This Registry Key DESTROYS Windows

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 พ.ย. 2024

ความคิดเห็น • 35

  • @Sypaka
    @Sypaka 2 วันที่ผ่านมา +39

    Oh crap. This is a nightmare. The fact Windows Defender didn't check this key and instantly removed it, is worrysome.

    • @teknixstuff
      @teknixstuff 2 วันที่ผ่านมา

      Windows XP never had defender.

    • @Sypaka
      @Sypaka 2 วันที่ผ่านมา +4

      @@teknixstuff Oh, it did. And it was horrible. At that time, Microsoft had two optional softwares: "Windows Defender" and "Microsoft Security Essentials". Defender didn't really do what it does today, that was MSE's job. Both programs later got merged at some point into what we have now.
      What I was saying earlier was about *Windows 10*, where Defender should _definitely_ have catched this, because malware actually does this to stay in the system.

    • @yourpcpal
      @yourpcpal  2 วันที่ผ่านมา +3

      @@teknixstuff Windows 10's version of Defender didn't catch this either, which is probably what they're referencing

    • @BurnerAccount101-ui4et
      @BurnerAccount101-ui4et 16 ชั่วโมงที่ผ่านมา +2

      Windows defender in Windows 11 does automatically delete this, I tried to do this on utilman (override accessibility menu with cmd), and the CMD window did appear, but immediately disappeared. And when I log back in, I see that the value is gone.

    • @yourpcpal
      @yourpcpal  16 ชั่วโมงที่ผ่านมา

      @BurnerAccount101-ui4et thanks for this comment! Will confirm later. Interesting that they didn't roll out whatever is detecting it to Windows 10.

  • @teknixstuff
    @teknixstuff 2 วันที่ผ่านมา +35

    This is NOT a bug or exploit! This key has legitimate use, and, when used with an actual debugger, can make finding and fixing bugs easier! The reason you encounter the issues in the video is that svchost is not a debugger, and instead just exits without doing anything when executed like this, essentially causing winlogon to act as though not present.

    • @yourpcpal
      @yourpcpal  2 วันที่ผ่านมา +11

      @@teknixstuff Yep, that was what I explained in the video - but the fact that Defender doesn't catch the debugger values being used in this way when referencing a system file is somewhat a concern. They've patched or added Defender flags for other things that aren't outright malicious, like the sethc.exe cmd workaround.

    • @teknixstuff
      @teknixstuff 2 วันที่ผ่านมา +3

      @@yourpcpal Yes, but sethc has obvious security implications and few legitimate uses. Debugging winlogon is a thing that is common to legitimately do, and Microsoft's docs even explain how to do it properly for certain things.

    • @yourpcpal
      @yourpcpal  วันที่ผ่านมา +5

      @@teknixstuff you're not getting what I'm saying. Setting that key manually is actually not common at all. In my years of working in IT I've never had to (or heard of anyone else having to) debug winlogon in this way.

  • @FinnySpam
    @FinnySpam 10 ชั่วโมงที่ผ่านมา +3

    heyoooooo! enjoying this. its the first vid ive seen from you and i am now subscribbled to you and hope to see more of ya. dunno if you're new or not but regardless you're makin' it, bc you were in my recommended feed!

    • @yourpcpal
      @yourpcpal  9 ชั่วโมงที่ผ่านมา

      Thanks

  • @OliVB2013
    @OliVB2013 54 นาทีที่ผ่านมา

    Hey PCPal I always love your videos! Could you maybe make a video sometime on install a Windows virus (for educational purposes only of course)? I think it would be interesting to see how something like this works and what you can learn about the dangers and security of your computer.

  • @TheUntitedStatesOfAmreica
    @TheUntitedStatesOfAmreica 2 วันที่ผ่านมา +7

    This channel should be more popular

  • @mrbeam89_
    @mrbeam89_ 2 วันที่ผ่านมา +16

    This seems actually very dangerous, however, it it possible that Microsoft will release an update even for every non-supported Windows version (maybe like when Wannacry was terrorizing the world, Microsoft released an update for Win XP). Doesn't the Windows Defender monitor the registry as part of the Real-Time protection ? Great video, hope it gets more views !

