As a threat hunter it is critical to get oriented quickly. When you have a device that has suspect activity on it and the threat hunter is still exploring what is happening they want a lot of different information about the device. This information is everything from what OS is it to have common live off the land tools been being run and does the device and who is on the device right now. With Live discover it is easy for the admin to run a query to get each of those bits of information but to speed things up I wanted to all of that and more in a single query. The query below will use UNION ALL to create a list of useful information about the device.
-- Cards orient the results in three columns
-- ATRIBUTE - The thing being checked
-- VALUE - The result of the evaluation
-- CONTEXT - Some useful information related to the Attribute
-- CONTEXT_DATA - The inoformation for the context information being shown
-- NOTES - Some additional relevant information on the Attribute/Value
-- COLLECT A LIST OF SUSPECT PUA AND SUSPECT MAL software seen running on the device in the last 7 days
WITH List_of_suspects AS ( SELECT *
FROM Sophos_File_Properties
WHERE sophos_File_properties.pathname IN (SELECT DISTINCT pathname FROM sophos_process_journal spj WHERE spj.time > strftime('%s','now','-7 days') GROUP BY sha256 )
ORDER BY puascore DESC, mlscore DESC LIMIT 5
)
-- BLANK LINE BETWEEN EACH DEVICE
SELECT CAST('=========================' AS TEXT) ATTRIBUTE, CAST('=========================' AS TEXT) VALUE, CAST('=========================' AS TEXT) CONTEXT, CAST('=========================' AS TEXT) CONTEXT_DATA, CAST('=========================' AS TEXT) NOTES
UNION ALL
-- Operating System information
SELECT 'OPERATING SYSTEM' ATTRIBUTE, name VALUE, 'VERSION' CONTEXT, version CONTEXT_DATA, 'INSTALLED ON: ' || substr(install_date,1,4) || ' ' || substr(install_date,5,2) || ' ' || substr(install_date,7,2) || ' ' || substr(install_date,9,2) || ':' || substr(install_date,11,2) NOTES
FROM os_version
UNION ALL
-- Current IP/MAC and DHCP Server for the device
SELECT 'IP-ADDRESS' ATTRIBUTE, CAST(ia.address AS TEXT) VALUE, 'MAC ADDRESS' CONTEXT, id.mac CONTEXT_DATA, 'DHCP SERVER: ' || id.dhcp_server NOTES
FROM interface_addresses ia JOIN interface_details id ON id.interface = ia.interface
WHERE ia.address NOT IN ('::1','127.0.0.1') AND id.enabled <> 0
-- UNION ALL
-- ISOLATED/HEALTH STATUS
-- SOME SQL CODE
UNION ALL
-- DISK INFO
-- TO DO - Add bitlocker enabled info for each drive
SELECT 'HARD DISK' ATTRIBUTE, device_id VALUE, 'SIZE ' CONTEXT, printf("%.2f", CAST(size AS FLOAT)/1024.0/1024.0/1024.0) || '(GB)' CONTEXT_DATA, printf("%.2f", (CAST (free_space AS FLOAT)/CAST(size AS FLOAT) ) * 100.0 ) || '% Free' NOTES
FROM logical_drives WHERE size > 0
UNION ALL
-- CPU AND MEMORY INFO
SELECT 'CPU/MEMORY ' ATTRIBUTE, cpu_brand VALUE, 'MEMORY' CONTEXT, printf("%.2f", CAST(physical_memory AS FLOAT)/1024.0/1024.0/1024.0) || '(GB)' CONTEXT_DATA, 'VENDOR: ' || hardware_vendor || ' MODEL: ' || hardware_model NOTES
FROM system_info
UNION ALL
-- UP TIME
SELECT 'UP TIME' ATTRIBUTE, days || ' days, ' || hours || ' hours ' || minutes || ' minutes' VALUE, 'BOOT MODE' CONTEXT,
(
SELECT CASE JSON_EXTRACT(data, '$.EventData.BootMode') WHEN '0' THEN 'Normal_Boot' WHEN '1' THEN 'Safe-Mode' ELSE 'Unknown Mode: ' || JSON_EXTRACT(data, '$.EventData.BootMode') END AS 'Boot Mode'
