Loading...

KASPERSKY LAB END USER LICENSE AGREEMENT (“LICENSE AGREEMENT”)PLEASE READ THE FOLLOWING LICENSE AGREEMENT CAREFULLY BEFORE YOU START USING THE SOFTWARE. TO ENTER INTO THIS LICENSE AGREEMENT, YOU MUST BE AN ADULT.

IF YOU ARE A CHILD, YOU MUST ASK ONE OF YOUR PARENTS OR LEGAL GUARDIAN TO READ AND ACCEPT THIS LICENSE AGREEMENT FOR YOU.

Create and manage reports in ads manager | facebook help center

BY RUNNING THE SOFTWARE, OR CLICKING THE BUTTON INDICATING YOUR ACCEPTANCE IN THE WINDOW CONTAINING THE LICENSE AGREEMENT, OR ENTERING CORRESPONDING SYMBOL(S) YOU REPRESENT THAT YOU ARE AN ADULT AND ARE EITHER ACCEPTING THIS LICENSE AGREEMENT ON BEHALF OF YOURSELF OR YOUR CHILD AND YOU TAKE FULL RESPONSIBILITY FOR ALL OBLIGATIONS IMPOSED ON AN END USER PURSUANT TO THE TERMS OF THIS LICENSE AGREEMENT.

ALSO RUNNING THE SOFTWARE, OR CLICKING THE BUTTON INDICATING YOUR ACCEPTANCE IN THE WINDOW CONTAINING THE LICENSE AGREEMENT, OR ENTERING CORRESPONDING SYMBOL(S) CONSTITUTES YOUR UNCONDITIONAL ACCEPTANCE OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT AND ENTITLES YOU THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT Promote your Page · Create and boost Facebook posts · Messaging on your Page · Page Insights · Facebook ads · Get started with ads · Buying Facebook ads..

IF YOU DO NOT AGREE WITH THE TERMS OF THIS LICENSE AGREEMENT OR YOU ARE NOT AN ADULT, YOU MUST ABORT THE INSTALLATION OF THE SOFTWARE AND/OR DELETE THE SOFTWARE. Software means GetSysteInfo software including any related materials. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation.

Computer(s) means hardware(s), including personal computers, laptops, workstations, personal digital assistants, ‘smart phones’, hand-held devices, or other electronic devices for which the Software was designed where the Software will be installed and/or used. End User (You/Your) means individual(s) installing or using the Software on his or her own behalf or who is legally using a copy of the Software; or, if the Software is being downloaded or installed on behalf of an organization, such as an employer, “You” further means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf.

For purposes hereof the term “organization,” without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority. The Rightholder hereby grants You a non-exclusive license to store, load, install, execute, and display (to “use”) the free of charge Software that will substantially perform within the scope of functionality set forth on . This free of charge Software can be used to obtain system information required for removal of technical problems originated while using of Rightholder’ software products and, in particular, originated from conflicts between Rightholder’ software products and other vendors’ software2.

Use of the Software does not guarantee removal of technical problems described above 2.

You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable.

This back-up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of your principal residence or in the country where You are using the Software. From the time of the Software installation You have the right to receive product consulting which is available at .

The Software can be used upon your acceptance of this Agreement perpetually.

Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time without notice to You be entitled to terminate this License to use the Software without refunding the purchase price or any part thereof. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law.

Neither Software's binary code nor source may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable.

Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the License granted hereunder and may result in criminal and/or civil prosecution against You. You shall not transfer the rights to use the Software to any third party.

You shall not rent, lease or lend the Software to any third party. You shall not use the Software with the purpose of executing illegal actions, including tracking and obtaining confidential information for use against a third party.

Violation of the intellectual rights to the Software shall result in civil, administrative or criminal liability in accordance with the law.

You acknowledge, accept and agree that no software is error free and You are advised to back-up the Computer, with frequency and reliability suitable for You.

You acknowledge that the Software will be provisioned with Kaspersky standard settings applied by default and that it is Your sole responsibility to configure the Software to satisfy Your own requirements. THE SOFTWARE IS PROVIDED "AS IS" AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE.

EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.

WITHOUT LIMITING THE FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER . TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATON, SOFTWARE AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS.

The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code (“Open Source Software”).

If such licenses require that for any software, which is distributed to someone in an executable binary format, the source code also be made available to those users, then the source code should be made available by sending the request to [email protected] or the source code is supplied with the Software. If any Open Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein.

You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States of America, as well as other countries and international treaties.

This Agreement does not grant to You any rights to the intellectual property including any trademarks or service marks of the Rightholder and/or its partners (“Trademarks”). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name.

