As a threat hunter it is critical to get oriented quickly. When you have a device that has suspect activity on it and the threat hunter is still exploring what is happening they want a lot of different information about the device. This information is everything from what OS is it to have common live off the land tools been being run and does the device and who is on the device right now. With Live discover it is easy for the admin to run a query to get each of those bits of information but to speed things up I wanted to all of that and more in a single query. The query below will use UNION ALL to create a list of useful information about the device.
-- Cards orient the results in three columns -- ATRIBUTE - The thing being checked -- VALUE - The result of the evaluation -- CONTEXT - Some useful information related to the Attribute -- CONTEXT_DATA - The inoformation for the context information being shown -- NOTES - Some additional relevant information on the Attribute/Value -- COLLECT A LIST OF SUSPECT PUA AND SUSPECT MAL software seen running on the device in the last 7 days WITH List_of_suspects AS ( SELECT * FROM Sophos_File_Properties WHERE sophos_File_properties.pathname IN (SELECT DISTINCT pathname FROM sophos_process_journal spj WHERE spj.time > strftime('%s','now','-7 days') GROUP BY sha256 ) ORDER BY puascore DESC, mlscore DESC LIMIT 5 ) -- BLANK LINE BETWEEN EACH DEVICE SELECT CAST('=========================' AS TEXT) ATTRIBUTE, CAST('=========================' AS TEXT) VALUE, CAST('=========================' AS TEXT) CONTEXT, CAST('=========================' AS TEXT) CONTEXT_DATA, CAST('=========================' AS TEXT) NOTES UNION ALL -- Operating System information SELECT 'OPERATING SYSTEM' ATTRIBUTE, name VALUE, 'VERSION' CONTEXT, version CONTEXT_DATA, 'INSTALLED ON: ' || substr(install_date,1,4) || ' ' || substr(install_date,5,2) || ' ' || substr(install_date,7,2) || ' ' || substr(install_date,9,2) || ':' || substr(install_date,11,2) NOTES FROM os_version UNION ALL -- Current IP/MAC and DHCP Server for the device SELECT 'IP-ADDRESS' ATTRIBUTE, CAST(ia.address AS TEXT) VALUE, 'MAC ADDRESS' CONTEXT, id.mac CONTEXT_DATA, 'DHCP SERVER: ' || id.dhcp_server NOTES FROM interface_addresses ia JOIN interface_details id ON id.interface = ia.interface WHERE ia.address NOT IN ('::1','127.0.0.1') AND id.enabled <> 0 -- UNION ALL -- ISOLATED/HEALTH STATUS -- SOME SQL CODE UNION ALL -- DISK INFO -- TO DO - Add bitlocker enabled info for each drive SELECT 'HARD DISK' ATTRIBUTE, device_id VALUE, 'SIZE ' CONTEXT, printf("%.2f", CAST(size AS FLOAT)/1024.0/1024.0/1024.0) || '(GB)' CONTEXT_DATA, printf("%.2f", (CAST (free_space AS FLOAT)/CAST(size AS FLOAT) ) * 100.0 ) || '% Free' NOTES FROM logical_drives WHERE size > 0 UNION ALL -- CPU AND MEMORY INFO SELECT 'CPU/MEMORY ' ATTRIBUTE, cpu_brand VALUE, 'MEMORY' CONTEXT, printf("%.2f", CAST(physical_memory AS FLOAT)/1024.0/1024.0/1024.0) || '(GB)' CONTEXT_DATA, 'VENDOR: ' || hardware_vendor || ' MODEL: ' || hardware_model NOTES FROM system_info UNION ALL -- UP TIME SELECT 'UP TIME' ATTRIBUTE, days || ' days, ' || hours || ' hours ' || minutes || ' minutes' VALUE, 'BOOT MODE' CONTEXT, ( SELECT CASE JSON_EXTRACT(data, '$.EventData.BootMode') WHEN '0' THEN 'Normal_Boot' WHEN '1' THEN 'Safe-Mode' ELSE 'Unknown Mode: ' || JSON_EXTRACT(data, '$.EventData.BootMode') END AS 'Boot Mode' FROM sophos_windows_events WHERE (eventid = 12 AND task = 1) AND time > STRFTIME('%s','NOW','-90 DAYS') ORDER by 1 DESC LIMIT 1 ) CONTEXT_VALUE, '' NOTES FROM uptime UNION ALL -- CURRENT USERS with active processes SELECT 'PROCESS COUNT BY USER' ATTRIBUTE, u.username VALUE, 'ACTIVE PROCESS COUNT' CONTEXT, count(p.uid) CONTEXT_DATA, 'USER TYPE: ' || u.type || ' UID: ' || u.uid || ' GID: ' || u.gid NOTES FROM users u JOIN processes p ON p.uid = u.uid GROUP BY p.uid UNION ALL -- RDP STATUS SELECT DISTINCT 'CHECK IF RDP IS LISTENING' ATTRIBUTE, 'Listening for connection' VALUE, '' CONTEXT, '' CONTEXT_DATA, '' NOTES FROM listening_ports lp WHERE lp.port = 3389 UNION ALL -- SUSPECT PUA -- TO DO: Add indicator if that process is currently running SELECT 'SUSPECT PUA' ATTRIBUTE, pathname VALUE, 'PUA SCORE' CONTEXT, puascore CONTEXT_DATA, 'SHA256: ' || sha256 NOTES FROM List_of_suspects los WHERE puascore > 30 UNION ALL -- SUSPECT MAL -- TO DO: Add indicator if that process is currently running SELECT 'SUSPECT MAL' ATTRIBUTE, pathname VALUE, 'MAL SCORE' CONTEXT, mlscore CONTEXT_DATA, 'SHA256: ' || sha256 NOTES FROM List_of_suspects los WHERE mlscore > 30 UNION ALL -- NEW Executables installed by the USERS in last 7 days -- WARNING: PROCESSES CREATED BY THE USER 'SYSTEM' ARE EXCLUDED SELECT 'NEW USER INSTALLED EXECUTABLE (last 7 days)' ATTRIBUTE, sfj.pathname VALUE, 'CREATING PROCESS NAME' CONTEXT, spj.processName CONTEXT_DATA, 'CREATED BY: ' || u.username || ' CREATED ON: ' || datetime(sfj.creationTime,'unixepoch') || ' CREATING PROCESS SPID: ' || sfj.sophosPID NOTES FROM sophos_file_journal sfj JOIN sophos_process_journal spj ON spj.sophosPID = sfj.sophosPID JOIN users u ON u.uuid = spj.sid WHERE sfj.subject = 'FileBinaryChanges' AND sfj.time > strftime('%s','now','-7 days') AND sfj.eventType IN (0,1,3) AND u.username <> 'SYSTEM' AND sfj.pathname LIKE '%.exe' UNION ALL -- COMMON LOL TOOL USAGE SELECT 'LIVE OFF LAND TOOL USE (Last 7 days)' ATTRIBUTE, spj.processname VALUE, 'RUN BY USER' CONTEXT, u.username CONTEXT_DATA, 'COMMAND LINE: ' || spj.cmdline || ' SOPHOS PID: ' || spj.sophosPID NOTES FROM sophos_process_journal spj JOIN users u ON u.uuid = spj.sid WHERE spj.eventtype = 0 AND spj.time > strftime('%s','now','-7 days') AND spj.processname IN ('arp.exe', 'hostname.exe', 'ntdutil.exe', 'schtasks.exe', 'at.exe', 'ipconfig.exe', 'pathping.exe', 'systeminfo.exe', 'bitsadmin.exe', 'nbtstat.exe', 'ping.exe', 'tasklist.exe', 'certutil.exe', 'net.exe', 'powershell.exe', 'tracert.exe', 'cmd.exe', 'net1.exe', 'qprocess.exe', 'ver.exe', 'dsget.exe', 'netdom.exe', 'query.exe', 'vssadmin.exe', 'dsquery.exe', 'netsh.exe', 'qwinsta.exe', 'wevtutil.exe', 'find.exe', 'netstat.exe', 'reg.exe', 'whoami.exe', 'findstr.exe', 'nltest.exe', 'rundll32.exe', 'wmic.exe', 'fsutil.exe', 'nslookup.exe', 'sc.exe', 'wusa.exe' ) AND u.username NOT IN('SYSTEM', 'LOCAL SERVICE', '') UNION ALL -- ENCODED CMDLINES(last 7 days) SELECT 'ENCOUDED COMMAND LINES (Last 7 days)' ATTRIBUTE, spj.cmdline VALUE, 'PROCESS NAME' CONTEXT, spj.processname CONTEXT_VALUE, 'SOPHOS PID: ' || spj.sophospid || ' USER: ' || u.username NOTES FROM sophos_process_journal spj JOIN users u ON u.uuid = spj.sid WHERE spj.eventtype = 0 AND spj.time > strftime('%s','now','-7 days') AND spj.cmdline LIKE 'encode' AND u.username NOT IN ('SYSTEM', 'LOCAL SERVICE', '') UNION ALL -- SCHEDULED TASKS SETUP IN LAST 7 DAYS SELECT 'NEW SCHEDULED TASKS (last 7 days)' ATTRIBUTE, spj.cmdline VALUE, 'CREATED BY USER' CONTEXT, u.username CONTEXT_DATA, 'DATE_TIME: ' || datetime(time, 'unixepoch') || ' SOPHOS PID: ' || spj.sophospid NOTES FROM sophos_process_journal spj JOIN users u ON u.uuid = spj.sid WHERE spj.time > strftime('%s','now', '-7 days') AND spj.eventtype = 0 AND spj.processname = 'schtasks.exe' AND spj.cmdline LIKE '%create%'
