| 1 | Microsoft-Windows-Sysmon/Operational | 1 | Process Create (rule: ProcessCreate) | Process Create. 
                      LogonGuid/LogonId: ID of the logon sessionParentProcessGuid/ParentProcessId: Process ID of the parent processParentImage: Executable file of the parent processCurrentDirectory: Work directoryCommandLine: Command line of the execution command (C:\Windows\System32\schtasks.exe /Create /S [Target] /U [User] /P [Password] /SC [Execution Timing] /TN [Task Name] /TR [Execution Command])IntegrityLevel: Privilege levelParentCommandLine: Command line of the parent processUtcTime: Process execution date and time (UTC)ProcessGuid/ProcessId: Process IDUser: Execute as userHashes: Hash value of the executable fileImage: Path to the executable file (C:\Windows\System32\schtasks.exe) | 
                  
                    
                    | Security | 4688 | Process Create | A new process has been created. 
                      Process Information > Required Label: Necessity of privilege escalation (Mandatory Label\Medium Mandatory Level)Subject > Security ID/Account Name/Account Domain: SID/Account name/Domain of the user who executed the toolProcess Information > Source Process Name: Path to parent process that created the new processLog Date and Time: Process execution date and time (local time)Process Information > New Process Name: Path to the executable file (C:\Windows\System32\schtasks.exe)Process Information > Token Escalation Type: Presence of privilege escalation (1)Process Information > New Process ID: Process ID (hexadecimal)Process Information > Source Process ID: Process ID of the parent process that created the new process. "Creator Process ID" in Windows 7Subject > Logon ID: Session ID of the user who executed the process | 
                  
                    | 2 | Microsoft-Windows-Sysmon/Operational | 12 | Registry object added or deleted (rule: RegistryEvent) | Registry object added or deleted. 
                      EventType: Process type (CreateKey)Image: Path to the executable file (C:\Windows\System32\schtasks.exe)ProcessGuid/ProcessId: Process IDTargetObject: Created/deleted registry key/value (\REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters) | 
                  
                    | 3 | Microsoft-Windows-Sysmon/Operational | 3 | Network connection detected (rule: NetworkConnect) | Network connection detected. 
                      Protocol: Protocol (tcp)DestinationIp: Destination IP address (destination host IP address)Image: Path to the executable fileDestinationHostname: Destination host name (destination host name)ProcessGuid/ProcessId: Process ID (process ID of schtasks.exe)User: Execute as userDestinationPort: Destination port number (135)SourcePort: Source port number (high port)SourceHostname: Source host name (source host name)SourceIp: Source IP address (source host IP address) | 
                  
                    
                    | Security | 5158 | Filtering Platform Connection | The Windows Filtering Platform has permitted a bind to a local port. 
                      Network Information > Protocol: Protocol used (6=TCP)Network Information > Source Port: Bind local port (high port)Application Information > Process ID: Process IDApplication Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe) | 
                  
                    
                    | Security | 5156 | Filtering Platform Connection | The Windows Filtering Platform has allowed a connection. 
                      Network Information > Destination Port: Destination port number (135)Network Information > Source Port: Source port number (high port)Network Information > Destination Address: Destination IP address (destination host)Network Information > Protocol: Protocol used (6=TCP)Application Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe)Network Information > Direction: Communication direction (outbound)Network Information > Source Address: Source IP address (source host)Application Information > Process ID: Process ID | 
                  
                    | 4 | Microsoft-Windows-Sysmon/Operational | 3 | Network connection detected (rule: NetworkConnect) | Network connection detected. 
                      Protocol: Protocol (tcp)DestinationIp: Destination IP address (destination host IP address)Image: Path to the executable fileDestinationHostname: Destination host name (destination host name)ProcessGuid/ProcessId: Process ID (process ID of schtasks.exe)User: Execute as userDestinationPort: Destination port number (high port)SourcePort: Source port number (high port)SourceHostname: Source host name (source host name)SourceIp: Source IP address (source host IP address) | 
                  
                    
                    | Security | 5158 | Filtering Platform Connection | The Windows Filtering Platform has permitted a bind to a local port. 
                      Network Information > Protocol: Protocol used (6=TCP)Network Information > Source Port: Bind local port (high port)Application Information > Process ID: Process IDApplication Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe) | 
                  
                    
                    | Security | 5156 | Filtering Platform Connection | The Windows Filtering Platform has allowed a connection. 
                      Network Information > Destination Port: Destination port number (high port)Network Information > Source Port: Source port number (high port)Network Information > Destination Address: Destination IP address (destination host)Network Information > Protocol: Protocol used (6=TCP)Application Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe)Network Information > Direction: Communication direction (outbound)Network Information > Source Address: Source IP address (source host)Application Information > Process ID: Process ID | 
                  