Such use of any Trademark does not give you any rights of ownership in that Trademark. The Rightholder and/or its partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein.

Your possession, installation or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software.

Except as stated herein, this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights not expressly granted to you in this Agreement.

You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software.

3 below, this Agreement shall be governed by and construed in accordance the laws specified below for the country or territory in which you obtained the Software, without reference to or application of conflicts of lawsprinciples:a.

If you obtained the Software in Russia, the laws of the Russian Federation.

United States, Puerto Rico, American Samoa, Guam, and U.

If you obtained the Software in the United States, Puerto Rico, American Samoa, Guam or the U. Virgin Islands, the laws of the State of Massachusetts, USA, provided, however, that the laws of the U. state where you live will govern claims under state consumer protection, unfair competition, or similar laws. To the fullest extent permitted by law, the Rightholder and you expressly agree hereby to waive any right to a trial by jury.

If you obtained the Software in Canada, the laws of the Province of Ontario Report a range of issues and incidents, from road traffic matters to serious crimes, In some cases we might ask a few quick questions first, to make sure we're .

If you obtained the Software in Mexico, the federal laws of the Republic of Mexico. If you obtained the Software in a member country of the EU, the laws of England.

If you obtained the Software in Australia, the laws of the State or Territory in which you obtained the license. Hong Kong Special Administration Region (SAR) and Macau SAR. If you obtained the Software in Hong Kong SAR or Macau SAR, the lawsof Hong Kong SAR.

If you obtained the Software in Japan, the laws of Japan. If you obtained the Software in any other country, the substantive laws of the country where the purchase took place would be in effect.

Notwithstanding the foregoing, if the mandatory laws or public policy of any country or territory in which this Agreement is enforced or construed prohibit the application of the law specified herein, then the laws of such country or territory shall instead apply to the extent required by such mandatory laws or public policy. Similarly, if you are an individual consumer, the provisions of Clause 10.

1 shall not affect any mandatory right you may have to take action in your country of residence under the laws of that country. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded.

The End User is responsible for contacting only the Right Holder or their partners directly if having any problems with the product. If you reside in the United States, this Clause 11 applies to you. If a dispute, claim, or controversy of any kind with respect to any Kaspersky Lab product, service, or any part of this agreement, arises between You and Kaspersky Lab or You and a third-party affiliate of Kaspersky Lab, and both parties couldn't resolve the dispute informally within a reasonable period of time, You and the other party agree to binding individual arbitration before the American Arbitration Association ("AAA") under the Federal Arbitration Act ("FAA"), and not to sue in court in front of a judge or jury.

Any proceedings, including but not limited to class action lawsuits, class-wide arbitrations, private attorney-general actions, the combining of individual actions without the consent of all parties, or any other legal procedure where someone acts in a representative capacity, are not permitted. By accepting this agreement, You agree not to begin or participate in any of the above mentioned class and multi-party proceedings, and any action pursued by You and remedy, if any awarded to You, must be on an individual basis, as provided in this clause.

In the event of a binding individual arbitration proceeding between parties, a neutral arbitrator will decide and the arbitrator’s decision will be final except for a limited right of appeal under the FAA. If any conflict exists between this agreement and the rules of the AAA, this agreement shall govern.

Any dispute, claim, or controversy concerning Kaspersky Lab's intellectual property rights, their enforcement, validity, etc. , and any claim pertaining to any form of unauthorized use, including but not limited to theft and piracy, of any Kaspersky Lab product or service are not subject to this arbitration clause.

Rightholder Contact InformationShould you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at:AO Kaspersky Lab, Bldg.

3, 39A, Leningradskoe ShosseMoscow, 125212SECTION B. CONDITIONS REGARDING DATA PROCESSINGPlease read the conditions of the Section “Conditions regarding data processing”.

This Section describes data received from You and/or from Your Computer and the manner by which the Rightholder will process data for the performance of this License Agreement. If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of the Section “Conditions regarding data processing” before they use the Software.

For the Rightholder and/or its Partners to fulfill their obligations under this License Agreement, the Rightholder needs to receive and process information described in Section B Clause 1 for the declared purposes.

Such information may be considered personal according to applicable laws of certain countries. • Providing You with the core functionality of the acquired Software.

