Sysmon Event ID 19

SourceSysmon
Discussions on Event ID 19
Ask a question about this event

19: WmiEventFilter activity detected

This is an event from Sysmon.

On this page

   

Free Security Log Resources by Randy

Description Fields in 19

  • Log Name
  • Source
  • Date
  • Event ID
  • Task Category
  • Level
  • Keywords
  • User
  • Computer
  • Description
  • EventType
  • UtcTime
  • Operation
  • User
  • EventNamespace
  • Name
  • Query

Supercharger Free Edition

 

Examples of 19

Log Name:      Microsoft-Windows-Sysmon/Operational
Source:        Microsoft-Windows-Sysmon
Date:          4/11/2018 9:26:16 AM
Event ID:      19
Task Category: WmiEventFilter activity detected (rule: WmiEvent)
Level:         Information
Keywords:     
User:          SYSTEM
Computer:      rfsh.lab.local
Description:
WmiEventFilter activity detected:
EventType: WmiFilterEvent
UtcTime: 2018-04-11 16:26:16.327
Operation: Created
User: LAB\rsmith
EventNamespace:  "root\\cimv2"
Name:  "BotFilter82"
Query:  "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 200 AND TargetInstance.SystemUpTime < 320"
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
  <System>
    <Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
    <EventID>19</EventID>
    <Version>3</Version>
    <Level>4</Level>
    <Task>19</Task>
    <Opcode>0</Opcode>
    <Keywords>0x8000000000000000</Keywords>
    <TimeCreated SystemTime="2018-04-11T16:26:16.327698700Z" />
    <EventRecordID>63551</EventRecordID>
    <Correlation />
    <Execution ProcessID="7620" ThreadID="21880" />
    <Channel>Microsoft-Windows-Sysmon/Operational</Channel>
    <Computer>rfsh.lab.local</Computer>
    <Security UserID="S-1-5-18" />
  </System>
  <EventData>
    <Data Name="EventType">WmiFilterEvent</Data>
    <Data Name="UtcTime">2018-04-11 16:26:16.327</Data>
    <Data Name="Operation">Created</Data>
    <Data Name="User">LAB\rsmith</Data>
    <Data Name="EventNamespace"> "root\\cimv2"</Data>
    <Data Name="Name"> "BotFilter82"</Data>
    <Data Name="Query"> "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime &gt;= 200 AND TargetInstance.SystemUpTime &lt; 320"</Data>
  </EventData>
</Event>

Top 10 Windows Security Events to Monitor

Free Tool for Windows Event Collection



 

Additional Resources