Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Guides - Privacy & Security Tips
Software restriction Policies to Windows Home
Message
<blockquote data-quote="Windows_Security" data-source="post: 544398" data-attributes="member: 50782"><p><strong><span style="color: #ff0000">First create a restore point before applying any of the tweaks mentioned in this post</span></strong></p><p><strong><span style="color: #ff0000"></span></strong></p><p><strong><span style="color: #000000">Intro</span></strong></p><p><span style="color: #000000">On Wilders Security forum a well know member with the nickname Lucy (helas, she is not active anymore, hope she is well) posted a registry file to use Software Restriction Policies on Windows Home versions also. The update should add SRP to both 32 and 64 bits versions of Windows Home. </span></p><p><strong></strong></p><p><strong><strong><span style="color: #000000">What is SRP?</span></strong></strong></p><p><span style="color: rgb(0, 0, 0)">SRP stands for Software Restriction Policies. As the name says it can be used to restrict software on your PC. It has basically three modes disallowed, basic user and unrestricted. </span></p><p><span style="color: rgb(0, 0, 0)"></span></p><p><span style="color: rgb(0, 0, 0)"><strong>Why only Basic User?</strong></span></p><p><span style="color: rgb(0, 0, 0)">This SRP uses Basic User as default level. This setup allows Administrators to overrule the execution restrictions enforces by Software Restriction Policies (SRP). Because all software which is already installed needs elvation to update itself, SRP basic User allows Windows and your already installed programs in Program Files to update themselves from user space.</span></p><p><span style="color: rgb(0, 0, 0)"></span></p><p><span style="color: rgb(0, 0, 0)"><strong>What is the benefit of this SRP?</strong></span></p><p><span style="color: rgb(0, 0, 0)">This SRP blocks program executions which are not initiated by the user of regular programs already installed. This covers 95% of all malware intrusions. This 5% risk is the price you pay for having Software Restriction Policies which still keep the Administrator at the steering will (being able to auto-update already installed and install new with right click 'run as administrator). I will provide two tips (which are free programs) to close the last 5 percent. </span></p><p><span style="color: rgb(0, 0, 0)"></span></p><p><span style="color: #000000"><strong>Add Symantect tweak for MSI installs</strong></span></p><p><span style="color: #000000">By default explorer has an option to run any executable with elevated priveledges by using the "Run as Administrator". Strangely Microsoft does not provice this option for MSI installers. Symantec came up with a registry tweak to also provide the option for running MSI files as Adminstrator (<a href="http://www.symantec.com/connect/downloads/msi-run-administrator-context-menu-vista" target="_blank">link</a>)</span></p><p><span style="color: #000000"></span></p><p><span style="color: #000000">Save the text between --- (do not include --- lines) as Add_Run_MSI_Admin.reg and run it</span></p><p><span style="color: #000000">--- start </span></p><p><span style="color: #000000">Windows Registry Editor Version 5.00</span></p><p><span style="color: #000000"></span></p><p><span style="color: #000000">[HKEY_CLASSES_ROOT\Msi.Package\shell\runas\command]</span></p><p><span style="color: #000000">@=hex(2):22,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\</span></p><p><span style="color: #000000"> 00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,\</span></p><p><span style="color: #000000"> 73,00,69,00,65,00,78,00,65,00,63,00,2e,00,65,00,78,00,65,00,22,00,20,00,2f,\</span></p><p><span style="color: #000000"> 00,69,00,20,00,22,00,25,00,31,00,22,00,20,00,25,00,2a,00,00,00</span></p><p><span style="color: #000000"></span></p><p><span style="color: #000000">--- end</span></p><p><span style="color: #000000"></span></p><p><span style="color: #000000"></span></p><p><span style="color: #000000"><strong>Add software restriction Policies</strong></span></p><p><span style="color: #000000">These SRP are the simplest in its form, they run Windows and Program Files folder for bot 32 and 64 bits as unrestricted, applies for all files (including extra's mentioned by <a href="https://malwaretips.com/threads/windows-pro-owner-use-software-restriction-policies.61871/#post-535083" target="_blank">@Av Gurus</a>) and all users (except Administrator). I used windows variables %ProgramFiles%, %ProgramFiles(x86)% and %ProgramW6432% from this <a href="https://msdn.microsoft.com/en-us/library/windows/desktop/aa384274(v=vs.85).aspx" target="_blank">source</a> and the GUID's for ProgramFiles, ProgramFilesX86 and ProgramFilesX64 from this <a href="https://msdn.microsoft.com/en-us/library/bb882665.aspx" target="_blank">source</a></span></p><p><span style="color: #000000"></span></p><p><span style="color: #000000"><span style="color: #000000">Save the text between --- (do not include --- lines) as Add_SRP_Basic_User.reg and run it</span></span></p><p><span style="color: #000000"><span style="color: #000000">--- start</span></span></p><p><span style="color: #000000"><span style="color: #000000">Windows Registry Editor Version 5.00</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers]</span></span></p><p><span style="color: #000000"><span style="color: #000000">"DefaultLevel"=dword:00020000</span></span></p><p><span style="color: #000000"><span style="color: #000000">"TransparentEnabled"=dword:00000002</span></span></p><p><span style="color: #000000"><span style="color: #000000">"PolicyScope"=dword:00000001</span></span></p><p><span style="color: #000000"><span style="color: #000000">"ExecutableTypes"=hex(7):57,00,53,00,48,00,00,00,27,00,57,00,53,00,46,00,00,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 57,00,53,00,46,00,00,00,57,00,53,00,43,00,00,00,57,00,53,00,00,00,56,00,42,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,53,00,00,00,56,00,42,00,45,00,00,00,56,00,42,00,00,00,55,00,52,00,4c,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,00,53,00,48,00,53,00,00,00,53,00,43,00,54,00,00,00,53,00,43,00,52,00,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,52,00,45,00,47,00,00,00,50,00,53,00,31,00,00,00,50,00,49,00,46,00,00,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 50,00,43,00,44,00,00,00,4f,00,43,00,58,00,00,00,4d,00,53,00,54,00,00,00,4d,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,53,00,50,00,00,00,4d,00,53,00,49,00,00,00,4d,00,53,00,43,00,00,00,4d,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 44,00,45,00,00,00,4d,00,44,00,42,00,00,00,4c,00,4e,00,4b,00,00,00,4a,00,53,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,45,00,00,00,4a,00,53,00,00,00,4a,00,41,00,52,00,00,00,49,00,53,00,50,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,00,49,00,4e,00,53,00,00,00,49,00,4e,00,46,00,00,00,48,00,54,00,41,00,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,48,00,4c,00,50,00,00,00,45,00,58,00,45,00,00,00,43,00,52,00,54,00,00,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 43,00,50,00,4c,00,00,00,43,00,4f,00,4d,00,00,00,43,00,4d,00,44,00,00,00,43,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 00,48,00,4d,00,00,00,42,00,41,00,54,00,00,00,42,00,41,00,53,00,00,00,41,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 44,00,50,00,00,00,41,00,44,00,45,00,00,00</span></span></p><p><span style="color: #000000"><span style="color: #000000">"AuthenticodeEnabled"=dword:00000000</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths]</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{6D809377-6AF0-444B-8957-A3773F02200E}]</span></span></p><p><span style="color: #000000"><span style="color: #000000">"LastModified"=hex(b):14,1f,bd,58,7c,11,d2,01</span></span></p><p><span style="color: #000000"><span style="color: #000000">"Description"="Program Files on 64 bits"</span></span></p><p><span style="color: #000000"><span style="color: #000000">"SaferFlags"=dword:00000000</span></span></p><p><span style="color: #000000"><span style="color: #000000">"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,57,00,36,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 34,00,33,00,32,00,25,00,00,00</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}]</span></span></p><p><span style="color: #000000"><span style="color: #000000">"LastModified"=hex(b):b2,19,7a,3d,7c,11,d2,01</span></span></p><p><span style="color: #000000"><span style="color: #000000">"Description"="Program Files (x86) on 64 bits"</span></span></p><p><span style="color: #000000"><span style="color: #000000">"SaferFlags"=dword:00000000</span></span></p><p><span style="color: #000000"><span style="color: #000000">"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 6c,00,65,00,73,00,28,00,78,00,38,00,36,00,29,00,25,00,00,00</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{905E63B6-C1BF-494E-B29C-65B732D3D21A}]</span></span></p><p><span style="color: #000000"><span style="color: #000000">"LastModified"=hex(b):62,e4,e4,4e,7c,11,d2,01</span></span></p><p><span style="color: #000000"><span style="color: #000000">"Description"="Program Files (default)"</span></span></p><p><span style="color: #000000"><span style="color: #000000">"SaferFlags"=dword:00000000</span></span></p><p><span style="color: #000000"><span style="color: #000000">"ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 6c,00,65,00,73,00,25,00,00,00</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{F38BF404-1D43-42F2-9305-67DE0B28FC23}]</span></span></p><p><span style="color: #000000"><span style="color: #000000">"LastModified"=hex(b):28,e1,f9,62,79,11,d2,01</span></span></p><p><span style="color: #000000"><span style="color: #000000">"Description"="Windows"</span></span></p><p><span style="color: #000000"><span style="color: #000000">"SaferFlags"=dword:00000000</span></span></p><p><span style="color: #000000"><span style="color: #000000">"ItemData"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\</span></span></p><p><span style="color: #000000"><span style="color: #000000"> 74,00,25,00,00,00</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000">--- end</span></span></p><p><span style="color: #000000"><span style="color: #000000"></span></span></p><p><span style="color: #000000"><span style="color: #000000"><strong>Restart Windows </strong></span></span></p></blockquote><p></p>
[QUOTE="Windows_Security, post: 544398, member: 50782"] [B][COLOR=#ff0000]First create a restore point before applying any of the tweaks mentioned in this post [/COLOR] [COLOR=#000000]Intro[/COLOR][/B] [COLOR=#000000]On Wilders Security forum a well know member with the nickname Lucy (helas, she is not active anymore, hope she is well) posted a registry file to use Software Restriction Policies on Windows Home versions also. The update should add SRP to both 32 and 64 bits versions of Windows Home. [/COLOR] [B] [B][COLOR=#000000]What is SRP?[/COLOR][/B][/B] [COLOR=rgb(0, 0, 0)]SRP stands for Software Restriction Policies. As the name says it can be used to restrict software on your PC. It has basically three modes disallowed, basic user and unrestricted. [B]Why only Basic User?[/B] This SRP uses Basic User as default level. This setup allows Administrators to overrule the execution restrictions enforces by Software Restriction Policies (SRP). Because all software which is already installed needs elvation to update itself, SRP basic User allows Windows and your already installed programs in Program Files to update themselves from user space. [B]What is the benefit of this SRP?[/B] This SRP blocks program executions which are not initiated by the user of regular programs already installed. This covers 95% of all malware intrusions. This 5% risk is the price you pay for having Software Restriction Policies which still keep the Administrator at the steering will (being able to auto-update already installed and install new with right click 'run as administrator). I will provide two tips (which are free programs) to close the last 5 percent. [/COLOR] [COLOR=#000000][B]Add Symantect tweak for MSI installs[/B] By default explorer has an option to run any executable with elevated priveledges by using the "Run as Administrator". Strangely Microsoft does not provice this option for MSI installers. Symantec came up with a registry tweak to also provide the option for running MSI files as Adminstrator ([URL='http://www.symantec.com/connect/downloads/msi-run-administrator-context-menu-vista']link[/URL]) Save the text between --- (do not include --- lines) as Add_Run_MSI_Admin.reg and run it --- start Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\Msi.Package\shell\runas\command] @=hex(2):22,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\ 00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,\ 73,00,69,00,65,00,78,00,65,00,63,00,2e,00,65,00,78,00,65,00,22,00,20,00,2f,\ 00,69,00,20,00,22,00,25,00,31,00,22,00,20,00,25,00,2a,00,00,00 --- end [B]Add software restriction Policies[/B] These SRP are the simplest in its form, they run Windows and Program Files folder for bot 32 and 64 bits as unrestricted, applies for all files (including extra's mentioned by [URL='https://malwaretips.com/threads/windows-pro-owner-use-software-restriction-policies.61871/#post-535083']@Av Gurus[/URL]) and all users (except Administrator). I used windows variables %ProgramFiles%, %ProgramFiles(x86)% and %ProgramW6432% from this [URL='https://msdn.microsoft.com/en-us/library/windows/desktop/aa384274(v=vs.85).aspx']source[/URL] and the GUID's for ProgramFiles, ProgramFilesX86 and ProgramFilesX64 from this [URL='https://msdn.microsoft.com/en-us/library/bb882665.aspx']source[/URL] [COLOR=#000000]Save the text between --- (do not include --- lines) as Add_SRP_Basic_User.reg and run it --- start Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers] "DefaultLevel"=dword:00020000 "TransparentEnabled"=dword:00000002 "PolicyScope"=dword:00000001 "ExecutableTypes"=hex(7):57,00,53,00,48,00,00,00,27,00,57,00,53,00,46,00,00,00,\ 57,00,53,00,46,00,00,00,57,00,53,00,43,00,00,00,57,00,53,00,00,00,56,00,42,\ 00,53,00,00,00,56,00,42,00,45,00,00,00,56,00,42,00,00,00,55,00,52,00,4c,00,\ 00,00,53,00,48,00,53,00,00,00,53,00,43,00,54,00,00,00,53,00,43,00,52,00,00,\ 00,52,00,45,00,47,00,00,00,50,00,53,00,31,00,00,00,50,00,49,00,46,00,00,00,\ 50,00,43,00,44,00,00,00,4f,00,43,00,58,00,00,00,4d,00,53,00,54,00,00,00,4d,\ 00,53,00,50,00,00,00,4d,00,53,00,49,00,00,00,4d,00,53,00,43,00,00,00,4d,00,\ 44,00,45,00,00,00,4d,00,44,00,42,00,00,00,4c,00,4e,00,4b,00,00,00,4a,00,53,\ 00,45,00,00,00,4a,00,53,00,00,00,4a,00,41,00,52,00,00,00,49,00,53,00,50,00,\ 00,00,49,00,4e,00,53,00,00,00,49,00,4e,00,46,00,00,00,48,00,54,00,41,00,00,\ 00,48,00,4c,00,50,00,00,00,45,00,58,00,45,00,00,00,43,00,52,00,54,00,00,00,\ 43,00,50,00,4c,00,00,00,43,00,4f,00,4d,00,00,00,43,00,4d,00,44,00,00,00,43,\ 00,48,00,4d,00,00,00,42,00,41,00,54,00,00,00,42,00,41,00,53,00,00,00,41,00,\ 44,00,50,00,00,00,41,00,44,00,45,00,00,00 "AuthenticodeEnabled"=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Hashes] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\Paths] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\131072\UrlZones] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths] [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{6D809377-6AF0-444B-8957-A3773F02200E}] "LastModified"=hex(b):14,1f,bd,58,7c,11,d2,01 "Description"="Program Files on 64 bits" "SaferFlags"=dword:00000000 "ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,57,00,36,00,\ 34,00,33,00,32,00,25,00,00,00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}] "LastModified"=hex(b):b2,19,7a,3d,7c,11,d2,01 "Description"="Program Files (x86) on 64 bits" "SaferFlags"=dword:00000000 "ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\ 6c,00,65,00,73,00,28,00,78,00,38,00,36,00,29,00,25,00,00,00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{905E63B6-C1BF-494E-B29C-65B732D3D21A}] "LastModified"=hex(b):62,e4,e4,4e,7c,11,d2,01 "Description"="Program Files (default)" "SaferFlags"=dword:00000000 "ItemData"=hex(2):25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,46,00,69,00,\ 6c,00,65,00,73,00,25,00,00,00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\262144\Paths\{F38BF404-1D43-42F2-9305-67DE0B28FC23}] "LastModified"=hex(b):28,e1,f9,62,79,11,d2,01 "Description"="Windows" "SaferFlags"=dword:00000000 "ItemData"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\ 74,00,25,00,00,00 --- end [B]Restart Windows [/B][/COLOR][/COLOR] [/QUOTE]
Insert quotes…
Verification
Post reply
Top