FROM sophos_windows_events WHERE (eventid = 12 AND task = 1) AND time > STRFTIME('%s','NOW','-90 DAYS') ORDER by 1 DESC LIMIT 1
) CONTEXT_VALUE, '' NOTES
FROM uptime
UNION ALL
-- CURRENT USERS with active processes
SELECT 'PROCESS COUNT BY USER' ATTRIBUTE, u.username VALUE, 'ACTIVE PROCESS COUNT' CONTEXT, count(p.uid) CONTEXT_DATA, 'USER TYPE: ' || u.type || ' UID: ' || u.uid || ' GID: ' || u.gid NOTES
FROM users u JOIN processes p ON p.uid = u.uid GROUP BY p.uid
UNION ALL
-- RDP STATUS
SELECT DISTINCT 'CHECK IF RDP IS LISTENING' ATTRIBUTE, 'Listening for connection' VALUE, '' CONTEXT, '' CONTEXT_DATA, '' NOTES
FROM listening_ports lp
WHERE lp.port = 3389
UNION ALL
-- SUSPECT PUA
-- TO DO: Add indicator if that process is currently running
SELECT 'SUSPECT PUA' ATTRIBUTE, pathname VALUE, 'PUA SCORE' CONTEXT, puascore CONTEXT_DATA, 'SHA256: ' || sha256 NOTES
FROM List_of_suspects los
WHERE puascore > 30
UNION ALL
-- SUSPECT MAL
-- TO DO: Add indicator if that process is currently running
SELECT 'SUSPECT MAL' ATTRIBUTE, pathname VALUE, 'MAL SCORE' CONTEXT, mlscore CONTEXT_DATA, 'SHA256: ' || sha256 NOTES
FROM List_of_suspects los
WHERE mlscore > 30
UNION ALL
-- NEW Executables installed by the USERS in last 7 days
-- WARNING: PROCESSES CREATED BY THE USER 'SYSTEM' ARE EXCLUDED
SELECT 'NEW USER INSTALLED EXECUTABLE (last 7 days)' ATTRIBUTE, sfj.pathname VALUE, 'CREATING PROCESS NAME' CONTEXT, spj.processName CONTEXT_DATA,
'CREATED BY: ' || u.username || ' CREATED ON: ' || datetime(sfj.creationTime,'unixepoch') || ' CREATING PROCESS SPID: ' || sfj.sophosPID NOTES
FROM sophos_file_journal sfj
JOIN sophos_process_journal spj ON spj.sophosPID = sfj.sophosPID
JOIN users u ON u.uuid = spj.sid
WHERE sfj.subject = 'FileBinaryChanges' AND sfj.time > strftime('%s','now','-7 days') AND sfj.eventType IN (0,1,3)
AND u.username <> 'SYSTEM'
AND sfj.pathname LIKE '%.exe'
UNION ALL
-- COMMON LOL TOOL USAGE
SELECT 'LIVE OFF LAND TOOL USE (Last 7 days)' ATTRIBUTE, spj.processname VALUE, 'RUN BY USER' CONTEXT, u.username CONTEXT_DATA, 'COMMAND LINE: ' || spj.cmdline || ' SOPHOS PID: ' || spj.sophosPID NOTES
FROM sophos_process_journal spj
JOIN users u ON u.uuid = spj.sid
WHERE spj.eventtype = 0 AND spj.time > strftime('%s','now','-7 days')
AND spj.processname IN ('arp.exe', 'hostname.exe', 'ntdutil.exe', 'schtasks.exe', 'at.exe', 'ipconfig.exe', 'pathping.exe', 'systeminfo.exe', 'bitsadmin.exe', 'nbtstat.exe', 'ping.exe', 'tasklist.exe',
'certutil.exe', 'net.exe', 'powershell.exe', 'tracert.exe', 'cmd.exe', 'net1.exe', 'qprocess.exe', 'ver.exe', 'dsget.exe', 'netdom.exe', 'query.exe', 'vssadmin.exe', 'dsquery.exe', 'netsh.exe', 'qwinsta.exe', 'wevtutil.exe',
'find.exe', 'netstat.exe', 'reg.exe', 'whoami.exe', 'findstr.exe', 'nltest.exe', 'rundll32.exe', 'wmic.exe', 'fsutil.exe', 'nslookup.exe', 'sc.exe', 'wusa.exe'
)
AND u.username NOT IN('SYSTEM', 'LOCAL SERVICE', '')
UNION ALL
-- ENCODED CMDLINES(last 7 days)
SELECT 'ENCOUDED COMMAND LINES (Last 7 days)' ATTRIBUTE, spj.cmdline VALUE, 'PROCESS NAME' CONTEXT, spj.processname CONTEXT_VALUE, 'SOPHOS PID: ' || spj.sophospid || ' USER: ' || u.username NOTES
FROM sophos_process_journal spj JOIN
users u ON u.uuid = spj.sid
WHERE spj.eventtype = 0 AND spj.time > strftime('%s','now','-7 days')
AND spj.cmdline LIKE 'encode'
AND u.username NOT IN ('SYSTEM', 'LOCAL SERVICE', '')
UNION ALL
-- SCHEDULED TASKS SETUP IN LAST 7 DAYS
SELECT 'NEW SCHEDULED TASKS (last 7 days)' ATTRIBUTE, spj.cmdline VALUE, 'CREATED BY USER' CONTEXT, u.username CONTEXT_DATA, 'DATE_TIME: ' || datetime(time, 'unixepoch') || ' SOPHOS PID: ' || spj.sophospid NOTES
FROM sophos_process_journal spj
JOIN users u ON u.uuid = spj.sid
WHERE spj.time > strftime('%s','now', '-7 days') AND spj.eventtype = 0 AND
spj.processname = 'schtasks.exe' AND spj.cmdline LIKE '%create%'
SAMPLE OUTPUT
|
epName
|
ATTRIBUTE
|
VALUE
|
CONTEXT
|
CONTEXT_DATA
|
NOTES
|
|
=========================
|
=========================
|
=========================
|
=========================
|
=========================
|
|
|
OPERATING SYSTEM
|
Microsoft Windows 7 Ultimate
|
VERSION
|
6.1.7601
|
INSTALLED ON: 2016 09 12 15:40
|
|
|
IP-ADDRESS
|
192.168.100.143
|
MAC ADDRESS
|
00:50:56:2a:3a:13
|
DHCP SERVER: 192.168.100.254
|
|
|
IP-ADDRESS
|
fe80::100:7f:fffe
|
MAC ADDRESS
|
00:00:00:00:00:00:00:e0
|
DHCP SERVER:
|
|
|
HARD DISK
|
C:
|
SIZE
|
60.00(GB)
|
61.33% Free
|
|
|
CPU/MEMORY
|
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
|
MEMORY
|
3.00(GB)
|
VENDOR: VMware, Inc. MODEL: VMware Virtual Platform
|
|
|
UP TIME
|
3 days, 13 hours 18 minutes
|
BOOT MODE
|
|||
|
PROCESS COUNT BY USER
|
SYSTEM
|
ACTIVE PROCESS COUNT
|
39
|
USER TYPE: special UID: 18 GID: 18
|
|
|
PROCESS COUNT BY USER
|
LOCAL SERVICE
|
ACTIVE PROCESS COUNT
|
15
|
USER TYPE: special UID: 19 GID: 19
|
|
|
PROCESS COUNT BY USER
|
NETWORK SERVICE
|
ACTIVE PROCESS COUNT
|
5
|
USER TYPE: special UID: 20 GID: 20
|
|
|
SUSPECT PUA
|
C:\Windows\System32\dllhost.exe
|
PUA SCORE
|
41
|
SHA256: f7ad4b09afb301ce46df695b22114331a57d52e6d4163ff74787bf68ccf44c78
|
|
|
SUSPECT PUA
|
C:\Program Files\Windows Media Player\wmpnetwk.exe
|
PUA SCORE
|
38
|
SHA256: 6c67dcb007c3cdf2eb0bbf5fd89c32cd7800c20f7166872f8c387be262c5cd21
|
|
|
SUSPECT PUA
|
C:\Windows\System32\autochk.exe
|
PUA SCORE
|
38
|
SHA256: 2e035366e9a1a26fb15f1e4857056e6ad7932bce8cc68bb4b655609f424d2756
|
|
|
SUSPECT PUA
|
C:\Windows\System32\csrss.exe
|
PUA SCORE
|
38
|
SHA256: f9112b88fec5ef10a7aedf88dcee61956d1fcde7cb42197216e8265578713786
|
|
|
SUSPECT PUA
|
C:\Windows\System32\conhost.exe
|
PUA SCORE
|
37
|
SHA256: 248d1591b39e6fbbf8ed081f9c0ffe99e76f2df180eb7371dcf531d9a58e4546
|
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 1484:132482013107543154
|
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 5572:132482013534837594
|
|
|
=========================
|
=========================
|
=========================
|
=========================
|
=========================
|
|
|
OPERATING SYSTEM
|
Microsoft Windows 7 Ultimate
|
VERSION
|
6.1.7601
|
INSTALLED ON: 2016 09 12 15:40
|
|
|
IP-ADDRESS
|
192.168.100.183
|
MAC ADDRESS
|
00:50:56:25:94:3c
|
DHCP SERVER: 192.168.100.254
|
|
|
IP-ADDRESS
|
fe80::100:7f:fffe
|
MAC ADDRESS
|
00:00:00:00:00:00:00:e0
|
DHCP SERVER:
|
|
|
HARD DISK
|
C:
|
SIZE
|
60.00(GB)
|
60.67% Free
|
|
|
CPU/MEMORY
|
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
|
MEMORY
|
3.00(GB)
|
VENDOR: VMware, Inc. MODEL: VMware Virtual Platform
|
|
|
UP TIME
|
3 days, 13 hours 18 minutes
|
BOOT MODE
|
|||
|
PROCESS COUNT BY USER
|
SYSTEM
|
ACTIVE PROCESS COUNT
|
38
|
USER TYPE: special UID: 18 GID: 18
|
|
|
PROCESS COUNT BY USER
|
LOCAL SERVICE
|
ACTIVE PROCESS COUNT
|
15
|
USER TYPE: special UID: 19 GID: 19
|
|
|
PROCESS COUNT BY USER
|
NETWORK SERVICE
|
ACTIVE PROCESS COUNT
|
6
|
USER TYPE: special UID: 20 GID: 20
|
|
|
PROCESS COUNT BY USER
|
test
|
ACTIVE PROCESS COUNT
|
10
|
USER TYPE: local UID: 1002 GID: 513
|
|
|
SUSPECT PUA
|
C:\Windows\System32\dllhost.exe
|
PUA SCORE
|
41
|
SHA256: f7ad4b09afb301ce46df695b22114331a57d52e6d4163ff74787bf68ccf44c78
|
|
|
SUSPECT PUA
|
C:\Program Files\Windows Media Player\wmpnetwk.exe
|
PUA SCORE
|
38
|
SHA256: 6c67dcb007c3cdf2eb0bbf5fd89c32cd7800c20f7166872f8c387be262c5cd21
|
|
|
SUSPECT PUA
|
C:\Windows\System32\autochk.exe
|
PUA SCORE
|
38
|
SHA256: 2e035366e9a1a26fb15f1e4857056e6ad7932bce8cc68bb4b655609f424d2756
|
|
|
SUSPECT PUA
|
C:\Windows\System32\csrss.exe
|
PUA SCORE
|
38
|
SHA256: f9112b88fec5ef10a7aedf88dcee61956d1fcde7cb42197216e8265578713786
|
|
|
SUSPECT PUA
|
C:\Windows\System32\conhost.exe
|
PUA SCORE
|
37
|
SHA256: 248d1591b39e6fbbf8ed081f9c0ffe99e76f2df180eb7371dcf531d9a58e4546
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\SophosSetup.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:25 CREATING PROCESS SPID: 6428:132485084615493431
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\test\AppData\Local\Temp\sfl-86709b40\Setup.exe
|
CREATING PROCESS NAME
|
SophosSetup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:38 CREATING PROCESS SPID: 6528:132485085981990104
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Program Files\Sophos\CloudInstaller\extract_cache\SophosSetup_Stage2.exe
|
CREATING PROCESS NAME
|
Setup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:55 CREATING PROCESS SPID: 7236:132485085984642109
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\SophosSetup.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:25 CREATING PROCESS SPID: 6428:132485084615493431
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\test\AppData\Local\Temp\sfl-86709b40\Setup.exe
|
CREATING PROCESS NAME
|
SophosSetup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:38 CREATING PROCESS SPID: 6528:132485085981990104
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Program Files\Sophos\CloudInstaller\extract_cache\SophosSetup_Stage2.exe
|
CREATING PROCESS NAME
|
Setup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:55 CREATING PROCESS SPID: 7236:132485085984642109
|
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 5276:132482013226331772
|
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt yr1WC98xYUeiFhBC.1 Census SOPHOS PID: 4360:132482840457734512
|
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt OUqtUY43BU2WrqCJ.1 Census SOPHOS PID: 6040:132485858646823219
|
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt iW71dRP6jEWqAl8a.1 Census SOPHOS PID: 6776:132486737379512842
|
|
|
=========================
|
=========================
|
=========================
|
=========================
|
=========================
|
|
|
OPERATING SYSTEM
|
Microsoft Windows 10 Pro
|
VERSION
|
10.0.19041
|
INSTALLED ON: 2020 06 10 10:25
|
|
|
IP-ADDRESS
|
fe80::3837:20c:2ac5:235
|
MAC ADDRESS
|
6e:ea:1d:c1:aa:55
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
169.254.2.53
|
MAC ADDRESS
|
6e:ea:1d:c1:aa:55
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
fe80::3046:a74:92c1:4245
|
MAC ADDRESS
|
00:50:56:c0:00:0a
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
172.16.16.1
|
MAC ADDRESS
|
00:50:56:c0:00:0a
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
fe80::cff:dcd7:bb9e:34ed
|
MAC ADDRESS
|
00:50:56:c0:00:08
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
192.168.100.1
|
MAC ADDRESS
|
00:50:56:c0:00:08
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
fe80::f101:efed:1c0:a21e
|
MAC ADDRESS
|
00:50:56:c0:00:10
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
10.50.50.1
|
MAC ADDRESS
|
00:50:56:c0:00:10
|
DHCP SERVER:
|
|
|
IP-ADDRESS
|
fe80::fc6e:5922:21d5:be56
|
MAC ADDRESS
|
5c:ea:1d:c1:aa:55
|
DHCP SERVER: 192.168.1.1
|
|
|
IP-ADDRESS
|
192.168.1.173
|
MAC ADDRESS
|
5c:ea:1d:c1:aa:55
|
DHCP SERVER: 192.168.1.1
|
|
|
HARD DISK
|
C:
|
SIZE
|
952.14(GB)
|
10.61% Free
|
|
|
CPU/MEMORY
|
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
|
MEMORY
|
63.83(GB)
|
VENDOR: Dell Inc. MODEL: Precision 7720
|
|
|
UP TIME
|
4 days, 9 hours 28 minutes
|
BOOT MODE
|
|||
|
PROCESS COUNT BY USER
|
SYSTEM
|
ACTIVE PROCESS COUNT
|
121
|
USER TYPE: special UID: 18 GID: 18
|
|
|
PROCESS COUNT BY USER
|
LOCAL SERVICE
|
ACTIVE PROCESS COUNT
|
44
|
USER TYPE: special UID: 19 GID: 19
|
|
|
PROCESS COUNT BY USER
|
NETWORK SERVICE
|
ACTIVE PROCESS COUNT
|
10
|
USER TYPE: special UID: 20 GID: 20
|
|
|
PROCESS COUNT BY USER
|
Admin
|
ACTIVE PROCESS COUNT
|
92
|
USER TYPE: local UID: 1001 GID: 513
|
|
|
SUSPECT PUA
|
C:\Windows\System32\services.exe
|
PUA SCORE
|
37
|
SHA256: 2400ad6ba8b57ee28972db12e39f5546ceff1854ee1013c22ac756ed64dc353d
|
|
|
SUSPECT PUA
|
C:\Windows\System32\sc.exe
|
PUA SCORE
|
35
|
SHA256: 41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9
|
|
|
SUSPECT PUA
|
C:\Windows\System32\dxgiadaptercache.exe
|
PUA SCORE
|
32
|
SHA256: 7ee345476d996e05e7d7519e0639abbc6d23011b5c38bfdcc63ad89d1352270a
|
|
|
SUSPECT PUA
|
C:\Windows\System32\MusNotification.exe
|
PUA SCORE
|
32
|
SHA256: 819fc501339911469bd79bc485101d18dd5cedc2de6f9e3fb112fcd68bf382fb
|
|
|
SUSPECT PUA
|
C:\Windows\System32\wevtutil.exe
|
PUA SCORE
|
31
|
SHA256: 4a727688b939e08c26064ea08dcff29b3d4608d28820874030524f79b4b1cca8
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\65B44228-124C-4448-8511-EC7DD31EB9C3\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-25 21:12:49 CREATING PROCESS SPID: 2540:132481339637393306
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\khuriej3.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1bcb0a70932b47a7af669cf0f2736e7b\vs_bootstrapper_d15\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
vs_setup_bootstrapper.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:42 CREATING PROCESS SPID: 832:132481830398886053
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\DEBRAIN.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:31:16 CREATING PROCESS SPID: 4448:132482138074149110
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$I405YYF.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:01 CREATING PROCESS SPID: 4448:132482138074149110
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\Vcffipzmnipbxzdl.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:43 CREATING PROCESS SPID: 4448:132482138074149110
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\68CF2614-4430-4EF2-B5F8-C35FD3476C02\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-27 18:29:20 CREATING PROCESS SPID: 7384:132482969563973777
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\099D4F03-45D3-4D1F-A604-EF35E8919D2A\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-28 17:45:54 CREATING PROCESS SPID: 15472:132483807534144736
