bbg.moiservice.com

DNS Lookup
Host Name IP Address
bbg.moiservice.com 74.117.174.82
i3ED6DA76.versanet.de 62.214.218.118

Opened listening TCP connection on port: 55907
Opened listening TCP connection on port: 113
C&C Server: 74.117.174.82:16667
Server Password:
Username: laMer
Nickname: XP|Ubd2
Channel: #lbl# (Password: lam)
Channeltopic: :

Registry Changes by all processes
Create or Open
Changes HKEY_CURRENT_USERSoftwaremIRC “DateUsed” = 1264705554
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallmIRC “DisplayName” = mIRC
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallmIRC “UninstallString” = “C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518iexplorer.com” -uninstall
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “WinXPService” = C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518iexplorer.com
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “VoiceEnabled” = [REG_DWORD, value: 00000001]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseVoiceTips” = [REG_DWORD, value: 00000001]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “KeyHoldHotKey” = [REG_DWORD, value: 00000091]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBeepSRPrompt” = [REG_DWORD, value: 00000001]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRTimerDelay” = [REG_DWORD, value: 000007D0]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRModeID” = [REG_BINARY, size: 16 bytes]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “EnableSpeaking” = [REG_DWORD, value: 00000001]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBalloon” = [REG_DWORD, value: 00000001]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseCharacterFont” = [REG_DWORD, value: 00000001]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseSoundEffects” = [REG_DWORD, value: 00000001]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SpeakingSpeed” = [REG_DWORD, value: 00000005]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetX” = [REG_DWORD, value: 000F423F]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetY” = [REG_DWORD, value: 000F423F]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetWidth” = [REG_DWORD, value: 00000000]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetHeight” = [REG_DWORD, value: 00000000]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetPage” = [REG_DWORD, value: 00000000]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLeft” = [REG_DWORD, value: FFFFFFFF]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowTop” = [REG_DWORD, value: FFFFFFFF]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowWidth” = [REG_DWORD, value: 000000C8]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowHeight” = [REG_DWORD, value: 000000C8]
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLocationSet” = [REG_DWORD, value: 00000000]
Reads HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion “ProgramFilesDir”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “Desktop”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShell Folders “Common Desktop”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “Programs”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShell Folders “Common Programs”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “Startup”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShell Folders “Common Startup”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “Start Menu”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShell Folders “Common Start Menu”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “AppData”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShell Folders “Common AppData”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “Favorites”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “Fonts”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “Personal”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders “SendTo”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSession ManagerAppCompatibility “DisableAppCompat”
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{56F9679E-7826-4C84-81F3-532071A8BCC5}InprocServer32 “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile “ProgID”
HKEY_LOCAL_MACHINESOFTWAREClassesfile “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesMapi “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesOutlookexpress “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesOTFS “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ScriptOk”
HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREClasseshtmlfileshellopen “command”
HKEY_LOCAL_MACHINESOFTWAREClassesmailtoshellopen “command”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSession ManagerAppCompatibility “DisableAppCompat”
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{871C5380-42A0-1069-A2EA-08002B30309D}InProcServer32 “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionApp PathsIEXPLORE.EXE “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedLow”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedHigh”
HKEY_LOCAL_MACHINESOFTWAREClassesInterface{EAB22AC1-30C1-11CF-A7EB-0000C05BAE0B}TypeLib “”
HKEY_LOCAL_MACHINESOFTWAREClassesInterface{B722BCCB-4E68-101B-A2BC-00AA00404770}ProxyStubClsid32 “”
HKEY_LOCAL_MACHINESOFTWAREClassesInterface{79EAC9C4-BAF9-11CE-8C82-00AA004BA90B}ProxyStubClsid32 “”
HKEY_LOCAL_MACHINESOFTWAREClassesInterface{000214E6-0000-0000-C000-000000000046}ProxyStubClsid32 “”
HKEY_LOCAL_MACHINESOFTWAREClassesInterface{93F2F68C-1D1B-11D3-A30E-00C04F79ABD1}ProxyStubClsid32 “”
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{56F9679E-7826-4C84-81F3-532071A8BCC5}InprocServer32 “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile “ProgID”
HKEY_LOCAL_MACHINESOFTWAREClassesfile “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesMapi “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesOutlookexpress “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREClassesOTFS “ShellFolder”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ScriptOk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ContentType”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “TemplateUrl”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ScriptOk”
HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “VoiceEnabled”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseVoiceTips”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “KeyHoldHotKey”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBeepSRPrompt”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRTimerDelay”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRModeID”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “EnableSpeaking”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBalloon”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseCharacterFont”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UserFont”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseSoundEffects”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SpeakingSpeed”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetX”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetY”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetWidth”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetHeight”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetPage”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLeft”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowTop”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowWidth”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowHeight”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLocationSet”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseSprites”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseUniScribe”
HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SystemCharacter”
Enums HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlers
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedType
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlers
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedType

File Changes by all processes
New Files C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518313.INS
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518dr67rf.zip
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451886102025.INS
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451827296716.INS
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518iexplorer.com
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451831861617.INS
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451837224256.INS
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518o1o2o3o4
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45188204747.INS
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518si3sj9.dll
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45187058408.INS
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518vcr32.zip
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp
DeviceRasAcd
Opened Files c:973be4811e58e7c7e280bf20638e753dinanaged.exe
.PIPEwkssvc
.PIPElsarpc
C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll
C:WINDOWSRegistrationR000000000007.clb
C:WINDOWSAppPatchsysmain.sdb
C:WINDOWSAppPatchsystest.sdb
DeviceNamedPipeShimViewer
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518
servers
servers
urls
urls
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518urls.ini
addrbk
addrbk
iexplore
iexplore
rundll32
rundll32
logs
logs
sounds
sounds
12
12
channels
channels
perform
perform
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518perform.ini
control
control
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518control.ini
aliases
aliases
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518aliases.ini
popups
popups
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518popups.ini
eiuq
eiuq
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518eiuq.msp
ei7g
ei7g
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp
l3ik7
l3ik7
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip
m93
m93
.PIPEwkssvc
C:WINDOWSsystem32ieframe.dll
C:WINDOWSRegistrationR000000000007.clb
C:ProgrammeInternet ExplorerIEXPLORE.EXE
C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll
.PIPElsarpc
C:WINDOWSAppPatchsysmain.sdb
C:WINDOWSAppPatchsystest.sdb
DeviceNamedPipeShimViewer
C:WINDOWS
dr67rf
dr67rf
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518dr67rf.zip
