Event ID 201 — Created process ProcessID for application ApplicationName in package PackageName.
Description
Created process ProcessID for application ApplicationName in package PackageName. Message.
Message #
Fields #
| Name | Description |
|---|---|
ProcessID UInt32 | — |
PackageName UnicodeString | — |
ImageName UnicodeString | — |
ApplicationName UnicodeString | — |
Message UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-AppModel-Runtime",
"guid": "F1EF270A-0D32-4352-BA52-DBAB41E1D859",
"event_source_name": "",
"event_id": 201,
"version": 0,
"level": 4,
"task": 0,
"opcode": 0,
"keywords": 2305843009213693956,
"time_created": "2023-11-06T01:55:56.247720+00:00",
"event_record_id": 466,
"correlation": {},
"execution": {
"process_id": 5324,
"thread_id": 18660
},
"channel": "Microsoft-Windows-AppModel-Runtime/Admin",
"computer": "WinDev2310Eval",
"security": {
"user_id": "S-1-5-18"
}
},
"event_data": {
"ProcessID": 21588,
"PackageName": "Microsoft.WindowsNotepad_11.2307.27.0_x64__8wekyb3d8bbwe",
"ImageName": "Notepad.exe",
"ApplicationName": "Microsoft.WindowsNotepad_8wekyb3d8bbwe!App",
"Message": "[FinishPackageActivation]"
},
"message": ""
}
Detection Rules #
View all rules referencing this event →
Sigma # view in reference
- Sysinternals Tools AppX Versions Execution source low: Detects execution of Sysinternals tools via an AppX package. Attackers could install the Sysinternals Suite to get access to tools such as psexec and procdump to avoid detection based on System paths.
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline