System/Kernel


*Evil-WinRM* PS C:\Users\enox\Documents> cmd /c ver
 
Microsoft Windows [Version 10.0.17763.2061]
 
*Evil-WinRM* PS C:\Users\enox\Documents> systeminfo ; Get-ComputerInfo
Program 'systeminfo.exe' failed to run: Access is deniedAt line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~.
At line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (:) [], ApplicationFailedException
    + FullyQualifiedErrorId : NativeCommandFailed
 
WindowsBuildLabEx                                       : 17763.1.amd64fre.rs5_release.180914-1434
WindowsCurrentVersion                                   : 6.3
WindowsEditionId                                        : ServerStandard
WindowsInstallationType                                 : Server
WindowsInstallDateFromRegistry                          : 5/28/2021 10:52:51 AM
WindowsProductId                                        : 00429-70000-00000-AA992
WindowsProductName                                      : Windows Server 2019 Standard
WindowsRegisteredOrganization                           :
WindowsRegisteredOwner                                  : Windows User
WindowsSystemRoot                                       : C:\Windows
WindowsVersion                                          : 1809
OsServerLevel                                           : FullServer
TimeZone                                                : (UTC-08:00) Pacific Time (US & Canada)
PowerPlatformRole                                       : Desktop
DeviceGuardSmartStatus                                  : Off
  • Microsoft Windows [Version 10.0.17763.2061]
  • WindowsProductName: Windows Server 2019 Standard

Networks


*Evil-WinRM* PS C:\Users\enox\Documents> ipconfig /all ; arp -a ; print route
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : DC01
   Primary Dns Suffix  . . . . . . . : heist.offsec
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : heist.offsec
 
Ethernet adapter Ethernet0 2:
 
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter
   Physical Address. . . . . . . . . : 00-50-56-9E-3A-12
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::9c3:b17e:4afd:c362%7(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.198.165(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.198.254
   DHCPv6 IAID . . . . . . . . . . . : 117461078
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-28-88-61-00-00-50-56-8A-53-00
   DNS Servers . . . . . . . . . . . : 192.168.198.254
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Interface: 192.168.198.165 --- 0x7
  Internet Address      Physical Address      Type
  192.168.198.254       00-50-56-9e-59-95     dynamic
  192.168.198.255       ff-ff-ff-ff-ff-ff     static
  224.0.0.22            01-00-5e-00-00-16     static
  224.0.0.251           01-00-5e-00-00-fb     static
  224.0.0.252           01-00-5e-00-00-fc     static
  255.255.255.255       ff-ff-ff-ff-ff-ff     static
Unable to initialize device PRN
*Evil-WinRM* PS C:\Users\enox\Documents> netstat -ano | Select-String LIST
 
  TCP    0.0.0.0:88             0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       908
  TCP    0.0.0.0:389            0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:464            0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:593            0.0.0.0:0              LISTENING       908
  TCP    0.0.0.0:636            0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:3268           0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:3269           0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:3389           0.0.0.0:0              LISTENING       340
  TCP    0.0.0.0:5985           0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:8080           0.0.0.0:0              LISTENING       584
  TCP    0.0.0.0:9389           0.0.0.0:0              LISTENING       2220
  TCP    0.0.0.0:47001          0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:49664          0.0.0.0:0              LISTENING       524
  TCP    0.0.0.0:49665          0.0.0.0:0              LISTENING       948
  TCP    0.0.0.0:49666          0.0.0.0:0              LISTENING       356
  TCP    0.0.0.0:49667          0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:49673          0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:49674          0.0.0.0:0              LISTENING       664
  TCP    0.0.0.0:49677          0.0.0.0:0              LISTENING       2160
  TCP    0.0.0.0:49680          0.0.0.0:0              LISTENING       644
  TCP    0.0.0.0:49703          0.0.0.0:0              LISTENING       2284
  TCP    0.0.0.0:49758          0.0.0.0:0              LISTENING       2252
  TCP    127.0.0.1:53           0.0.0.0:0              LISTENING       2284
  TCP    192.168.198.165:53     0.0.0.0:0              LISTENING       2284
  TCP    192.168.198.165:139    0.0.0.0:0              LISTENING       4
  TCP    [::]:88                [::]:0                 LISTENING       664
  TCP    [::]:135               [::]:0                 LISTENING       908
  TCP    [::]:389               [::]:0                 LISTENING       664
  TCP    [::]:445               [::]:0                 LISTENING       4
  TCP    [::]:464               [::]:0                 LISTENING       664
  TCP    [::]:593               [::]:0                 LISTENING       908
  TCP    [::]:636               [::]:0                 LISTENING       664
  TCP    [::]:3268              [::]:0                 LISTENING       664
  TCP    [::]:3269              [::]:0                 LISTENING       664
  TCP    [::]:3389              [::]:0                 LISTENING       340
  TCP    [::]:5985              [::]:0                 LISTENING       4
  TCP    [::]:9389              [::]:0                 LISTENING       2220
  TCP    [::]:47001             [::]:0                 LISTENING       4
  TCP    [::]:49664             [::]:0                 LISTENING       524
  TCP    [::]:49665             [::]:0                 LISTENING       948
  TCP    [::]:49666             [::]:0                 LISTENING       356
  TCP    [::]:49667             [::]:0                 LISTENING       664
  TCP    [::]:49673             [::]:0                 LISTENING       664
  TCP    [::]:49674             [::]:0                 LISTENING       664
  TCP    [::]:49677             [::]:0                 LISTENING       2160
  TCP    [::]:49680             [::]:0                 LISTENING       644
  TCP    [::]:49703             [::]:0                 LISTENING       2284
  TCP    [::]:49758             [::]:0                 LISTENING       2252
  TCP    [::1]:53               [::]:0                 LISTENING       2284
  TCP    [fe80::9c3:b17e:4afd:c362%7]:53  [::]:0                 LISTENING       2284

Users & Groups


*Evil-WinRM* PS C:\Users\enox\Documents> net users ; net user /DOMAIN ; ls C:\Users
 
User accounts for \\
 
-------------------------------------------------------------------------------
Administrator            enox                     Guest
krbtgt
The command completed with one or more errors.
 
 
User accounts for \\
 
-------------------------------------------------------------------------------
Administrator            enox                     Guest
krbtgt
The command completed with one or more errors.
 
 
 
    Directory: C:\Users
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        7/20/2021   4:25 AM                Administrator
d-----        7/20/2021   4:17 AM                enox
d-r---        5/28/2021   3:53 AM                Public
d-----        9/14/2021   8:27 AM                svc_apache$
*Evil-WinRM* PS C:\Users\enox\Documents> net localgroup ; net group /DOMAIN
 
Aliases for \\DC01
 
-------------------------------------------------------------------------------
*Access Control Assistance Operators
*Account Operators
*Administrators
*Allowed RODC Password Replication Group
*Backup Operators
*Cert Publishers
*Certificate Service DCOM Access
*Cryptographic Operators
*Denied RODC Password Replication Group
*Distributed COM Users
*DnsAdmins
*Event Log Readers
*Guests
*Hyper-V Administrators
*IIS_IUSRS
*Incoming Forest Trust Builders
*Network Configuration Operators
*Performance Log Users
*Performance Monitor Users
*Pre-Windows 2000 Compatible Access
*Print Operators
*RAS and IAS Servers
*RDS Endpoint Servers
*RDS Management Servers
*RDS Remote Access Servers
*Remote Desktop Users
*Remote Management Users
*Replicator
*Server Operators
*Storage Replica Administrators
*Terminal Server License Servers
*Users
*Windows Authorization Access Group
The command completed successfully.
 
 
Group Accounts for \\
 
-------------------------------------------------------------------------------
*Cloneable Domain Controllers
*DnsUpdateProxy
*Domain Admins
*Domain Computers
*Domain Controllers
*Domain Guests
*Domain Users
*Enterprise Admins
*Enterprise Key Admins
*Enterprise Read-only Domain Controllers
*Group Policy Creator Owners
*Key Admins
*Protected Users
*Read-only Domain Controllers
*Schema Admins
*Web Admins
The command completed with one or more errors.

Processes


*Evil-WinRM* PS C:\Users\enox\Documents> Get-WmiObject Win32_Process | % { $s = (Get-CimInstance Win32_Service | ? { $_.ProcessId -eq $_.ProcessId }).Name -join ", "; $u = $_.GetOwner(); [PSCustomObject]@{ Name = $_.Name; PID = $_.ProcessId; User = "$($u.Domain)$($u.User)"} } | ft -AutoSize
Access denied 
At line:1 char:1
+ Get-WmiObject Win32_Process | % { $s = (Get-CimInstance Win32_Service ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : InvalidOperation: (:) [Get-WmiObject], ManagementException
    + FullyQualifiedErrorId : GetWMIManagementException,Microsoft.PowerShell.Commands.GetWmiObjectCommand
*Evil-WinRM* PS C:\Users\enox\Documents> cmd /c tasklist /svc ; ps
cmd.exe : ERROR: Access denied
    + CategoryInfo          : NotSpecified: (ERROR: Access denied:String) [], RemoteException
    + FullyQualifiedErrorId : NativeCommandError
 
Handles  NPM(K)    PM(K)      WS(K)     CPU(s)     Id  SI ProcessName
-------  ------    -----      -----     ------     --  -- -----------
    150       9     8108      14340      25.69   3860   0 conhost
    149       9     6628      12476       0.03   3884   0 conhost
    319      14     2236       5368               400   0 csrss
    166       9     1748       4892               504   1 csrss
    403      33    16240      23324              2252   0 dfsrs
    157       8     2044       6208              2372   0 dfssvc
    254      14     4008      13716              3068   0 dllhost
    356      26     7912      10696              2284   0 dns
    542      22    23832      49872               988   1 dwm
     48       6     1528       4636              2068   0 fontdrvhost
     48       6     1628       4812              2076   1 fontdrvhost
      0       0       56          8                 0   0 Idle
    475      27    12584      49844              3016   1 LogonUI
   1897    1531    80848      91184               664   0 lsass
    386      31    37412      48164              2220   0 Microsoft.ActiveDirectory.WebServices
    225      13     3252      10672              3116   0 msdtc
    602      80   176332     141860              2400   0 MsMpEng
    129       8     1824       6564               112   0 nssm
    363      26    24860      36204     270.14    584   0 python
      0      16      432      63944                88   0 Registry
    417      13     5100      12260               644   0 services
     53       3      484       1208               284   0 smss
    471      22     5980      16916              2160   0 spoolsv
    579      20     4772      15016               340   0 svchost
   1380      47    23752      50440               356   0 svchost
    519      31    12524      22152               720   0 svchost
    202      11     1624       7456               796   0 svchost
    779      27     7472      18840               828   0 svchost
    666      18     4784      15156               864   0 svchost
    630      19     4104      10780               908   0 svchost
    583      18    14164      20856               948   0 svchost
    989    2332    87180     101756              1056   0 svchost
    209      11     2308       8764              1080   0 svchost
    401      32    10484      19464              1236   0 svchost
    312      11     2004       9068              1364   0 svchost
    159       8     1424       6600              1540   0 svchost
    164      10     1944       7660              1968   0 svchost
    340      15    10080      14612              2196   0 svchost
    469      21    16616      31032              2244   0 svchost
    150       8     1616       7524              3500   0 svchost
    138       8     3228       9696              4820   0 svchost
   1385       0      196        144                 4   0 System
    216      16     2384      10716              2808   0 vds
    171      12     3228      10684              2424   0 VGAuthService
    144       8     1680       7040              2408   0 vm3dservice
    138      10     1784       7500              2548   1 vm3dservice
    383      22     9852      22288              2392   0 vmtoolsd
    173      11     1488       7104               524   0 wininit
    243      12     2640      19044               568   1 winlogon
    397      20    10596      21592              2920   0 WmiPrvSE
    972      35    75996     104248       0.69   3332   0 wsmprovhost
    605      33    81484     104440       0.98   4404   0 wsmprovhost
  • 129 8 1824 6564 112 0 nssm
  • 471 22 5980 16916 2160 0 spoolsv
  • 216 16 2384 10716 2808 0 vds

Tasks


*Evil-WinRM* PS C:\Users\enox\Documents> Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft TaskName,TaskPath,State
Cannot connect to CIM server. Access denied 
At line:1 char:1
+ Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft  ...
+ ~~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_ScheduledTask:String) [Get-ScheduledTask], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-ScheduledTask
*Evil-WinRM* PS C:\Users\enox\Documents> cmd /c schtasks /QUERY /FO TABLE
cmd.exe : Access is denied.
    + CategoryInfo          : NotSpecified: (Access is denied.:String) [], RemoteException
    + FullyQualifiedErrorId : NativeCommandError

Services


*Evil-WinRM* PS C:\Users\enox\Documents> wmic service where "State='Running'" get Name,PathName,StartName | Out-String -Stream | Where-Object { $_ -match 'S' -and $_ -notmatch 'C:\Windows\System32' } | Select-Object
WMIC.exe : ERROR:
    + CategoryInfo          : NotSpecified: (ERROR::String) [], RemoteException
    + FullyQualifiedErrorId : NativeCommandError
*Evil-WinRM* PS C:\Users\enox\Documents> services
 
Path                                                                           Privileges Service          
----                                                                           ---------- -------          
C:\Windows\ADWS\Microsoft.ActiveDirectory.WebServices.exe                           False ADWS             
C:\Program Files\nssm-2.24\win64\nssm.exe                                           False FlaskService     
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe                        True NetTcpPortSharing
C:\Windows\SysWow64\perfhost.exe                                                    False PerfHost         
"C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe"          False Sense            
C:\Windows\servicing\TrustedInstaller.exe                                           False TrustedInstaller 
"C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"              False VGAuthService    
"C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"                                 False VMTools          
"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\NisSrv.exe"        True WdNisSvc         
"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\MsMpEng.exe"       True WinDefend        
"C:\Program Files\Windows Media Player\wmpnetwk.exe"                                False WMPNetworkSvc    

C:\Program Files\nssm-2.24\win64\nssm.exe False FlaskService

Installed Programs


*Evil-WinRM* PS C:\Users\enox\Documents> Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*", "HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall\*" -ErrorAction SilentlyContinue | Select-Object -ExpandProperty DisplayName -ErrorAction SilentlyContinue | Where-Object { $_ } | Sort-Object -Unique ; ls "C:\Program Files" ; ls "C:\Program Files (x86)"
Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.24.28127
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.24.28127
Microsoft Visual C++ 2019 X64 Additional Runtime - 14.24.28127
Microsoft Visual C++ 2019 X64 Minimum Runtime - 14.24.28127
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.24.28127
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.24.28127
Python 3.9.0 Add to Path (64-bit)
Python 3.9.0 Core Interpreter (64-bit)
Python 3.9.0 Development Libraries (64-bit)
Python 3.9.0 Documentation (64-bit)
Python 3.9.0 Executables (64-bit)
Python 3.9.0 pip Bootstrap (64-bit)
Python 3.9.0 Standard Library (64-bit)
Python 3.9.0 Tcl/Tk Support (64-bit)
Python 3.9.0 Utility Scripts (64-bit)
Python Launcher
VMware Tools
Windows 10 Update Assistant
 
 
    Directory: C:\Program Files
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        5/28/2021   6:05 AM                Common Files
d-----        5/28/2021   4:21 AM                internet explorer
d-----        7/20/2021   4:20 AM                nssm-2.24
d-----        7/20/2021   4:14 AM                Python39
d-----        5/28/2021   6:06 AM                VMware
d-r---        5/28/2021   4:32 AM                Windows Defender
d-----        6/30/2021  10:02 AM                Windows Defender Advanced Threat Protection
d-----        7/15/2021  12:28 PM                Windows Mail
d-----        5/28/2021   4:21 AM                Windows Media Player
d-----        9/15/2018  12:19 AM                Windows Multimedia Platform
d-----        9/15/2018  12:28 AM                windows nt
d-----        5/28/2021   4:21 AM                Windows Photo Viewer
d-----        9/15/2018  12:19 AM                Windows Portable Devices
d-----        9/15/2018  12:19 AM                Windows Security
d-----        9/15/2018  12:19 AM                WindowsPowerShell
 
