DNS Lookup 
 Host Name  IP Address 
 bleedmachine.dyndns.org  82.113.145.98 
 Lelystad.NL.EU.UnderNet.Org  195.47.220.2 
 Helsinki.FI.EU.Undernet.Org  195.197.175.21 
 mue-88-130-0-202.dsl.tropolys.de  88.130.0.202
Opened listening TCP connection on port: 113
 C&C Server: 82.113.145.98:6667 
 Server Password: 
 Username: bleed 
 Nickname: catd 
 Channel: (Password: ) 
 Channeltopic: 
 Outgoing connection to remote server: Lelystad.NL.EU.UnderNet.Org TCP port 6667
 Outgoing connection to remote server: Lelystad.NL.EU.UnderNet.Org TCP port 6667
 C&C Server: 195.197.175.21:6667 
 Server Password: 
 Username: bleed 
 Nickname: :evilo 
 Channel: (Password: ) 
 Channeltopic: 
 Outgoing connection to remote server: Lelystad.NL.EU.UnderNet.Org TCP port 6667
 C&C Server: 195.197.175.21:6667 
 Server Password: 
 Username: bleed 
 Nickname: catd 
 Channel: (Password: ) 
 Channeltopic: 
 C&C Server: 195.197.175.21:6667 
 Server Password: 
 Username: flood 
 Nickname: :bleedc 
 Channel: (Password: ) 
 Channeltopic:
Registry Changes by all processes 
 Create or Open 
 Changes  HKEY_CURRENT_USERSoftwareWinRAR SFX “C%%Windows%temp%spoolsv%” = C:Windowstempspoolsv
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicessvchostParameters “Application” = “C:Windowstempspoolsvspoolsv.exe”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicessvchostParameters “AppDirectory” = “C:Windowstempspoolsvspoolsv.exe”
 HKEY_CURRENT_USERSoftwaremIRCLicense “” = 5662-546732
 HKEY_CURRENT_USERSoftwaremIRCLockOptions “” = 0,4096
 HKEY_CURRENT_USERSoftwaremIRCUserName “” = WhiteHat
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “spoolsv” = “C:Windowstempspoolsvspoolsv.exe”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallmIRC “DisplayName” = mIRC
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstallmIRC “UninstallString” = “C:WINDOWStempspoolsvspoolsv.exe” -uninstall
 HKEY_LOCAL_MACHINESOFTWAREClasses.cha “” = ChatFile
 HKEY_LOCAL_MACHINESOFTWAREClasses.chat “” = ChatFile
 HKEY_LOCAL_MACHINESOFTWAREClassesChatFile “” = Chat File
 HKEY_LOCAL_MACHINESOFTWAREClassesChatFileDefaultIcon “” = “C:WINDOWStempspoolsvspoolsv.exe”
 HKEY_LOCAL_MACHINESOFTWAREClassesChatFileShellopencommand “” = “C:WINDOWStempspoolsvspoolsv.exe” -noconnect
 HKEY_LOCAL_MACHINESOFTWAREClassesChatFileShellopenddeexec “” = %1
 HKEY_LOCAL_MACHINESOFTWAREClassesChatFileShellopenddeexecApplication “” = svchost
 HKEY_LOCAL_MACHINESOFTWAREClassesChatFileShellopenddeexecifexec “” = %1
 HKEY_LOCAL_MACHINESOFTWAREClassesChatFileShellopenddeexecTopic “” = Connect
 HKEY_LOCAL_MACHINESOFTWAREClassesirc “” = URL:IRC Protocol
 HKEY_LOCAL_MACHINESOFTWAREClassesirc “EditFlags” = [REG_BINARY, size: 4 bytes]
 HKEY_LOCAL_MACHINESOFTWAREClassesirc “URL Protocol” =
 HKEY_LOCAL_MACHINESOFTWAREClassesircDefaultIcon “” = “C:WINDOWStempspoolsvspoolsv.exe”
 HKEY_LOCAL_MACHINESOFTWAREClassesircShellopencommand “” = “C:WINDOWStempspoolsvspoolsv.exe” -noconnect
 HKEY_LOCAL_MACHINESOFTWAREClassesircShellopenddeexec “” = %1
 HKEY_LOCAL_MACHINESOFTWAREClassesircShellopenddeexecApplication “” = svchost
 HKEY_LOCAL_MACHINESOFTWAREClassesircShellopenddeexecifexec “” = %1
 HKEY_LOCAL_MACHINESOFTWAREClassesircShellopenddeexecTopic “” = Connect
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “VoiceEnabled” = [REG_DWORD, value: 00000001]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseVoiceTips” = [REG_DWORD, value: 00000001]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “KeyHoldHotKey” = [REG_DWORD, value: 00000091]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBeepSRPrompt” = [REG_DWORD, value: 00000001]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRTimerDelay” = [REG_DWORD, value: 000007D0]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRModeID” = [REG_BINARY, size: 16 bytes]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “EnableSpeaking” = [REG_DWORD, value: 00000001]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBalloon” = [REG_DWORD, value: 00000001]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseCharacterFont” = [REG_DWORD, value: 00000001]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseSoundEffects” = [REG_DWORD, value: 00000001]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SpeakingSpeed” = [REG_DWORD, value: 00000005]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetX” = [REG_DWORD, value: 000F423F]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetY” = [REG_DWORD, value: 000F423F]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetWidth” = [REG_DWORD, value: 00000000]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetHeight” = [REG_DWORD, value: 00000000]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetPage” = [REG_DWORD, value: 00000000]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLeft” = [REG_DWORD, value: FFFFFFFF]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowTop” = [REG_DWORD, value: FFFFFFFF]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowWidth” = [REG_DWORD, value: 000000C8]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowHeight” = [REG_DWORD, value: 000000C8]
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLocationSet” = [REG_DWORD, value: 00000000]
 Reads  HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSession ManagerAppCompatibility “DisableAppCompat”
 HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{56F9679E-7826-4C84-81F3-532071A8BCC5}InprocServer32 “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile  “ProgID”
 HKEY_LOCAL_MACHINESOFTWAREClassesfile “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesMapi “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOutlookexpress “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOTFS “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ScriptOk”
 HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionApp PathsIEXPLORE.EXE “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedLow”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedHigh”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{EAB22AC1-30C1-11CF-A7EB-0000C05BAE0B}TypeLib “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{B722BCCB-4E68-101B-A2BC-00AA00404770}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{79EAC9C4-BAF9-11CE-8C82-00AA004BA90B}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{000214E6-0000-0000-C000-000000000046}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{93F2F68C-1D1B-11D3-A30E-00C04F79ABD1}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DisableUNCCheck”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “EnableExtensions”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DelayedExpansion”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DefaultColor”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “CompletionChar”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “PathCompletionChar”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “AutoRun”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DisableUNCCheck”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “EnableExtensions”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DelayedExpansion”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DefaultColor”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “CompletionChar”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “PathCompletionChar”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “AutoRun”
 HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSession ManagerAppCompatibility “DisableAppCompat”
 HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{56F9679E-7826-4C84-81F3-532071A8BCC5}InprocServer32 “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile  “ProgID”
 HKEY_LOCAL_MACHINESOFTWAREClassesfile “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesMapi “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOutlookexpress “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOTFS “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_CURRENT_USERSoftwaremIRC “date”