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveStandaloneUpdater.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:38 CREATING PROCESS SPID: 20452:132484561460515708
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileCoAuth.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncConfig.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncHelper.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSync.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSyncNativeMessagingClient.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveUpdaterService.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:45 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{4200586B-9416-44E2-A433-A21AC7F38159}_OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{38E04DBA-5646-42A1-82C9-8EC5088FBE03}_OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\67B37BA3-9BCE-4C52-B8D8-902E8DFF4746\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 17:11:29 CREATING PROCESS SPID: 18344:132484650868004878
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\A7BDE2FC-04DA-4264-A2D8-CCB8D5CCB190\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 18:21:26 CREATING PROCESS SPID: 15988:132484692856020961
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$IUEC255.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:45:09 CREATING PROCESS SPID: 16184:132485058970101352
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
|
CREATING PROCESS NAME
|
vmware-vmx.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:47:27 CREATING PROCESS SPID: 13508:132483644611850967
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1BF91BE7-8C11-4375-8F62-EDDD27A755EE\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 16:25:29 CREATING PROCESS SPID: 19672:132485487281094174
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\9175C3CA-FC9C-4D94-AFAF-5B26F190559C\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-31 15:07:11 CREATING PROCESS SPID: 21928:132486304305415025
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\3F5382CB-75B7-4E38-A5D5-1FB1F7F386BB\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-11-01 15:07:10 CREATING PROCESS SPID: 8996:132487168297906502
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\DEBRAIN.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 1989-11-29 01:10:36 CREATING PROCESS SPID: 4448:132482138074149110
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\sample IOC hunting query for Carbanak and Fin7.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 12:59:37 CREATING PROCESS SPID: 16184:132485058970101352
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\TEST_CONFIRM WILDCARD MATCH.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 12:59:37 CREATING PROCESS SPID: 16184:132485058970101352
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 5016:132483568139498111
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\RansomGen.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 5016:132483568139498111
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\RansomGen.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 16184:132485058970101352
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\65B44228-124C-4448-8511-EC7DD31EB9C3\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-25 21:12:49 CREATING PROCESS SPID: 2540:132481339637393306