SAMPLE OUTPUT
epName
|
ATTRIBUTE
|
VALUE
|
CONTEXT
|
CONTEXT_DATA
|
NOTES
|
=========================
|
=========================
|
=========================
|
=========================
|
=========================
|
|
OPERATING SYSTEM
|
Microsoft Windows 7 Ultimate
|
VERSION
|
6.1.7601
|
INSTALLED ON: 2016 09 12 15:40
|
|
IP-ADDRESS
|
192.168.100.143
|
MAC ADDRESS
|
00:50:56:2a:3a:13
|
DHCP SERVER: 192.168.100.254
|
|
IP-ADDRESS
|
fe80::100:7f:fffe
|
MAC ADDRESS
|
00:00:00:00:00:00:00:e0
|
DHCP SERVER:
|
|
HARD DISK
|
C:
|
SIZE
|
60.00(GB)
|
61.33% Free
|
|
CPU/MEMORY
|
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
|
MEMORY
|
3.00(GB)
|
VENDOR: VMware, Inc. MODEL: VMware Virtual Platform
|
|
UP TIME
|
3 days, 13 hours 18 minutes
|
BOOT MODE
|
|||
PROCESS COUNT BY USER
|
SYSTEM
|
ACTIVE PROCESS COUNT
|
39
|
USER TYPE: special UID: 18 GID: 18
|
|
PROCESS COUNT BY USER
|
LOCAL SERVICE
|
ACTIVE PROCESS COUNT
|
15
|
USER TYPE: special UID: 19 GID: 19
|
|
PROCESS COUNT BY USER
|
NETWORK SERVICE
|
ACTIVE PROCESS COUNT
|
5
|
USER TYPE: special UID: 20 GID: 20
|
|
SUSPECT PUA
|
C:\Windows\System32\dllhost.exe
|
PUA SCORE
|
41
|
SHA256: f7ad4b09afb301ce46df695b22114331a57d52e6d4163ff74787bf68ccf44c78
|
|
SUSPECT PUA
|
C:\Program Files\Windows Media Player\wmpnetwk.exe
|
PUA SCORE
|
38
|
SHA256: 6c67dcb007c3cdf2eb0bbf5fd89c32cd7800c20f7166872f8c387be262c5cd21
|
|
SUSPECT PUA
|
C:\Windows\System32\autochk.exe
|
PUA SCORE
|
38
|
SHA256: 2e035366e9a1a26fb15f1e4857056e6ad7932bce8cc68bb4b655609f424d2756
|
|
SUSPECT PUA
|
C:\Windows\System32\csrss.exe
|
PUA SCORE
|
38
|
SHA256: f9112b88fec5ef10a7aedf88dcee61956d1fcde7cb42197216e8265578713786
|
|
SUSPECT PUA
|
C:\Windows\System32\conhost.exe
|
PUA SCORE
|
37
|
SHA256: 248d1591b39e6fbbf8ed081f9c0ffe99e76f2df180eb7371dcf531d9a58e4546
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 1484:132482013107543154
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 5572:132482013534837594
|
|
=========================
|
=========================
|
=========================
|
=========================
|
=========================
|
|
OPERATING SYSTEM
|
Microsoft Windows 7 Ultimate
|
VERSION
|
6.1.7601
|
INSTALLED ON: 2016 09 12 15:40
|
|
IP-ADDRESS
|
192.168.100.183
|
MAC ADDRESS
|
00:50:56:25:94:3c
|
DHCP SERVER: 192.168.100.254
|
|
IP-ADDRESS
|
fe80::100:7f:fffe
|
MAC ADDRESS
|
00:00:00:00:00:00:00:e0
|
DHCP SERVER:
|
|
HARD DISK
|
C:
|
SIZE
|
60.00(GB)
|
60.67% Free
|
|
CPU/MEMORY
|
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
|
MEMORY
|
3.00(GB)
|
VENDOR: VMware, Inc. MODEL: VMware Virtual Platform
|
|
UP TIME
|
3 days, 13 hours 18 minutes
|
BOOT MODE
|
|||
PROCESS COUNT BY USER
|
SYSTEM
|
ACTIVE PROCESS COUNT
|
38
|
USER TYPE: special UID: 18 GID: 18
|
|
PROCESS COUNT BY USER
|
LOCAL SERVICE
|
ACTIVE PROCESS COUNT
|
15
|
USER TYPE: special UID: 19 GID: 19
|
|
PROCESS COUNT BY USER
|
NETWORK SERVICE
|
ACTIVE PROCESS COUNT
|
6
|
USER TYPE: special UID: 20 GID: 20
|
|
PROCESS COUNT BY USER
|
test
|
ACTIVE PROCESS COUNT
|
10
|
USER TYPE: local UID: 1002 GID: 513
|
|
SUSPECT PUA
|
C:\Windows\System32\dllhost.exe
|
PUA SCORE
|
41
|
SHA256: f7ad4b09afb301ce46df695b22114331a57d52e6d4163ff74787bf68ccf44c78
|
|
SUSPECT PUA
|
C:\Program Files\Windows Media Player\wmpnetwk.exe
|
PUA SCORE
|
38
|
SHA256: 6c67dcb007c3cdf2eb0bbf5fd89c32cd7800c20f7166872f8c387be262c5cd21
|
|