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518servers.ini
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518servers.ini
inanaged
inanaged
sounds
logs
internet
internet
java
java
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg
C:WINDOWSmsagentintlAgt0409.dll
C:WINDOWSRegistrationR000000000007.clb
.PIPElsarpc
Deleted Files
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518password.val
C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg
Chronological Order Open File: c:973be4811e58e7c7e280bf20638e753dinanaged.exe (OPEN_EXISTING)
Get File Attributes: C:DOKUME~1ADMINI~1LOKALE~1Temp Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:DOKUME~1ADMINI~1LOKALE~1Tempiyexit1.tmp Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$ Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller Flags: (SECURITY_ANONYMOUS)
Find File: c:WINDOWSInstaller*.*
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518 Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C: Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C: Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
Find File: c:973be4811e58e7c7e280bf20638e753dinanaged.exe
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518dr67rf.zip
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518313.INS
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518313.INS
Set File Time: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518313.INS
Move File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518313.INS to C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518dr67rf.zip
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451886102025.INS
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451886102025.INS
Set File Time: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451886102025.INS
Move File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451886102025.INS to C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518iexplorer.com
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451827296716.INS
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451827296716.INS
Set File Time: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451827296716.INS
Move File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451827296716.INS to C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518iexplorer.com
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451831861617.INS
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451831861617.INS
Set File Time: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451831861617.INS
Move File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451831861617.INS to C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518o1o2o3o4
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451837224256.INS
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451837224256.INS
Set File Time: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451837224256.INS
Move File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.451837224256.INS to C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518o1o2o3o4
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518si3sj9.dll
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45188204747.INS
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45188204747.INS
Set File Time: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45188204747.INS
Move File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45188204747.INS to C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518si3sj9.dll
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518vcr32.zip
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45187058408.INS
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45187058408.INS
Set File Time: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45187058408.INS
Move File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.45187058408.INS to C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518vcr32.zip
Delete File:
Delete File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518password.val
Open File: .PIPEwkssvc (OPEN_EXISTING)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518iexplorer.com Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
Open File: .PIPElsarpc (OPEN_EXISTING)
Get File Attributes: C:Dokumente und EinstellungenAdministratorEigene Dateiendesktop.ini Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:Dokumente und EinstellungenAll UsersDokumentedesktop.ini Flags: (SECURITY_ANONYMOUS)
Open File: C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll (OPEN_EXISTING)
Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518iexplorer.com:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518 ()
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518o1o2o3o4 Flags: (SECURITY_ANONYMOUS)
Set File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518o1o2o3o4 Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_COMPRESSED FILE_ATTRIBUTE_COMPRESSED SECURITY_ANONYMOUS)
Open File: servers (OPEN_EXISTING)
Find File: servers
Open File: servers (OPEN_EXISTING)
Get File Attributes: servers Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518servers.ini Flags: (SECURITY_ANONYMOUS)
Open File: urls (OPEN_EXISTING)
Find File: urls
Open File: urls (OPEN_EXISTING)
