Question Analysis

A process is running under a familiar Windows host name but originates from a user's AppData folder rather than the System32 directory. Identify the filename used to masquerade the PowerShell binary on this Windows device.

ac9d0fc3-8aa8-4ab5-b11f-682cd63b40aa
Question ID
6/16
Models Correct
1
Valid Answer
38%
Success Rate
Reference Answer

Human-validated correct answer for this question

taskhostw.exe
Model Performance Comparison

See how different AI models performed on this question

ModelAnswerKQL QueryStatusAttemptsTimeCost
gemini-2.5-flash-preview-04-17
svchost.exe
DeviceProcessEvents | where ActionType == "ProcessCreated" | where FolderPath contains "AppData" | where FolderPath !contains "System32" | project Timestamp, DeviceName, FolderPath, FileName, ProcessCommandLine, InitiatingProcessFileName
Incorrect
2
22.64s
0.0107
gpt-35-turbo
No answer provided
No query generated
Incorrect
5
0.00s
0.0109
gpt-4-turbo-2024-04-09
No answer provided
No query generated
Incorrect
5
0.00s
0.2288
gpt-4.1
taskhostw.exe
DeviceProcessEvents | where (ProcessVersionInfoInternalFileName =~ "powershell.exe" or ProcessVersionInfoOriginalFileName =~ "powershell.exe") // Exclude standard System32 path | where tolower(FolderPath) has "appdata" and not(tolower(FolderPath) has "windows\\system32") | project TimeGenerated, DeviceName, FileName, FolderPath, ProcessCommandLine, AccountName, ProcessVersionInfoCompanyName, ProcessVersionInfoFileDescription, ProcessVersionInfoOriginalFileName | order by TimeGenerated desc
Correct
2
10.54s
0.0224
gpt-4.1-finetuned
No answer provided
No query generated
Incorrect
5
0.00s
0.0386
gpt-4.1-mini
svchost.exe
DeviceProcessEvents | where FolderPath contains "AppData" | where FileName != "powershell.exe" and (InitiatingProcessVersionInfoOriginalFileName == "powershell.exe" or InitiatingProcessVersionInfoFileDescription contains "PowerShell") | summarize count() by FileName, FolderPath, DeviceName, InitiatingProcessFileName, InitiatingProcessFolderPath | project FileName, FolderPath, DeviceName, InitiatingProcessFileName, InitiatingProcessFolderPath | take 10
Incorrect
1
5.98s
0.0023
gpt-4.1-nano
No answer provided
No query generated
Incorrect
5
0.00s
0.0015
gpt-4o
No answer provided
No query generated
Incorrect
5
0.00s
0.0459
grok-3-beta
No answer provided
No query generated
Incorrect
5
0.00s
0.0929
grok-3-mini-beta
taskhostw.exe
DeviceProcessEvents | where FolderPath contains 'AppData' and not(FolderPath contains 'System32') | where ProcessVersionInfoOriginalFileName contains 'powershell' | distinct FileName
Correct
2
22.49s
0.0029
o1-high
taskhostw.exe
DeviceProcessEvents | where ActionType == "ProcessCreated" | where ProcessVersionInfoOriginalFileName == "PowerShell.EXE" | where FolderPath contains "AppData" | project TimeGenerated, DeviceName, FolderPath, FileName, ProcessCommandLine, SHA256
Correct
1
42.44s
0.1654
o1-low
taskhostw.exe
DeviceProcessEvents | where ActionType == "ProcessCreated" | where tolower(ProcessVersionInfoOriginalFileName) == "powershell.exe" | where tolower(FolderPath) has "users" and tolower(FolderPath) has "appdata" | project TimeGenerated, DeviceName, FolderPath, FileName, ProcessCommandLine, AccountName, AccountDomain | order by TimeGenerated desc
Correct
2
57.04s
0.4173
o3-mini-high
svchost.exe
DeviceProcessEvents | where ActionType == "ProcessCreated" | where tolower(FolderPath) contains "appdata" and tolower(FolderPath) !contains "system32" | where tolower(InitiatingProcessVersionInfoOriginalFileName) == "powershell.exe" | where tolower(FileName) != "powershell.exe" | project TimeGenerated, DeviceName, FileName, FolderPath, ProcessCommandLine, InitiatingProcessVersionInfoOriginalFileName | limit 50
Incorrect
2
35.42s
0.0234
o3-mini-low
svchost.exe
DeviceProcessEvents | where tolower(FolderPath) contains "appdata" and tolower(FolderPath) !contains "system32" | where tolower(ProcessCommandLine) contains "powershell" or tolower(InitiatingProcessVersionInfoOriginalFileName) contains "powershell" | project TimeGenerated, DeviceName, FileName, InitiatingProcessVersionInfoOriginalFileName, FolderPath, ProcessCommandLine, ProcessId | sort by TimeGenerated desc
Incorrect
3
55.06s
0.0373
o4-mini-high
taskhostw.exe
DeviceProcessEvents // Processes launched from a user AppData folder (not the system path) | where FolderPath has "\\Users\\" and FolderPath has "\\AppData\\" and not(FolderPath has "\\Windows\\System32\\") // Identify entries where the original file name is PowerShell but the actual file name differs | where tolower(ProcessVersionInfoOriginalFileName) == "powershell.exe" and tolower(FileName) != "powershell.exe" // Aggregate by the masquerade filename | summarize Occurrences = count() by MasqueradeFile = FileName | sort by Occurrences desc
Correct
5
169.55s
0.0362
o4-mini-low
taskhostw.exe
DeviceProcessEvents | where FolderPath has "\\AppData\\" // Running out of a user profile AppData folder | where ProcessVersionInfoOriginalFileName endswith "powershell.exe" // Internally still PowerShell | where FileName != "powershell.exe" // Exclude the real PowerShell binary name | distinct FileName
Correct
1
41.01s
0.0064