Question Analysis

On a Windows host, registry events reveal that PowerShell modified a value under the WDigest provider. Identify the exact command line that performed this registry change.

68254a85-aa42-4312-a695-38b7276307f8
Question ID
17/23
Models Correct
2
Valid Answers
74%
Success Rate
Reference Answers

Human-validated correct answers for this question

Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction IgnoreSet-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore
Model Performance Comparison

See how different AI models performed on this question

ModelAnswerKQL QueryStatusAttemptsTimeCost
gemini-2.5-flash-preview-04-17
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where ActionType == "RegistryValueSet" | where RegistryKey contains "WDigest" | where InitiatingProcessFileName =~ "powershell.exe" | project Timestamp, DeviceName, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData
Correct
1
13.61s
0.0056
gpt-35-turbo
Set-ItemProperty
DeviceRegistryEvents | where RegistryKey contains 'WDigest' | project InitiatingProcessCommandLine
Incorrect
1
2.25s
0.0025
gpt-4-turbo-2024-04-09
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where ActionType == 'RegistryValueSet' | where RegistryKey contains 'WDigest' | where InitiatingProcessFileName contains 'powershell' | project TimeGenerated, DeviceName, InitiatingProcessAccountName, InitiatingProcessCommandLine
Correct
2
17.04s
0.1016
gpt-4.1
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction Ignore}
DeviceRegistryEvents | where ActionType contains "Set" or ActionType contains "Modif" | where RegistryKey has_any ("WDigest", "wdigest", "securityproviders\\wdigest", "SecurityProviders\\WDigest") | where InitiatingProcessFileName in~ ("powershell.exe", "pwsh.exe") | project TimeGenerated, DeviceName, DeviceId, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessAccountDomain
Correct
2
32.87s
0.0234
gpt-4.1-finetuned
No answer provided
No query generated
Incorrect
5
0.00s
0.0557
gpt-4.1-mini
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where RegistryKey contains "WDigest" | where InitiatingProcessFileName has "powershell" or InitiatingProcessFileName has "pwsh" | project DeviceName, TimeGenerated, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine | order by TimeGenerated desc
Correct
1
6.64s
0.0024
gpt-4.1-nano
No answer provided
No query generated
Incorrect
5
0.00s
0.0016
gpt-4o
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where RegistryKey contains "WDigest" and InitiatingProcessFileName has "powershell.exe" | project TimeGenerated, DeviceName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessCommandLine
Correct
2
21.70s
0.0283
gpt-5-high
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction Ignore}
DeviceRegistryEvents | where ActionType == "RegistryValueSet" | where RegistryKey has "SecurityProviders" and RegistryKey has "WDigest" // | where RegistryValueName =~ "UseLogonCredential" // optional: focus on the typical WDigest abuse | where InitiatingProcessFileName in~ ("powershell.exe","pwsh.exe") or InitiatingProcessParentFileName in~ ("powershell.exe","pwsh.exe") | project TimeGenerated, DeviceName, RegistryKey, RegistryValueName, PreviousRegistryValueData, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessId, InitiatingProcessCreationTime, InitiatingProcessParentFileName, InitiatingProcessParentId, InitiatingProcessAccountDomain, InitiatingProcessAccountName | order by TimeGenerated desc
Correct
1
114.55s
0.0550
gpt-5-mini-high
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where Timestamp >= ago(30d) | where tolower(RegistryKey) contains "wdigest" or tolower(RegistryValueName) contains "wdigest" or tolower(RegistryValueData) contains "wdigest" | where ActionType in ("SetValue", "Create", "Modify", "Set") or RegistryValueName has_any ("UseLogonCredential", "wdigest") | where tolower(InitiatingProcessFileName) contains "powershell" or tolower(InitiatingProcessCommandLine) contains "powershell" | project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessId, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData, ActionType | order by Timestamp desc
Correct
1
16.36s
0.0041
gpt-5-mini-low
No answer provided
No query generated
Incorrect
5
0.00s
0.0186
gpt-5-mini-medium
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where tolower(tostring(RegistryKey)) contains "wdigest" // look for PowerShell as the initiating process or parent process | where ( tolower(tostring(InitiatingProcessFileName)) contains "powershell" or tolower(tostring(InitiatingProcessCommandLine)) contains "powershell" or tolower(tostring(InitiatingProcessParentFileName)) contains "powershell" ) | project TimeGenerated, DeviceName, ActionType, RegistryKey, RegistryValueName, RegistryValueData, PreviousRegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessId, InitiatingProcessParentFileName, InitiatingProcessAccountName, InitiatingProcessAccountDomain | order by TimeGenerated desc | take 50
