WannaCry-Themed Dropper Deleting Shadow Copies For Impact


Zero‑Dwell Threat Intelligence Report

A narrative, executive‑ready view into the malware’s behavior, exposure, and reliable defenses.
Generated: 2025-12-04 08:22:01 UTC

Executive Overview — What We’re Dealing With

This specimen has persisted long enough to matter. Human experts classified it as Malware, and the telemetry confirms a capable, evasive Trojan with real impact potential.

File
Merzoct.exe
Type
Generic CIL Executable (.NET, Mono, etc.)
SHA‑1
2f7ff48cb432122cdde2961e9cd0feb18d767227
MD5
4c5639ca18826695f459ccfc92c44f0e
First Seen
2025-12-01 14:07:46.421948
Last Analysis
2025-12-01 21:28:48.011100
Dwell Time
0 days, 7 hours, 33 minutes

Extended Dwell Time Impact

For 7+ hours, this malware remained undetected — a several-hour window that allowed the adversary to complete initial compromise and begin early-stage persistence establishment.

Comparative Context

Industry studies report a median dwell time closer to 21–24 days. This case represents rapid detection and containment within hours rather than days.

Timeline

Time (UTC) Event Elapsed
2025-11-13 21:17:02 UTC First VirusTotal submission
2025-12-03 21:10:54 UTC Latest analysis snapshot 19 days, 23 hours, 53 minutes
2025-12-04 08:22:01 UTC Report generation time 20 days, 11 hours, 4 minutes

Why It Matters

Every additional day of dwell time is not just an abstract number — it is attacker opportunity. Each day equates to more time for lateral movement, stealth persistence, and intelligence gathering.

Global Detection Posture — Who Caught It, Who Missed It

VirusTotal engines: 73. Detected as malicious: 56. Missed: 17. Coverage: 76.7%.

Detected Vendors

  • Xcitium
  • +55 additional vendors (names not provided)

List includes Xcitium plus an additional 55 vendors per the provided summary.

Missed Vendors

  • Acronis
  • Antiy-AVL
  • Baidu
  • CAT-QuickHeal
  • CMC
  • Cynet
  • google_safebrowsing
  • Jiangmin
  • Kingsoft
  • SUPERAntiSpyware
  • TACHYON
  • tehtris
  • TrendMicro
  • ViRobot
  • Webroot
  • Yandex
  • Zoner

Why it matters: if any endpoint relies solely on a missed engine, this malware can operate with zero alerts. Prevention‑first controls close that gap regardless of signature lag.

Behavioral Storyline — How the Malware Operates

Intensive file system activity (39.94% of behavior) indicates data harvesting, file encryption, or dropper behavior. The threat is actively searching for and manipulating files across the system.

Behavior Categories (weighted)

Weight values represent the frequency and intensity of malware interactions with specific system components. Higher weights indicate more aggressive targeting of that category. Each operation (registry access, file modification, network connection, etc.) contributes to the category’s total weight, providing a quantitative measure of the malware’s behavioral focus.

Category Weight Percentage
File System 115524 39.94%
System 82581 28.55%
Synchronization 37681 13.03%
Misc 36669 12.68%
Registry 13495 4.67%
Process 1799 0.62%
Device 456 0.16%
Com 354 0.12%
Threading 291 0.10%
Crypto 250 0.09%
Services 76 0.03%
Windows 33 0.01%
Hooking 18 0.01%
Network 5 0.00%

MITRE ATT&CK Mapping

  • T1083 – check if file exists
  • T1222 – set file attributes
  • T1560.002 – compress data using GZip in .NET
  • T1083 – check if directory exists
  • T1082 – query environment variable
  • T1497.001 – reference anti-VM strings targeting Xen
  • T1003 – Harvests information related to installed mail clients
  • T1003 – Steals private information from local Internet browsers
  • T1539 – Touches a file containing cookies, possibly for information gathering
  • T1555 – Steals private information from local Internet browsers
  • T1552 – Harvests information related to installed mail clients
  • T1552 – Steals private information from local Internet browsers
  • T1555.003 – Steals private information from local Internet browsers
  • T1552.001 – Harvests information related to installed mail clients
  • T1552.001 – Steals private information from local Internet browsers
  • T1114 – Harvests information related to installed mail clients
  • T1005 – Harvests information related to installed mail clients
  • T1005 – Steals private information from local Internet browsers
  • T1074 – Manipulates data from or to the Recycle Bin
  • T1547 – Installs itself for autorun at Windows startup
  • T1547.001 – Installs itself for autorun at Windows startup
  • T1548 – A file was accessed within the Public folder.
  • T1202 – Uses suspicious command line tools or Windows utilities
  • T1202 – Uses Windows utilities for basic functionality
  • T1036 – A file was accessed within the Public folder.
  • T1112 – Installs itself for autorun at Windows startup
  • T1064 – A scripting utility was executed
  • T1027 – The binary likely contains encrypted or compressed data
  • T1027.002 – The binary likely contains encrypted or compressed data
  • T1082 – Checks available memory
  • T1071 – Yara detections observed in process dumps, payloads or dropped files
  • T1071 – Reads data out of its own binary image
  • T1071 – A process attempted to delay the analysis task.
  • T1106 – Created a process from a suspicious location
  • T1106 – Guard pages use detected – possible anti-debugging.
  • T1059 – A scripting utility was executed
  • T1486 – Performs a large number of encryption calls using the same key possibly indicative of ransomware file encryption behavior
  • T1486 – Creates a known WannaCry ransomware decryption instruction / key file.
  • T1486 – Exhibits possible ransomware or wiper file modification behavior: mass_file_deletion overwrites_existing_files
  • T1485 – Anomalous file deletion behavior detected (10+)
  • T1129 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1083 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1027 – SetUnhandledExceptionFilter detected: superseding the top-level exception handler of each thread of a process is a common anti-debug technique.
  • T1129 – The process attempted to dynamically load a malicious function
  • T1059 – Detected command line output monitoring
  • T1564.003 – Detected the creation of a hidden window (common execution hiding technique)
  • T1140 – Detected an attempt to pull out some data from the binary image
  • T1129 – The process tried to load dynamically one or more functions.
  • T1129 – Detected a call to NtDelayExecution API: the process may have attempted a sandbox evasion (sleeping!).
  • T1083 – Detected a call to NtDelayExecution API: the process may have attempted a sandbox evasion (sleeping!).
  • T1027 – Detected a call to NtDelayExecution API: the process may have attempted a sandbox evasion (sleeping!).
  • T1057 – The process has tried to detect the debugger probing the use of page guards.
  • T1027.009 – The process has executed a dropped binary
  • T1057 – The process attempted to detect a running debugger using common APIs
  • T1089 – The process has tried to suspend a sandbox-related thread (possible sandbox evasion attempt)
  • T1082 – Queries for the computername
  • T1081 – Detected an attempt to access Browser data that may contain sensible informations (e.g. user credentials)
  • T1119 – Detected an attempt to access Browser data that may contain sensible informations (e.g. user credentials)
  • T1158 – Detected the creation of a non white-listed hidden or system file
  • T1105 – The process acted as a ransomware (suspicious behaviours common in ransomwares were detected)
  • T1107 – The process acted as a ransomware (suspicious behaviours common in ransomwares were detected)
  • T1082 – The process tried to collect informations about the system reading some known registry keys
  • T1012 – The process tried to collect informations about the system reading some known registry keys
  • T1129 – Manalize Local SandBox Strings
  • T1083 – Manalize Local SandBox Strings
  • T1027 – Manalize Local SandBox Strings
  • T1070 – The process attempted to delete web history
  • T1107 – The process attempted to delete web history
  • T1129 – The process exhibits a know Trojan behaviour (Zeus)
  • T1083 – The process exhibits a know Trojan behaviour (Zeus)
  • T1027 – The process exhibits a know Trojan behaviour (Zeus)
  • T1112 – The process has tried to set its autorun on the system startup
  • T1060 – The process has tried to set its autorun on the system startup
  • T1050 – The process has tried to set its autorun on the system startup
  • T1129 – The process wrote a message on disk that could be related to a ransomware activity
  • T1083 – The process wrote a message on disk that could be related to a ransomware activity
  • T1027 – The process wrote a message on disk that could be related to a ransomware activity
  • T1027.009 – Drops interesting files and uses them
  • T1497 – Allocates memory with a write watch (potentially for evading sandboxes)
  • T1562.001 – Creates guard pages, often used to prevent reverse engineering and debugging
  • T1070.006 – Binary contains a suspicious time stamp
  • T1083 – Reads ini files
  • T1082 – Queries the volume information (name, serial number etc) of a device
  • T1082 – Queries the cryptographic machine GUID
  • T1112 – Stores large binary data to the registry
  • T1497 – May sleep (evasive loops) to hinder dynamic analysis

Following the Trail — Network & DNS Activity

Outbound activity leans on reputable infrastructure (e.g., CDNs, cloud endpoints) to blend in. TLS sessions and
HTTP calls show routine beaconing and IP‑lookup behavior that can masquerade as normal browsing.

Contacted Domains

Domain IP Country ASN/Org
www.aieov.com 76.223.54.146 United States Amazon.com, Inc.

Observed IPs

IP Country ASN/Org
224.0.0.252
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

DNS Queries

Request Type
5isohu.com A
www.aieov.com A

Contacted IPs

IP Country ASN/Org
224.0.0.252
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

Port Distribution

Port Count Protocols
137 1 udp
5355 4 udp
53 52 udp

UDP Packets

Source IP Dest IP Sport Dport Time Proto
192.168.56.14 192.168.56.255 137 137 3.0794949531555176 udp
192.168.56.14 224.0.0.252 51209 5355 3.009394884109497 udp
192.168.56.14 224.0.0.252 53401 5355 5.563201904296875 udp
192.168.56.14 224.0.0.252 55094 5355 6.384588956832886 udp
192.168.56.14 224.0.0.252 55848 5355 3.5067319869995117 udp
192.168.56.14 8.8.4.4 49916 53 104.86511397361755 udp
192.168.56.14 8.8.4.4 50180 53 154.21048283576965 udp
192.168.56.14 8.8.4.4 50710 53 68.3683090209961 udp
192.168.56.14 8.8.4.4 50870 53 329.4722249507904 udp
192.168.56.14 8.8.4.4 50914 53 253.70239090919495 udp
192.168.56.14 8.8.4.4 51262 53 315.09818482398987 udp
192.168.56.14 8.8.4.4 51614 53 536.877427816391 udp
192.168.56.14 8.8.4.4 52556 53 521.9566938877106 udp
192.168.56.14 8.8.4.4 52815 53 8.95320987701416 udp
192.168.56.14 8.8.4.4 53449 53 373.2682490348816 udp
192.168.56.14 8.8.4.4 54579 53 53.55929899215698 udp
192.168.56.14 8.8.4.4 54683 53 203.72645497322083 udp
192.168.56.14 8.8.4.4 55827 53 268.0770699977875 udp
192.168.56.14 8.8.4.4 55914 53 135.24156403541565 udp
192.168.56.14 8.8.4.4 56399 53 183.35690593719482 udp
192.168.56.14 8.8.4.4 57742 53 387.64446902275085 udp
192.168.56.14 8.8.4.4 59068 53 358.90458703041077 udp
192.168.56.14 8.8.4.4 60117 53 84.20592284202576 udp
192.168.56.14 8.8.4.4 60713 53 282.4463198184967 udp
192.168.56.14 8.8.4.4 62022 53 168.85226392745972 udp
192.168.56.14 8.8.4.4 62112 53 38.86941194534302 udp
192.168.56.14 8.8.4.4 62548 53 232.47465801239014 udp
192.168.56.14 8.8.4.4 62800 53 300.71416902542114 udp
192.168.56.14 8.8.4.4 63205 53 218.11073088645935 udp
192.168.56.14 8.8.4.4 64753 53 119.6751618385315 udp
192.168.56.14 8.8.4.4 65148 53 24.32831597328186 udp
192.168.56.14 8.8.8.8 49916 53 103.86576199531555 udp
192.168.56.14 8.8.8.8 50180 53 153.20296788215637 udp
192.168.56.14 8.8.8.8 50710 53 67.36268591880798 udp
192.168.56.14 8.8.8.8 50870 53 328.4687328338623 udp
192.168.56.14 8.8.8.8 50914 53 252.70206594467163 udp
192.168.56.14 8.8.8.8 51262 53 314.0956299304962 udp
192.168.56.14 8.8.8.8 51614 53 535.8749098777771 udp
192.168.56.14 8.8.8.8 52556 53 520.957193851471 udp
192.168.56.14 8.8.8.8 52815 53 9.95361590385437 udp
192.168.56.14 8.8.8.8 53449 53 372.26488184928894 udp
192.168.56.14 8.8.8.8 54579 53 52.55773186683655 udp
192.168.56.14 8.8.8.8 54683 53 202.72592282295227 udp
192.168.56.14 8.8.8.8 55827 53 267.0759599208832 udp
192.168.56.14 8.8.8.8 55914 53 134.2351839542389 udp
192.168.56.14 8.8.8.8 56399 53 182.35612297058105 udp
192.168.56.14 8.8.8.8 57742 53 386.6441419124603 udp
192.168.56.14 8.8.8.8 59068 53 357.9050889015198 udp
192.168.56.14 8.8.8.8 60117 53 83.20614099502563 udp
192.168.56.14 8.8.8.8 60713 53 281.4437029361725 udp
192.168.56.14 8.8.8.8 62022 53 167.85076785087585 udp
192.168.56.14 8.8.8.8 62112 53 37.868764877319336 udp
192.168.56.14 8.8.8.8 62548 53 231.47324681282043 udp
192.168.56.14 8.8.8.8 62800 53 299.7137608528137 udp
192.168.56.14 8.8.8.8 63205 53 217.1102797985077 udp
192.168.56.14 8.8.8.8 64753 53 118.67367792129517 udp
192.168.56.14 8.8.8.8 65148 53 23.33253788948059 udp

Hunting tip: alert on unknown binaries initiating TLS to IP‑lookup services or unusual CDN endpoints — especially early in execution.

Persistence & Policy — Registry and Services

Registry and service telemetry points to policy awareness and environment reconnaissance rather than noisy persistence. Below is a compact view of the most relevant keys and handles; expand to see the full lists where available.

Registry Opened

588

Registry Set

18

Services Started

2

Services Opened

3

Registry Opened (Top 25)

