System/Kernel


*Evil-WinRM* PS C:\Users\anirudh\Documents> cmd /c ver
 
Microsoft Windows [Version 10.0.17763.2300]
 
*Evil-WinRM* PS C:\Users\anirudh\Documents> systeminfo ; Get-ComputerInfo
Program 'systeminfo.exe' failed to run: Access is deniedAt line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~.
At line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (:) [], ApplicationFailedException
    + FullyQualifiedErrorId : NativeCommandFailed
 
 
WindowsBuildLabEx                                       : 17763.1.amd64fre.rs5_release.180914-1434
WindowsCurrentVersion                                   : 6.3
WindowsEditionId                                        : ServerStandard
WindowsInstallationType                                 : Server
WindowsInstallDateFromRegistry                          : 5/28/2021 10:52:51 AM
WindowsProductId                                        : 00429-70000-00000-AA958
WindowsProductName                                      : Windows Server 2019 Standard
WindowsRegisteredOrganization                           :
WindowsRegisteredOwner                                  : Windows User
WindowsSystemRoot                                       : C:\Windows
WindowsVersion                                          : 1809
OsServerLevel                                           : FullServer
TimeZone                                                : (UTC-08:00) Pacific Time (US & Canada)
LogonServer                                             : \\DC
PowerPlatformRole                                       : Desktop
DeviceGuardSmartStatus                                  : Off
  • Microsoft Windows [Version 10.0.17763.2300]
  • WindowsProductName : Windows Server 2019 Standard
  • OsServerLevel : FullServer
  • PowerPlatformRole : Desktop

Networks


*Evil-WinRM* PS C:\Users\anirudh\Documents> ipconfig /all ; arp -a ; print route
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : DC
   Primary Dns Suffix  . . . . . . . : vault.offsec
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : vault.offsec
 
Ethernet adapter Ethernet0 2:
 
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter
   Physical Address. . . . . . . . . : 00-50-56-9E-CC-71
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.187.172(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.187.254
   DNS Servers . . . . . . . . . . . : 192.168.187.254
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Interface: 192.168.187.172 --- 0x7
  Internet Address      Physical Address      Type
  192.168.187.254       00-50-56-9e-ad-80     dynamic
  192.168.187.255       ff-ff-ff-ff-ff-ff     static
  224.0.0.22            01-00-5e-00-00-16     static
  224.0.0.251           01-00-5e-00-00-fb     static
  224.0.0.252           01-00-5e-00-00-fc     static
  255.255.255.255       ff-ff-ff-ff-ff-ff     static
Unable to initialize device PRN
*Evil-WinRM* PS C:\Users\anirudh\Documents> netstat -ano | Select-String LIST
 
  TCP    0.0.0.0:88             0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       904
  TCP    0.0.0.0:389            0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:464            0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:593            0.0.0.0:0              LISTENING       904
  TCP    0.0.0.0:636            0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:3268           0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:3269           0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:3389           0.0.0.0:0              LISTENING       60
  TCP    0.0.0.0:5985           0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:9389           0.0.0.0:0              LISTENING       2636
  TCP    0.0.0.0:47001          0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:49664          0.0.0.0:0              LISTENING       508
  TCP    0.0.0.0:49665          0.0.0.0:0              LISTENING       848
  TCP    0.0.0.0:49666          0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:49668          0.0.0.0:0              LISTENING       1256
  TCP    0.0.0.0:49675          0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:49676          0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:49681          0.0.0.0:0              LISTENING       2592
  TCP    0.0.0.0:49686          0.0.0.0:0              LISTENING       640
  TCP    0.0.0.0:49708          0.0.0.0:0              LISTENING       2700
  TCP    0.0.0.0:49842          0.0.0.0:0              LISTENING       2676
  TCP    127.0.0.1:53           0.0.0.0:0              LISTENING       2700
  TCP    192.168.187.172:53     0.0.0.0:0              LISTENING       2700
  TCP    192.168.187.172:139    0.0.0.0:0              LISTENING       4
  TCP    [::]:88                [::]:0                 LISTENING       648
  TCP    [::]:135               [::]:0                 LISTENING       904
  TCP    [::]:445               [::]:0                 LISTENING       4
  TCP    [::]:464               [::]:0                 LISTENING       648
  TCP    [::]:593               [::]:0                 LISTENING       904
  TCP    [::]:3389              [::]:0                 LISTENING       60
  TCP    [::]:5985              [::]:0                 LISTENING       4
  TCP    [::]:9389              [::]:0                 LISTENING       2636
  TCP    [::]:47001             [::]:0                 LISTENING       4
  TCP    [::]:49664             [::]:0                 LISTENING       508
  TCP    [::]:49665             [::]:0                 LISTENING       848
  TCP    [::]:49666             [::]:0                 LISTENING       648
  TCP    [::]:49668             [::]:0                 LISTENING       1256
  TCP    [::]:49675             [::]:0                 LISTENING       648
  TCP    [::]:49676             [::]:0                 LISTENING       648
  TCP    [::]:49681             [::]:0                 LISTENING       2592
  TCP    [::]:49686             [::]:0                 LISTENING       640
  TCP    [::]:49708             [::]:0                 LISTENING       2700
  TCP    [::]:49842             [::]:0                 LISTENING       2676
  TCP    [::1]:53               [::]:0                 LISTENING       2700

