Overview
Findings (15)
Process 'mimikatz.exe' matched threat-intel database. Type: process Description: Credential dumper
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:28:46 | Security | 4688 | hacker | Demo EventID 4688 |
Service 'WindowsUpdateHelper' installed from suspicious path: c:\users\public\svc.exe at 10:18:46.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:18:46 | System | 7045 | SYSTEM | Demo EventID 7045 |
The audit log was cleared by 'hacker' at 2026-05-13 10:08:46. This is a strong indicator of an attacker covering tracks.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:08:46 | Security | 1102 | hacker | Demo EventID 1102 |
User 'hacker' was granted: SeDebugPrivilege, SeImpersonatePrivilege, SeTcbPrivilege at 10:43:46.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:43:46 | Security | 4672 | hacker | Demo EventID 4672 |
Process 'c:\temp\mimikatz.exe' launched by 'hacker' with args: mimikatz.exe sekurlsa::logonpasswords
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:28:46 | Security | 4688 | hacker | Demo EventID 4688 |
PowerShell script contains: -enc. Snippet: powershell -enc sqbfafgaiaaoae4azqb3ac0atwbiagoazqbjahqaiaboaguadaauafcazqbiaemababpaguabgb0acaalqbdag8abgbuaguaywb0afqaaqbtaguabwb1ahqaiaaxadaakqauagqabwb3ag4ababvageazabtahqacgbpag4azwaoaccaaab0ahqacaa=
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:23:46 | Windows PowerShell | 4104 | hacker | Demo EventID 4104 |
'backdoor_user' was added to group 'Administrators' by 'hacker'.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:14:46 | Security | 4732 | hacker | Demo EventID 4732 |
6 failed logins for 'Administrator' within 5 minutes (first: 09:48:46).
Show 6 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 09:48:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:49:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:50:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:51:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:52:46 | Security | 4625 | Administrator | Demo EventID 4625 |
... and 1 more events
6 failed logins from 185.220.101.45 in 5 min.
Show 6 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 09:48:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:49:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:50:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:51:46 | Security | 4625 | Administrator | Demo EventID 4625 |
| 09:52:46 | Security | 4625 | Administrator | Demo EventID 4625 |
... and 1 more events
Account 'bob_smith' was locked out (triggered from WORKSTATION-07). May indicate a brute-force attempt.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:58:46 | Security | 4740 | bob_smith | Demo EventID 4740 |
Firewall rule 'Allow_Backdoor_4444' was added at 10:38:46. Unexpected changes may indicate an attacker disabling defenses.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:38:46 | Security | 4946 | hacker | Demo EventID 4946 |
Task '\Microsoft\Windows\SystemUpdateCheck' was created by 'hacker' at 10:33:46. Scheduled tasks are a common persistence technique.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:33:46 | Security | 4698 | hacker | Demo EventID 4698 |
Account 'backdoor_user' was created by 'hacker' at 2026-05-13 10:13:46.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 10:13:46 | Security | 4720 | hacker | Demo EventID 4720 |
System experienced an unexpected shutdown at 2026-05-13 08:28:46. Could be hardware failure, crash, or forced power-off.
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 08:28:46 | System | 6008 | SYSTEM | Demo EventID 6008 |
User 'contractor_bob' logged in at 03:15 UTC (outside 06:00–22:00 UTC).
Show 1 related event(s)
| Time | Channel | ID | User | Detail |
|---|---|---|---|---|
| 03:15:00 | Security | 4624 | contractor_bob | Off-hours logon demo |
Generated by Log Sentinel. Keep this report private because it may contain usernames, hostnames, process names, and security details.