The core functionality of the Software as described in the User Manual is to collect system information from the User’s Computer. To provide this core functionality, while You are using the Software the Rightholder has to receive from Your device and process information about the Computer, about installed software, about the services, specifically:• Information about the computer: o Information about the central processing unit (CPU)o Information about the printers being used: information about the number of print jobs since the last restart of the printer, code indicating the status of the printer at the time the information is provided, flag indicating whether a network or local printer is used, name of the print queue manager (PrintProcessor), flag indicating whether buffering and queuing is supported, name of the print server to which the network printer is connected, flag indicating whether the printer is available as a shared resource, and name of the shared printero Information about video controllers: information about the status of the device, flag indicating that the device is using a user-specified configuration, values of the current device settings and operation mode, date and time of the last modification of the device driver, version of the video driver, path to the video adapter's INF file and section of the INF file with information for the video adapter, name of the video device's installed driver, architecture code, and code indicating the type of the video device's memory, description of the video processoro Information about video monitors: unique monitor identifier and status of the device at the time the information is providedo Information about audio cards: unique ID of the device, status and state at the time the information is providedo Information about logical disks: description, name of the first class in the inheritance chain, unique identifier, type of logical disk, type of file system partition, amount of free disk space, code indicating the type of disk, name of logical disk, size of logical disk, header of the volume on the logical disk, serial number of the logical disko Information about network adapters: information about the name of the adapter, accessibility code and status; identifier indicating the type of network used, identifier for installation of the adapter in the system, MAC address of the adapter, name of the adapter manufacturer, name of the network connection shown to the user, code indicating the state of the network adapter's connection to the network, estimate of the current capacity (bps), status of the adapter at the time the information is provided, date and time when the adapter was last restarted, IP address of the default gateway, flag indicating whether DHCP is used, expiration date and time of the IP address issued by the DHCP server, date and time of receipt of the IP address from DHCP, IP address of the DHCP server, DNS name of the domain that the host belongs to, list of DNS name suffixes added to the end of the host name in the process of resolving the domain name, flag indicating that WINS is used, DNS name of the host, list of IP addresses used for DNS queries, identifier for registration of the IP address for a domain, list of IP addresses associated with the adapter, IP Connection Metric, flag indicating that TCP/IP is used, values of settings and device state parameters• Computer name• Name of the domain or work group that the computer belongs to, code indicating the computer's role in the domain or work group• Information about the computer manufacturer, name of the computer according to the manufacturer's version, contact information for the computer's technical support• Name of the current user, domain or computer description• Information about environment variables• Information about Warning or Error system events in the last three 24-hour periods at the time the information is provided:o Event subcategory and textual description of the subcategoryo Value of the last 16 bits of the event propertyo Event identifiero Name of WinNT event logo Message shown in the event log, and event identifiero Name of source that the event pertains too Event creation time and time at which the event was recorded in the logo Name of the user in the system at the time the event occurred• Information about user accounts:o Account descriptiono Date and time at which the account was createdo Flag indicating whether the account is localo User security identifiero Current object state• Information about installed products that is necessary for the Right Owner to identify its products installed on the user's computer:o Product nameo Name of product vendoro Product versiono Product locale• Information about registry keys containing group policy settings.

Information about Microsoft Windows Explorer plugins installed with the Right Owner's products. Registry keys:o HKEY LOCAL MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

o HKEY CURRENT USER, SOFTWARE\Microsoft\Windows\CurrentVersion\Run. o HKEY CURRENT USER\Software\Microsoft\Windows\CurrentVersion\ LOCAL MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.

o HKEY LOCAL MACHINE\ SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce. o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce. o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. o HKEY USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\RunOnce.

o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run How to report a trader or company to Trading Standards and what they'll do with per minute - if you have inclusive minutes, it's the same as calling a landline..

Report to trading standards - citizens advice

o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. o HKEY USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\RunOnce.

o HKEY USERS\DEFAULT\SOFTWARE\Classes\exefile\shell\open\command. o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Command Processor.

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows. o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

o HKEY USERS\DEFAULT\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop. o HKEY USERS\S-1-5-18\SOFTWARE\Classes\exefile\shell\open\command.

o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Command Processor. o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows.

o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. o HKEY USERS\S-1-5-18\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop.

o HKEY USERS\S-1-5-19\SOFTWARE\Classes\exefile\shell\open\command. o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Command Processor.

o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows. o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

o HKEY USERS\S-1-5-19\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop. o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Classes\exefile\shell\open\command.

o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Microsoft\Command Processor. o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Microsoft\Windows .

o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop. o HKEY USERS\S-1-5-20\SOFTWARE\Classes\exefile\shell\open\command.

o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Command Processor. o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows.

o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. o HKEY USERS\S-1-5-20\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop.

o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Classes\exefile\shell\open\command. o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Microsoft\Command Processor.

o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Microsoft\Windows . o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop.

o HKEY LOCAL MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad. o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Active Setup\Installed Components.