 HKEY_CURRENT_USERSoftwaremIRC “LockOptions”
 HKEY_CURRENT_USERSoftwaremIRC “Channels”
 HKEY_LOCAL_MACHINESOFTWAREClasseshtmlfileshellopen “command”
 HKEY_LOCAL_MACHINESOFTWAREClassesmailtoshellopen “command”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_CURRENT_USERSoftwaremIRC “UserName”
 HKEY_CURRENT_USERSoftwaremIRC “License”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “VoiceEnabled”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseVoiceTips”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “KeyHoldHotKey”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBeepSRPrompt”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRTimerDelay”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SRModeID”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “EnableSpeaking”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseBalloon”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseCharacterFont”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UserFont”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseSoundEffects”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SpeakingSpeed”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetX”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetY”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetWidth”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetHeight”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “PropertySheetPage”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLeft”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowTop”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowWidth”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowHeight”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “CommandsWindowLocationSet”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseSprites”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “UseUniScribe”
 HKEY_CURRENT_USERSoftwareMicrosoftMicrosoft Agent “SystemCharacter”
 Enums  HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlers
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedType
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlers
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedType
File Changes by all processes 
 New Files  __tmp_rar_sfx_access_check_5738906
 a.reg
 aliases.ini
 control.ini
 mirc.ico
 mirc.ini
 remote.ini
 run.bat
 servers.ini
 spoolsv.exe
 users.ini
 ident.txt
 xmas.JPG
 fullname.txt
 s.mrc
 com.mrc
 C:WINDOWStempspoolsvTMP1.$$$
 C:WINDOWStempspoolsvcontrol.ini
 C:WINDOWStempspoolsvcontrol.ini
 C:WINDOWStempspoolsvTMP2.$$$
 C:WINDOWStempspoolsvcontrol.ini
 C:WINDOWStempspoolsvTMP3.$$$
 C:WINDOWStempspoolsvcontrol.ini
 C:WINDOWStempspoolsvTMP4.$$$
 C:WINDOWStempspoolsvcontrol.ini
 C:WINDOWStempspoolsvTMP5.$$$
 C:WINDOWStempspoolsvremote.ini
 C:WINDOWStempspoolsvremote.ini
 C:WINDOWStempspoolsvTMP6.$$$
 C:WINDOWStempspoolsvremote.ini
 DeviceRasAcd
 Opened Files  c:card.exe
 C:WINDOWSRegistrationR000000000007.clb
 c:card.exe
 .PIPEwkssvc
 .PIPElsarpc
 C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll
 C:WINDOWSAppPatchsysmain.sdb
 C:WINDOWSAppPatchsystest.sdb
 DeviceNamedPipeShimViewer
 C:Windowstempspoolsv
 C:ProgrammeInternet ExplorerIEXPLORE.EXE
 C:Windowstempspoolsvrun.bat
 C:WINDOWSAppPatchsysmain.sdb
 C:WINDOWSAppPatchsystest.sdb
 DeviceNamedPipeShimViewer
 C:WINDOWS
 C:WINDOWStempspoolsv
 .PIPEwkssvc
 .PIPElsarpc
 C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll
 C:WINDOWSRegistrationR000000000007.clb
 C:WINDOWSsystem32
 C:WINDOWSTempspoolsva.reg
 servers
 servers
 urls
 urls
 C:WINDOWStempspoolsvurls.ini
 addrbk
 addrbk
 iexplore
 iexplore
 rundll32
 rundll32
 logs
 logs
 sounds
 sounds
 spoolsv
 spoolsv
 channels
 channels
 perform
 perform
 C:WINDOWStempspoolsvperform.ini
 download
 download
 control
 control
 C:WINDOWStempspoolsvcontrol.ini
 aliases
 aliases
 C:WINDOWStempspoolsvaliases.ini
 popups
 popups
 C:WINDOWStempspoolsvpopups.ini