Users & Groups


*Evil-WinRM* PS C:\Users\anirudh\Documents> net users ; ls C:\Users
 
User accounts for \\
 
-------------------------------------------------------------------------------
Administrator            anirudh                  Guest
krbtgt
The command completed with one or more errors.
 
 
 
    Directory: C:\Users
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        5/28/2021   3:53 AM                Administrator
d-----       11/19/2021   1:12 AM                anirudh
d-r---        5/28/2021   3:53 AM                Public
*Evil-WinRM* PS C:\Users\anirudh\Documents> net localgroup ; net group /DOMAIN
 
Aliases for \\DC
 
-------------------------------------------------------------------------------
*Access Control Assistance Operators
*Account Operators
*Administrators
*Allowed RODC Password Replication Group
*Backup Operators
*Cert Publishers
*Certificate Service DCOM Access
*Cryptographic Operators
*Denied RODC Password Replication Group
*Distributed COM Users
*DnsAdmins
*Event Log Readers
*Guests
*Hyper-V Administrators
*IIS_IUSRS
*Incoming Forest Trust Builders
*Network Configuration Operators
*Performance Log Users
*Performance Monitor Users
*Pre-Windows 2000 Compatible Access
*Print Operators
*RAS and IAS Servers
*RDS Endpoint Servers
*RDS Management Servers
*RDS Remote Access Servers
*Remote Desktop Users
*Remote Management Users
*Replicator
*Server Operators
*Storage Replica Administrators
*Terminal Server License Servers
*Users
*Windows Authorization Access Group
The command completed successfully.
 
 
Group Accounts for \\
 
-------------------------------------------------------------------------------
*Cloneable Domain Controllers
*DnsUpdateProxy
*Domain Admins
*Domain Computers
*Domain Controllers
*Domain Guests
*Domain Users
*Enterprise Admins
*Enterprise Key Admins
*Enterprise Read-only Domain Controllers
*Group Policy Creator Owners
*Key Admins
*Protected Users
*Read-only Domain Controllers
*Schema Admins
The command completed with one or more errors.

Processes


*Evil-WinRM* PS C:\Users\anirudh\Documents> Get-WmiObject Win32_Process | % { $s = (Get-CimInstance Win32_Service | ? { $_.ProcessId -eq $_.ProcessId }).Name -join ", "; $u = $_.GetOwner(); [PSCustomObject]@{ Name = $_.Name; PID = $_.ProcessId; User = "$($u.Domain)$($u.User)"; Services = $s } } | ft -AutoSize
Access denied 
At line:1 char:1
+ Get-WmiObject Win32_Process | % { $s = (Get-CimInstance Win32_Service ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : InvalidOperation: (:) [Get-WmiObject], ManagementException
    + FullyQualifiedErrorId : GetWMIManagementException,Microsoft.PowerShell.Commands.GetWmiObjectCommand
*Evil-WinRM* PS C:\Users\anirudh\Documents> cmd /c tasklist /svc ; ps
cmd.exe : ERROR: Access denied
    + CategoryInfo          : NotSpecified: (ERROR: Access denied:String) [], RemoteException
    + FullyQualifiedErrorId : NativeCommandError
 