SUSPECT PUA
|
C:\Windows\System32\autochk.exe
|
PUA SCORE
|
38
|
SHA256: 2e035366e9a1a26fb15f1e4857056e6ad7932bce8cc68bb4b655609f424d2756
|
|
SUSPECT PUA
|
C:\Windows\System32\csrss.exe
|
PUA SCORE
|
38
|
SHA256: f9112b88fec5ef10a7aedf88dcee61956d1fcde7cb42197216e8265578713786
|
|
SUSPECT PUA
|
C:\Windows\System32\conhost.exe
|
PUA SCORE
|
37
|
SHA256: 248d1591b39e6fbbf8ed081f9c0ffe99e76f2df180eb7371dcf531d9a58e4546
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\SophosSetup.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:25 CREATING PROCESS SPID: 6428:132485084615493431
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\test\AppData\Local\Temp\sfl-86709b40\Setup.exe
|
CREATING PROCESS NAME
|
SophosSetup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:38 CREATING PROCESS SPID: 6528:132485085981990104
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Program Files\Sophos\CloudInstaller\extract_cache\SophosSetup_Stage2.exe
|
CREATING PROCESS NAME
|
Setup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:55 CREATING PROCESS SPID: 7236:132485085984642109
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\SophosSetup.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:25 CREATING PROCESS SPID: 6428:132485084615493431
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\test\AppData\Local\Temp\sfl-86709b40\Setup.exe
|
CREATING PROCESS NAME
|
SophosSetup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:38 CREATING PROCESS SPID: 6528:132485085981990104
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Program Files\Sophos\CloudInstaller\extract_cache\SophosSetup_Stage2.exe
|
CREATING PROCESS NAME
|
Setup.exe
|
CREATED BY: test CREATED ON: 2020-10-30 05:16:55 CREATING PROCESS SPID: 7236:132485085984642109
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding SOPHOS PID: 5276:132482013226331772
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt yr1WC98xYUeiFhBC.1 Census SOPHOS PID: 4360:132482840457734512
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt OUqtUY43BU2WrqCJ.1 Census SOPHOS PID: 6040:132485858646823219
|
|
LIVE OFF LAND TOOL USE (Last 7 days)
|
rundll32.exe
|
RUN BY USER
|
test
|
COMMAND LINE: rundll32 C:\Windows\system32\generaltel.dll,RunInUserCxt iW71dRP6jEWqAl8a.1 Census SOPHOS PID: 6776:132486737379512842
|
|
=========================
|
=========================
|
=========================
|
=========================
|
=========================
|
|
OPERATING SYSTEM
|
Microsoft Windows 10 Pro
|
VERSION
|
10.0.19041
|
INSTALLED ON: 2020 06 10 10:25
|
|
IP-ADDRESS
|
fe80::3837:20c:2ac5:235
|
MAC ADDRESS
|
6e:ea:1d:c1:aa:55
|
DHCP SERVER:
|
|
IP-ADDRESS
|
169.254.2.53
|
MAC ADDRESS
|
6e:ea:1d:c1:aa:55
|
DHCP SERVER:
|
|
IP-ADDRESS
|
fe80::3046:a74:92c1:4245
|
MAC ADDRESS
|
00:50:56:c0:00:0a
|
DHCP SERVER:
|
|
IP-ADDRESS
|
172.16.16.1
|
MAC ADDRESS
|
00:50:56:c0:00:0a
|
DHCP SERVER:
|
|
IP-ADDRESS
|
fe80::cff:dcd7:bb9e:34ed
|
MAC ADDRESS
|
00:50:56:c0:00:08
|
DHCP SERVER:
|
|
IP-ADDRESS
|
192.168.100.1
|
MAC ADDRESS
|
00:50:56:c0:00:08
|
DHCP SERVER:
|
|
IP-ADDRESS
|
fe80::f101:efed:1c0:a21e
|
MAC ADDRESS
|
00:50:56:c0:00:10
|
DHCP SERVER:
|
|
IP-ADDRESS
|
10.50.50.1
|
MAC ADDRESS
|
00:50:56:c0:00:10
|
DHCP SERVER:
|
|
IP-ADDRESS
|
fe80::fc6e:5922:21d5:be56
|
MAC ADDRESS
|
5c:ea:1d:c1:aa:55
|
DHCP SERVER: 192.168.1.1
|
|
IP-ADDRESS
|
192.168.1.173
|
MAC ADDRESS
|
5c:ea:1d:c1:aa:55
|
DHCP SERVER: 192.168.1.1
|
|
HARD DISK
|
C:
|
SIZE
|
952.14(GB)
|
10.61% Free
|
|
CPU/MEMORY
|
Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
|
MEMORY
|
63.83(GB)
|
VENDOR: Dell Inc. MODEL: Precision 7720
|
|
UP TIME
|
4 days, 9 hours 28 minutes
|
BOOT MODE
|
|||
PROCESS COUNT BY USER
|
SYSTEM
|
ACTIVE PROCESS COUNT
|
121
|
USER TYPE: special UID: 18 GID: 18
|
|
PROCESS COUNT BY USER
|
LOCAL SERVICE
|
ACTIVE PROCESS COUNT
|
44
|
USER TYPE: special UID: 19 GID: 19
|
|
PROCESS COUNT BY USER
|
NETWORK SERVICE
|
ACTIVE PROCESS COUNT
|
10
|
USER TYPE: special UID: 20 GID: 20
|
|
PROCESS COUNT BY USER
|
Admin
|
ACTIVE PROCESS COUNT
|
92
|
USER TYPE: local UID: 1001 GID: 513
|
|
SUSPECT PUA
|
C:\Windows\System32\services.exe
|
PUA SCORE
|
37
|
SHA256: 2400ad6ba8b57ee28972db12e39f5546ceff1854ee1013c22ac756ed64dc353d
|
|
SUSPECT PUA
|
C:\Windows\System32\sc.exe
|
PUA SCORE
|
35
|
SHA256: 41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9
|
|
SUSPECT PUA
|
C:\Windows\System32\dxgiadaptercache.exe
|
PUA SCORE
|
32
|
SHA256: 7ee345476d996e05e7d7519e0639abbc6d23011b5c38bfdcc63ad89d1352270a
|
|
SUSPECT PUA
|
C:\Windows\System32\MusNotification.exe
|
PUA SCORE
|
32
|
SHA256: 819fc501339911469bd79bc485101d18dd5cedc2de6f9e3fb112fcd68bf382fb
|
|
SUSPECT PUA
|
C:\Windows\System32\wevtutil.exe
|
PUA SCORE
|
31
|
SHA256: 4a727688b939e08c26064ea08dcff29b3d4608d28820874030524f79b4b1cca8
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\65B44228-124C-4448-8511-EC7DD31EB9C3\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-25 21:12:49 CREATING PROCESS SPID: 2540:132481339637393306
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\khuriej3.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1bcb0a70932b47a7af669cf0f2736e7b\vs_bootstrapper_d15\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
vs_setup_bootstrapper.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:42 CREATING PROCESS SPID: 832:132481830398886053
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\DEBRAIN.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:31:16 CREATING PROCESS SPID: 4448:132482138074149110
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$I405YYF.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:01 CREATING PROCESS SPID: 4448:132482138074149110
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\Vcffipzmnipbxzdl.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:43 CREATING PROCESS SPID: 4448:132482138074149110
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\68CF2614-4430-4EF2-B5F8-C35FD3476C02\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-27 18:29:20 CREATING PROCESS SPID: 7384:132482969563973777
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\099D4F03-45D3-4D1F-A604-EF35E8919D2A\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-28 17:45:54 CREATING PROCESS SPID: 15472:132483807534144736
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveStandaloneUpdater.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:38 CREATING PROCESS SPID: 20452:132484561460515708
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileCoAuth.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncConfig.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncHelper.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSync.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSyncNativeMessagingClient.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveUpdaterService.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:45 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{4200586B-9416-44E2-A433-A21AC7F38159}_OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{38E04DBA-5646-42A1-82C9-8EC5088FBE03}_OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\67B37BA3-9BCE-4C52-B8D8-902E8DFF4746\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 17:11:29 CREATING PROCESS SPID: 18344:132484650868004878
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\A7BDE2FC-04DA-4264-A2D8-CCB8D5CCB190\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 18:21:26 CREATING PROCESS SPID: 15988:132484692856020961
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$IUEC255.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:45:09 CREATING PROCESS SPID: 16184:132485058970101352
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
|
CREATING PROCESS NAME
|
vmware-vmx.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:47:27 CREATING PROCESS SPID: 13508:132483644611850967
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1BF91BE7-8C11-4375-8F62-EDDD27A755EE\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 16:25:29 CREATING PROCESS SPID: 19672:132485487281094174
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\9175C3CA-FC9C-4D94-AFAF-5B26F190559C\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-31 15:07:11 CREATING PROCESS SPID: 21928:132486304305415025
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\3F5382CB-75B7-4E38-A5D5-1FB1F7F386BB\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-11-01 15:07:10 CREATING PROCESS SPID: 8996:132487168297906502
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\DEBRAIN.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 1989-11-29 01:10:36 CREATING PROCESS SPID: 4448:132482138074149110
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\sample IOC hunting query for Carbanak and Fin7.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 12:59:37 CREATING PROCESS SPID: 16184:132485058970101352
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\TEST_CONFIRM WILDCARD MATCH.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 12:59:37 CREATING PROCESS SPID: 16184:132485058970101352
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 5016:132483568139498111
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\RansomGen.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 5016:132483568139498111
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\PerfLogs\RansomGen.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-01-28 15:08:50 CREATING PROCESS SPID: 16184:132485058970101352
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\65B44228-124C-4448-8511-EC7DD31EB9C3\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-25 21:12:49 CREATING PROCESS SPID: 2540:132481339637393306
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\khuriej3.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\725421a842714d28b845ff146ca42cb3\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
devenv.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 10:50:39 CREATING PROCESS SPID: 7288:132481829693627065
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1bcb0a70932b47a7af669cf0f2736e7b\vs_bootstrapper_d15\vs_setup_bootstrapper.exe
|
CREATING PROCESS NAME
|
vs_setup_bootstrapper.exe
|
CREATED BY: Admin CREATED ON: 2020-08-27 02:56:24 CREATING PROCESS SPID: 832:132481830398886053
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\DEBRAIN.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:31:16 CREATING PROCESS SPID: 4448:132482138074149110
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$I405YYF.EXE
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:01 CREATING PROCESS SPID: 4448:132482138074149110