 users
 users
 C:WINDOWStempspoolsvusers.ini
 remote
 remote
 C:WINDOWStempspoolsvremote.ini
 com
 com
 C:WINDOWStempspoolsvcom.mrc
 s
 s
 C:WINDOWStempspoolsvs.mrc
 ident
 ident
 C:WINDOWStempspoolsvident.txt
 fullname
 fullname
 C:WINDOWStempspoolsvfullname.txt
 C:WINDOWStempspoolsvservers.ini
 C:WINDOWStempspoolsvservers.ini
 .PIPElsarpc
 C:WINDOWSRegistrationR000000000007.clb
 vhost
 vhost
 silence
 silence
 mode
 mode
 .PIPElsarpc
 C:WINDOWSRegistrationR000000000007.clb
 C:WINDOWSTempspoolsvxmas.JPG
 C:WINDOWSmsagentintlAgt0409.dll
 C:WINDOWSRegistrationR000000000007.clb
 .PIPElsarpc
 Deleted Files  __tmp_rar_sfx_access_check_5738906
 C:WINDOWStempspoolsvTMP1.$$$
 C:WINDOWStempspoolsvTMP2.$$$
 C:WINDOWStempspoolsvTMP3.$$$
 C:WINDOWStempspoolsvTMP4.$$$
 C:WINDOWStempspoolsvTMP5.$$$
 C:WINDOWStempspoolsvTMP6.$$$
 Chronological Order  Open File: c:card.exe (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Open File: c:card.exe (OPEN_EXISTING)
 Set File Attributes: C:Windowstempspoolsv Flags: (SECURITY_ANONYMOUS)
 Create File: __tmp_rar_sfx_access_check_5738906
 Delete File: __tmp_rar_sfx_access_check_5738906
 Find File: c:card.exe
 Get File Attributes: a.reg Flags: (SECURITY_ANONYMOUS)
 Create File: a.reg
 Set File Time: C:WINDOWSTempspoolsva.reg
 Set File Attributes: a.reg Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: aliases.ini Flags: (SECURITY_ANONYMOUS)
 Create File: aliases.ini
 Set File Time: C:WINDOWSTempspoolsvaliases.ini
 Set File Attributes: aliases.ini Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: control.ini Flags: (SECURITY_ANONYMOUS)
 Create File: control.ini
 Set File Time: C:WINDOWSTempspoolsvcontrol.ini
 Set File Attributes: control.ini Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: mirc.ico Flags: (SECURITY_ANONYMOUS)
 Create File: mirc.ico
 Set File Time: C:WINDOWSTempspoolsvmirc.ico
 Set File Attributes: mirc.ico Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_READONLY FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: mirc.ini Flags: (SECURITY_ANONYMOUS)
 Create File: mirc.ini
 Set File Time: C:WINDOWSTempspoolsvmirc.ini
 Set File Attributes: mirc.ini Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: remote.ini Flags: (SECURITY_ANONYMOUS)
 Create File: remote.ini
 Set File Time: C:WINDOWSTempspoolsvremote.ini
 Set File Attributes: remote.ini Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: run.bat Flags: (SECURITY_ANONYMOUS)
 Create File: run.bat
 Set File Time: C:WINDOWSTempspoolsvrun.bat
 Set File Attributes: run.bat Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: servers.ini Flags: (SECURITY_ANONYMOUS)
 Create File: servers.ini
 Set File Time: C:WINDOWSTempspoolsvservers.ini
 Set File Attributes: servers.ini Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: spoolsv.exe Flags: (SECURITY_ANONYMOUS)
 Create File: spoolsv.exe
 Set File Time: C:WINDOWSTempspoolsvspoolsv.exe
 Set File Attributes: spoolsv.exe Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_READONLY FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: users.ini Flags: (SECURITY_ANONYMOUS)
 Create File: users.ini
 Set File Time: C:WINDOWSTempspoolsvusers.ini
 Set File Attributes: users.ini Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Get File Attributes: ident.txt Flags: (SECURITY_ANONYMOUS)
 Create File: ident.txt
 Set File Time: C:WINDOWSTempspoolsvident.txt
 Set File Attributes: ident.txt Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Get File Attributes: xmas.JPG Flags: (SECURITY_ANONYMOUS)
 Create File: xmas.JPG
 Set File Time: C:WINDOWSTempspoolsvxmas.JPG
 Set File Attributes: xmas.JPG Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Get File Attributes: fullname.txt Flags: (SECURITY_ANONYMOUS)
 Create File: fullname.txt
 Set File Time: C:WINDOWSTempspoolsvfullname.txt
 Set File Attributes: fullname.txt Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Get File Attributes: s.mrc Flags: (SECURITY_ANONYMOUS)
 Create File: s.mrc
 Set File Time: C:WINDOWSTempspoolsvs.mrc
 Set File Attributes: s.mrc Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Get File Attributes: com.mrc Flags: (SECURITY_ANONYMOUS)
 Create File: com.mrc
 Set File Time: C:WINDOWSTempspoolsvcom.mrc
 Set File Attributes: com.mrc Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Get File Attributes: C:Windowstempspoolsvrun.bat Flags: (SECURITY_ANONYMOUS)
 Open File: .PIPEwkssvc (OPEN_EXISTING)
 Get File Attributes: C:Windowstempspoolsv Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorEigene Dateiendesktop.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAll UsersDokumentedesktop.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll (OPEN_EXISTING)
 Get File Attributes: C:Windowstempspoolsvrun.bat:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
 Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
 Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
 Open File: C:Windowstempspoolsv ()
 Find File: C:WINDOWSTempspoolsvrun.bat
 Open File: C:ProgrammeInternet ExplorerIEXPLORE.EXE (OPEN_EXISTING)
 Get File Attributes: C:Windowstempspoolsv Flags: (SECURITY_ANONYMOUS)
 Find File: C:Windows
 Find File: C:WINDOWStemp
 Find File: C:WINDOWSTempspoolsv
 Get File Attributes: C:WINDOWSTempspoolsv Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: “C:Windowstempspoolsvrun.bat” Flags: (SECURITY_ANONYMOUS)
 Find File: C:Windowstempspoolsvrun.bat
 Open File: C:Windowstempspoolsvrun.bat (OPEN_EXISTING)
 Find File: C:Windowstempspoolsvregedit.*
 Find File: C:Windowstempspoolsvregedit
 Find File: C:WINDOWSsystem32regedit.*
 Find File: C:WINDOWSsystem32regedit
 Find File: C:WINDOWSregedit.*
 Find File: C:WINDOWSregedit.COM
 Find File: C:WINDOWSregedit.EXE
 Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
 Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
 Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
 Open File: C:WINDOWS ()
 Find File: C:WINDOWSregedit.exe
 Find File: C:WINDOWStempspoolsvspoolsv.exe
 Open File: C:WINDOWStempspoolsv ()
 Find File: C:WINDOWSTempspoolsvspoolsv.exe
 Find File: C:WINDOWStempspoolsvxmas.jpg
 Find File: C:WINDOWSTempspoolsvxmas.JPG
 Open File: .PIPEwkssvc (OPEN_EXISTING)
 Get File Attributes: C:WINDOWStempspoolsvxmas.JPG Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorEigene Dateiendesktop.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAll UsersDokumentedesktop.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSsystem32rundll32.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSsystem32shimgvw.dll Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSsystem32 ()
 Find File: C:WINDOWSsystem32rundll32.exe
 Find File: C:Windowstempspoolsvattrib.*
 Find File: C:Windowstempspoolsvattrib
 Find File: C:WINDOWSsystem32attrib.*
 Find File: C:WINDOWSsystem32attrib.COM
 Find File: C:WINDOWSsystem32attrib.EXE
 Find File: C:WINDOWSsystem32attrib.exe
 Open File: C:WINDOWSTempspoolsva.reg (OPEN_EXISTING)
 Get File Attributes: C:WINDOWStempspoolsvmirc.ini Flags: (SECURITY_ANONYMOUS)
 Open File: servers (OPEN_EXISTING)
 Find File: servers
 Open File: servers (OPEN_EXISTING)
 Get File Attributes: servers Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvservers.ini Flags: (SECURITY_ANONYMOUS)
 Open File: urls (OPEN_EXISTING)
 Find File: urls
 Open File: urls (OPEN_EXISTING)
 Get File Attributes: urls Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvurls.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvurls.ini (OPEN_EXISTING)
 Open File: addrbk (OPEN_EXISTING)
 Find File: addrbk
 Open File: addrbk (OPEN_EXISTING)
 Get File Attributes: addrbk Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvaddrbk.ini Flags: (SECURITY_ANONYMOUS)
 Open File: iexplore (OPEN_EXISTING)
 Find File: iexplore
 Open File: iexplore (OPEN_EXISTING)
 Get File Attributes: iexplore Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:ProgrammeInternet Exploreriexplore.exe Flags: (SECURITY_ANONYMOUS)
 Open File: rundll32 (OPEN_EXISTING)
 Find File: rundll32
 Open File: rundll32 (OPEN_EXISTING)
 Get File Attributes: rundll32 Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: rundll32.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: logs. Flags: (SECURITY_ANONYMOUS)
 Open File: logs (OPEN_EXISTING)
 Find File: logs
 Get File Attributes: logs Flags: (SECURITY_ANONYMOUS)
 Open File: logs (OPEN_EXISTING)
 Get File Attributes: C:WINDOWStempspoolsvlogs Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: sounds. Flags: (SECURITY_ANONYMOUS)
 Open File: sounds (OPEN_EXISTING)
 Find File: sounds
 Get File Attributes: sounds Flags: (SECURITY_ANONYMOUS)
 Open File: sounds (OPEN_EXISTING)
 Get File Attributes: C:WINDOWStempspoolsvsounds Flags: (SECURITY_ANONYMOUS)
 Open File: spoolsv (OPEN_EXISTING)
 Find File: spoolsv
 Open File: spoolsv (OPEN_EXISTING)
 Get File Attributes: spoolsv Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsv Flags: (SECURITY_ANONYMOUS)
 Open File: channels (OPEN_EXISTING)
 Find File: channels
 Open File: channels (OPEN_EXISTING)
 Get File Attributes: channels Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvchannels.txt Flags: (SECURITY_ANONYMOUS)
 Open File: perform (OPEN_EXISTING)
 Find File: perform
 Open File: perform (OPEN_EXISTING)
 Get File Attributes: perform Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvperform.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvperform.ini (OPEN_EXISTING)
 Get File Attributes: C:WINDOWStempspoolsvdownload. Flags: (SECURITY_ANONYMOUS)
 Open File: download (OPEN_EXISTING)
 Find File: download
 Get File Attributes: download Flags: (SECURITY_ANONYMOUS)
 Open File: download (OPEN_EXISTING)
 Get File Attributes: C:WINDOWStempspoolsvdownload Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvsounds. Flags: (SECURITY_ANONYMOUS)
 Open File: control (OPEN_EXISTING)
 Find File: control
 Open File: control (OPEN_EXISTING)
 Get File Attributes: control Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvcontrol.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvcontrol.ini (OPEN_EXISTING)
 Open File: aliases (OPEN_EXISTING)
 Find File: aliases
 Open File: aliases (OPEN_EXISTING)
 Get File Attributes: aliases Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvaliases.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvaliases.ini (OPEN_EXISTING)
 Find File: C:WINDOWStempspoolsvaliases.ini
 Open File: popups (OPEN_EXISTING)
 Find File: popups
 Open File: popups (OPEN_EXISTING)
 Get File Attributes: popups Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvpopups.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvpopups.ini (OPEN_EXISTING)
 Find File: C:WINDOWStempspoolsvpopups.ini
 Get File Attributes: C:WINDOWStempspoolsvtblogo.bmp Flags: (SECURITY_ANONYMOUS)
 Open File: users (OPEN_EXISTING)
 Find File: users
 Open File: users (OPEN_EXISTING)
 Get File Attributes: users Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvusers.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvusers.ini (OPEN_EXISTING)
 Find File: C:WINDOWStempspoolsvusers.ini
 Open File: remote (OPEN_EXISTING)
 Find File: remote
 Open File: remote (OPEN_EXISTING)
 Get File Attributes: remote Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvremote.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvremote.ini (OPEN_EXISTING)
 Find File: C:WINDOWStempspoolsvremote.ini
 Open File: com (OPEN_EXISTING)
 Find File: com
 Open File: com (OPEN_EXISTING)
 Get File Attributes: com Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvcom.mrc Flags: (SECURITY_ANONYMOUS)
 Set File Attributes: C:WINDOWStempspoolsvcom.mrc Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_COMPRESSED FILE_ATTRIBUTE_COMPRESSED SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvcom.mrc (OPEN_EXISTING)
 Find File: C:WINDOWStempspoolsvcom.mrc
 Open File: s (OPEN_EXISTING)
 Find File: s
 Open File: s (OPEN_EXISTING)
 Get File Attributes: s Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvs.mrc Flags: (SECURITY_ANONYMOUS)
 Set File Attributes: C:WINDOWStempspoolsvs.mrc Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_COMPRESSED FILE_ATTRIBUTE_COMPRESSED SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvs.mrc (OPEN_EXISTING)
 Find File: C:WINDOWStempspoolsvs.mrc
 Open File: ident (OPEN_EXISTING)
 Find File: ident
 Open File: ident (OPEN_EXISTING)
 Get File Attributes: ident Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvident.txt Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvident.txt (OPEN_EXISTING)
 Open File: fullname (OPEN_EXISTING)
 Find File: fullname
 Open File: fullname (OPEN_EXISTING)
 Get File Attributes: fullname Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvfullname.txt Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWStempspoolsvfullname.txt (OPEN_EXISTING)
 Find File: C:WINDOWStempspoolsvmirc.ini
 Get File Attributes: TMP1.$$$ Flags: (SECURITY_ANONYMOUS)
 Create File: C:WINDOWStempspoolsvTMP1.$$$
 Copy File: C:WINDOWStempspoolsvTMP1.$$$ to C:WINDOWStempspoolsvcontrol.ini
 Delete File: C:WINDOWStempspoolsvTMP1.$$$
 Create/Open File: C:WINDOWStempspoolsvcontrol.ini (OPEN_ALWAYS)
 Get File Attributes: TMP2.$$$ Flags: (SECURITY_ANONYMOUS)
 Create File: C:WINDOWStempspoolsvTMP2.$$$
 Copy File: C:WINDOWStempspoolsvTMP2.$$$ to C:WINDOWStempspoolsvcontrol.ini
 Delete File: C:WINDOWStempspoolsvTMP2.$$$
 Get File Attributes: TMP3.$$$ Flags: (SECURITY_ANONYMOUS)
 Create File: C:WINDOWStempspoolsvTMP3.$$$
 Copy File: C:WINDOWStempspoolsvTMP3.$$$ to C:WINDOWStempspoolsvcontrol.ini
 Delete File: C:WINDOWStempspoolsvTMP3.$$$
 Get File Attributes: TMP4.$$$ Flags: (SECURITY_ANONYMOUS)
 Create File: C:WINDOWStempspoolsvTMP4.$$$
 Copy File: C:WINDOWStempspoolsvTMP4.$$$ to C:WINDOWStempspoolsvcontrol.ini
 Delete File: C:WINDOWStempspoolsvTMP4.$$$
 Get File Attributes: TMP5.$$$ Flags: (SECURITY_ANONYMOUS)
 Create File: C:WINDOWStempspoolsvTMP5.$$$
 Copy File: C:WINDOWStempspoolsvTMP5.$$$ to C:WINDOWStempspoolsvremote.ini
 Delete File: C:WINDOWStempspoolsvTMP5.$$$
 Create/Open File: C:WINDOWStempspoolsvremote.ini (OPEN_ALWAYS)
 Open File: C:WINDOWStempspoolsvservers.ini (OPEN_EXISTING)
 Open File: C:WINDOWStempspoolsvservers.ini (OPEN_EXISTING)
 Get File Attributes: TMP6.$$$ Flags: (SECURITY_ANONYMOUS)
 Create File: C:WINDOWStempspoolsvTMP6.$$$
 Copy File: C:WINDOWStempspoolsvTMP6.$$$ to C:WINDOWStempspoolsvremote.ini
 Delete File: C:WINDOWStempspoolsvTMP6.$$$
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Open File: vhost (OPEN_EXISTING)
 Find File: vhost
 Open File: vhost (OPEN_EXISTING)
 Get File Attributes: vhost Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvvhost.hlp Flags: (SECURITY_ANONYMOUS)
 Create/Open File: DeviceRasAcd (OPEN_ALWAYS)
 Open File: silence (OPEN_EXISTING)
 Find File: silence
 Open File: silence (OPEN_EXISTING)
 Get File Attributes: silence Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvsilence.hlp Flags: (SECURITY_ANONYMOUS)
 Open File: mode (OPEN_EXISTING)
 Find File: mode
 Open File: mode (OPEN_EXISTING)
 Get File Attributes: mode Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWStempspoolsvmode.hlp Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSsystem32shimgvw.dll Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSsystem32shimgvw.dll.manifest Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSTempspoolsvdesktop.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSTempspoolsvxmas.JPG Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSTempspoolsvxmas.JPG (OPEN_EXISTING)
 Find File: C:WINDOWStemp
 Find File: C:WINDOWStempspoolsv
 Set File Attributes: C:WINDOWStempspoolsv Flags: (FILE_ATTRIBUTE_COMPRESSED FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM FILE_ATTRIBUTE_COMPRESSED SECURITY_ANONYMOUS)
 Open File: C:WINDOWSmsagentintlAgt0409.dll (OPEN_EXISTING)
 Find File: C:WINDOWSmsagentintlagt????.dll
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Open File: .PIPElsarpc (OPEN_EXISTING)