    • @yourpcpal
      @yourpcpal  2 วันที่ผ่านมา +1

      Thanks :)
      Also to answer your question, I believe Windows Defender does monitor certain registry keys but it seems MS devs have overlooked this one.

    • @search_history
      @search_history วันที่ผ่านมา

      @@yourpcpal they rarely unless its a script that does over ...im not sure how many lines but it has to be more than the entire script of 20 LTT videos cause of how bad it is

  • @lolbat.
    @lolbat. 5 ชั่วโมงที่ผ่านมา +1

    Here before your channel explodes like an atomic bomb and gains 100k subs

    • @KillProc0
      @KillProc0 2 ชั่วโมงที่ผ่านมา

      same lol

  • @iGPR3
    @iGPR3 2 วันที่ผ่านมา +7

    this is an issue on modern windows as well as xp then?

    • @yourpcpal
      @yourpcpal  2 วันที่ผ่านมา +3

      @@iGPR3 Yep, haven't tested on 11 yet but it definitely does the same thing on 10, just without a bluescreen

    • @iGPR3
      @iGPR3 2 วันที่ผ่านมา +2

      @@yourpcpal damn, microsoft better hop on this asap. wouldnt be surprised if it takes them a good while though

  • @jacie_krece1991
    @jacie_krece1991 วันที่ผ่านมา +2

    On later versions of Windows (e.g. Windows 10), will the Command Prompt (where you can run regedit) from the Recovery Options also work to solve this problem?

    • @yourpcpal
      @yourpcpal  วันที่ผ่านมา

      Your comment was super interesting. On trying, it seems not as the whole list of keys doesn't show for some reason.
      snipboard.io/S0KW1x.jpg

    • @Denik-bt2lx
      @Denik-bt2lx วันที่ผ่านมา

      Yes

    • @GigantTech
      @GigantTech 21 ชั่วโมงที่ผ่านมา +1

      ​@@yourpcpalits because its a Windows PE environment which is completely seperate from your normal Windows installation

    • @SmilerRyanYT
      @SmilerRyanYT 17 ชั่วโมงที่ผ่านมา +1

      In theory you should be able to load the hide file the same way in the registry editor (load hive), delete the key, unload the hive, and reboot.

    • @unicodefox
      @unicodefox 6 ชั่วโมงที่ผ่านมา +1

      @@yourpcpalYou need to load the registry hives from your actual OS image. File > Load Registry Hive, and from memory i think they're in C:\System32\Config.
      WinPE is just a cutdown version of Windows, so it still has its own registry, which regedit will open by default

  • @mwk1
    @mwk1 2 วันที่ผ่านมา +3

    A nie można w trybie awaryjnym?

    • @yourpcpal
      @yourpcpal  2 วันที่ผ่านมา +2

      Nope, winlogon is still loaded in safe mode so you just get a black screen.

    • @mwk1
      @mwk1 2 วันที่ผ่านมา +1

      @@yourpcpal copy that 🍻

  • @le9038
    @le9038 วันที่ผ่านมา +1

    Doesn't windows keep a backup of a factory fresh copy of your registry??? Couldn't you just go into recovery mode and boot up windows with the backup registry?????

    • @DavyB81
      @DavyB81 13 ชั่วโมงที่ผ่านมา

      I don't know about the recent versions of Windows. But versions before Windows 10 don't do that. You have to manually make your own backups.

  • @生き残ったキツネの毛皮
    @生き残ったキツネの毛皮 วันที่ผ่านมา

    This is wild considering I use a combo. Of Mac and a laptop

  • @thiesenf
    @thiesenf 21 ชั่วโมงที่ผ่านมา +1

    Good that it destroys Windows... then you can install some Linux based distro instead... :-)