Skip to content

Commit 6972869

Browse files
wikijmgithub-actions[bot]
authored andcommitted
Apply automatic changes
1 parent 0b92cd8 commit 6972869

File tree

27 files changed

+27
-27
lines changed

27 files changed

+27
-27
lines changed

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_boinc_execution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and tgt.process.displayName="University of California, Berkeley")
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_conhost_headless_execution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and (src.process.image.path contains "\\conhost.exe" and src.process.cmdline contains "--headless"))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_csc_compilation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and (tgt.process.image.path contains "\\csc.exe" and tgt.process.cmdline contains "/noconfig /fullpaths @"))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_curl_download.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and ((tgt.process.image.path contains "\\curl.exe" or tgt.process.displayName="The curl executable") and (tgt.process.cmdline contains " -O" or tgt.process.cmdline contains "--remote-name" or tgt.process.cmdline contains "--output")))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_curl_execution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and (tgt.process.image.path contains "\\curl.exe" or tgt.process.displayName="The curl executable"))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_curl_fileupload.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and (((tgt.process.image.path contains "\\curl.exe" or tgt.process.displayName="The curl executable") and ((tgt.process.cmdline contains " --form" or tgt.process.cmdline contains " --upload-file " or tgt.process.cmdline contains " --data " or tgt.process.cmdline contains " --data-") or tgt.process.cmdline matches "\\s-[FTd]\\s")) and (not (tgt.process.cmdline contains "://localhost" or tgt.process.cmdline contains "://127.0.0.1"))))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_curl_useragent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and ((tgt.process.image.path contains "\\curl.exe" or tgt.process.displayName="The curl executable") and (tgt.process.cmdline contains " -A " or tgt.process.cmdline contains " --user-agent ")))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_dfsvc_child_processes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and (src.process.image.path contains "\\dfsvc.exe" and tgt.process.image.path contains "\\AppData\\Local\\Apps\\2.0\\"))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_diskshadow_child_process.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and (src.process.image.path contains "\\diskshadow.exe" and (not tgt.process.image.path contains ":\\Windows\\System32\\WerFault.exe")))
44
```
55

S1PQ-rules-threat-hunting-windows-process_creation/proc_creation_win_explorer_child_of_shell_process.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```sql
2-
// Translated content (automatically translated on 12-01-2026 00:57:10):
2+
// Translated content (automatically translated on 13-01-2026 00:50:20):
33
event.type="Process Creation" and (endpoint.os="windows" and ((src.process.image.path contains "\\cmd.exe" or src.process.image.path contains "\\powershell.exe" or src.process.image.path contains "\\pwsh.exe") and tgt.process.image.path contains "\\explorer.exe" and tgt.process.cmdline contains "explorer.exe"))
44
```
55

0 commit comments

Comments
 (0)