Correct
2
35.52s
0.0098
gpt-5-nano-high
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where isnotempty(RegistryKey) | where tolower(RegistryKey) contains "wdigest" | where tolower(RegistryValueName) contains "uselogoncredential" | where tolower(InitiatingProcessFileName) contains "powershell" | project TimeGenerated, DeviceName, DeviceId, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCreationTime | sort by TimeGenerated desc | take 100
Correct
1
40.85s
0.0026
gpt-5-nano-medium
No answer provided
No query generated
Incorrect
5
0.00s
0.0073
grok-3-beta
powershell.exe & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where RegistryKey contains "WDigest" | where InitiatingProcessFileName in ("powershell.exe", "pwsh.exe") | project Timestamp, DeviceName, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData
Correct
1
8.88s
0.0229
grok-3-mini-beta
The exact command lines are: "powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore} and "powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction Ignore}
DeviceRegistryEvents | where RegistryKey has 'WDigest' | where InitiatingProcessFileName has 'powershell.exe' | project Timestamp, DeviceName, RegistryKey, RegistryValueName, InitiatingProcessCommandLine | order by Timestamp desc
Correct
1
14.44s
0.0017
o1-high
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where ActionType in ("RegistryValueSet", "RegistryValueModified") | where RegistryKey has "WDigest" | where InitiatingProcessFileName =~ "powershell.exe" | project TimeGenerated, DeviceName, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData | order by TimeGenerated desc
Correct
1
53.75s
0.4048
o1-low
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction Ignore} and "powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where tolower(RegistryKey) contains "wdigest" | where tolower(InitiatingProcessFileName) contains "powershell" | where ActionType in~ ("ModifiedValue", "SetValue", "RegistryValueSet", "RegistryValueModified") | project TimeGenerated, DeviceName, ActionType, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessCommandLine | order by TimeGenerated asc
Correct
2
64.45s
0.4811
o3-high
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction Ignore}
// 1. Identify registry events that change a value (RegistryValueSet) // 2. Focus on the WDigest provider key under the SecurityProviders hive // 3. Keep only modifications performed by PowerShell (powershell.exe or pwsh.exe) // 4. Surface the full command line that carried out the change DeviceRegistryEvents | where ActionType == "RegistryValueSet" // value alterations only | where RegistryKey has "SecurityProviders" and RegistryKey has "WDigest" // WDigest provider key | where tolower(InitiatingProcessFileName) in ("powershell.exe", "pwsh.exe") // -- Output investigation details | project TimeGenerated, DeviceName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessAccountDomain, InitiatingProcessAccountName, InitiatingProcessCommandLine, InitiatingProcessId, InitiatingProcessSHA256 | order by TimeGenerated desc
Correct
1
41.83s
0.0260
o3-mini-high
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where RegistryKey contains "WDigest" | where InitiatingProcessFileName =~ "powershell.exe" | project TimeGenerated, DeviceName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessCommandLine | sort by TimeGenerated desc
Correct
1
29.23s
0.0137
o3-mini-low
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where RegistryKey contains "WDigest" | where InitiatingProcessFileName contains "powershell" | project TimeGenerated, DeviceName, RegistryKey, RegistryValueName, RegistryValueData, CommandLine=InitiatingProcessCommandLine | order by TimeGenerated desc
Correct
1
19.98s
0.0151
o4-mini-high
No answer provided
No query generated
Incorrect
5
0.00s
0.0504
o4-mini-low
"powershell.exe" & {Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore}
DeviceRegistryEvents | where ActionType == "RegistryValueSet" | where RegistryKey contains "WDigest" | where tolower(InitiatingProcessFileName) == "powershell.exe" | project TimeGenerated, DeviceName, InitiatingProcessAccountDomain, InitiatingProcessAccountName, InitiatingProcessFileName, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData | sort by TimeGenerated desc
Correct
2
48.93s
0.0131