VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Setup/Setup.c
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2015-10-27 15:23:22 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2015-10-27 20:47:56 +0100
commitebbbde89647ae0a7cce430ef880822805ebc2e12 (patch)
treed3f4e77715505f02b17e63cc85f82df1819b7d1c /src/Setup/Setup.c
parent62de77e2c869acc0f9e1f82b4347c86faaf9ac47 (diff)
downloadVeraCrypt-ebbbde89647ae0a7cce430ef880822805ebc2e12.tar.gz
VeraCrypt-ebbbde89647ae0a7cce430ef880822805ebc2e12.zip
Windows: workaround to solve false positive detection by some anti-virus software.
Diffstat (limited to 'src/Setup/Setup.c')
-rw-r--r--src/Setup/Setup.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/src/Setup/Setup.c b/src/Setup/Setup.c
index 7c3caa1c..1b2042b0 100644
--- a/src/Setup/Setup.c
+++ b/src/Setup/Setup.c
@@ -495,7 +495,9 @@ BOOL IsSystemRestoreEnabled ()
BOOL bEnabled = FALSE;
HKEY hKey;
DWORD dwValue = 0, cbValue = sizeof (DWORD);
- if (RegOpenKeyEx (HKEY_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SystemRestore", 0, KEY_READ | KEY_WOW64_64KEY, &hKey) == ERROR_SUCCESS)
+ char szRegPath[MAX_PATH];
+ GetRestorePointRegKeyName (szRegPath, sizeof (szRegPath));
+ if (RegOpenKeyEx (HKEY_LOCAL_MACHINE, szRegPath, 0, KEY_READ | KEY_WOW64_64KEY, &hKey) == ERROR_SUCCESS)
{
if (IsOSAtLeast (WIN_VISTA))
{