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Extensions. o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Active Setup\Installed Components.

o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Extensions. o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Active Setup\Installed Components.

o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\Extensions. o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Active Setup\Installed Components.

o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\Extensions. o HKEY LOCAL MACHINE, SOFTWARE\Microsoft\Internet Explorer\Main, Start Page.

• Information about public folders:o Local path to foldero Descriptiono Current status of folder accesso Information about open portso Protocol identifier (TCP or UDP)o ID of the process using the port to establish a connectiono IP address and numbers of open ports of the participants in an established connectiono Connection stateo Value of %TEMP% variableso Full path to the folder without using environment variables• Information about executable files in the folder:o File name. o File versiono File size on disko Size of compressed file on disk, if the file is compressedo File creation dateo File accessed dateo Name of the product that the file pertains too File descriptiono File hash (MD5)• Value of the registry key:HKEY LOCAL MACHINE\System\CurrentControlSet\Control• Value of the registry key:HKEY LOCAL MACHINE\System\CurrentControlSet\Services• Value of the registry key:HKEY LOCAL MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ • Value of the registry key:HKEY LOCAL MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ • Value of the registry key:HKEY CLASSES ROOT\Installer\Products\ • Value of the registry key:HKEY LOCAL MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\• Reports from the Right Owner’s Klnagchk utility (if detected on the system)• Report files for updates of the Right Owner's products• Detected dump files for the Right Owner's products from the “\Tiny Dumps” directory• Detected report files from the Right Owner's KAVRemover utility• Information about settings for Internet Explorer, Mozilla and Chrome at the time the information is provided• Event logs:o SQL servero AVZ utility• Information about modules (exe, dll) loaded into memory: path to the process file; process PID in the address space that the module is loaded in• Information about the module's developer; module description; MD5; size in bytes; date of creation and modification of the module file, attributes• Information about Windows Explorer extension modules: path to the module file; module CLSID; module description; information about the module's developer• Information about printing system extensions: name; type; description; information about the developer; redirector• Information about Windows scheduled tasks: task name; path to executable file that will be started as part of the task; x86 or x64, description, and information about the vendor of the executable file being started as part of the task• Information about the Local Service Provider (LSP/SPI)• Information about the state of ports on the user's computer: port number, state (ESTABLISHED, LISTENING, TIME WAIT); Application running on the indicated port, its description, x86 or x64, information about the application vendor• List of files from the Downloaded Program Files directory• List of Control Panel applets installed on the user's computer• Information about processes started on the user’s computer: path to the installer; whether the installer is x86 or x64; information about the developer, CLSID of the installer• Information about changes made to the HOST file on the user's computer• Information about modules registered as protocol handlers (AP GZIP Encoding/Decoding Filter, ftp: Asynchronous Pluggable Protocol Handler or http: Asynchronous Pluggable Protocol Handler)• Information about shared resources on the user's computer• %WinDir%\inf\setupapi*.

log• Information about the Right Owner's products installed on the computer:o Information about dumps and logs on the user's system in the %WinDir% and %WinDir%\Minidump directories• Information about software on the user’s computer that is incompatible with the Right Owner's products:o Information about system drivers that is incompatible with the Right Owner's productso Information about third-party drivers that are incompatible with the Right Owner's productso Information about third-party applications currently running that are incompatible with the Right Owner's producto Information about services currently running that are incompatible with the Right Owner's product• The application diagnoses the Internet connection using Microsoft Windows built-in tools:o Tracing the route of packets in an IP network up to Kaspersky Lab’s public update servers (tracert " ") and Kaspersky Lab’s public activation servers (tracert " ")o Information about all TCP/IP network settings (ipconfig /all)2.

If You decide not to provide the information necessary for the Rightholder to perform its obligations under this License Agreement as indicated in the Section “Conditions regarding data processing,” You do not agree to the conditions of this License Agreement. In this case, please discontinue installation and/or remove the Software.

When You provide Your data through the Software to the Rightholder, the Rightholder handles it according to its Privacy Policy, which describes, in particular, the manner by which the Rightholder protects Your data, where the Rightholder processes Your data, and your rights as the data subject.

You can find and read its complete content at /Products-and-Services-Privacy-Policy. The Software and any accompanying documentation are copyrighted and protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties.

KASPERSKY LAB END USER LICENSE AGREEMENT (“LICENSE AGREEMENT”)PLEASE READ THE FOLLOWING LICENSE AGREEMENT CAREFULLY BEFORE YOU START USING THE SOFTWARE. TO ENTER INTO THIS LICENSE AGREEMENT, YOU MUST BE AN ADULT.