Handles  NPM(K)    PM(K)      WS(K)     CPU(s)     Id  SI ProcessName
-------  ------    -----      -----     ------     --  -- -----------
    150       9     6644      12484       0.02   5084   0 conhost
    323      14     2308       5408               396   0 csrss
    240      12     2236       5256               500   1 csrss
    361      15     3532      15184       0.14   3872   1 ctfmon
    411      33    16184      23516              2676   0 dfsrs
    183      12     2392       7900              2752   0 dfssvc
    255      14     3976       7660              3124   0 dllhost
   5354    3697    68544      12784              2700   0 dns
    584      26    27456      41024              1000   1 dwm
    629      36    11540      41940       0.19   3016   1 explorer
   1467      55    21940      39344       3.11   4324   1 explorer
    564      35    11696      42940       0.22   4464   1 explorer
     48       6     1516       4608              2500   0 fontdrvhost
     48       7     1804       5324              2504   1 fontdrvhost
      0       0       56          8                 0   0 Idle
    141      12     2276       6032              2732   0 ismserv
   1726     155    71628      69228               648   0 lsass
    734      31    36840      22660              2636   0 Microsoft.ActiveDirectory.WebServices
    225      13     3224      10656              3568   0 msdtc
    612      84   192920     100004              2848   0 MsMpEng
      0      38     5784     107252                88   0 Registry
    225      11     2196      12628       0.06   2796   1 RuntimeBroker
    147       8     1640       7844       0.02   4768   1 RuntimeBroker
    317      17    19588      10640       0.42   4864   1 RuntimeBroker
    676      33    19900       4960       0.45   4696   1 SearchUI
    426      13     4740      12176               640   0 services
    689      28    15048       4216       0.22   4596   1 ShellExperienceHost
    439      17     4820      10344       0.17   2128   1 sihost
     53       3      504       1208               280   0 smss
    473      23     5888      17144              2592   0 spoolsv
    502      18     4148      13128                60   0 svchost
    869      32     9248      14464               312   0 svchost
    209      12     1668       7484               340   0 svchost
    757      46     9620      25812               496   0 svchost
    619      34    14936      25384               704   0 svchost
    673      21    15992      24348               848   0 svchost
    854      23     6224      23488               856   0 svchost
    803      21     5308      12272               904   0 svchost
    402      32     9944      19008              1124   0 svchost
   1711      55    29276      47268              1256   0 svchost
    313      12     2180       9220              1360   0 svchost
    185      10     4316      13508              1376   0 svchost
    195       9     1528       6812              1524   0 svchost
    164      10     2184       7960              2004   0 svchost
    435      20     6184      22124       0.16   2216   1 svchost
    213      11     2324       8708              2348   0 svchost
    374      16    10192      14620              2628   0 svchost
    583      23    17264      22776              2668   0 svchost
   1700       0      196        144                 4   0 System
    178      11     3544       8488       0.03   1136   1 taskhostw
    179      11     2104      11296       0.06   1456   1 taskhostw
    296      16    12212       9452              2060   0 taskhostw
    203      60   747932     649704              4388   0 TiWorker
    138       8     1788       4440              3912   0 TrustedInstaller
    216      16     2368      10732              2220   0 vds
    171      12     3224      10772              2812   0 VGAuthService
    144       8     1692       7108              2820   0 vm3dservice
    138       9     1816       7632              3008   1 vm3dservice
    261      18     5296      17528       0.03   1016   1 vmtoolsd
    383      22     9880      22368              2840   0 vmtoolsd
    173      11     1500       7068               508   0 wininit
    281      12     2672      12936               556   1 winlogon
    141       8     1352       4012              2440   0 WmiApSrv
    392      20     9656      19384              3092   0 WmiPrvSE
   1427      34    79564     108116       0.86    144   0 wsmprovhost
   1642      29    77620      96848       0.47   2012   0 wsmprovhost