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\Desktop\Vcffipzmnipbxzdl.exe
|
CREATING PROCESS NAME
|
explorer.exe
|
CREATED BY: Admin CREATED ON: 2020-10-26 19:32:43 CREATING PROCESS SPID: 4448:132482138074149110
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\68CF2614-4430-4EF2-B5F8-C35FD3476C02\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-27 18:29:20 CREATING PROCESS SPID: 7384:132482969563973777
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\099D4F03-45D3-4D1F-A604-EF35E8919D2A\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-28 17:45:54 CREATING PROCESS SPID: 15472:132483807534144736
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveStandaloneUpdater.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:38 CREATING PROCESS SPID: 20452:132484561460515708
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileCoAuth.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncConfig.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\FileSyncHelper.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSync.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\MicrosoftListSyncNativeMessagingClient.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:44 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveUpdaterService.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:45 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0008\OneDriveSetup.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{4200586B-9416-44E2-A433-A21AC7F38159}_OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDrive.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\20.169.0823.0006\{38E04DBA-5646-42A1-82C9-8EC5088FBE03}_OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe
|
CREATING PROCESS NAME
|
OneDriveSetup.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 14:42:52 CREATING PROCESS SPID: 13748:132484561623029376
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\67B37BA3-9BCE-4C52-B8D8-902E8DFF4746\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 17:11:29 CREATING PROCESS SPID: 18344:132484650868004878
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\A7BDE2FC-04DA-4264-A2D8-CCB8D5CCB190\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-29 18:21:26 CREATING PROCESS SPID: 15988:132484692856020961
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\$Recycle.Bin\S-1-5-21-1046890641-3398658149-2418694993-1001\$IUEC255.exe
|
CREATING PROCESS NAME
|
dllhost.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:45:09 CREATING PROCESS SPID: 16184:132485058970101352
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\vmware-Admin\VMwareDnD\138c3d80\RansomGen.exe
|
CREATING PROCESS NAME
|
vmware-vmx.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 04:47:27 CREATING PROCESS SPID: 13508:132483644611850967
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\1BF91BE7-8C11-4375-8F62-EDDD27A755EE\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-30 16:25:29 CREATING PROCESS SPID: 19672:132485487281094174
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\9175C3CA-FC9C-4D94-AFAF-5B26F190559C\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-10-31 15:07:11 CREATING PROCESS SPID: 21928:132486304305415025
|
|
NEW USER INSTALLED EXECUTABLE (last 7 days)
|
C:\Users\kacke\AppData\Local\Temp\3F5382CB-75B7-4E38-A5D5-1FB1F7F386BB\DismHost.exe
|
CREATING PROCESS NAME
|
cleanmgr.exe
|
CREATED BY: Admin CREATED ON: 2020-11-01 15:07:10 CREATING PROCESS SPID: 8996:132487168297906502
|