IF YOU ARE A CHILD, YOU MUST ASK ONE OF YOUR PARENTS OR LEGAL GUARDIAN TO READ AND ACCEPT THIS LICENSE AGREEMENT FOR YOU. PARENT(S) OR HOLDER(S) OF PARENTAL RESPONSIBILITY MUST ACCEPT THIS LICENSE AGREEMENT ON YOUR BEHALF AND TAKE FULL RESPONSIBILITY FOR ALL OBLIGATIONS IMPOSED ON AN END USER PURSUANT TO THE TERMS OF THIS LICENSE AGREEMENT. BY RUNNING THE SOFTWARE, OR CLICKING THE BUTTON INDICATING YOUR ACCEPTANCE IN THE WINDOW CONTAINING THE LICENSE AGREEMENT, OR ENTERING CORRESPONDING SYMBOL(S) YOU REPRESENT THAT YOU ARE AN ADULT AND ARE EITHER ACCEPTING THIS LICENSE AGREEMENT ON BEHALF OF YOURSELF OR YOUR CHILD AND YOU TAKE FULL RESPONSIBILITY FOR ALL OBLIGATIONS IMPOSED ON AN END USER PURSUANT TO THE TERMS OF THIS LICENSE AGREEMENT.

ALSO RUNNING THE SOFTWARE, OR CLICKING THE BUTTON INDICATING YOUR ACCEPTANCE IN THE WINDOW CONTAINING THE LICENSE AGREEMENT, OR ENTERING CORRESPONDING SYMBOL(S) CONSTITUTES YOUR UNCONDITIONAL ACCEPTANCE OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT AND ENTITLES YOU THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.

IF YOU DO NOT AGREE WITH THE TERMS OF THIS LICENSE AGREEMENT OR YOU ARE NOT AN ADULT, YOU MUST ABORT THE INSTALLATION OF THE SOFTWARE AND/OR DELETE THE SOFTWARE GetReport Retrieves the specified report. Use this method to download report data once Analytics has completed processing the report request. Method .

Software means GetSysteInfo software including any related materials.

Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation. Computer(s) means hardware(s), including personal computers, laptops, workstations, personal digital assistants, ‘smart phones’, hand-held devices, or other electronic devices for which the Software was designed where the Software will be installed and/or used.

End User (You/Your) means individual(s) installing or using the Software on his or her own behalf or who is legally using a copy of the Software; or, if the Software is being downloaded or installed on behalf of an organization, such as an employer, “You” further means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term “organization,” without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority.

The Rightholder hereby grants You a non-exclusive license to store, load, install, execute, and display (to “use”) the free of charge Software that will substantially perform within the scope of functionality set forth on .

This free of charge Software can be used to obtain system information required for removal of technical problems originated while using of Rightholder’ software products and, in particular, originated from conflicts between Rightholder’ software products and other vendors’ software2. Use of the Software does not guarantee removal of technical problems described above 2. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of your principal residence or in the country where You are using the Software.

From the time of the Software installation You have the right to receive product consulting which is available at . The Software can be used upon your acceptance of this Agreement perpetually. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time without notice to You be entitled to terminate this License to use the Software without refunding the purchase price or any part thereof.

You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither Software's binary code nor source may be used or reverse engineered to re-create the program algorithm, which is proprietary.

All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the License granted hereunder and may result in criminal and/or civil prosecution against You.

You shall not transfer the rights to use the Software to any third party. You shall not rent, lease or lend the Software to any third party.

You shall not use the Software with the purpose of executing illegal actions, including tracking and obtaining confidential information for use against a third party. Violation of the intellectual rights to the Software shall result in civil, administrative or criminal liability in accordance with the law.

You acknowledge, accept and agree that no software is error free and You are advised to back-up the Computer, with frequency and reliability suitable for You.

You acknowledge that the Software will be provisioned with Kaspersky standard settings applied by default and that it is Your sole responsibility to configure the Software to satisfy Your own requirements Once you have selected breakdowns and metrics, shifted columns and applied filters, click Save to save your report. It will appear in the full list of reports when .

THE SOFTWARE IS PROVIDED "AS IS" AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE.

YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER .

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATON, SOFTWARE AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS. The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code (“Open Source Software”). If such licenses require that for any software, which is distributed to someone in an executable binary format, the source code also be made available to those users, then the source code should be made available by sending the request to [email protected] or the source code is supplied with the Software.

