Microsoft-Windows-WMI-Activity

25 events across 3 channels

Event IDTitleChannel
1GroupOperationId = GroupOperationId; OperationId = OperationId; Operation = …Trace
2ProviderInfo for GroupOperationId = GroupOperationId; Operation = Operation; …Trace
3Stop OperationId = OperationId.Trace
11CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId …Trace
12ProviderInfo for GroupOperationId = GroupOperationId; Operation = Operation; …Trace
13Stop OperationId = OperationId; ResultCode = ResultCode.Trace
14OperationId = OperationId; Operation = Operation; Channel = Channel; Message = …Trace
15OperationId = OperationId; Operation = Operation; ErrorID = ErrorId; …Trace
16OperationId = OperationId; Operation = Operation; ErrorID = ErrorId; Message = …Trace
17CorrelationId = CorrelationId; ProcessId = ProcessId; Protocol = Protocol; …Trace
18WMI Events were dropped.Trace
19Performing delete operation on the WMI repository.Trace
20Performing Update operation on the WMI repository.Trace
21WMI Events were bound.Trace
22CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId …Trace
23CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId …Trace
24GroupOperationId = GroupOperationId; Executing polling query Query in namespace …Trace
50Activity TransferTrace
100ComponentName = ComponentName; MessageDetail = MessageDetail; FileName = …Debug
101ComponentName = ComponentName; ErrorId = ErrorId; ErrorDetail = ErrorDetail; …Debug
5857Operation_StartedOperational.ProviderName provider started with result code …Operational
5858Id = Operation_ClientFailure.Id; ClientMachine = …Operational
5859Namespace = Operation_EssStarted.NamespaceName; NotificationQuery = …Operational
5860Namespace = Operation_TemporaryEssStarted.NamespaceName; NotificationQuery = …Operational
5861Namespace = Operation_ESStoConsumerBinding.Namespace; Eventfilter = …Operational

Event ID 1 — GroupOperationId = GroupOperationId; OperationId = OperationId; Operation = Operation; ClientMachine = ClientMachine; User = User; ClientProcessId = ClientProcessId; NamespaceName = NamespaceName.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

GroupOperationId = GroupOperationId; OperationId = OperationId; Operation = Operation; ClientMachine = ClientMachine; User = User; ClientProcessId = ClientProcessId; NamespaceName = NamespaceName.

Message #

GroupOperationId = %1; OperationId = %2; Operation = %3; ClientMachine = %4; User = %5; ClientProcessId = %6; NamespaceName = %7

Fields #

NameDescription
GroupOperationId UInt32
OperationId UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ClientMachine UnicodeString
User UnicodeString
ClientProcessId UInt32
NamespaceName UnicodeString

Event ID 2 — ProviderInfo for GroupOperationId = GroupOperationId; Operation = Operation; ProviderName = ProviderName; ProviderGuid = ProviderGuid; Path = Path.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

ProviderInfo for GroupOperationId = GroupOperationId; Operation = Operation; ProviderName = ProviderName; ProviderGuid = ProviderGuid; Path = Path.

Message #

ProviderInfo for GroupOperationId = %1; Operation = %2; ProviderName = %3; ProviderGuid = %4; Path = %5

Fields #

NameDescription
GroupOperationId UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ProviderName UnicodeString
ProviderGuid UnicodeString
Path UnicodeString

Event ID 3 — Stop OperationId = OperationId.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

Stop OperationId = OperationId.

Message #

Stop OperationId = %1

Fields #

NameDescription
OperationId UInt32

Event ID 11 — CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId = OperationId; Operation = Operation; ClientMachine = ClientMachine; User = User; ClientProcessId = ClientProcessId; ...

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId = OperationId; Operation = Operation; ClientMachine = ClientMachine; User = User; ClientProcessId = ClientProcessId; NamespaceName = ClientProcessCreationTime.

Message #

CorrelationId = %1; GroupOperationId = %2; OperationId = %3; Operation = %4; ClientMachine = %5; User = %7; ClientProcessId = %8; NamespaceName = %9

Fields #

NameDescription
Operation_New.CorrelationId
Operation_New.GroupOperationId
Operation_New.OperationId
Operation_New.Operation
Operation_New.ClientMachine
Operation_New.ClientMachineFQDN
Operation_New.User
Operation_New.ClientProcessId
Operation_New.ClientProcessCreationTime
Operation_New.NamespaceName
Operation_New.IsLocal
CorrelationId UnicodeString
GroupOperationId UInt32
OperationId UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ClientMachine UnicodeString
ClientMachineFQDN UnicodeString
User UnicodeString
ClientProcessId UInt32
ClientProcessCreationTime UInt64
NamespaceName UnicodeString
IsLocal Boolean

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 11,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T21:02:22.5390626+00:00",
    "event_record_id": 3702,
    "correlation": {
      "ActivityID": "a5a72efc-0725-4af3-8928-2c7be294af3b",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 3776,
      "thread_id": 14888
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "Operation_New": {
      "CorrelationId": "{EB2F7CD8-77D6-447B-8B41-85BBC0F0CD29}",
      "GroupOperationId": "33824",
      "OperationId": "33915",
      "Operation": "Start IWbemServices::DeleteInstance - Root\\Rsop\\Computer : RSOP_ExtensionStatus.extensionGuid=\"{FB2CA36D-0B40-4307-821B-A13B252DE56C}\"",
      "ClientMachine": "DESKTOP-K7Q9MS2",
      "ClientMachineFQDN": "DESKTOP-K7Q9MS2",
      "User": "NT AUTHORITY\\SYSTEM",
      "ClientProcessId": "5592",
      "ClientProcessCreationTime": "134223150821160298",
      "NamespaceName": "\\\\.\\Root\\Rsop\\Computer",
      "IsLocal": "true"
    }
  },
  "message": "CorrelationId = {EB2F7CD8-77D6-447B-8B41-85BBC0F0CD29}; GroupOperationId = 33824; OperationId = 33915; Operation = Start IWbemServices::DeleteInstance - Root\\Rsop\\Computer : RSOP_ExtensionStatus.extensionGuid=\"{FB2CA36D-0B40-4307-821B-A13B252DE56C}\"; ClientMachine = DESKTOP-K7Q9MS2; User = NT AUTHORITY\\SYSTEM; ClientProcessId = 5592; NamespaceName = 134223150821160298"
}

Event ID 12 — ProviderInfo for GroupOperationId = GroupOperationId; Operation = Operation; HostID = HostId; ProviderName = ProviderName; ProviderGuid = ProviderGuid; Path = Path.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

ProviderInfo for GroupOperationId = GroupOperationId; Operation = Operation; HostID = HostId; ProviderName = ProviderName; ProviderGuid = ProviderGuid; Path = Path.

Message #

ProviderInfo for GroupOperationId = %1; Operation = %2; HostID = %3; ProviderName = %4; ProviderGuid = %5; Path = %6

Fields #

NameDescription
Operation_Provider_Info_New.GroupOperationId
Operation_Provider_Info_New.Operation
Operation_Provider_Info_New.HostId
Operation_Provider_Info_New.ProviderName
Operation_Provider_Info_New.ProviderGuid
Operation_Provider_Info_New.Path
GroupOperationId UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
HostId UInt32
ProviderName UnicodeString
ProviderGuid UnicodeString
Path UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 12,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T21:02:08.7213624+00:00",
    "event_record_id": 2932,
    "correlation": {
      "ActivityID": "c4d83776-df9b-4f73-8eb3-abf6fdb18958",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 3776,
      "thread_id": 15356
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "Operation_Provider_Info_New": {
      "GroupOperationId": "33752",
      "Operation": "Provider::ExecQuery - CIMWin32 : select __RELPATH, __RELPATH from Win32_Process",
      "HostId": "14556",
      "ProviderName": "CIMWin32",
      "ProviderGuid": "{d63a5850-8f16-11cf-9f47-00aa00bf345c}",
      "Path": "%systemroot%\\system32\\wbem\\cimwin32.dll"
    }
  },
  "message": "ProviderInfo for GroupOperationId = 33752; Operation = Provider::ExecQuery - CIMWin32 : select __RELPATH, __RELPATH from Win32_Process; HostID = 14556; ProviderName = CIMWin32; ProviderGuid = {d63a5850-8f16-11cf-9f47-00aa00bf345c}; Path = %systemroot%\\system32\\wbem\\cimwin32.dll"
}

Event ID 13 — Stop OperationId = OperationId; ResultCode = ResultCode.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

Stop OperationId = OperationId; ResultCode = ResultCode.

Message #

Stop OperationId = %1; ResultCode = %2

Fields #

NameDescription
Operation_Stop_New.OperationId
Operation_Stop_New.ResultCode
OperationId UInt32
ResultCode HexInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 13,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T21:02:22.5397755+00:00",
    "event_record_id": 3704,
    "correlation": {
      "ActivityID": "eda08d7d-6e98-43be-adba-1f74e64b4281",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 3776,
      "thread_id": 14888
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "Operation_Stop_New": {
      "OperationId": "33915",
      "ResultCode": "0x80041002"
    }
  },
  "message": "Stop OperationId = 33915; ResultCode = 0x80041002"
}

Event ID 14 — OperationId = OperationId; Operation = Operation; Channel = Channel; Message = Message.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

OperationId = OperationId; Operation = Operation; Channel = Channel; Message = Message.

Message #

OperationId = %1; Operation = %2; Channel = %3; Message = %4

Fields #

NameDescription
OperationId UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
Channel UInt32
Message UnicodeString

Event ID 15 — OperationId = OperationId; Operation = Operation; ErrorID = ErrorId; ErrorCategory = ErrorCategory; Message = Message; TargetName = TargetName.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

OperationId = OperationId; Operation = Operation; ErrorID = ErrorId; ErrorCategory = ErrorCategory; Message = Message; TargetName = TargetName.

Message #

OperationId = %1; Operation = %2; ErrorID = %3; ErrorCategory = %4; Message = %5; TargetName = %6

Fields #

NameDescription
OperationId UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ErrorId UnicodeString
ErrorCategory UInt32
Message UnicodeString
TargetName UnicodeString

Event ID 16 — OperationId = OperationId; Operation = Operation; ErrorID = ErrorId; Message = Message.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

OperationId = OperationId; Operation = Operation; ErrorID = ErrorId; Message = Message.

Message #

OperationId = %1; Operation = %2; ErrorID = %3; Message = %4

Fields #

NameDescription
Operation_Provider_Result.OperationId
Operation_Provider_Result.Operation
Operation_Provider_Result.ErrorId
Operation_Provider_Result.Message
OperationId UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ErrorId HexInt32
Message UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 16,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T20:59:47.4850086+00:00",
    "event_record_id": 1271,
    "correlation": {
      "ActivityID": "64478093-d4f9-0001-b4d0-5164f9d4dc01",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 3536,
      "thread_id": 11712
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "Operation_Provider_Result": {
      "OperationId": "32845",
      "Operation": "Method Execution",
      "ErrorId": "0x0",
      "Message": ""
    }
  },
  "message": "OperationId = 32845; Operation = Method Execution; ErrorID = 0x0; Message = "
}

Event ID 17 — CorrelationId = CorrelationId; ProcessId = ProcessId; Protocol = Protocol; Operation = Operation; User = User; Namespace = Namespace.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

CorrelationId = CorrelationId; ProcessId = ProcessId; Protocol = Protocol; Operation = Operation; User = User; Namespace = Namespace.

Message #

CorrelationId = %1; ProcessId = %2; Protocol = %3; Operation = %4; User = %5; Namespace = %6

Fields #

NameDescription
Operation_Client.CorrelationId
Operation_Client.ProcessId
Operation_Client.Protocol
Operation_Client.Operation
Operation_Client.User
Operation_Client.Namespace
CorrelationId UnicodeString
ProcessId UInt32
Protocol UnicodeString
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
User UnicodeString
Namespace UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 17,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T21:02:08.7157677+00:00",
    "event_record_id": 2926,
    "correlation": {
      "ActivityID": "64478093-d4f9-0007-03d4-5464f9d4dc01",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 12952,
      "thread_id": 11016
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "Operation_Client": {
      "CorrelationId": "{64478093-D4F9-0007-03D4-5464F9D4DC01}",
      "ProcessId": "12952",
      "Protocol": "DCOM",
      "Operation": "MI_Session::EnumerateInstance",
      "User": "NULL",
      "Namespace": "root\\cimv2"
    }
  },
  "message": "CorrelationId = {64478093-D4F9-0007-03D4-5464F9D4DC01}; ProcessId = 12952; Protocol = DCOM; Operation = MI_Session::EnumerateInstance; User = NULL; Namespace = root\\cimv2"
}

Event ID 18 — WMI Events were dropped.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

WMI Events were dropped. ConsumerType = ConsumerType; Possiblecause = PossibleCause.

Message #

WMI Events were dropped. ConsumerType = %1; Possiblecause = %2

Fields #

NameDescription
ConsumerType UnicodeString
PossibleCause UnicodeString

Event ID 19 — Performing delete operation on the WMI repository.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

Performing delete operation on the WMI repository. OperationID = OperationID; Operation = Operation.

Message #

Performing delete operation on the WMI repository. OperationID = %1; Operation = %2

Fields #

NameDescription
Operation_RepDelete.OperationID
Operation_RepDelete.Operation
OperationID UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ClientProcessId UInt32
ClientMachineFQDN UnicodeString
ClientProcessCreationTime UInt64
IsLocal Boolean

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 19,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T21:02:22.4784408+00:00",
    "event_record_id": 3467,
    "correlation": {
      "ActivityID": "b1d8c3f2-a930-480b-bcb8-cb95471878d4",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 3776,
      "thread_id": 12224
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "Operation_RepDelete": {
      "OperationID": "33824",
      "Operation": "\\\\DESKTOP-K7Q9MS2\\ROOT\\Rsop\\Computer:RSOP_RegistryPolicySetting.id=\"{852A0000-5369-4B5D-A940-3515E805B186}\",precedence=1"
    }
  },
  "message": "Performing delete operation on the WMI repository. OperationID = 33824; Operation = \\\\DESKTOP-K7Q9MS2\\ROOT\\Rsop\\Computer:RSOP_RegistryPolicySetting.id=\"{852A0000-5369-4B5D-A940-3515E805B186}\",precedence=1"
}

Event ID 20 — Performing Update operation on the WMI repository.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

Performing Update operation on the WMI repository. OperationID = OperationID; Operation = Operation; Flags = Flags.

Message #

Performing Update operation on the WMI repository. OperationID = %1; Operation = %2; Flags = %3

Fields #

NameDescription
Operation_RepUpdate.OperationID
Operation_RepUpdate.Operation
Operation_RepUpdate.Flags
OperationID UInt32
Operation UnicodeString
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
Flags UInt32
ClientProcessId UInt32
ClientMachineFQDN UnicodeString
ClientProcessCreationTime UInt64
IsLocal Boolean

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 20,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T21:02:22.4902463+00:00",
    "event_record_id": 3508,
    "correlation": {
      "ActivityID": "258aa0ca-4464-4d48-85ef-f9a43cd8ccbf",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 3776,
      "thread_id": 14888
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "Operation_RepUpdate": {
      "OperationID": "33824",
      "Operation": "RSOP_ExtensionStatus.extensionGuid=\"{35378EAC-683F-11D2-A89A-00C04FBBCFA2}\"",
      "Flags": "1"
    }
  },
  "message": "Performing Update operation on the WMI repository. OperationID = 33824; Operation = RSOP_ExtensionStatus.extensionGuid=\"{35378EAC-683F-11D2-A89A-00C04FBBCFA2}\"; Flags = 1"
}

Event ID 21 — WMI Events were bound.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

WMI Events were bound. ConsumerType = ConsumerType; Possiblecause = PossibleCause.

Message #

WMI Events were bound. ConsumerType = %1; Possiblecause = %2

Fields #

NameDescription
ConsumerType UnicodeString
PossibleCause UnicodeString

Detection Rules #

View all rules referencing this event →

Elastic # view in reference

Event ID 22 — CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId = OperationId; ClassName= ClassName; MethodName = MethodName; ImplementationClass = ImplementationClass; ClientMachin...

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId = OperationId; ClassName= ClassName; MethodName = MethodName; ImplementationClass = ImplementationClass; ClientMachine = ClientMachine; User = User; ClientProcessId = ClientProcessId; NamespaceName = NamespaceName.

Message #

CorrelationId = %1; GroupOperationId = %2; OperationId = %3; ClassName= %4; MethodName = %5; ImplementationClass = %6; ClientMachine = %7; User = %9; ClientProcessId = %10; NamespaceName = %12

Fields #

NameDescription
MethodExec.CorrelationId
MethodExec.GroupOperationId
MethodExec.OperationId
MethodExec.ClassName
MethodExec.MethodName
MethodExec.ImplementationClass
MethodExec.ClientMachine
MethodExec.ClientMachineFQDN
MethodExec.User
MethodExec.ClientProcessId
MethodExec.ClientProcessCreationTime
MethodExec.NamespaceName
MethodExec.IsLocal
CorrelationId UnicodeString
GroupOperationId UInt32
OperationId UInt32
ClassName UnicodeString
MethodName UnicodeString
ImplementationClass UnicodeString
ClientMachine UnicodeString
ClientMachineFQDN UnicodeString
User UnicodeString
ClientProcessId UInt32
ClientProcessCreationTime UInt64
NamespaceName UnicodeString
IsLocal Boolean

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 22,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T20:57:44.1010074+00:00",
    "event_record_id": 227,
    "correlation": {
      "ActivityID": "09b2d503-9f8b-44d1-b13f-a24eb51f7612",
      "RelatedActivityID": ""
    },
    "execution": {
      "process_id": 3776,
      "thread_id": 15116
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "user_data": {
    "MethodExec": {
      "CorrelationId": "{8D9DCB76-6D12-4141-8AD2-CAE6C7B89797}",
      "GroupOperationId": "32845",
      "OperationId": "32842",
      "ClassName": "MSFT_MpScan",
      "MethodName": "Start",
      "ImplementationClass": "MSFT_MpScan",
      "ClientMachine": "DESKTOP-K7Q9MS2",
      "ClientMachineFQDN": "DESKTOP-K7Q9MS2",
      "User": "DESKTOP-K7Q9MS2\\localuser",
      "ClientProcessId": "14256",
      "ClientProcessCreationTime": "134223154630497608",
      "NamespaceName": "\\\\.\\ROOT\\Microsoft\\Windows\\Defender",
      "IsLocal": "true"
    }
  },
  "message": "CorrelationId = {8D9DCB76-6D12-4141-8AD2-CAE6C7B89797}; GroupOperationId = 32845; OperationId = 32842; ClassName= MSFT_MpScan; MethodName = Start; ImplementationClass = MSFT_MpScan; ClientMachine = DESKTOP-K7Q9MS2; User = DESKTOP-K7Q9MS2\\localuser; ClientProcessId = 14256; NamespaceName = \\\\.\\ROOT\\Microsoft\\Windows\\Defender"
}

Event ID 23 — CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId = OperationId; Commandline= Commandline; CreatedProcessId = CreatedProcessId; ClientMachine = CreatedProcessCreationT...

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

CorrelationId = CorrelationId; GroupOperationId = GroupOperationId; OperationId = OperationId; Commandline= Commandline; CreatedProcessId = CreatedProcessId; ClientMachine = CreatedProcessCreationTime; User = ClientMachineFQDN; ClientProcessId = User.

Message #

CorrelationId = %1; GroupOperationId = %2; OperationId = %3; Commandline= %4; CreatedProcessId = %5; ClientMachine = %6; User = %8; ClientProcessId = %9

Fields #

NameDescription
CorrelationId UnicodeString
GroupOperationId UInt32
OperationId UInt32
Commandline UnicodeString
CreatedProcessId UInt32
CreatedProcessCreationTime UInt64
ClientMachine UnicodeString
ClientMachineFQDN UnicodeString
User UnicodeString
ClientProcessId UInt32
ClientProcessCreationTime UInt64
IsLocal Boolean

Event ID 24 — GroupOperationId = GroupOperationId; Executing polling query Query in namespace NamespaceName.

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace

Description

GroupOperationId = GroupOperationId; Executing polling query Query in namespace NamespaceName.

Message #

GroupOperationId = %1; Executing polling query %2 in namespace %3

Fields #

NameDescription
GroupOperationId UInt32
Query UnicodeString
NamespaceName UnicodeString

Event ID 50 — Activity Transfer

Provider
Microsoft-Windows-WMI-Activity
Channel
Trace
Level
4

Description

Activity Transfer.

Message #

Activity Transfer

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418ef04-b0b4-4623-bf7e-d74ab47bbdaa",
    "event_source_name": "",
    "event_id": 50,
    "version": 0,
    "level": 4,
    "task": 0,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-05-03T21:02:22.5402448+00:00",
    "event_record_id": 3705,
    "correlation": {
      "ActivityID": "bf89d6b0-0749-4787-9648-37993808a186",
      "RelatedActivityID": "eb2f7cd8-77d6-447b-8b41-85bbc0f0cd29"
    },
    "execution": {
      "process_id": 3776,
      "thread_id": 14888
    },
    "channel": "Microsoft-Windows-WMI-Activity/Trace",
    "computer": "DESKTOP-K7Q9MS2",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": "Activity Transfer"
}

Event ID 100 — ComponentName = ComponentName; MessageDetail = MessageDetail; FileName = FileName.

Provider
Microsoft-Windows-WMI-Activity
Channel
Debug

Description

ComponentName = ComponentName; MessageDetail = MessageDetail; FileName = FileName.

Message #

ComponentName = %1; MessageDetail = %2; FileName = %3

Fields #

NameDescription
ComponentName UnicodeString
MessageDetail UnicodeString
FileName UnicodeString

Event ID 101 — ComponentName = ComponentName; ErrorId = ErrorId; ErrorDetail = ErrorDetail; FileName = FileName.

Provider
Microsoft-Windows-WMI-Activity
Channel
Debug

Description

ComponentName = ComponentName; ErrorId = ErrorId; ErrorDetail = ErrorDetail; FileName = FileName.

Message #

ComponentName = %1; ErrorId = %2; ErrorDetail = %3; FileName = %4

Fields #

NameDescription
ComponentName UnicodeString
ErrorId HexInt32
ErrorDetail UnicodeString
FileName UnicodeString

Event ID 5857 — Operation_StartedOperational.ProviderName provider started with result code Operation_StartedOperational.Code.

#
Provider
Microsoft-Windows-WMI-Activity
Channel
Operational
Collection Priority
Recommended (Palantir, others)

Description

Operation_StartedOperational.ProviderName provider started with result code Operation_StartedOperational.Code. HostProcess = Operation_StartedOperational.HostProcess; ProcessID = Operation_StartedOperational.ProcessID; ProviderPath = Operation_StartedOperational.ProviderPath.

Message #

%1 provider started with result code %2. HostProcess = %3; ProcessID = %4; ProviderPath = %5

Fields #

NameDescription
Operation_StartedOperational.ProviderName
Operation_StartedOperational.Code
Operation_StartedOperational.HostProcess
Operation_StartedOperational.ProcessID
Operation_StartedOperational.ProviderPath

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418EF04-B0B4-4623-BF7E-D74AB47BBDAA",
    "event_source_name": "",
    "event_id": 5857,
    "version": 0,
    "level": 0,
    "task": 0,
    "opcode": 0,
    "keywords": 4611686018427387904,
    "time_created": "2023-11-06T01:54:48.665106+00:00",
    "event_record_id": 2401,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0003-A64E-DBE43710DA01"
    },
    "execution": {
      "process_id": 4404,
      "thread_id": 14236
    },
    "channel": "Microsoft-Windows-WMI-Activity/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-20"
    }
  },
  "user_data": {
    "Operation_StartedOperational": {
      "ProviderName": "netnat",
      "Code": "0x0",
      "HostProcess": "wmiprvse.exe",
      "ProcessID": 4404,
      "ProviderPath": "%systemroot%\\system32\\wbem\\NetNat.dll"
    }
  },
  "message": ""
}

References #

Event ID 5858 — Id = Operation_ClientFailure.Id; ClientMachine = Operation_ClientFailure.ClientMachine; User = Operation_ClientFailure.User; ClientProcessId = Operation_ClientFailure.ClientProcessId; Component = O...

#
Provider
Microsoft-Windows-WMI-Activity
Channel
Operational
Level
Error
Collection Priority
Recommended (Palantir, others)

Description

Id = ; ClientMachine = ; User = ; ClientProcessId = ; Component = ; Operation = ; ResultCode = ; PossibleCause =.

