DNS Lookup 
 Host Name  IP Address 
 Established.yi.org  87.236.232.25 
 Established.yi.org 
 mue-88-130-14-018.dsl.tropolys.de  88.130.14.18 
 mue-88-130-14-018.dsl.tropolys.de 
 whatismyip.akamai.com  212.201.100.185 
 whatismyip.akamai.com 
 Driver.yi.org  91.93.117.180 
 Driver.yi.org
Opened listening TCP connection on port: 113Download URLs 
 http://212.201.100.169/ (212.201.100.169) 
 http://91.93.117.180/run.exe (Driver.yi.org)
C&C Server: 87.236.232.25:6667 
 Server Password: 
 Username: t7d4z2 
 Nickname: :V|XP|G7Zd1 
 Channel: #Establish (Password: fuckyouall) 
 Channeltopic: 
 Outgoing connection to remote server: 212.201.100.169 TCP port 80
 Outgoing connection to remote server: Driver.yi.org TCP port 80
 Registry Changes by all processes 
 Create or Open 
 Changes  HKEY_CURRENT_USERSoftwareWinRAR SFX “C%%Dokumente und Einstellungen%Administrator%Anwendungsdaten%%mIRC%%” = C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRC
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfg “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfg “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfg “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfgtraceIdentifier “Guid” = 5f31090b-d990-4e91-b16d-46121d0255aa
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfgtraceIdentifier “BitNames” = Error Unusual Info Debug
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxy “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxy “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxy “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxytraceIdentifier “Guid” = 5f31090b-d990-4e91-b16d-46121d0255aa
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxytraceIdentifier “BitNames” = Error Unusual Info Debug
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtil “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtil “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtil “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtiltraceIdentifier “Guid” = 8aefce96-4618-42ff-a057-3536aa78233e
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtiltraceIdentifier “BitNames” = Error Unusual Info Debug
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftNAPNetsh “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftNAPNetsh “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftNAPNetsh “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftNAPNetshNapmontr “Guid” = 710adbf0-ce88-40b4-a50d-231ada6593f0
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftNAPNetshNapmontr “BitNames” = NAP_TRACE_BASE NAP_TRACE_NETSH
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftqagent “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftqagent “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftqagent “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftqagenttraceIdentifier “Guid” = b0278a28-76f1-4e15-b1df-14b209a12613
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftqagenttraceIdentifier “BitNames” = Error Unusual Info Debug
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessParametersFirewallPolicyStandardProfile “EnableFirewall” = [REG_DWORD, value: 00000000]
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessParametersFirewallPolicyStandardProfile “DoNotAllowExceptions” = [REG_DWORD, value: 00000000]
 HKEY_CURRENT_USERSoftwaremIRC “LastRun” = 1285686972,0
 HKEY_CURRENT_USERirc “” = URL:IRC Protocol
 HKEY_CURRENT_USERirc “EditFlags” = [REG_BINARY, size: 4 bytes]
 HKEY_CURRENT_USERirc “URL Protocol” =
 HKEY_CURRENT_USERircDefaultIcon “” = “C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.exe”
 HKEY_CURRENT_USERircShellopencommand “” = “C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.exe” %1
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfg “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfg “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfg “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfgtraceIdentifier “Guid” = 5f31090b-d990-4e91-b16d-46121d0255aa
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappcfgtraceIdentifier “BitNames” = Error Unusual Info Debug
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxy “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxy “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxy “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxytraceIdentifier “Guid” = 5f31090b-d990-4e91-b16d-46121d0255aa
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosofteappprxytraceIdentifier “BitNames” = Error Unusual Info Debug
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtil “LogSessionName” = [REG_EXPAND_SZ, value: stdout]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtil “Active” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtil “ControlFlags” = [REG_DWORD, value: 00000001]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtiltraceIdentifier “Guid” = 8aefce96-4618-42ff-a057-3536aa78233e
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionTracingMicrosoftQUtiltraceIdentifier “BitNames” = Error Unusual Info Debug
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftESENTProcessmircDEBUG “Trace Level” =
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesEventlogApplicationESENT “EventMessageFile” = [REG_EXPAND_SZ, value: C:WINDOWSsystem32ESENT.dll]
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesEventlogApplicationESENT “CategoryMessageFile” = [REG_EXPAND_SZ, value: C:WINDOWSsystem32ESENT.dll]
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesEventlogApplicationESENT “CategoryCount” = [REG_DWORD, value: 00000010]
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesEventlogApplicationESENT “TypesSupported” = [REG_DWORD, value: 00000007]
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Microsoft” = C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCMicrosoftDrivers.exe
 HKEY_CURRENT_USERSoftwaremIRCLicense “” = 3546-331847
 HKEY_CURRENT_USERSoftwaremIRCUserName “” = cCTeam
 Reads  HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSession ManagerAppCompatibility “DisableAppCompat”
 HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{56F9679E-7826-4C84-81F3-532071A8BCC5}InprocServer32 “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile  “ProgID”
 HKEY_LOCAL_MACHINESOFTWAREClassesfile “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesMapi “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOutlookexpress “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOTFS “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ScriptOk”
 HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionApp PathsIEXPLORE.EXE “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedLow”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedHigh”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{EAB22AC1-30C1-11CF-A7EB-0000C05BAE0B}TypeLib “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{B722BCCB-4E68-101B-A2BC-00AA00404770}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{79EAC9C4-BAF9-11CE-8C82-00AA004BA90B}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{000214E6-0000-0000-C000-000000000046}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{93F2F68C-1D1B-11D3-A30E-00C04F79ABD1}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSession ManagerAppCompatibility “DisableAppCompat”
 HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{871C5380-42A0-1069-A2EA-08002B30309D}InProcServer32 “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionApp PathsIEXPLORE.EXE “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedLow”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerSetup “IExploreLastModifiedHigh”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{EAB22AC1-30C1-11CF-A7EB-0000C05BAE0B}TypeLib “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{B722BCCB-4E68-101B-A2BC-00AA00404770}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{79EAC9C4-BAF9-11CE-8C82-00AA004BA90B}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{000214E6-0000-0000-C000-000000000046}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesInterface{93F2F68C-1D1B-11D3-A30E-00C04F79ABD1}ProxyStubClsid32 “”
 HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{56F9679E-7826-4C84-81F3-532071A8BCC5}InprocServer32 “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile  “ProgID”
 HKEY_LOCAL_MACHINESOFTWAREClassesfile “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesMapi “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOutlookexpress “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREClassesOTFS “ShellFolder”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersDefault “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.bmp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.c “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cpp “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cs “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.cxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.doc “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.dot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.emf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.eml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.err “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.gif “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.h “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.htm “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.html “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.hxx “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.idl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpeg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jpg “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.jsl “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mht “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.mhtml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.nws “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pdf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.png “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pot “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.pps “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.ppt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.rtf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.txt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.vb “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wmf “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.wrn “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xls “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xlt “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xml “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension.xsd “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecalendar “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecommunications “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypecontact “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypedocument “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeemail “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefavorite “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypefolder “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeim “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeimages “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypemusic “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypenote “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepicture “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypepresentation “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypeprogram “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypespreadsheet “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypetext “ScriptOk”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ContentType”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “TemplateUrl”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedTypevideo “ScriptOk”
 HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustCertificate{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$DLL”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustCertificate{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$Function”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustFinalPolicy{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$DLL”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustFinalPolicy{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$Function”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustInitialization{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$DLL”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustInitialization{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$Function”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustMessage{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$DLL”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustMessage{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$Function”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustSignature{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$DLL”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustSignature{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$Function”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustCertCheck{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$DLL”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustCertCheck{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$Function”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustCleanup{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$DLL”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyProvidersTrustCleanup{00AAC56B-CD44-11D0-8CC2-00C04FC295EE} “$Function”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptography “MachineGuid”
 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionWinTrustTrust ProvidersSoftware Publishing “State”
 HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerSecurity “Safety Warning Level”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion “CurrentBuildNumber”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Logging”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Logging Directory”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Log File Max Size”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Repository Directory”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentLocalConfig “Enable Tracing”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentLocalConfig “Tracing Level”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Friendly Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Description”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Version”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Enabled”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Vendor Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Info Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Config Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Validator Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Registration Date”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79617 “Component Type”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Friendly Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Description”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Version”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Enabled”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Vendor Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Info Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Config Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Validator Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Registration Date”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79618 “Component Type”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Friendly Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Description”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Version”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Enabled”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Vendor Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Info Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Config Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Validator Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Registration Date”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79619 “Component Type”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Friendly Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Description”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Version”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Enabled”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Vendor Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Info Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Config Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Validator Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Registration Date”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79620 “Component Type”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Friendly Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Description”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Version”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Enabled”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Vendor Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Info Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Config Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Validator Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Registration Date”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79621 “Component Type”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Friendly Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Description”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Version”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Enabled”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Vendor Name”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Info Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Config Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Validator Clsid”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Registration Date”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs79623 “Component Type”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentLocalConfig “PlumbIpsecPolicy”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “ProcessID”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “EnablePrivateObjectHeap”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “ContextLimit”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “ObjectLimit”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “IdentifierLimit”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DisableUNCCheck”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “EnableExtensions”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DelayedExpansion”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DefaultColor”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “CompletionChar”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “PathCompletionChar”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “AutoRun”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DisableUNCCheck”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “EnableExtensions”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DelayedExpansion”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DefaultColor”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “CompletionChar”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “PathCompletionChar”
 HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “AutoRun”
 HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREClassesHTTPshellopen “command”
 HKEY_LOCAL_MACHINESOFTWAREClassesHTTPshellopen “ddeexecApplication”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_CURRENT_USERSoftwaremIRC “DateUsed”
 HKEY_CURRENT_USERSoftwaremIRC “LastRun”
 HKEY_CURRENT_USERSoftwaremIRC “UserName”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftESENTGlobalDEBUG “Trace Level”
 HKEY_LOCAL_MACHINESYSTEMControlSet001ControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}{5D19E473-BE30-416B-B5C7-D8A091C41D2F}Connection “Name”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Microsoft”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Logging Directory”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Logging”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Log File Max Size”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “Repository Directory”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “ProcessID”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “EnablePrivateObjectHeap”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “ContextLimit”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “ObjectLimit”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “IdentifierLimit”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOM “EnableObjectValidation”