If any Open Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States of America, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any trademarks or service marks of the Rightholder and/or its partners (“Trademarks”).

You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name. Such use of any Trademark does not give you any rights of ownership in that Trademark.

The Rightholder and/or its partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement.

All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement.

Rightholder reserves all rights not expressly granted to you in this Agreement. You agree not to modify or alter the Software in any way.

You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software. 3 below, this Agreement shall be governed by and construed in accordance the laws specified below for the country or territory in which you obtained the Software, without reference to or application of conflicts of lawsprinciples:a. If you obtained the Software in Russia, the laws of the Russian Federation. United States, Puerto Rico, American Samoa, Guam, and U. If you obtained the Software in the United States, Puerto Rico, American Samoa, Guam or the U.

Virgin Islands, the laws of the State of Massachusetts, USA, provided, however, that the laws of the U.

state where you live will govern claims under state consumer protection, unfair competition, or similar laws.

To the fullest extent permitted by law, the Rightholder and you expressly agree hereby to waive any right to a trial by jury. If you obtained the Software in Canada, the laws of the Province of Ontario.

If you obtained the Software in Mexico, the federal laws of the Republic of Mexico.

If you obtained the Software in a member country of the EU, the laws of England Thankfully, Google Analytics experts have taken the time to create templates for the custom reports they find most valuable and make them available for anyone .

If you obtained the Software in Australia, the laws of the State or Territory in which you obtained the license.

Hong Kong Special Administration Region (SAR) and Macau SAR.

If you obtained the Software in Hong Kong SAR or Macau SAR, the lawsof Hong Kong SAR. If you obtained the Software in Japan, the laws of Japan.

If you obtained the Software in any other country, the substantive laws of the country where the purchase took place would be in effect. Notwithstanding the foregoing, if the mandatory laws or public policy of any country or territory in which this Agreement is enforced or construed prohibit the application of the law specified herein, then the laws of such country or territory shall instead apply to the extent required by such mandatory laws or public policy.

Similarly, if you are an individual consumer, the provisions of Clause 10. 1 shall not affect any mandatory right you may have to take action in your country of residence under the laws of that country.

This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. The End User is responsible for contacting only the Right Holder or their partners directly if having any problems with the product.

If you reside in the United States, this Clause 11 applies to you.

If a dispute, claim, or controversy of any kind with respect to any Kaspersky Lab product, service, or any part of this agreement, arises between You and Kaspersky Lab or You and a third-party affiliate of Kaspersky Lab, and both parties couldn't resolve the dispute informally within a reasonable period of time, You and the other party agree to binding individual arbitration before the American Arbitration Association ("AAA") under the Federal Arbitration Act ("FAA"), and not to sue in court in front of a judge or jury. Any proceedings, including but not limited to class action lawsuits, class-wide arbitrations, private attorney-general actions, the combining of individual actions without the consent of all parties, or any other legal procedure where someone acts in a representative capacity, are not permitted.

By accepting this agreement, You agree not to begin or participate in any of the above mentioned class and multi-party proceedings, and any action pursued by You and remedy, if any awarded to You, must be on an individual basis, as provided in this clause. In the event of a binding individual arbitration proceeding between parties, a neutral arbitrator will decide and the arbitrator’s decision will be final except for a limited right of appeal under the FAA.

If any conflict exists between this agreement and the rules of the AAA, this agreement shall govern. Any dispute, claim, or controversy concerning Kaspersky Lab's intellectual property rights, their enforcement, validity, etc.

, and any claim pertaining to any form of unauthorized use, including but not limited to theft and piracy, of any Kaspersky Lab product or service are not subject to this arbitration clause. Rightholder Contact InformationShould you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at:AO Kaspersky Lab, Bldg. 3, 39A, Leningradskoe ShosseMoscow, 125212SECTION B.

CONDITIONS REGARDING DATA PROCESSINGPlease read the conditions of the Section “Conditions regarding data processing”. This Section describes data received from You and/or from Your Computer and the manner by which the Rightholder will process data for the performance of this License Agreement.

If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of the Section “Conditions regarding data processing” before they use the Software. For the Rightholder and/or its Partners to fulfill their obligations under this License Agreement, the Rightholder needs to receive and process information described in Section B Clause 1 for the declared purposes. Such information may be considered personal according to applicable laws of certain countries.

• Providing You with the core functionality of the acquired Software. The core functionality of the Software as described in the User Manual is to collect system information from the User’s Computer.