 
    Directory: C:\Program Files (x86)
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        9/15/2018  12:28 AM                Common Files
d-----        5/28/2021   4:21 AM                Internet Explorer
d-----        9/15/2018  12:19 AM                Microsoft.NET
d-----        5/28/2021   4:21 AM                Windows Defender
d-----        7/15/2021  12:28 PM                Windows Mail
d-----        5/28/2021   4:21 AM                Windows Media Player
d-----        9/15/2018  12:19 AM                Windows Multimedia Platform
d-----        9/15/2018  12:28 AM                windows nt
d-----        5/28/2021   4:21 AM                Windows Photo Viewer
d-----        9/15/2018  12:19 AM                Windows Portable Devices
d-----        9/15/2018  12:19 AM                WindowsPowerShell
  • Python
  • nssm-2.24

Firewall & AV


*Evil-WinRM* PS C:\Users\enox\Documents> netsh firewall show config
 
Domain profile configuration (current):
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
Service configuration for Domain profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
Enable   No          Remote Desktop
 
Allowed programs configuration for Domain profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
Port configuration for Domain profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
8080   TCP       Enable  Inbound               Port 8080 for Flask
5985   TCP       Enable  Inbound               WinRM-HTTP
 
Standard profile configuration:
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
Service configuration for Standard profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
Enable   Yes         Network Discovery
Enable   No          Remote Desktop
 
Allowed programs configuration for Standard profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
Port configuration for Standard profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
8080   TCP       Enable  Inbound               Port 8080 for Flask
5985   TCP       Enable  Inbound               WinRM-HTTP
 
Log configuration:
-------------------------------------------------------------------
File location   = C:\Windows\system32\LogFiles\Firewall\pfirewall.log
Max file size   = 4096 KB
Dropped packets = Disable
Connections     = Disable
 
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
*Evil-WinRM* PS C:\Users\enox\Documents> Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property ExclusionPath
Cannot connect to CIM server. Access denied 
At line:1 char:1
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+ ~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_MpComputerStatus:String) [Get-MpComputerStatus], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpComputerStatus
Cannot connect to CIM server. Access denied 
At line:1 char:24
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+                        ~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_MpPreference:String) [Get-MpPreference], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpPreference

Session Architecture


*Evil-WinRM* PS C:\Users\enox\Documents> [Environment]::Is64BitProcess
True

Installed .NET Frameworks


*Evil-WinRM* PS C:\Users\enox\Documents> cmd /c dir /A:D C:\Windows\Microsoft.NET\Framework ; cmd /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP" ; cmd /c reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
 Volume in drive C has no label.
 Volume Serial Number is 5C30-DCD7
 
 Directory of C:\Windows\Microsoft.NET\Framework
 
09/15/2018  12:19 AM    <DIR>          .
09/15/2018  12:19 AM    <DIR>          ..
09/15/2018  12:19 AM    <DIR>          v1.0.3705
09/15/2018  12:19 AM    <DIR>          v1.1.4322
09/15/2018  12:19 AM    <DIR>          v2.0.50727
07/07/2025  06:40 AM    <DIR>          v4.0.30319
               0 File(s)              0 bytes
               6 Dir(s)  13,352,640,512 bytes free
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\CDF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4.0
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF\v4.0
    HttpNamespaceReservationInstalled    REG_DWORD    0x1
    NetTcpPortSharingInstalled    REG_DWORD    0x1
    NonHttpActivationInstalled    REG_DWORD    0x1
    SMSvcHostPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    WMIInstalled    REG_DWORD    0x1
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    InstallPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    InstallPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0
    (Default)    REG_SZ    deprecated
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0\Client
    Install    REG_DWORD    0x1
    Version    REG_SZ    4.0.0.0

.NET 4.7.03190