Key
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{89bc3f49-f8d9-5103-ba13-de497e609167}\ProxyStubClsid32
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AF86E2E0-B12D-4c6a-9C5A-D7AA65101E90}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{89bc3f49-f8d9-5103-ba13-de497e609167}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\CommandLine
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ServiceName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\Permissions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4005801669-2598574594-602355426-1001\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ActivatableClasses
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8645456f-d9a2-4b82-afec-58f0e8df0acf}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateInSharedBroker
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\UseRyuJIT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\CustomAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C53E07EC-25F3-4093-AA39-FC67EA22E99D}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{657A8842-0B5E-40E1-B8CB-9AAFACC33AAB}\ProxyStubClsid32\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8645456F-D9A2-4B82-AFEC-58F0E8DF0ACF}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4005801669-2598574594-602355426-1001\Installer\Assemblies\C:|Users|<USER>|Desktop|Merzoct.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ExplicitPsmActivationType
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\OnlyUseLatestCLR
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\Server
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\IdentityType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8645456f-d9a2-4b82-afec-58f0e8df0acf}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\DllPath
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\(Default)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\AppContext
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\NGen\Policy\v4.0\OptimizeUsedBinaries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateInBrokerForMediumILContainer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateAsUser
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OLE\Diagnosis
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\DllPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\TrustLevel
Show all (588 total)
Key
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{89BC3F49-F8D9-5103-BA13-DE497E609167}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\ActivateOnHostFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\ActivateOnHostFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\CustomAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{657A8842-0B5E-40E1-B8CB-9AAFACC33AAB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AF86E2E0-B12D-4c6a-9C5A-D7AA65101E90}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InprocHandler
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\Server
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\Elevation
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\MDMEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivateOnHostFlags
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|<USER>|Desktop|Merzoct.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\Permissions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\Threading
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\Threading
HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsRuntime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\RemoteServer
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy\STE
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize\AppsUseLightTheme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server
Policy\Standards
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\ActivationType
HKEY_LOCAL_MACHINE\Software\Microsoft\StrongName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\TreatAs
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Merzoct.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\CustomAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Internal.StateRepository.FileTypeAssociation\ActivationType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{657A8842-0B5E-40E1-B8CB-9AAFACC33AAB}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\Release
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableUmpdBufferSizeCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\SKUs\default
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ServerType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Storage.Streams.DataWriter\TrustLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\FeatureSIMD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\Identity
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c53e07ec-25f3-4093-aa39-fc67ea22e99d}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\AppId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\Server\StateRepository\ExePath
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AF86E2E0-B12D-4C6A-9C5A-D7AA65101E90}
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LoggingLevel
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.UIAutomationProvider__31bf3856ad364e35
Software\Microsoft\MediaPlayer\Preferences\UserWMPMetadataView
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Numerics__b77a5c561934e089
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Video\{14509299-CF7D-4E39-A977-2521FBAF26B0}\0000\InstalledDisplayDrivers
HKEY_LOCAL_MACHINE\Software\Microsoft\MediaPlayer\MediaPlugins\DSP\{73647561-0000-0010-8000-00AA00389B71}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\NodeCLSIDs\{E5A8C40E-654B-44D4-ACBB-DBE6D3B3333B}
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\7bafb3b1-d8f4-4279-9253-27da423108de
Software\Microsoft\MediaPlayer\Preferences\CurrentMetadataView
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.PresentationFramework.classic__31bf3856ad364e35
HKEY_CLASSES_ROOT\.vbs\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_INITIALIZE_URLACTION_SHELLEXECUTE_TO_ALLOW_KB936610
Software\Microsoft\MediaPlayer\Preferences\NowPlayingSettings
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\f371728a-6052-4d47-827c-d039335dfe0a\Attributes
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_PROTOCOL_LOCKDOWN
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP\ProxyStyle
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ALLOW_REVERSE_SOLIDUS_IN_USERINFO_KB932562
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Input.Manipulations__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogResourceBinds
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\62ce7e72-4c71-4d20-b15d-452831a87d9d\InputTypes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{93EB32F5-87B1-45AD-ACC6-0F2483DB83BB}\FriendlyName
Software\Microsoft\MediaPlayer\Preferences\NowPlayingPlaylist
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\QM
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\bbeea841-0a63-4f52-a7ab-a9b3a84ed38a
Software\Microsoft\MediaPlayer\Preferences\UserWMPDisplayPreset
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP\ProxyPort
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.UIAutomationTypes__31bf3856ad364e35
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Script Host\Settings\IgnoreUserSettings
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\FeatureSIMD
HKEY_CLASSES_ROOT\.vbs
Software\Microsoft\MediaPlayer\Preferences\UserWMPMetadataPreset
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SessionMerging
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FrameTabWindow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\Platform\EVR\{5C67A112-A4C9-483F-B4A7-1D473BECAFDC}\OptimizationFlags
HKEY_CLASSES_ROOT\VBSFile\ScriptEngine\0x0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Extensions\.mp4\Permissions
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\Categories\d6c02d4b-6833-45b4-971a-05a4b04bab91
Software\Microsoft\MediaPlayer\Preferences\MaxBandwidth
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\UseLegacyIdentityFormat
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\874131cb-4ecc-443b-8948-746b89595d20\MFTFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.WindowsBase__31bf3856ad364e35
Software\Microsoft\MediaPlayer\Preferences\CurrentEffectPreset
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\SpecialFoldersCacheSize
Software\Microsoft\MediaPlayer\Preferences\UseHTTP
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseMillisecondsBetweenRetries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Extensions\.mp4
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\TabProcGrowth
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\TIP\{0000897b-83df-4b96-be07-0fb58b01c4a4}\LanguageProfile\0x00000000\{0001bea3-ed56-483d-a2e2-aeae25577436}\Enable
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\32d186a7-218f-4c75-8876-dd77273a8999\OutputTypes
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\82d353df-90bd-4382-8bc2-3f6192b76e34\Attributes
Software\Microsoft\MediaPlayer\Preferences\ShrinkToFit
HKEY_LOCAL_MACHINE\Software\Microsoft\MediaPlayer\MediaPlugins\DSP\{73646976-0000-0010-8000-00AA00389B71}
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Software\Microsoft\MediaPlayer\Preferences\ForceDisableTerminateOnHeapCorruption
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\2eeb4adf-4578-4d10-bca7-bb955f56320a\InputTypes
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\7bafb3b1-d8f4-4279-9253-27da423108de\Attributes
HKEY_CLASSES_ROOT\VBSFile\ScriptEngine
Software\Microsoft\MediaPlayer\Preferences\NowPlayingMetadata
HKEY_CURRENT_USER\Software\Microsoft\CTF\Disable Thread Input Manager
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EVR
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{48501FF0-F6A9-11D2-9435-00A0C92A2F2D}\FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{AE7BFAFE-DCC8-4A73-92C8-CC300CA88859}\FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Management__b03f5f7f11d50a3a
Software\Microsoft\MediaPlayer\Preferences\UserWMPShowMetadata
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\4a76b469-7b66-4dd4-ba2d-ddf244c766dc\InputTypes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{93EB32F5-87B1-45AD-ACC6-0F2483DB83BB}
HKEY_CURRENT_USER\Software\Microsoft\Tracing\WPF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\NodeCLSIDs\{13A7995E-7D8F-45B4-9C77-819265225763}
Software\Microsoft\MediaPlayer\Player\Tasks\NowPlaying\SettingsHeight
Software\Microsoft\MediaPlayer\Preferences\ShowAlbumArt
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.PresentationCore__31bf3856ad364e35
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager
HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer\Protocols\HTTP
Software\Microsoft\MediaPlayer\Preferences\CurrentSettingsView
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-4270068108-2931534202-3907561125-1001
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Killer Clown 2.0.exe
HKEY_CLASSES_ROOT\Interface\{C247F616-BBEB-406A-AED3-F75E656599AE}
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\cba9e78b-49a3-49ea-93d4-6bcba8c4de07\Attributes
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.PresentationUI__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FontCache\Parameters
HKEY_CURRENT_USER\Software
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework\Policy\Standards
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.UIAutomationTypes__31bf3856ad364e35
HKEY_CURRENT_USER\Software\Microsoft\Windows Media Foundation\ByteStreamHandlers\.mp4
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\32d186a7-218f-4c75-8876-dd77273a8999
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP\ProxyBypass
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|azure|Downloads|Merzoct.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\Latest
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP\ProxyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP\ProxyBypass
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\bbeea841-0a63-4f52-a7ab-a9b3a84ed38a\Attributes
HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\62ce7e72-4c71-4d20-b15d-452831a87d9d
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\cb17e772-e1cc-4633-8450-5617af577905
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\C:|Users|azure|Downloads|Merzoct.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinSAT\VideoMemorySize
HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer\Protocols\RTSP
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default
HKEY_CURRENT_USER\Software\Microsoft\Avalon.Xaml
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\32d186a7-218f-4c75-8876-dd77273a8999\MFTFlags
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\cba9e78b-49a3-49ea-93d4-6bcba8c4de07
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\92b66080-5e2d-449e-90c4-c41f268e5514\Attributes
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\NodeCLSIDs\{D01BC8E2-70AD-4976-9612-21B37ED5C8E8}
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0\OptimizeUsedBinaries
HKEY_LOCAL_MACHINE\System\Setup
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{48501FF0-F6A9-11D2-9435-00A0C92A2F2D}
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP\ProxyExclude
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnablePunycode
HKEY_CURRENT_USER\Software\Microsoft\Windows Script Host\Settings\LogSecuritySuccesses
Software\Microsoft\MediaPlayer\Preferences\ShowCaptions
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\Platform
Software\Microsoft\MediaPlayer\Preferences\SendUserGUID
Software\Microsoft\MediaPlayer\Preferences\DefaultAudioLanguage
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Printing__31bf3856ad364e35
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\5686a0d9-fe39-409f-9dff-3fdbc849f9f5\MFTFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\f371728a-6052-4d47-827c-d039335dfe0a
Software\Microsoft\MediaPlayer\Preferences\UserWMPSettingsPreset
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\APTCA
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FrameMerging
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\DefaultSecurity
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\CacheLocation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\CLRLoadLogDir
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|azure|Downloads|Merzoct.exe
Software\Microsoft\MediaPlayer\Preferences\TerminateOnHeapCorruption
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\Platform\EVR\{5C67A112-A4C9-483F-B4A7-1D473BECAFDC}\SWVideoDecodePowerLevel
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseRyuJIT
HKEY_CURRENT_USER\Software\Microsoft\Windows Media\WMSDK\Metering
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\cba9e78b-49a3-49ea-93d4-6bcba8c4de07\InputTypes
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Video\{14509299-CF7D-4E39-A977-2521FBAF26B0}\0000
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NoClientChecks
Software\Microsoft\MediaPlayer\Preferences\UseDefaultBufferTime
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{6F4D201B-EFB8-4B0A-9563-F105812EC14C}
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xaml__b77a5c561934e089
HKEY_CURRENT_USER\Software\Microsoft\CTF
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\Categories\9ea73fb4-ef7a-4559-8d5d-719d8f0426c7
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\874131cb-4ecc-443b-8948-746b89595d20\Attributes
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.PresentationUI__31bf3856ad364e35
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\KindMap
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{1EA16D11-DCB1-41fe-BC17-42CDFBEF8F53}\FriendlyName
Software\Microsoft\MediaPlayer\Player\Tasks\NowPlaying\MetadataWidth
Software\Microsoft\MediaPlayer\Preferences\UserWMPShowSettings
HKEY_CURRENT_USER\Software\Microsoft\Wisp\Software\Microsoft\Wisp\Pen\SysEventParameters
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.PresentationCore__31bf3856ad364e35
HKEY_CURRENT_USER\Software\Microsoft\Avalon.Touch
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\bbeea841-0a63-4f52-a7ab-a9b3a84ed38a\InputTypes
HKEY_CURRENT_USER\Software\Microsoft\Windows Media Foundation\SchemeHandlers\file:
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseRetryAttempts
Software\Microsoft\MediaPlayer\Preferences\CurrentSettingsPreset
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\32d186a7-218f-4c75-8876-dd77273a8999\InputTypes
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\7bafb3b1-d8f4-4279-9253-27da423108de\MFTFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\Platform\FreeWppTrace
Software\Microsoft\MediaPlayer\Player\Tasks\NowPlaying\PlaylistHeight
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\TIP\{0000897b-83df-4b96-be07-0fb58b01c4a4}\LanguageProfile\0x00000000\{0001bea3-ed56-483d-a2e2-aeae25577436}
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.PresentationFramework__31bf3856ad364e35
Software\Microsoft\MediaPlayer\Preferences\LastGSMShowSounds
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Windows Presentation Foundation\Features
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\ca34fe0a-5722-43ad-af23-05f7650257dd\MFTFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinSAT\VideoMemoryBandwidth
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{AE7BFAFE-DCC8-4A73-92C8-CC300CA88859}
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\SpecialFoldersCacheSize
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogFailures
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Input.Manipulations__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Avalon.Graphics
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\f371728a-6052-4d47-827c-d039335dfe0a\InputTypes
HKEY_CURRENT_USER\Software\Microsoft\Scrunch\CodecPack\MSDVD
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs\default
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\92b66080-5e2d-449e-90c4-c41f268e5514
Software\Microsoft\MediaPlayer\Preferences\VideoZoom
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\5210f8e4-b0bb-47c3-a8d9-7b2282cc79ed
HKEY_LOCAL_MACHINE\Software\Microsoft\MediaPlayer\Debug
Software\Microsoft\MediaPlayer\Preferences\UserDisplayView
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\AdminTabProcs
Software\Microsoft\MediaPlayer\Preferences\DVD_Audio_LCID
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System__b77a5c561934e089
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\82d353df-90bd-4382-8bc2-3f6192b76e34
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\2eeb4adf-4578-4d10-bca7-bb955f56320a
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\4a76b469-7b66-4dd4-ba2d-ddf244c766dc\Attributes
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\a16e1bff-a80d-48ad-aecd-a35c005685fe\InputTypes
Software\Microsoft\MediaPlayer\Preferences\UseCustomUDPPort
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONES_CHECK_ZONEMAP_POLICY_KB941001
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\cb17e772-e1cc-4633-8450-5617af577905\Attributes
HKEY_LOCAL_MACHINE\Software\Policies
HKEY_LOCAL_MACHINE\Software\Microsoft\MediaPlayer\Preferences
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\NodeCLSIDs
Software\Microsoft\MediaPlayer\Player\Tasks\NowPlaying\InitFlags
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP\ProxyPort
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\XML
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\5686a0d9-fe39-409f-9dff-3fdbc849f9f5\Attributes
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\cba9e78b-49a3-49ea-93d4-6bcba8c4de07\MFTFlags
Software\Microsoft\Windows Script Host\Settings\DisplayLogo
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\874131cb-4ecc-443b-8948-746b89595d20\InputTypes
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\cb17e772-e1cc-4633-8450-5617af577905\InputTypes
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\Standards\v4.0.30319
Software\Microsoft\MediaPlayer\Preferences\DebugLogging
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\62ce7e72-4c71-4d20-b15d-452831a87d9d\MFTFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.WindowsBase__31bf3856ad364e35
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.UIAutomationProvider__31bf3856ad364e35
HKEY_LOCAL_MACHINE\Software\WanaCrypt0r
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IGNORE_POLICIES_ZONEMAP_IF_ESC_ENABLED_KB918915
Software\Microsoft\MediaPlayer\Preferences\Audio_LCID
HKEY_CURRENT_USER\Software\Microsoft\Avalon.Graphics\MultiAdapterSupport
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP\ProxyExclude
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\NodeCLSIDs\{D7E9C0B4-0E4D-46B4-BC46-1D0222F92C6F}
Software\Microsoft\MediaPlayer\Preferences\CurrentDisplayView
HKEY_LOCAL_MACHINE\Software\Microsoft\Net Framework Setup\NDP\v4\Client
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\Categories
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\404a6de5-d4d6-4260-9bc7-5a6cbd882432\Attributes
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\NodeCLSIDs\{B2DBA270-9F49-4513-AC13-76496D6EBA3A}
Software\Microsoft\MediaPlayer\Preferences\StretchToFit
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xaml__b77a5c561934e089
Software\Microsoft\MediaPlayer\Preferences\UseTCP
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\bbeea841-0a63-4f52-a7ab-a9b3a84ed38a\MFTFlags
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\82d353df-90bd-4382-8bc2-3f6192b76e34\MFTFlags
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\TimeManager
HKEY_CURRENT_USER\Software\Microsoft\Windows Script Host\Settings\UseWINSAFER
Software\Microsoft\MediaPlayer\Preferences\CurrentMetadataPreset
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Preferences\NoNormalizeCalculations
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\5686a0d9-fe39-409f-9dff-3fdbc849f9f5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinSAT
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\DownloadCacheQuotaInKB
HKEY_CURRENT_USER\Software\Microsoft\Windows Script Host\Settings
Software\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP\ProxyName
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\4a76b469-7b66-4dd4-ba2d-ddf244c766dc\MFTFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinSAT
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\AltJit
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\92b66080-5e2d-449e-90c4-c41f268e5514\MFTFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Printing__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins\{47DEA830-D619-4154-B8D8-6B74845D6A2D}\FriendlyName
Software\Microsoft\MediaPlayer\Preferences\CurrentEffectType
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\2eeb4adf-4578-4d10-bca7-bb955f56320a\Attributes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\TIP\{0000897b-83df-4b96-be07-0fb58b01c4a4}\LanguageProfile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Foundation\RT
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\62ce7e72-4c71-4d20-b15d-452831a87d9d\Attributes
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.ReachFramework__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Plugins
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\404a6de5-d4d6-4260-9bc7-5a6cbd882432\MFTFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.PresentationFramework.classic__31bf3856ad364e35
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\874131cb-4ecc-443b-8948-746b89595d20
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CTF\TIP
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\a16e1bff-a80d-48ad-aecd-a35c005685fe
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer
Software\Microsoft\MediaPlayer\Preferences\ShowTitles
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\ca34fe0a-5722-43ad-af23-05f7650257dd
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\NodeCLSIDs\{95037DA1-6ED9-4B27-8CFF-9AD3DFB0B2F2}
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONES_DEFAULT_DRIVE_INTRANET_KB941000
Software\Microsoft\MediaPlayer\Preferences\UseUDP
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Preferences\ProxySettings
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\EnableLog
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\62ce7e72-4c71-4d20-b15d-452831a87d9d\OutputTypes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|azure|AppData|Local|Temp|Killer Clown 2.0.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.Accessibility__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Preferences
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.PresentationFramework__31bf3856ad364e35
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-4270068108-2931534202-3907561125-1001\Installer\Assemblies\C:|Users|azure|AppData|Local|Temp|Killer Clown 2.0.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\v4.0
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinSAT\VideoMemorySize
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\404a6de5-d4d6-4260-9bc7-5a6cbd882432\InputTypes
HKEY_CLASSES_ROOT\MediaFoundation\Transforms\a16e1bff-a80d-48ad-aecd-a35c005685fe\Attributes
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|azure|AppData|Local|Temp|Killer Clown 2.0.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
Software\Microsoft\MediaPlayer\Preferences\CurrentDisplayPreset
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\TreatAs
HKEY_CURRENT_USER_Classes\Folder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\KnownFolderSettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Printing__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.ReachFramework__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.PresentationUI__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.PresentationCore__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\ShellFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\LocalServer
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{F8CB6B5F-0B41-45F8-B124-957208F7A23A}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\LocalServer32
HKEY_CURRENT_USER\SOFTWARE\Microsoft\.NETFramework\XML
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.UIAutomationTypes__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xaml__b77a5c561934e089
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xaml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\LocalServer
HKEY_LOCAL_MACHINE\OSDATA\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.ReachFramework__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.PresentationUI__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\Clsid
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance\NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System__b77a5c561934e089
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Preferences\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.WindowsBase__31bf3856ad364e35
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\ShellFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\LocalServer
HKEY_CURRENT_USER\Software\Microsoft\Avalon.Packaging
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\policy\v4.0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InprocHandler32
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance\InitPropertyBag
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\NULL
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|user|Desktop|Merzoct.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\CurVer
HKEY_CURRENT_USER_Classes\Drive\shellex\FolderExtensions
HKEY_CURRENT_USER_Classes\exefile\Clsid
HKEY_CURRENT_USER\Software\Microsoft\Avalon.Graphics
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\InprocServer32
HKEY_CURRENT_USER\Software\Microsoft\Fusion
HKEY_CURRENT_USER_Classes\AllFilesystemObjects
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_CURRENT_USER_Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance\InitPropertyBag
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\Elevation
HKEY_CURRENT_USER_Classes\exefile\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Numerics__b77a5c561934e089
HKEY_CURRENT_USER_Classes\Drive\shellex\FolderExtensions\{fbeb8a05-beee-4442-804e-409d6c4515e9}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppModel\Lookaside\machine
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Data.SqlXml__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Forms__b77a5c561934e089
HKEY_CURRENT_USER\Control Panel\International\Geo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11D3-B153-00C04F79FAA6}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Printing__31bf3856ad364e35
HKEY_CURRENT_USER_Classes\exefile\CurVer
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AllowedEnumeration
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4DF0C730-DF9D-4AE3-9153-AA6B82E9795A}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\InprocHandler32
HKEY_CURRENT_USER_Classes\Folder\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_CURRENT_USER_Classes\Directory\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\LocalServer32
HKEY_CURRENT_USER_Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance
HKEY_CURRENT_USER_Classes\Directory\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.VisualBasic__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Input.Manipulations__b77a5c561934e089
HKEY_CURRENT_USER_Classes
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\DocObject
HKEY_CURRENT_USER_Classes\CLSID\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\ShellFolder
HKEY_CURRENT_USER_Classes\Folder\BrowseInPlace
HKEY_CURRENT_USER_Classes\exefile
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\InprocHandler32
HKEY_CURRENT_USER\Software\Microsoft\Direct3D
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.UIAutomationProvider__31bf3856ad364e35
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|user|Desktop|Merzoct.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.PresentationFramework__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Standards
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Security__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml.Linq__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.exe\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\Elevation
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocHandler32
HKEY_CURRENT_USER_Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\ShellFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Deployment__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.PresentationCore__31bf3856ad364e35
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Core__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Input.Manipulations__b77a5c561934e089
HKEY_CURRENT_USER_Classes\exefile\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\TreatAs
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\KnownFolders
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\BrowseInPlace
HKEY_CURRENT_USER_Classes\exefile\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\BrowseInPlace
HKEY_CURRENT_USER_Classes\Folder\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\LocalServer32
HKEY_CURRENT_USER\Software\Classes\CLSID\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\Instance
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\TreatAs
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\InprocHandler32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
HKEY_CURRENT_USER_Classes\Folder\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\TreatAs
HKEY_CURRENT_USER_Classes\.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\InprocHandler
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.Accessibility__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Numerics__b77a5c561934e089
HKEY_CURRENT_USER_Classes\Directory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Runtime.Remoting__b77a5c561934e089
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0E5AAE11-A475-4c5b-AB00-C66DE400274E}\InprocHandler
HKEY_CURRENT_USER\Software\Microsoft
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\DocObject
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|user|AppData|Local|Temp|Killer Clown 2.0.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppModel\Lookaside\user
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\policy\standards\v4.0.30319
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Drawing__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml__b77a5c561934e089
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe\ShellEx\IconHandler
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\LocalServer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\TreatAs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.Accessibility__b03f5f7f11d50a3a
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|user|AppData|Local|Temp|Killer Clown 2.0.exe
HKEY_CURRENT_USER_Classes\Directory\Clsid
HKEY_CURRENT_USER_Classes\CLSID\{59031a47-3f72-44a7-89c5-5595fe6b30ee}\ShellFolder
HKEY_CURRENT_USER_Classes\Directory\ShellEx\IconHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\BrowseInPlace
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Servicing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.PresentationFramework__31bf3856ad364e35
HKEY_CURRENT_USER_Classes\SystemFileAssociations\.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_CURRENT_USER_Classes\AllFilesystemObjects\Clsid
HKEY_CURRENT_USER\System\CurrentControlSet\Control\GraphicsDrivers\Scheduler
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{BF2BE681-CD15-4F0D-A3B4-4DC5C9B142E7}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|user|Desktop|software.exe
HKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|user|Desktop|software.exe
HKEY_CURRENT_USER\Software\Microsoft\Direct3D\Drivers