To provide this core functionality, while You are using the Software the Rightholder has to receive from Your device and process information about the Computer, about installed software, about the services, specifically:• Information about the computer: o Information about the central processing unit (CPU)o Information about the printers being used: information about the number of print jobs since the last restart of the printer, code indicating the status of the printer at the time the information is provided, flag indicating whether a network or local printer is used, name of the print queue manager (PrintProcessor), flag indicating whether buffering and queuing is supported, name of the print server to which the network printer is connected, flag indicating whether the printer is available as a shared resource, and name of the shared printero Information about video controllers: information about the status of the device, flag indicating that the device is using a user-specified configuration, values of the current device settings and operation mode, date and time of the last modification of the device driver, version of the video driver, path to the video adapter's INF file and section of the INF file with information for the video adapter, name of the video device's installed driver, architecture code, and code indicating the type of the video device's memory, description of the video processoro Information about video monitors: unique monitor identifier and status of the device at the time the information is providedo Information about audio cards: unique ID of the device, status and state at the time the information is providedo Information about logical disks: description, name of the first class in the inheritance chain, unique identifier, type of logical disk, type of file system partition, amount of free disk space, code indicating the type of disk, name of logical disk, size of logical disk, header of the volume on the logical disk, serial number of the logical disko Information about network adapters: information about the name of the adapter, accessibility code and status; identifier indicating the type of network used, identifier for installation of the adapter in the system, MAC address of the adapter, name of the adapter manufacturer, name of the network connection shown to the user, code indicating the state of the network adapter's connection to the network, estimate of the current capacity (bps), status of the adapter at the time the information is provided, date and time when the adapter was last restarted, IP address of the default gateway, flag indicating whether DHCP is used, expiration date and time of the IP address issued by the DHCP server, date and time of receipt of the IP address from DHCP, IP address of the DHCP server, DNS name of the domain that the host belongs to, list of DNS name suffixes added to the end of the host name in the process of resolving the domain name, flag indicating that WINS is used, DNS name of the host, list of IP addresses used for DNS queries, identifier for registration of the IP address for a domain, list of IP addresses associated with the adapter, IP Connection Metric, flag indicating that TCP/IP is used, values of settings and device state parameters• Computer name• Name of the domain or work group that the computer belongs to, code indicating the computer's role in the domain or work group• Information about the computer manufacturer, name of the computer according to the manufacturer's version, contact information for the computer's technical support• Name of the current user, domain or computer description• Information about environment variables• Information about Warning or Error system events in the last three 24-hour periods at the time the information is provided:o Event subcategory and textual description of the subcategoryo Value of the last 16 bits of the event propertyo Event identifiero Name of WinNT event logo Message shown in the event log, and event identifiero Name of source that the event pertains too Event creation time and time at which the event was recorded in the logo Name of the user in the system at the time the event occurred• Information about user accounts:o Account descriptiono Date and time at which the account was createdo Flag indicating whether the account is localo User security identifiero Current object state• Information about installed products that is necessary for the Right Owner to identify its products installed on the user's computer:o Product nameo Name of product vendoro Product versiono Product locale• Information about registry keys containing group policy settings. Information about Microsoft Windows Explorer plugins installed with the Right Owner's products.

Registry keys:o HKEY LOCAL MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. o HKEY CURRENT USER, SOFTWARE\Microsoft\Windows\CurrentVersion\Run.

o HKEY CURRENT USER\Software\Microsoft\Windows\CurrentVersion\ LOCAL MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. o HKEY LOCAL MACHINE\ SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce.

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce.

o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. o HKEY USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\RunOnce.

o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. o HKEY USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\RunOnce. o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.

o HKEY USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\RunOnce.

Report | the met - met police

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Command Processor.

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Learn more about the Statutory Credit Report, including the main differences between the You can choose to view your report online or receive it by post..

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. o HKEY USERS\DEFAULT\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop.

o HKEY USERS\S-1-5-18\SOFTWARE\Classes\exefile\shell\open\command. o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Command Processor.

o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows. o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

o HKEY USERS\S-1-5-18\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop. o HKEY USERS\S-1-5-19\SOFTWARE\Classes\exefile\shell\open\command.

o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Command Processor. o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows.

o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. o HKEY USERS\S-1-5-19\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop.

o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Classes\exefile\shell\open\command. o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Microsoft\Command Processor.

o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Microsoft\Windows . o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. o HKEY USERS\S-1-5-19 Classes\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop.

o HKEY USERS\S-1-5-20\SOFTWARE\Classes\exefile\shell\open\command. o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Command Processor.

o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows. o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

o HKEY USERS\S-1-5-20\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop. o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Classes\exefile\shell\open\command.

