Just for giggles I tried to set permissions to those keys so System would not be able make changes to the key - no luck. Even with explicit write deny permissions for "System", ekrn.exe (which invokes the System) is still changing the key. Windows must have a global override.
So for now I just modified the permissions so I can still change the keys quickly myself with an exported registry file. Since Windows reads these values only once upon login, I need to execute the reg file before I log off. It's a pain, but much faster than manually modifying the keys all the time. One of these days I'll set up a script or batch file that runs this automatically upon logoff.
I also verified with a plain Windows 10 machine without ESET that both registry keys are set to %SystemRoot%\system32\windows.storage.dll
Here is the reg file contents:
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,77,00,69,00,\
6e,00,64,00,6f,00,77,00,73,00,2e,00,73,00,74,00,6f,00,72,00,61,00,67,00,65,\
00,2e,00,64,00,6c,00,6c,00,00,00
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,\
00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,77,00,69,00,\
6e,00,64,00,6f,00,77,00,73,00,2e,00,73,00,74,00,6f,00,72,00,61,00,67,00,65,\
00,2e,00,64,00,6c,00,6c,00,00,00