
"value" : "%ProgramFiles(X86)%\\Adobe\\Acrobat Reader DC\\Reader\\Update\\Setup.dll" , Title : Wireless Network Setup Settings Changed Legitimate use of the Wireless Network Setup Wizard Amazon SSM Document Worker # fp example: powershell " ::OutputEncoding = ::UTF8 $keyExists = Test-Path "Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\OC Manager\Subcomponents" $jsonObj = if ($keyExists) Proc_creation_win_powershell_cmdline_special_characters.yml SourceImage\|endswith : \Installer\setup.exe Proc_access_win_cred_dump_lsass_access.yml ' C:\Windows\system32\config\cy-GB\Setup\SKB\InputMethod\TupTask.dat' Rollout of log collection agents (the setup routine often includes a reset of the local Eventlog)įile_event_win_cve_2021_31979_cve_2021_33771_exploits.yml Admins may setup new or modify old spans, or use a monitor for troubleshooting

SourceĪn attacker with the iam:UpdateLoginProfile permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.ĭescription : Show when a monitor or a span/rspan is setup or modified While setup.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes. The following table contains possible examples of setup.exe being misused.

Could not write "SetupMetrics" persistent histograms to file as the storage directory does not exist. 68 at system - level conflicts with this one at user - level.