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\khuriej3.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1bcb0a70932b47a7af669cf0f2736e7b\vs_bootstrapper_d15\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
vs_setup_bootstrapper.exe
|
CREATED BY: Admin CREATED ON: 2020-08-27 02:56:24 CREATING PROCESS SPID: 832:132481830398886053
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\DEBRAIN.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:31:16 CREATING PROCESS SPID: 4448:132482138074149110
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$I405YYF.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:01 CREATING PROCESS SPID: 4448:132482138074149110
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\Vcffipzmnipbxzdl.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:43 CREATING PROCESS SPID: 4448:132482138074149110
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\68CF2614-4430-4EF2-B5F8-C35FD3476C02\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-27 18:29:20 CREATING PROCESS SPID: 7384:132482969563973777
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\099D4F03-45D3-4D1F-A604-EF35E8919D2A\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-28 17:45:54 CREATING PROCESS SPID: 15472:132483807534144736
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveStandaloneUpdater.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:38 CREATING PROCESS SPID: 20452:132484561460515708
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileCoAuth.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncConfig.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncHelper.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSync.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSyncNativeMessagingClient.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveUpdaterService.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:45 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{4200586B-9416-44E2-A433-A21AC7F38159}_OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{38E04DBA-5646-42A1-82C9-8EC5088FBE03}_OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\67B37BA3-9BCE-4C52-B8D8-902E8DFF4746\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 17:11:29 CREATING PROCESS SPID: 18344:132484650868004878
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\A7BDE2FC-04DA-4264-A2D8-CCB8D5CCB190\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 18:21:26 CREATING PROCESS SPID: 15988:132484692856020961
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$IUEC255.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:45:09 CREATING PROCESS SPID: 16184:132485058970101352
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
|
CREATING PROCESS NAME
|
vmware-vmx.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:47:27 CREATING PROCESS SPID: 13508:132483644611850967
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1BF91BE7-8C11-4375-8F62-EDDD27A755EE\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 16:25:29 CREATING PROCESS SPID: 19672:132485487281094174
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\9175C3CA-FC9C-4D94-AFAF-5B26F190559C\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-31 15:07:11 CREATING PROCESS SPID: 21928:132486304305415025
|
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\3F5382CB-75B7-4E38-A5D5-1FB1F7F386BB\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-11-01 15:07:10 CREATING PROCESS SPID: 8996:132487168297906502
|