Registry Set (Top 25)

Key Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace\LocalBase C:\Users\Bruno\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace\DTDFile C:\Users\Bruno\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace\LocalDelta C:\Users\Bruno\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNSD.XML
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace\RemoteDelta C:\Users\Bruno\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNSR.XML
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WanaCrypt0r\wd C:\Users\Bruno\AppData\Local\Temp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop\IconLayouts \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x01\x00\x01\x00\x01\x00\x04\x00\x00\x00\x00\x00\x00\x00,\x00\x00\x00\x00\x00\x00\x00:\x00:\x00{\x002\x000\x00D\x000\x004\x00F\x00E\x000\x00-\x003\x00A\x00E\x00A\x00-\x001\x000\x006\x009\x00-\x00A\x002\x00D\x008\x00-\x000\x008\x000\x000\x002\x00B\x003\x000\x003\x000\x009\x00D\x00}\x00>\x00 \x00 \x00\x00\x00,\x00\x00\x00\x00\x00\x00\x00:\x00:\x00{\x006\x004\x005\x00F\x00F\x000\x004\x000\x00-\x005\x000\x008\x001\x00-\x001\x000\x001\x00B\x00-\x009\x00F\x000\x008\x00-\x000\x000\x00A\x00A\x000\x000\x002\x00F\x009\x005\x004\x00E\x00}\x00>\x00 \x00 \x00\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00D\x00o\x00c\x00u\x00m\x00e\x00n\x00t\x00s\x00.\x00l\x00n\x00k\x00>\x00 \x00 \x00\x00\x00\x0f\x00\x00\x00\x00\x00\x00\x00M\x00e\x00r\x00z\x00o\x00c\x00t\x00.\x00e\x00x\x00e\x00>\x00 \x00 \x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x02\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x02\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop\IconNameVersion 1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\InstalledWin32AppsRevision {F1535249-8104-439B-92CC-336DF6CAA906}
Software\WanaCrypt0r\wd C:\Users\<USER>\AppData\Local\Temp
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{ED50FC29-B964-48A9-AFB3-15EBB9B97F36} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF Binary Data
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yqzejaezr591 “C:\Users\<USER>\AppData\Local\Temp\tasksche.exe”
HKEY_USERS\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids\exefile Binary Data
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{F8CB6B5F-0B41-45F8-B124-957208F7A23A}
HKEY_LOCAL_MACHINE\SYSTEM\Software\Microsoft\TIP\AggregateResults\data D9 A7 A8 01 01 00 03 00 EC 03 F4 6F 00 00 00 00 0C 00 00 00 02 00 00 00 49 A8 A8 01 01 02 03 00 5C 4
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{BF2BE681-CD15-4F0D-A3B4-4DC5C9B142E7}
HKEY_LOCAL_MACHINE\Software\WOW6432Node\WanaCrypt0r
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WanaCrypt0r\wd C:\Users\user\AppData\Local\Temp

Services Started (Top 15)

Service
BITS
WSearch

Services Opened (Top 15)

Service
AudioSrv
wscsvc
VaultSvc

What To Do Now — Practical Defense Playbook

  • Contain unknowns: block first‑run binaries by default — signatures catch up, containment works now.
  • EDR controls: alert on keyboard hooks, screen capture APIs, VM/sandbox checks, and command‑shell launches.
  • Registry watch: flag queries/sets under policy paths (e.g., …\FipsAlgorithmPolicy\*).
  • Network rules: inspect outbound TLS to IP‑lookup services and unexpected CDN endpoints.
  • Hunt broadly: sweep endpoints for the indicators above and quarantine positives immediately.

Dwell time equals attacker opportunity. Reducing execution privileges and egress shrinks that window even when vendors disagree.

Scroll to Top