473 23 5888 17144 2592 0 spoolsv

Tasks


*Evil-WinRM* PS C:\Users\anirudh\Documents> Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft TaskName,TaskPath,State 
Cannot connect to CIM server. Access denied 
At line:1 char:1
+ Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft  ...
+ ~~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_ScheduledTask:String) [Get-ScheduledTask], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-ScheduledTask
*Evil-WinRM* PS C:\Users\anirudh\Documents> cmd /c schtasks /QUERY /FO TABLE
cmd.exe : Access is denied.
    + CategoryInfo          : NotSpecified: (Access is denied.:String) [], RemoteException
    + FullyQualifiedErrorId : NativeCommandError

Services


*Evil-WinRM* PS C:\Users\anirudh\Documents> wmic service where "State='Running'" get Name,PathName,StartName | Out-String -Stream | Where-Object { $_ -match 'S' -and $_ -notmatch 'C:\Windows\System32' } | Select-Object -First 100
WMIC.exe : ERROR:
    + CategoryInfo          : NotSpecified: (ERROR::String) [], RemoteException
    + FullyQualifiedErrorId : NativeCommandError
*Evil-WinRM* PS C:\Users\anirudh\Documents> net start
net.exe : System error 5 has occurred.
    + CategoryInfo          : NotSpecified: (System error 5 has occurred.:String) [], RemoteException
    + FullyQualifiedErrorId : NativeCommandError
*Evil-WinRM* PS C:\Users\anirudh\Documents> Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}
Access denied 
At line:1 char:1
+ Get-CimInstance -ClassName win32_service | Select Name,State,PathName ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : PermissionDenied: (root\cimv2:win32_service:String) [Get-CimInstance], CimException
    + FullyQualifiedErrorId : HRESULT 0x80041003,Microsoft.Management.Infrastructure.CimCmdlets.GetCimInstanceCommand
 
*Evil-WinRM* PS C:\Users\anirudh\Documents> services
 
Path                                                                           Privileges Service          
----                                                                           ---------- -------          
C:\Windows\ADWS\Microsoft.ActiveDirectory.WebServices.exe                            True ADWS             
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe                        True NetTcpPortSharing
C:\Windows\SysWow64\perfhost.exe                                                     True PerfHost         
"C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe"          False Sense            
C:\Windows\servicing\TrustedInstaller.exe                                           False TrustedInstaller 
"C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"               True VGAuthService    
"C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"                                  True VMTools          
"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2111.5-0\NisSrv.exe"        True WdNisSvc         
"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2111.5-0\MsMpEng.exe"       True WinDefend        
"C:\Program Files\Windows Media Player\wmpnetwk.exe"                                False WMPNetworkSvc    

Installed Programs


*Evil-WinRM* PS C:\Users\anirudh\Documents> Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*", "HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall\*" -ErrorAction SilentlyContinue | Select-Object -ExpandProperty DisplayName -ErrorAction SilentlyContinue | Where-Object { $_ } | Sort-Object -Unique 
Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.24.28127
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.24.28127
Microsoft Visual C++ 2019 X64 Additional Runtime - 14.24.28127
Microsoft Visual C++ 2019 X64 Minimum Runtime - 14.24.28127
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.24.28127
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.24.28127
VMware Tools
Windows 10 Update Assistant
 
*Evil-WinRM* PS C:\Users\anirudh\Documents> ls "C:\Program Files" ; ls "C:\Program Files (x86)"
 
 
    Directory: C:\Program Files
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        5/28/2021   6:05 AM                Common Files
d-----         9/1/2021   9:04 AM                internet explorer
d-----        5/28/2021   6:06 AM                VMware
d-r---        5/28/2021   4:32 AM                Windows Defender
d-----       11/18/2021  11:12 PM                Windows Defender Advanced Threat Protection
d-----        7/15/2021  12:28 PM                Windows Mail
d-----        5/28/2021   4:21 AM                Windows Media Player
d-----        9/15/2018  12:19 AM                Windows Multimedia Platform
d-----        9/15/2018  12:28 AM                windows nt
d-----        5/28/2021   4:21 AM                Windows Photo Viewer
d-----        9/15/2018  12:19 AM                Windows Portable Devices
d-----        9/15/2018  12:19 AM                Windows Security
d-----        9/15/2018  12:19 AM                WindowsPowerShell
 