Get File Attributes: urls Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518urls.ini Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518urls.ini (OPEN_EXISTING)
Open File: addrbk (OPEN_EXISTING)
Find File: addrbk
Open File: addrbk (OPEN_EXISTING)
Get File Attributes: addrbk Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518addrbk.ini Flags: (SECURITY_ANONYMOUS)
Open File: iexplore (OPEN_EXISTING)
Find File: iexplore
Open File: iexplore (OPEN_EXISTING)
Get File Attributes: iexplore Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:ProgrammeInternet Exploreriexplore.exe Flags: (SECURITY_ANONYMOUS)
Open File: rundll32 (OPEN_EXISTING)
Find File: rundll32
Open File: rundll32 (OPEN_EXISTING)
Get File Attributes: rundll32 Flags: (SECURITY_ANONYMOUS)
Get File Attributes: rundll32.exe Flags: (SECURITY_ANONYMOUS)
Open File: logs (OPEN_EXISTING)
Find File: logs
Get File Attributes: logs Flags: (SECURITY_ANONYMOUS)
Open File: logs (OPEN_EXISTING)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518logs Flags: (SECURITY_ANONYMOUS)
Open File: sounds (OPEN_EXISTING)
Find File: sounds
Get File Attributes: sounds Flags: (SECURITY_ANONYMOUS)
Open File: sounds (OPEN_EXISTING)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518sounds Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518sounds. Flags: (SECURITY_ANONYMOUS)
Open File: 12 (OPEN_EXISTING)
Find File: 12
Open File: 12 (OPEN_EXISTING)
Get File Attributes: 12 Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518 Flags: (SECURITY_ANONYMOUS)
Open File: channels (OPEN_EXISTING)
Find File: channels
Open File: channels (OPEN_EXISTING)
Get File Attributes: channels Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518channels.txt Flags: (SECURITY_ANONYMOUS)
Open File: perform (OPEN_EXISTING)
Find File: perform
Open File: perform (OPEN_EXISTING)
Get File Attributes: perform Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518perform.ini Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518perform.ini (OPEN_EXISTING)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518. Flags: (SECURITY_ANONYMOUS)
Open File: control (OPEN_EXISTING)
Find File: control
Open File: control (OPEN_EXISTING)
Get File Attributes: control Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518control.ini Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518control.ini (OPEN_EXISTING)
Open File: aliases (OPEN_EXISTING)
Find File: aliases
Open File: aliases (OPEN_EXISTING)
Get File Attributes: aliases Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518aliases.ini Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518aliases.ini (OPEN_EXISTING)
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518aliases.ini
Open File: popups (OPEN_EXISTING)
Find File: popups
Open File: popups (OPEN_EXISTING)
Get File Attributes: popups Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518popups.ini Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518popups.ini (OPEN_EXISTING)
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518popups.ini
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518tblogo.bmp Flags: (SECURITY_ANONYMOUS)
Open File: eiuq (OPEN_EXISTING)
Find File: eiuq
Open File: eiuq (OPEN_EXISTING)
Get File Attributes: eiuq Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518eiuq.msp Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518eiuq.msp (OPEN_EXISTING)
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518eiuq.msp
Open File: ei7g (OPEN_EXISTING)
Find File: ei7g
Open File: ei7g (OPEN_EXISTING)
Get File Attributes: ei7g Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp Flags: (SECURITY_ANONYMOUS)
Set File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_COMPRESSED FILE_ATTRIBUTE_COMPRESSED SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp (OPEN_EXISTING)
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp
Open File: l3ik7 (OPEN_EXISTING)
Find File: l3ik7
Open File: l3ik7 (OPEN_EXISTING)
Get File Attributes: l3ik7 Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip Flags: (SECURITY_ANONYMOUS)
Set File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_COMPRESSED FILE_ATTRIBUTE_COMPRESSED SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip (OPEN_EXISTING)
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518l3ik7.zip
Open File: m93 (OPEN_EXISTING)
Find File: m93
Open File: m93 (OPEN_EXISTING)
Get File Attributes: m93 Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg Flags: (SECURITY_ANONYMOUS)
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg
Create/Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg (OPEN_ALWAYS)
Find File: regedit.*
Find File: C:WINDOWSsystem32regedit.*
Find File: C:WINDOWSSystemregedit.*
Find File: C:WINDOWSregedit.*
Open File: .PIPEwkssvc (OPEN_EXISTING)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518 Flags: (SECURITY_ANONYMOUS)
Find File: regedit.*
Open File: C:WINDOWSsystem32ieframe.dll (OPEN_EXISTING)
Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
Open File: C:ProgrammeInternet ExplorerIEXPLORE.EXE (OPEN_EXISTING)
Open File: C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll (OPEN_EXISTING)
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518regedit.*
