{"CommandLine": "rundll32.exe log.dll,LogInit", "EventCode": "1", "EventData_Xml": "-2026-02-02 20:26:46.079{05ed74c3-0886-6981-4f90-000000005302}5628C:\\Windows\\System32\\rundll32.exe10.0.20348.3451 (WinBuild.160101.0800)Windows host process (Rundll32)Microsoft® Windows® Operating SystemMicrosoft CorporationRUNDLL32.EXErundll32.exe log.dll,LogInitC:\\Users\\Administrator\\AppData\\Roaming\\Bluetooth\\ATTACKRANGE\\Administrator{05ed74c3-b450-697b-1298-200000000000}0x2098122HighMD5=E7D621DDAB207739772BDEA40E12296E,SHA256=02F6A04B3373F195152FB1B4AEAFE25BF8EF4411DC020C2238C541BCC3DC309B,IMPHASH=5C68DE198B5D2DD5C1129782AD19676C{05ed74c3-0886-6981-4e90-000000005302}4432C:\\Windows\\System32\\cmd.exe\"C:\\Windows\\system32\\cmd.exe\" /c \"rundll32.exe log.dll,LogInit\"ATTACKRANGE\\Administrator", "EventID": "1", "Image": "C:\\Windows\\System32\\rundll32.exe", "System_Props_Xml": "154100x800000000000000042317Microsoft-Windows-Sysmon/Operationalar-win-dc.attackrange.local", "_bkt": "win~0~84569963-7203-40C6-84C0-B281193711B0", "_cd": "0:87710270", "_indextime": "1770064006", "_raw": "154100x800000000000000042317Microsoft-Windows-Sysmon/Operationalar-win-dc.attackrange.local-2026-02-02 20:26:46.079{05ed74c3-0886-6981-4f90-000000005302}5628C:\\Windows\\System32\\rundll32.exe10.0.20348.3451 (WinBuild.160101.0800)Windows host process (Rundll32)Microsoft® Windows® Operating SystemMicrosoft CorporationRUNDLL32.EXErundll32.exe log.dll,LogInitC:\\Users\\Administrator\\AppData\\Roaming\\Bluetooth\\ATTACKRANGE\\Administrator{05ed74c3-b450-697b-1298-200000000000}0x2098122HighMD5=E7D621DDAB207739772BDEA40E12296E,SHA256=02F6A04B3373F195152FB1B4AEAFE25BF8EF4411DC020C2238C541BCC3DC309B,IMPHASH=5C68DE198B5D2DD5C1129782AD19676C{05ed74c3-0886-6981-4e90-000000005302}4432C:\\Windows\\System32\\cmd.exe\"C:\\Windows\\system32\\cmd.exe\" /c \"rundll32.exe log.dll,LogInit\"ATTACKRANGE\\Administrator", "_serial": "0", "_si": ["splunk-server", "win"], "_sourcetype": "XmlWinEventLog", "_time": "2026-02-02T20:26:46.000+00:00", "host": "AR-WIN-DC", "index": "win", "linecount": "1", "source": "XmlWinEventLog:Microsoft-Windows-Sysmon/Operational", "sourcetype": "XmlWinEventLog", "splunk_server": "splunk-server"} {"CommandLine": "rundll32.exe log.dll,LogInit", "EventCode": "1", "EventData_Xml": "-2026-02-02 20:14:09.803{05ed74c3-0591-6981-c08f-000000005302}6572C:\\Windows\\System32\\rundll32.exe10.0.20348.3451 (WinBuild.160101.0800)Windows host process (Rundll32)Microsoft® Windows® Operating SystemMicrosoft CorporationRUNDLL32.EXErundll32.exe log.dll,LogInitC:\\Users\\Administrator\\AppData\\Roaming\\Bluetooth\\ATTACKRANGE\\Administrator{05ed74c3-058c-6981-5675-790700000000}0x77975560HighMD5=E7D621DDAB207739772BDEA40E12296E,SHA256=02F6A04B3373F195152FB1B4AEAFE25BF8EF4411DC020C2238C541BCC3DC309B,IMPHASH=5C68DE198B5D2DD5C1129782AD19676C{05ed74c3-0591-6981-bf8f-000000005302}1544C:\\Windows\\System32\\cmd.exe\"C:\\Windows\\system32\\cmd.exe\" /c \"rundll32.exe log.dll,LogInit\"ATTACKRANGE\\Administrator", "EventID": "1", "Image": "C:\\Windows\\System32\\rundll32.exe", "System_Props_Xml": "154100x800000000000000042170Microsoft-Windows-Sysmon/Operationalar-win-dc.attackrange.local", "_bkt": "win~0~84569963-7203-40C6-84C0-B281193711B0", "_cd": "0:23808175", "_indextime": "1770063251", "_raw": "154100x800000000000000042170Microsoft-Windows-Sysmon/Operationalar-win-dc.attackrange.local-2026-02-02 20:14:09.803{05ed74c3-0591-6981-c08f-000000005302}6572C:\\Windows\\System32\\rundll32.exe10.0.20348.3451 (WinBuild.160101.0800)Windows host process (Rundll32)Microsoft® Windows® Operating SystemMicrosoft CorporationRUNDLL32.EXErundll32.exe log.dll,LogInitC:\\Users\\Administrator\\AppData\\Roaming\\Bluetooth\\ATTACKRANGE\\Administrator{05ed74c3-058c-6981-5675-790700000000}0x77975560HighMD5=E7D621DDAB207739772BDEA40E12296E,SHA256=02F6A04B3373F195152FB1B4AEAFE25BF8EF4411DC020C2238C541BCC3DC309B,IMPHASH=5C68DE198B5D2DD5C1129782AD19676C{05ed74c3-0591-6981-bf8f-000000005302}1544C:\\Windows\\System32\\cmd.exe\"C:\\Windows\\system32\\cmd.exe\" /c \"rundll32.exe log.dll,LogInit\"ATTACKRANGE\\Administrator", "_serial": "1", "_si": ["splunk-server", "win"], "_sourcetype": "XmlWinEventLog", "_time": "2026-02-02T20:14:09.000+00:00", "host": "AR-WIN-DC", "index": "win", "linecount": "1", "source": "XmlWinEventLog:Microsoft-Windows-Sysmon/Operational", "sourcetype": "XmlWinEventLog", "splunk_server": "splunk-server"}