                    | 6 | Security | 4648 | Logon | A logon was attempted using explicit credentials. 
                      Process Information > Process ID: Process ID that attempted the logonAccount for which Credentials were Used > Account Name: Specified account name (user specified by the schtasks.exe command line)Subject > Logon ID/Logon GUID: Session ID of the user who executed the authenticationSubject > Account Domain: Domain to which the account belongsTarget Server > Target Server Name: Logon destination host name (target host)Process Information > Process Name: Name of the process that attempted the logon (C:\Windows\System32\schtasks.exe)Subject > Account Name: Name of the account that executed the toolSubject > Security ID: SID of the user who executed the toolTarget Server > Additional Information: Additional information on the logon destination host (target host)Account for which Credentials were Used > Account Domain: Domain to which the specified account belongs (domain of the user specified by the schtasks.exe command line) | 
                  
                    | 7 | Microsoft-Windows-Sysmon/Operational | 5 | Process terminated (rule: ProcessTerminate) | Process terminated. 
                      UtcTime: Process terminated date and time (UTC)ProcessGuid/ProcessId: Process IDImage: Path to the executable file (C:\Windows\System32\schtasks.exe) | 
                  
                    
                    | Security | 4689 | Process Termination | A process has exited. 
                      Process Information > Process ID: Process ID (hexadecimal)Subject > Security ID/Account Name/Account Domain: SID/Account name/Domain of the user who executed the toolProcess Information > Exit Status: Process return value (0x0)Log Date and Time: Process terminated date and time (local time)Process Information > Process Name: Path to the executable file (C:\Windows\System32\schtasks.exe)Subject > Logon ID: Session ID of the user who executed the process | 
                  
                    | 8 | Microsoft-Windows-Sysmon/Operational | 11 | File created (rule: FileCreate) | File created. 
                      Image: Path to the executable file (C:\Windows\System32\svchost.exe)ProcessGuid/ProcessId: Process IDTargetFilename: Created file (C:\Windows\Prefetch\SCHTASKS.EXE-[RANDOM].pf)CreationUtcTime: File creation date and time (UTC) | 
                  
                    
                    | Security | 4656 | File System/Other Object Access Events | A handle to an object was requested. 
                      Process Information > Process ID: Process ID (hexadecimal)Access Request Information > Access/Reason for Access/Access Mask: Requested privileges (including WriteData or AddFile, and AppendData)Subject > Security ID/Account Name/Account Domain: SID/Account name/Domain of the user who executed the toolObject > Object Name: Target file name (C:\Windows\Prefetch\SCHTASKS.EXE-[RANDOM].pf))Process Information > Process Name: Name of the process that closed the handle (C:\Windows\System32\svchost.exe)Object > Object Type: File typeSubject > Logon ID: Session ID of the user who executed the processObject > Handle ID: ID of the relevant handle | 
                  
                    
                    | Security | 4663 | File System | An attempt was made to access an object. 
                      Process Information > Process ID: Process ID (hexadecimal)Access Request Information > Access/Reason for Access/Access Mask: Requested privileges (including WriteData or AddFile, and AppendData)Subject > Security ID/Account Name/Account Domain: SID/Account name/Domain of the user who executed the toolObject > Object Name: Target file name (C:\Windows\Prefetch\SCHTASKS.EXE-[RANDOM].pf))Audit Success: Success or failure (access successful)Process Information > Process Name: Name of the process that closed the handle (C:\Windows\System32\svchost.exe)Object > Object Type: Category of the target (File)Subject > Logon ID: Session ID of the user who executed the processObject > Handle ID: ID of the relevant handle (handle obtained with Event ID 4656) | 
                  
                    
                    | Security | 4658 | File System | The handle to an object was closed. 
                      Process Information > Process ID: Process ID (hexadecimal)Process Information > Process Name: Name of the process that requested the object (C:\Windows\System32\svchost.exe)Subject > Security ID/Account Name/Account Domain: SID/Account name/Domain of the user who executed the toolSubject > Logon ID: Session ID of the user who executed the processObject > Handle ID: ID of the relevant handle (handle obtained with Event ID 4656) | 
                  
                    | 9 | Microsoft-Windows-Sysmon/Operational | 1 | Process Create (rule: ProcessCreate) | Process Create. 
                      LogonGuid/LogonId: ID of the logon sessionParentProcessGuid/ParentProcessId: Process ID of the parent processParentImage: Executable file of the parent processCurrentDirectory: Work directoryCommandLine: Command line of the execution command (C:\Windows\System32\schtasks.exe /Run /S [Target] /U [User] /P [Password] /TN [Task Name])IntegrityLevel: Privilege levelParentCommandLine: Command line of the parent processUtcTime: Process execution date and time (UTC)ProcessGuid/ProcessId: Process IDUser: Execute as userHashes: Hash value of the executable fileImage: Path to the executable file (C:\Windows\System32\schtasks.exe) | 
                  
                    
                    | Security | 4688 | Process Create | A new process has been created. 
                      Process Information > Required Label: Necessity of privilege escalation (Mandatory Label\Medium Mandatory Level)Subject > Security ID/Account Name/Account Domain: SID/Account name/Domain of the user who executed the toolProcess Information > Source Process Name: Path to parent process that created the new processLog Date and Time: Process execution date and time (local time)Process Information > New Process Name: Path to the executable file (C:\Windows\System32\schtasks.exe)Process Information > Token Escalation Type: Presence of privilege escalation (1)Process Information > New Process ID: Process ID (hexadecimal)Process Information > Source Process ID: Process ID of the parent process that created the new process. "Creator Process ID" in Windows 7Subject > Logon ID: Session ID of the user who executed the process | 
                  
                    | 10 | Microsoft-Windows-Sysmon/Operational | 12 | Registry object added or deleted (rule: RegistryEvent) | Registry object added or deleted. 
                      EventType: Process type (CreateKey)Image: Path to the executable file (C:\Windows\System32\schtasks.exe)ProcessGuid/ProcessId: Process IDTargetObject: Created/deleted registry key/value (\REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters) | 
                  
                    | 11 | Microsoft-Windows-Sysmon/Operational | 3 | Network connection detected (rule: NetworkConnect) | Network connection detected. 
                      Protocol: Protocol (tcp)DestinationIp: Destination IP address (destination host IP address)Image: Path to the executable fileDestinationHostname: Destination host name (destination host name)ProcessGuid/ProcessId: Process ID (process ID of schtasks.exe)User: Execute as userDestinationPort: Destination port number (135)SourcePort: Source port number (high port)SourceHostname: Source host name (source host name)SourceIp: Source IP address (source host IP address) | 
                  
                    
                    | Security | 5158 | Filtering Platform Connection | The Windows Filtering Platform has permitted a bind to a local port. 
                      Network Information > Protocol: Protocol used (6=TCP)Network Information > Source Port: Bind local port (high port)Application Information > Process ID: Process IDApplication Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe) | 
                  
                    
                    | Security | 5156 | Filtering Platform Connection | The Windows Filtering Platform has allowed a connection. 
                      Network Information > Destination Port: Destination port number (135)Network Information > Source Port: Source port number (high port)Network Information > Destination Address: Destination IP address (destination host)Network Information > Protocol: Protocol used (6=TCP)Application Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe)Network Information > Direction: Communication direction (outbound)Network Information > Source Address: Source IP address (source host)Application Information > Process ID: Process ID | 
                  
                    | 12 | Microsoft-Windows-Sysmon/Operational | 3 | Network connection detected (rule: NetworkConnect) | Network connection detected. 
                      Protocol: Protocol (tcp)DestinationIp: Destination IP address (destination host IP address)Image: Path to the executable fileDestinationHostname: Destination host name (destination host name)ProcessGuid/ProcessId: Process ID (process ID of schtasks.exe)User: Execute as userDestinationPort: Destination port number (high port)SourcePort: Source port number (high port)SourceHostname: Source host name (source host name)SourceIp: Source IP address (source host IP address) | 
                  
                    
                    | Security | 5158 | Filtering Platform Connection | The Windows Filtering Platform has permitted a bind to a local port. 
                      Network Information > Protocol: Protocol used (6=TCP)Network Information > Source Port: Bind local port (high port)Application Information > Process ID: Process IDApplication Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe) | 
                  
                    
                    | Security | 5156 | Filtering Platform Connection | The Windows Filtering Platform has allowed a connection. 
                      Network Information > Destination Port: Destination port number (high port)Network Information > Source Port: Source port number (high port)Network Information > Destination Address: Destination IP address (destination host)Network Information > Protocol: Protocol used (6=TCP)Application Information > Application Name: Execution process (\device\harddiskvolume2\windows\system32\schtasks.exe)Network Information > Direction: Communication direction (outbound)Network Information > Source Address: Source IP address (source host)Application Information > Process ID: Process ID | 
                  
                    | 13 | Security | 4648 | Logon | A logon was attempted using explicit credentials. 
                      Process Information > Process ID: Process ID that attempted the logonAccount for which Credentials were Used > Account Name: Specified account name (user specified by the schtasks.exe command line)Subject > Logon ID/Logon GUID: Session ID of the user who executed the authenticationSubject > Account Domain: Domain to which the account belongsTarget Server > Target Server Name: Logon destination host name (destination host)Process Information > Process Name: Name of the process that attempted the logon (C:\Windows\System32\schtasks.exe)Subject > Account Name: Name of the account that executed the toolSubject > Security ID: SID of the user who executed the toolTarget Server > Additional Information: Additional information on the logon destination host (destination host)Account for which Credentials were Used > Account Domain: Domain to which the specified account belongs (domain of the user specified by the schtasks.exe command line) | 
                  
                    | 14 | Microsoft-Windows-Sysmon/Operational | 5 | Process terminated (rule: ProcessTerminate) | Process terminated. 
                      UtcTime: Process terminated date and time (UTC)ProcessGuid/ProcessId: Process IDImage: Path to the executable file (C:\Windows\System32\schtasks.exe) | 
                  
                    
                    | Security | 4689 | Process Termination | A process has exited. 
                      Process Information > Process ID: Process ID (hexadecimal)Subject > Security ID/Account Name/Account Domain: SID/Account name/Domain of the user who executed the toolProcess Information > Exit Status: Process return value (0x0)Log Date and Time: Process terminated date and time (local time)Process Information > Process Name: Path to the executable file (C:\Windows\System32\schtasks.exe)Subject > Logon ID: Session ID of the user who executed the process |