 HKEY_CURRENT_USERSoftwaremIRCLicense “”
 HKEY_CURRENT_USERSoftwaremIRCUserName “”
 Enums  HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlers
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedType
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlers
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows SearchProtocolHandlersFile
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersExtension
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Desktop SearchPreviewersPerceivedType
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyOIDEncodingType 0CryptSIPDllIsMyFileType2
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyOID
 HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesnapagentQecs
 File Changes by all processes 
 New Files  __tmp_rar_sfx_access_check_1005812
 old.txt
 mirc.ini
 RegKeys.bat
 MicrosoftDrivers.exe
 mirc.exe
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirclogsstatus.log
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc1.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsmirc2.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsvars.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsvars.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc3.tm_
 DeviceTcp6
 DeviceTcp
 DeviceNetBT_Tcpip_{5D19E473-BE30-416B-B5C7-D8A091C41D2F}
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc4.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc5.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc6.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc7.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini
 DeviceRasAcd
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc8.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc9.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc10.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc11.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc12.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc13.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrdate
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc14.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc15.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrun.exe
 Opened Files  c:svcnost.exe
 C:WINDOWSRegistrationR000000000007.clb
 c:svcnost.exe
 .PIPEwkssvc
 .PIPElsarpc
 C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll
 C:WINDOWSAppPatchsysmain.sdb
 C:WINDOWSAppPatchsystest.sdb
 DeviceNamedPipeShimViewer
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRC
 C:ProgrammeInternet ExplorerIEXPLORE.EXE
 .PIPEwkssvc
 C:WINDOWSsystem32ieframe.dll
 C:WINDOWSRegistrationR000000000007.clb
 C:ProgrammeInternet ExplorerIEXPLORE.EXE
 C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll
 .PIPElsarpc
 C:WINDOWSAppPatchsysmain.sdb
 C:WINDOWSAppPatchsystest.sdb
 DeviceNamedPipeShimViewer
 C:WINDOWSsystem32
 C:WINDOWSsystem32de-DEwshext.dll.mui
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirc
 C:WINDOWSRegistrationR000000000007.clb
 .PIPElsarpc
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircRegKeys.bat
 C:WINDOWSAppPatchsysmain.sdb
 C:WINDOWSAppPatchsystest.sdb
 DeviceNamedPipeShimViewer
 C:WINDOWSsystem32
 .PIPElsarpc
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.exe
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircold.txt
 C:WINDOWSRegistrationR000000000007.clb
 C:WINDOWSfontsARIAL.TTF
 C:WINDOWSfontsARIALBD.TTF
 C:WINDOWSfontsARIALBI.TTF
 C:WINDOWSfontsARIALI.TTF
 C:WINDOWSfontsCOUR.TTF
 C:WINDOWSfontsCOURBD.TTF
 C:WINDOWSfontsCOURBI.TTF
 C:WINDOWSfontsCOURI.TTF
 C:WINDOWSfontsLUCON.TTF
 C:WINDOWSfontsL_10646.TTF
 C:WINDOWSfontsTIMES.TTF
 C:WINDOWSfontsTIMESBD.TTF
 C:WINDOWSfontsTIMESBI.TTF
 C:WINDOWSfontsTIMESI.TTF
 C:WINDOWSfontsWINGDING.TTF
 C:WINDOWSfontsSYMBOL.TTF
 C:WINDOWSfontsverdana.TTF
 C:WINDOWSfontsverdanab.TTF
 C:WINDOWSfontsverdanai.TTF
 C:WINDOWSfontsverdanaz.TTF
 C:WINDOWSfontsariblk.TTF
 C:WINDOWSfontscomic.TTF
 C:WINDOWSfontscomicbd.TTF
 C:WINDOWSfontsimpact.TTF
 C:WINDOWSfontsgeorgia.TTF
 C:WINDOWSfontsgeorgiab.TTF
 C:WINDOWSfontsgeorgiaz.TTF
 C:WINDOWSfontsgeorgiai.TTF
 C:WINDOWSfontsFramd.TTF
 C:WINDOWSfontsFramdit.TTF
 C:WINDOWSfontspala.TTF
 C:WINDOWSfontspalab.TTF
 C:WINDOWSfontspalabi.TTF
 C:WINDOWSfontspalai.TTF
 C:WINDOWSfontstahomabd.TTF
 C:WINDOWSfontstrebuc.TTF
 C:WINDOWSfontstrebucbd.TTF
 C:WINDOWSfontstrebucbi.TTF
 C:WINDOWSfontstrebucit.TTF
 C:WINDOWSfontswebdings.TTF
 C:WINDOWSfontsestre.TTF
 C:WINDOWSfontsgautami.TTF
 C:WINDOWSfontslatha.TTF
 C:WINDOWSfontsmangal.TTF
 C:WINDOWSfontsmvboli.TTF
 C:WINDOWSfontsraavi.TTF
 C:WINDOWSfontsshruti.TTF
 C:WINDOWSfontstunga.TTF
 C:WINDOWSfontssylfaen.TTF
 C:WINDOWSfontsTAHOMA.TTF
 C:WINDOWSfontsMICROSS.TTF
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc1.tm_
 .Ip6
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrun.exe
 .PIPElsarpc
 C:WINDOWSRegistrationR000000000007.clb
 Deleted Files  __tmp_rar_sfx_access_check_1005812
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc3.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc5.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc9.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc11.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc13.tm_
 C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc15.tm_
 Chronological Order  Open File: c:svcnost.exe (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Open File: c:svcnost.exe (OPEN_EXISTING)
 Set File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRC Flags: (SECURITY_ANONYMOUS)
 Create File: __tmp_rar_sfx_access_check_1005812
 Delete File: __tmp_rar_sfx_access_check_1005812
 Find File: c:svcnost.exe
 Find File: old.txt
 Get File Attributes: old.txt Flags: (SECURITY_ANONYMOUS)
 Create File: old.txt
 Set File Time: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCold.txt
 Set File Attributes: old.txt Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Find File: mirc.ini
 Get File Attributes: mirc.ini Flags: (SECURITY_ANONYMOUS)
 Create File: mirc.ini
 Set File Time: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCmirc.ini
 Set File Attributes: mirc.ini Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Find File: RegKeys.bat
 Get File Attributes: RegKeys.bat Flags: (SECURITY_ANONYMOUS)
 Create File: RegKeys.bat
 Set File Time: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCRegKeys.bat
 Set File Attributes: RegKeys.bat Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Find File: MicrosoftDrivers.exe
 Get File Attributes: MicrosoftDrivers.exe Flags: (SECURITY_ANONYMOUS)
 Create File: MicrosoftDrivers.exe
 Set File Time: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCMicrosoftDrivers.exe
 Set File Attributes: MicrosoftDrivers.exe Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Find File: mirc.exe
 Get File Attributes: mirc.exe Flags: (SECURITY_ANONYMOUS)
 Create File: mirc.exe
 Set File Time: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCmirc.exe
 Set File Attributes: mirc.exe Flags: (FILE_ATTRIBUTE_ARCHIVE SECURITY_ANONYMOUS)
 Open File: .PIPEwkssvc (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRC Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCMicrosoftDrivers.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorEigene Dateiendesktop.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAll UsersDokumentedesktop.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCMicrosoftDrivers.exe:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
 Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
 Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRC ()
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCMicrosoftDrivers.exe
 Open File: C:ProgrammeInternet ExplorerIEXPLORE.EXE (OPEN_EXISTING)
 Open File: .PIPEwkssvc (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRC Flags: (SECURITY_ANONYMOUS)
 Find File: netsh.*
 Open File: C:WINDOWSsystem32ieframe.dll (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Open File: C:ProgrammeInternet ExplorerIEXPLORE.EXE (OPEN_EXISTING)
 Open File: C:ProgrammeWindows Desktop SearchMSNLNamespaceMgr.dll (OPEN_EXISTING)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCnetsh.*
 Find File: C:WINDOWSsystem32netsh.*
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSsystem32netsh.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSsystem32netsh.exe:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
 Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
 Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
 Open File: C:WINDOWSsystem32 ()
 Find File: C:WINDOWSsystem32netsh.exe
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdaten Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: mircRegKeys.bat Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircRegKeys.bat Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircRegKeys.bat:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSsystem32de-DEwshext.dll.mui (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatendesktop.ini Flags: (SECURITY_ANONYMOUS)
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirc ()
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCRegKeys.bat
 Get File Attributes: mircmirc.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.exe:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCmirc.exe
 Find File: taskkill.*
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmIRCtaskkill.*
 Find File: C:WINDOWSsystem32taskkill.*
 Get File Attributes: C:WINDOWSsystem32taskkill.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSsystem32taskkill.exe:Zone.Identifier Flags: (SECURITY_ANONYMOUS)
 Find File: C:WINDOWSsystem32taskkill.exe
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSsystem32WBEMLogs Flags: (SECURITY_ANONYMOUS)
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdaten Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und Einstellungen
 Find File: C:Dokumente und EinstellungenAdministrator
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdaten
 Get File Attributes: “C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircRegKeys.bat” Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircRegKeys.bat
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircRegKeys.bat (OPEN_EXISTING)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenREG.*
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenREG
 Find File: C:WINDOWSsystem32REG.*
 Find File: C:WINDOWSsystem32reg.COM
 Find File: C:WINDOWSsystem32reg.EXE
 Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
 Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
 Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
 Open File: C:WINDOWSsystem32 ()
 Find File: C:WINDOWSsystem32reg.exe
 Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatendesktop.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdaten Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorLokale EinstellungenAnwendungsdaten Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorLokale EinstellungenAnwendungsdatenVirtualStoreDokumente und EinstellungenAdministratorAnwendungsdatenmirc Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirc*.*
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.exe (OPEN_EXISTING)
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini (OPEN_EXISTING)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircurls.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircaddrbk.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:ProgrammeInternet Exploreriexplore.exe Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirclogs. Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircsounds. Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircchannels. Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirc Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirclogs Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircsounds Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircchannelschannels.txt Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircperform.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircdownloads. Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircdownload Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircdownloads Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirccontrol.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircaliases.ini Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircaliases.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircpopups.ini Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircpopups.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsusers.ini Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsusers.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsvars.ini Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsvars.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircold.txt Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircold.txt Flags: (SECURITY_ANONYMOUS)
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircold.txt (OPEN_EXISTING)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircold.txt
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirctoolbar.ini Flags: (SECURITY_ANONYMOUS)
 Create/Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmirclogsstatus.log (OPEN_ALWAYS)
 Get File Attributes: C:WINDOWSmsagentagentsvr.exe Flags: (SECURITY_ANONYMOUS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircdefaultsservers.ini Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Open File: C:WINDOWSfontsARIAL.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsARIALBD.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsARIALBI.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsARIALI.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsCOUR.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsCOURBD.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsCOURBI.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsCOURI.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsLUCON.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsL_10646.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsTIMES.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsTIMESBD.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsTIMESBI.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsTIMESI.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsWINGDING.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsSYMBOL.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsverdana.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsverdanab.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsverdanai.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsverdanaz.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsariblk.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontscomic.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontscomicbd.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsimpact.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsgeorgia.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsgeorgiab.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsgeorgiaz.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsgeorgiai.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsFramd.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsFramdit.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontspala.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontspalab.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontspalabi.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontspalai.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontstahomabd.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontstrebuc.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontstrebucbd.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontstrebucbi.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontstrebucit.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontswebdings.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsestre.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsgautami.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontslatha.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsmangal.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsmvboli.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsraavi.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsshruti.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontstunga.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontssylfaen.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsTAHOMA.TTF (OPEN_EXISTING)
 Open File: C:WINDOWSfontsMICROSS.TTF (OPEN_EXISTING)
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc1.tm_
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc1.tm_ Flags: (SECURITY_ANONYMOUS)
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsvars.ini to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsmirc2.tm_
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc1.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsvars.ini
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc1.tm_ (OPEN_EXISTING)
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircscriptsvars.ini
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc1.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc3.tm_
 Delete File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc3.tm_
 Create/Open File: DeviceTcp6 (OPEN_ALWAYS)
 Create/Open File: DeviceTcp (OPEN_ALWAYS)
 Create/Open File: DeviceNetBT_Tcpip_{5D19E473-BE30-416B-B5C7-D8A091C41D2F} (OPEN_ALWAYS)
 Open File: .Ip6 (OPEN_EXISTING)
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc4.tm_
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc4.tm_ Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc.ini Flags: (SECURITY_ANONYMOUS)
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc5.tm_
 Delete File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc5.tm_
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc4.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc6.tm_
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc6.tm_ Flags: (SECURITY_ANONYMOUS)
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc7.tm_
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc6.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini
 Create/Open File: DeviceRasAcd (OPEN_ALWAYS)
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircchannels*.txt
 Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircchannels*.*
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc8.tm_
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc8.tm_ Flags: (SECURITY_ANONYMOUS)
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc9.tm_
 Delete File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc9.tm_
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc8.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc10.tm_
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc10.tm_ Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircservers.ini Flags: (SECURITY_ANONYMOUS)
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc11.tm_
 Delete File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc11.tm_
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc10.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircservers.ini
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc12.tm_
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc12.tm_ Flags: (SECURITY_ANONYMOUS)
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc13.tm_
 Delete File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc13.tm_
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc12.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircwho.chm Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircwho.hlp Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrdate Flags: (SECURITY_ANONYMOUS)
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrdate
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc14.tm_
 Get File Attributes: C:DOKUME~1ADMINI~1ANWEND~1mircmirc14.tm_ Flags: (SECURITY_ANONYMOUS)
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc15.tm_
 Delete File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc15.tm_
 Move File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc14.tm_ to C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircmirc.ini
 Get File Attributes: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrun.exe Flags: (SECURITY_ANONYMOUS)
 Create File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrun.exe
 Open File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenmircrun.exe (OPEN_EXISTING)
 Open File: .PIPElsarpc (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSRegistration Flags: (SECURITY_ANONYMOUS)
 Open File: C:WINDOWSRegistrationR000000000007.clb (OPEN_EXISTING)
 Get File Attributes: C:WINDOWSsystem32WBEMLogs Flags: (SECURITY_ANONYMOUS)