o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Microsoft\Command Processor. o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Microsoft\Windows .

o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.

o HKEY USERS\S-1-5-20 Classes\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop. o HKEY LOCAL MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad.

o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Active Setup\Installed Components. o HKEY USERS\DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Extensions.

o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Active Setup\Installed Components. o HKEY USERS\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Extensions.

o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Active Setup\Installed Components. o HKEY USERS\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\Extensions.

o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Active Setup\Installed Components. o HKEY USERS\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\Extensions.

o HKEY LOCAL MACHINE, SOFTWARE\Microsoft\Internet Explorer\Main, Start Page. • Information about public folders:o Local path to foldero Descriptiono Current status of folder accesso Information about open portso Protocol identifier (TCP or UDP)o ID of the process using the port to establish a connectiono IP address and numbers of open ports of the participants in an established connectiono Connection stateo Value of %TEMP% variableso Full path to the folder without using environment variables• Information about executable files in the folder:o File name.

o File versiono File size on disko Size of compressed file on disk, if the file is compressedo File creation dateo File accessed dateo Name of the product that the file pertains too File descriptiono File hash (MD5)• Value of the registry key:HKEY LOCAL MACHINE\System\CurrentControlSet\Control• Value of the registry key:HKEY LOCAL MACHINE\System\CurrentControlSet\Services• Value of the registry key:HKEY LOCAL MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ • Value of the registry key:HKEY LOCAL MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ • Value of the registry key:HKEY CLASSES ROOT\Installer\Products\ • Value of the registry key:HKEY LOCAL MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\• Reports from the Right Owner’s Klnagchk utility (if detected on the system)• Report files for updates of the Right Owner's products• Detected dump files for the Right Owner's products from the “\Tiny Dumps” directory• Detected report files from the Right Owner's KAVRemover utility• Information about settings for Internet Explorer, Mozilla and Chrome at the time the information is provided• Event logs:o SQL servero AVZ utility• Information about modules (exe, dll) loaded into memory: path to the process file; process PID in the address space that the module is loaded in• Information about the module's developer; module description; MD5; size in bytes; date of creation and modification of the module file, attributes• Information about Windows Explorer extension modules: path to the module file; module CLSID; module description; information about the module's developer• Information about printing system extensions: name; type; description; information about the developer; redirector• Information about Windows scheduled tasks: task name; path to executable file that will be started as part of the task; x86 or x64, description, and information about the vendor of the executable file being started as part of the task• Information about the Local Service Provider (LSP/SPI)• Information about the state of ports on the user's computer: port number, state (ESTABLISHED, LISTENING, TIME WAIT); Application running on the indicated port, its description, x86 or x64, information about the application vendor• List of files from the Downloaded Program Files directory• List of Control Panel applets installed on the user's computer• Information about processes started on the user’s computer: path to the installer; whether the installer is x86 or x64; information about the developer, CLSID of the installer• Information about changes made to the HOST file on the user's computer• Information about modules registered as protocol handlers (AP GZIP Encoding/Decoding Filter, ftp: Asynchronous Pluggable Protocol Handler or http: Asynchronous Pluggable Protocol Handler)• Information about shared resources on the user's computer• %WinDir%\inf\setupapi*. log• Information about the Right Owner's products installed on the computer:o Information about dumps and logs on the user's system in the %WinDir% and %WinDir%\Minidump directories• Information about software on the user’s computer that is incompatible with the Right Owner's products:o Information about system drivers that is incompatible with the Right Owner's productso Information about third-party drivers that are incompatible with the Right Owner's productso Information about third-party applications currently running that are incompatible with the Right Owner's producto Information about services currently running that are incompatible with the Right Owner's product• The application diagnoses the Internet connection using Microsoft Windows built-in tools:o Tracing the route of packets in an IP network up to Kaspersky Lab’s public update servers (tracert " ") and Kaspersky Lab’s public activation servers (tracert " ")o Information about all TCP/IP network settings (ipconfig /all)2. If You decide not to provide the information necessary for the Rightholder to perform its obligations under this License Agreement as indicated in the Section “Conditions regarding data processing,” You do not agree to the conditions of this License Agreement.

In this case, please discontinue installation and/or remove the Software. When You provide Your data through the Software to the Rightholder, the Rightholder handles it according to its Privacy Policy, which describes, in particular, the manner by which the Rightholder protects Your data, where the Rightholder processes Your data, and your rights as the data subject. You can find and read its complete content at /Products-and-Services-Privacy-Policy.

The Software and any accompanying documentation are copyrighted and protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties.