Skip to content

<<< Hide Navigation Hide TOC >>>

DLL Loaded From Suspicious Location Via Cmspt.EXE (75e508f7-932d-4ebc-af77-269237a84ce1)

Detects cmstp loading "dll" or "ocx" files from suspicious locations

Galaxy ColorsSigma-Rule...Attack Pat...
Rows: 2
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
DLL Loaded From Suspicious Location Via Cmspt.EXE (75e508f7-932d-4ebc-af77-269237a84ce1) Sigma-Rules CMSTP - T1218.003 (4cbc6a62-9e34-4f94-8a19-5c1a11392a49) Attack Pattern 1
CMSTP - T1218.003 (4cbc6a62-9e34-4f94-8a19-5c1a11392a49) Attack Pattern System Binary Proxy Execution - T1218 (457c7820-d331-465a-915e-42f85500ccc4) Attack Pattern 2