Event ID 101 — The scripted diagnostic engine started initializing a diagnostic package located at PackagePath.
Description
The scripted diagnostic engine started initializing a diagnostic package located at PackagePath.
Message #
Fields #
| Name | Description |
|---|---|
PackagePath UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Diagnosis-Scripted",
"guid": "E1DD7E52-621D-44E3-A1AD-0370C2B25946",
"event_source_name": "",
"event_id": 101,
"version": 0,
"level": 4,
"task": 0,
"opcode": 0,
"keywords": 4611686052787126272,
"time_created": "2022-04-04T07:40:09.755421+00:00",
"event_record_id": 1,
"correlation": {},
"execution": {
"process_id": 4124,
"thread_id": 4192
},
"channel": "Microsoft-Windows-Diagnosis-Scripted/Operational",
"computer": "WIN-TKC15D7KHUR",
"security": {
"user_id": "S-1-5-21-1958040314-2592322477-2606035944-500"
}
},
"event_data": {
"PackagePath": "C:\\Windows\\diagnostics\\scheduled\\Maintenance"
},
"message": ""
}
Detection Rules #
View all rules referencing this event →
Sigma # view in reference
- Loading Diagcab Package From Remote Path source high: Detects loading of diagcab packages from a remote path, as seen in DogWalk vulnerability
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline