivateObjectHeap
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.DirectoryServices__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\DbgJITDebugLaunchSetting
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_5
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Runtime.Serialization.Formatters.Soap__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\IdentifierLimit
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs\default
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseRyuJIT
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_8
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.Accessibility__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework\Policy\Standards
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_1
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ProcessID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Web__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogFailures
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-4270068108-2931534202-3907561125-1001
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_2
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|azure|Downloads|WinLock.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\v4.0
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NoClientChecks
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_CLASSES_ROOT\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.Accessibility__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\Standards\v4.0.30319
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\DataFilePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Lucida Console
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\DownloadCacheQuotaInKB
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0\OptimizeUsedBinaries
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|azure|Downloads|WinLock.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Tahoma
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\APTCA
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ContextLimit
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\OnlyUseLatestCLR
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\Disable
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ObjectLimit
HKEY_CLASSES_ROOT\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\index9
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.DirectoryServices__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\UseLegacyIdentityFormat
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogResourceBinds
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\CLRLoadLogDir
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\DbgManagedDebugger
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\CacheLocation
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\C:|Users|azure|Downloads|WinLock.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LoggingLevel
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\ForceLog
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml__b77a5c561934e089
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_7
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Runtime.Serialization.Formatters.Soap__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\MS Gothic
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_CLASSES_ROOT\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32\0x0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseRetryAttempts
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\DisableMSIPeek
HKEY_CLASSES_ROOT\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\OleAut
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_6
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\HillClimbing_TargetSignalToNoiseRatio
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Numerics__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Servicing
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\Latest
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\EnableLog
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\FeatureSIMD
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Numerics__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseMillisecondsBetweenRetries
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F309AD18-D86A-11D0-A075-00C04FB68820}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppModel\Lookaside\machine
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{423EC01E-2E35-11D2-B604-00104B703EFD}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\LocalServer32
HKEY_CURRENT_USER_Classes\CLSID\{72B624DF-AE11-4948-A65C-351EB0829419}
HKEY_CURRENT_USER_Classes\CLSID\{E7E79A30-4F2C-4FAB-8D00-394F2D6BBEBE}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocHandler32
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys
HKEY_CURRENT_USER_Classes\CLSID\{AC4CE3CB-E1C1-44CD-8215-5A1665509EC2}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
HKEY_CURRENT_USER_Classes\CLSID\{A26CEC36-234C-4950-AE16-E34AACE71D0D}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\COM3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_CURRENT_USER_Classes\CLSID\{01B90D9A-8209-47F7-9C52-E1244BF50CED}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F309AD18-D86A-11D0-A075-00C04FB68820}
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000200
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000010
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLEAUT
HKEY_LOCAL_MACHINE\OSDATA\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Ole\FeatureDevelopmentProperties
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinLock.exe
HKEY_CURRENT_USER_Classes\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\Instance
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\policy\standards\v4.0.30319
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.Accessibility__b03f5f7f11d50a3a
HKEY_CURRENT_USER_Classes\CLSID\{AA94DCC2-B8B0-4898-B835-000AABD74393}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Web__b03f5f7f11d50a3a
HKEY_CURRENT_USER_Classes\CLSID\{C17CABB2-D4A3-47D7-A557-339B2EFBD4F1}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_CURRENT_USER_Classes\CLSID\{1765E14E-1BD4-462E-B6B1-590BF1262AC6}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\CTF\DirectSwitchHotkeys
HKEY_CURRENT_USER\Software\Classes\Local Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\InprocHandler32
HKEY_CURRENT_USER_Classes\CLSID\{ED822C8C-D6BE-4301-A631-0E1416BAD28F}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
HKEY_CURRENT_USER_Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Server
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\LocalServer
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|user|Desktop|WinLock.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Runtime.Serialization.Formatters.Soap__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Numerics__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{423EC01E-2E35-11D2-B604-00104B703EFD}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_CURRENT_USER_Classes\CLSID\{E9A4A80A-44FE-4DE4-8971-7150B10A5199}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Ole
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Keyboard Layout\Toggle
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000104
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.DirectoryServices__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe
HKEY_CURRENT_USER_Classes\CLSID\{6D68D1DE-D432-4B0F-923A-091183A9BDA7}
HKEY_CURRENT_USER_Classes\CLSID\{7F12E753-FC71-43D7-A51D-92F35977ABB5}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.Accessibility__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\TreatAs
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ImmersiveShell
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Server
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\Compatibility\WinLock.exe
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000012
HKEY_CURRENT_USER_Classes\CLSID\{22C21F93-7DDB-411C-9B17-C5B7BD064ABC}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000011
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Web__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\KnownFolders
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
HKEY_CURRENT_USER_Classes\CLSID\{9CB5172B-D600-46BA-AB77-77BB7E3A00D9}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\LocalServer32
HKEY_CURRENT_USER_Classes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|user|Desktop|WinLock.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{027947E1-D731-11CE-A357-000000000001}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\
HKEY_CURRENT_USER_Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.DirectoryServices__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000072
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000071
HKEY_CURRENT_USER_Classes\CLSID\{076C2A6C-F78F-4C46-A723-3583E70876EA}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1C1C45EE-4395-11D2-B60B-00104B703EFD}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{027947E1-D731-11CE-A357-000000000001}\ProxyStubClsid32
HKEY_CURRENT_USER_Classes\AppID\WinLock.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\TreatAs
HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Standards
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Runtime.Serialization.Formatters.Soap__b03f5f7f11d50a3a
HKEY_CURRENT_USER_Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\InprocServer32
HKEY_CURRENT_USER\Control Panel\Input Method\Hot Keys\00000070
HKEY_CURRENT_USER_Classes\CLSID\{0DBECEC1-9EB3-4860-9C6F-DDBE86634575}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\policy\v4.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocHandler
HKEY_CURRENT_USER_Classes\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\Instance\Disabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\Elevation
HKEY_CURRENT_USER_Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Fusion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E7D35CFA-348B-485E-B524-252725D697CA}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Numerics__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1C1C45EE-4395-11D2-B60B-00104B703EFD}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C857801-7381-11CF-884D-00AA004B2E24}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppModel\Lookaside\user
HKEY_CURRENT_USER_Classes\CLSID\{7693E886-51C9-4070-8419-9F70738EC8FA}

Registry Set (Top 25)

Key Value
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS “%SAMPLEPATH%” –wininit
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 “%SAMPLEPATH%” /setup
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow “%SAMPLEPATH%” –init
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\a YOU ARE HACKED!\1
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\MRUList abc
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\c BIBORAN.com\1
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\b HAHAHAHAHAHAHA\1
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Count 229
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Type 3
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Time E7 07 0A 00 04 00 05 00 08 00 0A 00 27 00 23 03
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell “%SAMPLEPATH%”
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked 1
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX “%SAMPLEPATH%”
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_7 ux-cryptor.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_6 native.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_5 _default64.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_4 System.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_3 windowsx-c.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_2 taskhost.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_1 AWindowsService.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_8 crypt0rsx.exe
HKEY_USERS\S-1-5-21-575823232-3065301323-1442773979-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller “%SAMPLEPATH%” -startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller “C:\Users\Bruno\Desktop\WinLock.exe” -startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX “C:\Users\Bruno\Desktop\WinLock.exe”
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow “C:\Users\Bruno\Desktop\WinLock.exe” –init
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 “C:\Users\Bruno\Desktop\WinLock.exe” /setup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS “C:\Users\Bruno\Desktop\WinLock.exe” –wininit
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell “C:\Users\Bruno\Desktop\WinLock.exe”
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\a YOU ARE HACKED!\1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\b HAHAHAHAHAHAHA\1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\c BIBORAN.com\1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\MRUList abc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_1 AWindowsService.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_2 taskhost.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_3 windowsx-c.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_4 System.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_5 _default64.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_6 native.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_7 ux-cryptor.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIN32_8 crypt0rsx.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller “%SAMPLEPATH%\WinLock.exe” -startup
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX “%SAMPLEPATH%\WinLock.exe”
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_1 AWindowsService.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_2 taskhost.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_3 windowsx-c.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_4 System.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_5 _default64.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_6 native.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_7 ux-cryptor.exe
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_8 crypt0rsx.exe
Show all (259 total)
Key Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller “C:\Users\<USER>\Downloads\WinLock.exe” -startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX “C:\Users\<USER>\Downloads\WinLock.exe”
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow “C:\Users\<USER>\Downloads\WinLock.exe” –init
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 “C:\Users\<USER>\Downloads\WinLock.exe” /setup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS “C:\Users\<USER>\Downloads\WinLock.exe” –wininit
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell “C:\Users\<USER>\Downloads\WinLock.exe”
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller “C:\Users\<USER>\Downloads\WinLock.exe” -startup
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX “C:\Users\<USER>\Downloads\WinLock.exe”
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow “C:\Users\<USER>\Downloads\WinLock.exe” –init
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 “C:\Users\<USER>\Downloads\WinLock.exe” /setup
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS “C:\Users\<USER>\Downloads\WinLock.exe” –wininit
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell “C:\Users\<USER>\Downloads\WinLock.exe”
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_1 AWindowsService.exe
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_2 taskhost.exe
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_3 windowsx-c.exe
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_4 System.exe
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_5 _default64.exe
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_6 native.exe
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_7 ux-cryptor.exe
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_8 crypt0rsx.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/genuineintel_-_intel64_family_6_model_79_-____________intel(r)_xeon(r)_cpu_@_2.20ghz/_0\DriverVerVersion 6.1.7601.24520
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/genuineintel_-_intel64_family_6_model_79_-____________intel(r)_xeon(r)_cpu_@_2.20ghz/_1\DriverVerVersion 6.1.7601.24520
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/pnp0303/4&2c352a27&0\DriverVerVersion 6.1.7601.17514
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/pnp0700/4&2c352a27&0\DriverVerVersion 6.1.7600.16385
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/pnp0a03/0\DriverVerVersion 6.1.7601.24441
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/pnp0a06/pci_hotplug_resources\DriverVerVersion 6.1.7601.24441
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/pnp0b00/4&2c352a27&0\DriverVerVersion 6.1.7601.24441
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplication\0000c34c48b48a14753d8877e705591744db00000000\Publisher Microsoft Corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/pnp0f13/4&2c352a27&0\DriverVerVersion 6.1.7600.16385
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplication\0000021f1df94e2c7570a94e39009b97cde300000000\Publisher Microsoft Corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\acpi/qemu0002/3&267a616a&0\DriverVerVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\hdaudio/func_01&ven_1af4&dev_0022&subsys_1af40022&rev_1001/4&82fd0c&0&0001\DriverVerVersion 6.1.7601.24519
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_1af4&dev_1001&subsys_00021af4&rev_00/3&267a616a&0&38\DriverVerVersion 61.77.104.17100
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_1af4&dev_1002&subsys_00051af4&rev_00/3&267a616a&0&40\DriverVerVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_1af4&dev_1003&subsys_00031af4&rev_00/3&267a616a&0&30\DriverVerVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_1b36&dev_0100&subsys_11001af4&rev_05/3&267a616a&0&10\DriverVerVersion 6.1.7600.16385
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_100e&subsys_11001af4&rev_03/3&267a616a&0&18\DriverVerVersion 8.4.1.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_1237&subsys_11001af4&rev_02/3&267a616a&0&00\DriverVerVersion 6.1.7601.24441
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_2668&subsys_11001af4&rev_01/3&267a616a&0&20\DriverVerVersion 6.1.7601.17514
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|ff7d4b2859769f83\LowerCaseLongPath c:\program files\mozilla firefox\updated\crashreporter.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|ff7d4b2859769f83\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|ff7d4b2859769f83\LinkDate 01/04/2023 18:08:34
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|ff7d4b2859769f83\BinProductVersion 108.0.2.8404
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|42c867fb8c2e92b5\LowerCaseLongPath c:\program files\mozilla firefox\updated\default-browser-agent.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|42c867fb8c2e92b5\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|42c867fb8c2e92b5\LinkDate 01/04/2023 18:14:01
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|42c867fb8c2e92b5\BinProductVersion 108.0.2.8404
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|2ad62017703a5d51\LowerCaseLongPath c:\program files\mozilla firefox\updated\firefox.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|2ad62017703a5d51\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|2ad62017703a5d51\LinkDate 01/04/2023 18:07:51
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|2ad62017703a5d51\BinProductVersion 108.0.2.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|9e41ab94690fe110\LowerCaseLongPath c:\program files\mozilla firefox\updated\maintenanceservice.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|9e41ab94690fe110\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|9e41ab94690fe110\LinkDate 01/04/2023 18:08:08
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|9e41ab94690fe110\BinProductVersion 108.0.2.8404
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|835fe6e36c60be8a\LowerCaseLongPath c:\program files\mozilla firefox\updated\maintenanceservice_installer.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|835fe6e36c60be8a\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|835fe6e36c60be8a\LinkDate 07/24/2021 22:21:04
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|835fe6e36c60be8a\BinProductVersion 1.0.0.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_2934&subsys_11001af4&rev_03/3&267a616a&0&28\DriverVerVersion 6.1.7601.24138
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_2935&subsys_11001af4&rev_03/3&267a616a&0&29\DriverVerVersion 6.1.7601.24138
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|65ea540e962fc321\LowerCaseLongPath c:\program files\mozilla firefox\updated\minidump-analyzer.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|65ea540e962fc321\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|65ea540e962fc321\LinkDate 01/04/2023 18:08:09
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|65ea540e962fc321\BinProductVersion 108.0.2.8404
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|8b73640a1b1d1fbf\LowerCaseLongPath c:\program files\mozilla firefox\updated\pingsender.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|8b73640a1b1d1fbf\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|8b73640a1b1d1fbf\LinkDate 01/04/2023 18:08:08
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|8b73640a1b1d1fbf\BinProductVersion 108.0.2.8404
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_2936&subsys_11001af4&rev_03/3&267a616a&0&2a\DriverVerVersion 6.1.7601.24138
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_293a&subsys_11001af4&rev_03/3&267a616a&0&2f\DriverVerVersion 6.1.7601.24138
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_7000&subsys_11001af4&rev_00/3&267a616a&0&08\DriverVerVersion 6.1.7601.24441
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|d11f96b41e7541d1\LowerCaseLongPath c:\program files\mozilla firefox\updated\plugin-container.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|d11f96b41e7541d1\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|d11f96b41e7541d1\LinkDate 01/04/2023 18:25:28
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|d11f96b41e7541d1\BinProductVersion 108.0.2.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\private_browsing|f9cb5f69ed313a48\LowerCaseLongPath c:\program files\mozilla firefox\updated\private_browsing.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\private_browsing|f9cb5f69ed313a48\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\private_browsing|f9cb5f69ed313a48\LinkDate 01/04/2023 18:07:20
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\private_browsing|f9cb5f69ed313a48\BinProductVersion 108.0.2.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pci/ven_8086&dev_7010&subsys_11001af4&rev_00/3&267a616a&0&09\DriverVerVersion 6.1.7601.18231
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\helper.exe|d40dac1890f7a00\LowerCaseLongPath c:\program files\mozilla firefox\updated\uninstall\helper.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\helper.exe|d40dac1890f7a00\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\helper.exe|d40dac1890f7a00\LinkDate 07/24/2021 22:21:04
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\helper.exe|d40dac1890f7a00\BinProductVersion 1.0.0.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|1b3aeb7e8625ed27\LowerCaseLongPath c:\program files\mozilla firefox\updated\updater.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|1b3aeb7e8625ed27\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|1b3aeb7e8625ed27\LinkDate 01/04/2023 18:07:32
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|1b3aeb7e8625ed27\BinProductVersion 108.0.2.8404
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pciide/idechannel/4&403bef5&0&0\DriverVerVersion 6.1.7601.18231
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryDevicePnp\pciide/idechannel/4&403bef5&0&1\DriverVerVersion 6.1.7601.18231
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|63c55d3d1009672b\LowerCaseLongPath c:\program files\mozilla firefox\crashreporter.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|63c55d3d1009672b\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|63c55d3d1009672b\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\crashreporter.ex|63c55d3d1009672b\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplication\0000ca0169d7b9bbcfa4e65eb68a13f930210000ffff\Publisher Mozilla
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|dc77861eecd2248\LowerCaseLongPath c:\program files\mozilla firefox\default-browser-agent.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|dc77861eecd2248\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|dc77861eecd2248\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\default-browser-|dc77861eecd2248\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|ebd16581180f4552\LowerCaseLongPath c:\program files\mozilla firefox\firefox.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|ebd16581180f4552\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|ebd16581180f4552\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\firefox.exe|ebd16581180f4552\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|97180995320ca115\LowerCaseLongPath c:\program files\mozilla firefox\maintenanceservice.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|97180995320ca115\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|97180995320ca115\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|97180995320ca115\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|a02830353e4ef7f\LowerCaseLongPath c:\program files\mozilla firefox\maintenanceservice_installer.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|a02830353e4ef7f\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|a02830353e4ef7f\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\maintenanceservi|a02830353e4ef7f\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|c30fa22ff3f6a149\LowerCaseLongPath c:\program files\mozilla firefox\minidump-analyzer.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|c30fa22ff3f6a149\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|c30fa22ff3f6a149\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\minidump-analyze|c30fa22ff3f6a149\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|aaf23943349d4957\LowerCaseLongPath c:\program files\mozilla firefox\pingsender.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|aaf23943349d4957\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|aaf23943349d4957\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\pingsender.exe|aaf23943349d4957\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|bff6e47ff7f94db5\LowerCaseLongPath c:\program files\mozilla firefox\plugin-container.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|bff6e47ff7f94db5\Publisher mozilla corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|bff6e47ff7f94db5\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\plugin-container|bff6e47ff7f94db5\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|c1b2e9c223e636df\LowerCaseLongPath c:\program files\mozilla firefox\updater.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|c1b2e9c223e636df\Publisher mozilla foundation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|c1b2e9c223e636df\LinkDate (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\updater.exe|c1b2e9c223e636df\BinProductVersion (Empty)
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|313edc2dd92685a6\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\addinprocess.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|313edc2dd92685a6\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|313edc2dd92685a6\LinkDate 03/28/2019 06:56:01
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|313edc2dd92685a6\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|31487d5668d38eef\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\addinprocess.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|31487d5668d38eef\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|31487d5668d38eef\LinkDate 03/28/2019 06:56:01
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess.exe|31487d5668d38eef\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|3e8e05d4ef4495aa\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\addinprocess32.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|3e8e05d4ef4495aa\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|3e8e05d4ef4495aa\LinkDate 03/28/2019 06:56:57
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|3e8e05d4ef4495aa\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|fe3b638e0334bae2\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\addinprocess32.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|fe3b638e0334bae2\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|fe3b638e0334bae2\LinkDate 03/28/2019 06:56:57
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinprocess32.e|fe3b638e0334bae2\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|92167fbc1ed0ed08\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\addinutil.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|92167fbc1ed0ed08\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|92167fbc1ed0ed08\LinkDate 03/28/2019 06:56:58
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|92167fbc1ed0ed08\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|ab652f18224684a7\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\addinutil.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|ab652f18224684a7\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|ab652f18224684a7\LinkDate 03/28/2019 06:56:58
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\addinutil.exe|ab652f18224684a7\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|45b62bd7e4fc0c6f\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\applaunch.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|45b62bd7e4fc0c6f\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|45b62bd7e4fc0c6f\LinkDate 03/28/2019 06:36:04
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|45b62bd7e4fc0c6f\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|7127527a8f617d48\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|7127527a8f617d48\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|7127527a8f617d48\LinkDate 03/28/2019 06:49:21
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\applaunch.exe|7127527a8f617d48\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|4b7f3f64b82fdfc9\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_compiler.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|4b7f3f64b82fdfc9\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|4b7f3f64b82fdfc9\LinkDate 03/28/2019 06:48:46
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|4b7f3f64b82fdfc9\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|e1cf3170e346d70f\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\aspnet_compiler.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|e1cf3170e346d70f\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|e1cf3170e346d70f\LinkDate 03/28/2019 06:56:53
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_compiler.|e1cf3170e346d70f\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|8255322e96705ae8\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_regbrowsers.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|8255322e96705ae8\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|8255322e96705ae8\LinkDate 03/28/2019 06:48:49
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|8255322e96705ae8\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|87ef4760aa410a54\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regbrowsers.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|87ef4760aa410a54\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|87ef4760aa410a54\LinkDate 03/28/2019 06:56:53
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regbrowse|87ef4760aa410a54\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|12e275fb52b742fb\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_regiis.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|12e275fb52b742fb\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|12e275fb52b742fb\LinkDate 03/28/2019 06:48:55
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|12e275fb52b742fb\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regiis.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0\LinkDate 03/28/2019 06:56:58
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regsql.ex|5e0151b8dea6687b\LowerCaseLongPath c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regsql.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regsql.ex|5e0151b8dea6687b\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regsql.ex|5e0151b8dea6687b\LinkDate 03/28/2019 06:56:56
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regsql.ex|5e0151b8dea6687b\BinProductVersion 4.0.30319.0
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regsql.ex|a1587a010eaeaa18\LowerCaseLongPath c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_regsql.exe
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regsql.ex|a1587a010eaeaa18\Publisher microsoft corporation
\REGISTRY\A\{71067DFC-BF9D-8719-5673-BC5C7862677E}\Root\InventoryApplicationFile\aspnet_regsql.ex|a1587a010eaeaa18\LinkDate 03/28/2019 06:48:55
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WindowsInstaller “C:\Users\user\Desktop\WinLock.exe” -startup
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MSEdgeUpdateX “C:\Users\user\Desktop\WinLock.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\System3264Wow “C:\Users\user\Desktop\WinLock.exe” –init
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive10293 “C:\Users\user\Desktop\WinLock.exe” /setup
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\WINDOWS “C:\Users\user\Desktop\WinLock.exe” –wininit
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell “C:\Users\user\Desktop\WinLock.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\a YOU ARE HACKED!\1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\b HAHAHAHAHAHAHA\1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\c BIBORAN.com\1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\MRUList abc
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_1 AWindowsService.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_2 taskhost.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_3 windowsx-c.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_4 System.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_5 _default64.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_6 native.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_7 ux-cryptor.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\WIN32_8 crypt0rsx.exe

Services Started (Top 15)

Service
BITS
WSearch

Services Opened (Top 15)

Service
VaultSvc
clipsvc

What To Do Now — Practical Defense Playbook

  • Contain unknowns: block first‑run binaries by default — signatures catch up, containment works now.
  • EDR controls: alert on keyboard hooks, screen capture APIs, VM/sandbox checks, and command‑shell launches.
  • Registry watch: flag queries/sets under policy paths (e.g., …\FipsAlgorithmPolicy\*).
  • Network rules: inspect outbound TLS to IP‑lookup services and unexpected CDN endpoints.
  • Hunt broadly: sweep endpoints for the indicators above and quarantine positives immediately.

Dwell time equals attacker opportunity. Reducing execution privileges and egress shrinks that window even when vendors disagree.

Scroll to Top