 
    Directory: C:\Program Files (x86)
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        9/15/2018  12:28 AM                Common Files
d-----         9/1/2021   9:04 AM                Internet Explorer
d-----        9/15/2018  12:19 AM                Microsoft.NET
d-----        5/28/2021   4:21 AM                Windows Defender
d-----        7/15/2021  12:28 PM                Windows Mail
d-----        5/28/2021   4:21 AM                Windows Media Player
d-----        9/15/2018  12:19 AM                Windows Multimedia Platform
d-----        9/15/2018  12:28 AM                windows nt
d-----        5/28/2021   4:21 AM                Windows Photo Viewer
d-----        9/15/2018  12:19 AM                Windows Portable Devices
d-----        9/15/2018  12:19 AM                WindowsPowerShell

Firewall & AV


*Evil-WinRM* PS C:\Users\anirudh\Documents> netsh firewall show config
 
Domain profile configuration (current):
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
Service configuration for Domain profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
Enable   No          Remote Desktop
 
Allowed programs configuration for Domain profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
Port configuration for Domain profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
5985   TCP       Enable  Inbound               WinRM-HTTP
 
Standard profile configuration:
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
Service configuration for Standard profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
Enable   Yes         Network Discovery
Enable   No          Remote Desktop
 
Allowed programs configuration for Standard profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
Port configuration for Standard profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
5985   TCP       Enable  Inbound               WinRM-HTTP
 
Log configuration:
-------------------------------------------------------------------
File location   = C:\Windows\system32\LogFiles\Firewall\pfirewall.log
Max file size   = 4096 KB
Dropped packets = Disable
Connections     = Disable
 
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .

5985 TCP Enable Inbound WinRM-HTTP

*Evil-WinRM* PS C:\Users\anirudh\Documents> Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property ExclusionPath
Cannot connect to CIM server. Access denied 
At line:1 char:1
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+ ~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_MpComputerStatus:String) [Get-MpComputerStatus], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpComputerStatus
Cannot connect to CIM server. Access denied 
At line:1 char:24
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+                        ~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_MpPreference:String) [Get-MpPreference], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpPreference

Session Architecture


*Evil-WinRM* PS C:\Users\anirudh\Documents> [Environment]::Is64BitProcess
True

Installed .NET Frameworks


*Evil-WinRM* PS C:\Users\anirudh\Documents> cmd /c dir /A:D C:\Windows\Microsoft.NET\Framework ; cmd /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP" ; cmd /c reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
 Volume in drive C has no label.
 Volume Serial Number is 5C30-DCD7
 
 Directory of C:\Windows\Microsoft.NET\Framework
 
09/15/2018  12:19 AM    <DIR>          .
09/15/2018  12:19 AM    <DIR>          ..
09/15/2018  12:19 AM    <DIR>          v1.0.3705
09/15/2018  12:19 AM    <DIR>          v1.1.4322
09/15/2018  12:19 AM    <DIR>          v2.0.50727
05/01/2025  12:20 PM    <DIR>          v4.0.30319
               0 File(s)              0 bytes
               6 Dir(s)   4,205,051,904 bytes free
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\CDF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4.0
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF\v4.0
    HttpNamespaceReservationInstalled    REG_DWORD    0x1
    NetTcpPortSharingInstalled    REG_DWORD    0x1
    NonHttpActivationInstalled    REG_DWORD    0x1
    SMSvcHostPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    WMIInstalled    REG_DWORD    0x1
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    InstallPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    InstallPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x70bf6
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.7.03190
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0
    (Default)    REG_SZ    deprecated
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0\Client
    Install    REG_DWORD    0x1
    Version    REG_SZ    4.0.0.0

.NET 4.7.03190