Open File: .PIPElsarpc (OPEN_EXISTING)
Get File Attributes: C:WINDOWSregedit.exe Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSregedit.exe:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
Open File: C:WINDOWS ()
Find File: C:WINDOWSregedit.exe
Open File: dr67rf (OPEN_EXISTING)
Find File: dr67rf
Open File: dr67rf (OPEN_EXISTING)
Get File Attributes: dr67rf Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518dr67rf.zip Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518dr67rf.zip (OPEN_EXISTING)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518servers.ini (OPEN_EXISTING)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518servers.ini (OPEN_EXISTING)
Find File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518o1o2o3o4
Open File: inanaged (OPEN_EXISTING)
Find File: inanaged
Open File: inanaged (OPEN_EXISTING)
Get File Attributes: inanaged Flags: (SECURITY_ANONYMOUS)
Get File Attributes: c:inanaged.exe Flags: (SECURITY_ANONYMOUS)
Create File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518ei7g.msp
Create/Open File: DeviceRasAcd (OPEN_ALWAYS)
Delete File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg
Open File: sounds (OPEN_EXISTING)
Open File: logs (OPEN_EXISTING)
Open File: internet (OPEN_EXISTING)
Find File: internet
Open File: internet (OPEN_EXISTING)
Get File Attributes: internet Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518internet Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518channels Flags: (SECURITY_ANONYMOUS)
Open File: java (OPEN_EXISTING)
Find File: java
Open File: java (OPEN_EXISTING)
Get File Attributes: java Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518java Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSInstaller$PatchCache$Managed0002109F10090400000000000F01FEC12.0.4518m93.reg (OPEN_EXISTING)
Open File: C:WINDOWSmsagentintlAgt0409.dll (OPEN_EXISTING)
Find File: C:WINDOWSmsagentintlagt????.dll
Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
Open File: .PIPElsarpc (OPEN_EXISTING)

NICK XP|Hdm7
:s11.cpe.netcabo.uk NOTICE AUTH :*** Looking up your hostname…
USER laMer “” “bbg.moiservice.com” :.4·.là.4.M..ér.4· You Think i.°.m .N.aughty .‹.!.›
:s11.cpe.netcabo.uk NOTICE AUTH :*** Found your hostname
:s11.cpe.netcabo.uk 001 XP|Hdm7
:s11.cpe.netcabo.uk 002 XP|Hdm7
:s11.cpe.netcabo.uk 003 XP|Hdm7
:s11.cpe.netcabo.uk 004 XP|Hdm7
:s11.cpe.netcabo.uk 005 XP|Hdm7
:s11.cpe.netcabo.uk 005 XP|Hdm7
:s11.cpe.netcabo.uk 005 XP|Hdm7
:s11.cpe.netcabo.uk 422 XP|Hdm7 :MOTD File is missing
:XP|Hdm7 MODE XP|Hdm7 :+iwRG
USERHOST XP|Hdm7
MODE XP|Hdm7 +i
:s11.cpe.netcabo.uk 302 XP|Hdm7 :XP|Hdm7=+laMer@host81-141-83-183.wlms-broadband.com
JOIN #lbl# lam
:XP|Hdm7!laMer@host81-141-83-183.wlms-broadband.com JOIN :#lbl#
MODE #lbl#
:oP!X@admin.com PRIVMSG #lbl# :!cl jp #ßæíÊ e .#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_.¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…#…¯_¯….00_…#…¯_¯….00_…#… ¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#….¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯w7w7 🙂
:oP!X@admin.com PRIVMSG #lbl# :!cl jp #ßæíÊ e .#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_.¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…#…¯_¯….00_…#…¯_¯….00_…#… ¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#….¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯w7w7 🙂
PING :s11.cpe.netcabo.uk
PONG :s11.cpe.netcabo.uk
:oP!X@admin.com PRIVMSG #lbl# :!cl con astro.ga.us.dal.net 6668 1
:oP!X@admin.com PRIVMSG #lbl# :!cl con soho.dal.net 6665 1
:oP!X@admin.com PRIVMSG #lbl# :!cl con soho.dal.net 6665 1
:oP!X@admin.com PRIVMSG #lbl# :!cl jp #ßæíÊ e w7w7 :)) .b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h…..
:oP!X@admin.com TOPIC #lbl# :!cl jp #ßæíÊ e w7w7 :)) .b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a..
PING :s11.cpe.netcabo.uk
PONG :s11.cpe.netcabo.uk
:oP!X@admin.com TOPIC #lbl# :!cl f.c #ßæíÊ e w7w7 :)) .b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a.
:oP!X@admin.com PRIVMSG #lbl# :!cl jp #ßæíÊ e .#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_.¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…#…¯_¯….00_…#…¯_¯….00_…#… ¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#….¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯_¯….00_…#…¯w7w7 🙂
:oP!X@admin.com PRIVMSG #lbl# :!cl f.c #ßæíÊ e w7w7 :)) .b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h…..
:oP!X@admin.com PRIVMSG #lbl# :!cl con soho.dal.net 6665 1
:oP!X@admin.com PRIVMSG #lbl# :!cl con soho.dal.net 6665 1
:oP!X@admin.com PRIVMSG #lbl# :!cl f.c #ßæíÊ e w7w7 :)) .b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h…..
:oP!X@admin.com PRIVMSG #lbl# :!cl f.c #ninja e w7w7 :)) .b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h……b..L..a…h…..
PING :s11.cpe.netcabo.uk
PONG :s11.cpe.netcabo.uk
:oP!X@admin.com PRIVMSG #lbl# :!cl die
:oP!X@admin.com PRIVMSG #lbl# :!cl die
:oP!X@admin.com PRIVMSG #lbl# :!cl die
:oP!X@admin.com PRIVMSG #lbl# :!cl die
PING :s11.cpe.netcabo.uk
PONG :s11.cpe.netcabo.uk
PING :s11.cpe.netcabo.uk
PONG :s11.cpe.netcabo.uk
:oP!X@admin.com TOPIC #lbl# :

Download source here:
http://privatepaste.com/download/b2f37be3dc

Categories: Uncategorized