title: DN_0022_19_windows_sysmon_WmiEvent description: > When a WMI event filter is registered, which is a method used by malware to execute, this event logs the WMI namespace, filter name and filter expression loggingpolicy: - LP_0010_windows_sysmon_WmiEvent references: - https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-19.md - https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90019 category: OS Logs platform: Windows type: Applications and Services Logs channel: Microsoft-Windows-Sysmon/Operational provider: Microsoft-Windows-Sysmon fields: - EventID - Computer - Hostname # redundant - UtcTime - EventType - Operation - User - EventNamespace - Name - Query - RuleName sample: | - - 19 3 4 19 0 0x8000000000000000 46712 Microsoft-Windows-Sysmon/Operational atc-win-10.atc.local - WmiFilterEvent 2019-02-05 14:44:42.432 Created atc-win-10\user1 "root\\CimV2" "AtomicRedTeam-WMIPersistence-Example" "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 240 AND TargetInstance.SystemUpTime < 325"