In the context of a generalized .NET component that can be placed in various scenarios, that is, 64-bit or not, an interactive process or not, I need to write to the registry in the field, UAC Virtualization. However, I want this access not to be virtualized, so that every execution is not subject to the vagaries of the current context (i.e. I would not want one reading from HKLM to have a manifest, and the other from HKCU..VirtualStore, because it is not) .
In other words, I'm looking for something similar to KEY_WOW64_64KEY or reg.exe REG_KEY_DONT_VIRTUALIZE to indicate that I do not want to virtualize under any circumstances. Or is there some form of canonicalization-related syntax that I can use to make it a la the way you specify a file name> 260 char?
I am fine with a code error if the executable user does not have the appropriate permissions in the corresponding registry key.
This question is strongly related to [this question about registry virtualization discovery] ( Registry virtualization discovery ), but the definition is definitely not enough in this context.
source share