Message #

Id = %1; ClientMachine = %2; User = %3; ClientProcessId = %4; Component = %5; Operation = %6; ResultCode = %7; PossibleCause = %8

Fields #

NameDescription
Operation_ClientFailure.Id
Operation_ClientFailure.ClientMachine
Operation_ClientFailure.User
Operation_ClientFailure.ClientProcessId
Operation_ClientFailure.Component
Operation_ClientFailure.Operation
Operation_ClientFailure.ResultCode
Operation_ClientFailure.PossibleCause

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418EF04-B0B4-4623-BF7E-D74AB47BBDAA",
    "event_source_name": "",
    "event_id": 5858,
    "version": 0,
    "level": 2,
    "task": 0,
    "opcode": 0,
    "keywords": 4611686018427387904,
    "time_created": "2023-11-06T01:47:52.150550+00:00",
    "event_record_id": 2399,
    "correlation": {},
    "execution": {
      "process_id": 3340,
      "thread_id": 10792
    },
    "channel": "Microsoft-Windows-WMI-Activity/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "user_data": {
    "Operation_ClientFailure": {
      "Id": "{00000000-0000-0000-0000-000000000000}",
      "ClientMachine": "WINDEV2310EVAL",
      "User": "WINDEV2310EVAL\\User",
      "ClientProcessId": 12004,
      "Component": "Unknown",
      "Operation": "Start IWbemServices::ExecQuery - ROOT\\CIMV2 : SELECT Family,VirtualizationFirmwareEnabled FROM Win32_Processor",
      "ResultCode": "0x80041032",
      "PossibleCause": "Unknown"
    }
  },
  "message": ""
}

References #

Event ID 5859 — Namespace = Operation_EssStarted.NamespaceName; NotificationQuery = Operation_EssStarted.Query; OwnerName = Operation_EssStarted.User; HostProcessID = Operation_EssStarted.Processid; Provider= Oper...

#
Provider
Microsoft-Windows-WMI-Activity
Channel
Operational
Collection Priority
Recommended (Palantir, others)

Description

Namespace = ; NotificationQuery = ; OwnerName = ; HostProcessID = ; Provider= , queryID = ; PossibleCause =.

Message #

Namespace = %1; NotificationQuery = %2; OwnerName = %3; HostProcessID = %4;  Provider= %5, queryID = %6; PossibleCause = %7

Fields #

NameDescription
Operation_EssStarted.NamespaceName
Operation_EssStarted.Query
Operation_EssStarted.User
Operation_EssStarted.Processid
Operation_EssStarted.Provider
Operation_EssStarted.queryid
Operation_EssStarted.PossibleCause

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418EF04-B0B4-4623-BF7E-D74AB47BBDAA",
    "event_source_name": "",
    "event_id": 5859,
    "version": 0,
    "level": 0,
    "task": 0,
    "opcode": 0,
    "keywords": 4611686018427387904,
    "time_created": "2022-04-07T16:53:42.548405+00:00",
    "event_record_id": 562,
    "correlation": {
      "ActivityID": "E0AAB88C-4A9F-0001-86B9-AAE09F4AD801"
    },
    "execution": {
      "process_id": 2456,
      "thread_id": 3588
    },
    "channel": "Microsoft-Windows-WMI-Activity/Operational",
    "computer": "WIN-FPV0DSIC9O6.lab.local",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "user_data": {
    "Operation_EssStarted": {
      "NamespaceName": "//./root/CIMV2",
      "Query": "select * from MSFT_SCMEventLogEvent",
      "User": "S-1-5-32-544",
      "Processid": 2456,
      "Provider": "SCM Event Provider",
      "queryid": 0,
      "PossibleCause": "Permanent"
    }
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Can be used for remote execution.

References #

Event ID 5860 — Namespace = Operation_TemporaryEssStarted.NamespaceName; NotificationQuery = Operation_TemporaryEssStarted.Query; UserName = Operation_TemporaryEssStarted.User; ClientProcessID = Operation_Temporar...

#
Provider
Microsoft-Windows-WMI-Activity
Channel
Operational
Collection Priority
Recommended (Palantir, others)

Description

Namespace = ; NotificationQuery = ; UserName = ; ClientProcessID = , ClientMachine = ; PossibleCause =.

Message #

Namespace = %1; NotificationQuery = %2; UserName = %3; ClientProcessID = %4, ClientMachine = %5; PossibleCause = %6

Fields #

NameDescription
Operation_TemporaryEssStarted.NamespaceName
Operation_TemporaryEssStarted.Query
Operation_TemporaryEssStarted.User
Operation_TemporaryEssStarted.Processid
Operation_TemporaryEssStarted.ClientMachine
Operation_TemporaryEssStarted.PossibleCause

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418EF04-B0B4-4623-BF7E-D74AB47BBDAA",
    "event_source_name": "",
    "event_id": 5860,
    "version": 0,
    "level": 0,
    "task": 0,
    "opcode": 0,
    "keywords": 4611686018427387904,
    "time_created": "2023-11-05T22:52:28.183845+00:00",
    "event_record_id": 1567,
    "correlation": {},
    "execution": {
      "process_id": 3340,
      "thread_id": 8416
    },
    "channel": "Microsoft-Windows-WMI-Activity/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "user_data": {
    "Operation_TemporaryEssStarted": {
      "NamespaceName": "ROOT\\Subscription",
      "Query": "SELECT * FROM __InstanceOperationEvent WITHIN 5WHERE TargetInstance ISA '__EventConsumer' OR TargetInstance ISA '__EventFilter' OR TargetInstance ISA '__FilterToConsumerBinding'",
      "User": "NT AUTHORITY\\SYSTEM",
      "Processid": 7064,
      "ClientMachine": "WINDEV2310EVAL",
      "PossibleCause": "Temporary"
    }
  },
  "message": ""
}

References #

Event ID 5861 — Namespace = Operation_ESStoConsumerBinding.Namespace; Eventfilter = Operation_ESStoConsumerBinding.ESS (refer to its activate eventid:5859); Consumer = Operation_ESStoConsumerBinding.CONSUMER; Poss...

#
Provider
Microsoft-Windows-WMI-Activity
Channel
Operational
Collection Priority
Recommended (Palantir, others)

Description

Namespace = Operation_ESStoConsumerBinding.Namespace; Eventfilter = Operation_ESStoConsumerBinding.ESS (refer to its activate eventid:5859); Consumer = Operation_ESStoConsumerBinding.CONSUMER; PossibleCause = Operation_ESStoConsumerBinding.PossibleCause.

Message #

Namespace = %1; Eventfilter = %2 (refer to its activate eventid:5859); Consumer = %3; PossibleCause = %4

Fields #

NameDescription
Operation_ESStoConsumerBinding.Namespace
Operation_ESStoConsumerBinding.ESS
Operation_ESStoConsumerBinding.CONSUMER
Operation_ESStoConsumerBinding.PossibleCause

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-WMI-Activity",
    "guid": "1418EF04-B0B4-4623-BF7E-D74AB47BBDAA",
    "event_source_name": "",
    "event_id": 5861,
    "version": 0,
    "level": 0,
    "task": 0,
    "opcode": 0,
    "keywords": 4611686018427387904,
    "time_created": "2022-04-07T16:53:38.894721+00:00",
    "event_record_id": 560,
    "correlation": {},
    "execution": {
      "process_id": 2456,
      "thread_id": 3584
    },
    "channel": "Microsoft-Windows-WMI-Activity/Operational",
    "computer": "WIN-FPV0DSIC9O6.lab.local",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "user_data": {
    "Operation_ESStoConsumerBinding": {
      "Namespace": "//./root/subscription",
      "ESS": "SCM Event Log Filter",
      "CONSUMER": "NTEventLogEventConsumer=\"SCM Event Log Consumer\"",
      "PossibleCause": "Binding EventFilter: \ninstance of __EventFilter\n{\n\tCreatorSID = {1, 2, 0, 0, 0, 0, 0, 5, 32, 0, 0, 0, 32, 2, 0, 0};\n\tEventNamespace = \"root\\\\cimv2\";\n\tName = \"SCM Event Log Filter\";\n\tQuery = \"select * from MSFT_SCMEventLogEvent\";\n\tQueryLanguage = \"WQL\";\n};\nPerm. Consumer: \ninstance of NTEventLogEventConsumer\n{\n\tCategory = 0;\n\tCreatorSID = {1, 2, 0, 0, 0, 0, 0, 5, 32, 0, 0, 0, 32, 2, 0, 0};\n\tEventType = 1;\n\tName = \"SCM Event Log Consumer\";\n\tNameOfUserSIDProperty = \"sid\";\n\tSourceName = \"Service Control Manager\";\n};\n"
    }
  },
  "message": ""
}

Detection Patterns #

Community Notes #

These consumers survive reboots. WMI abuse is a classic technique for file-less persistence.

References #