WmiApSrv.exe

  • File Path: C:\Windows\system32\wbem\WmiApSrv.exe
  • Description: WMI Performance Reverse Adapter

Hashes

Type Hash
MD5 4D05488FEC7D3FB63248CA9652B48CBB
SHA1 5877F71C48AE3F5F36F77E78EC86E4C7A7F1FBA7
SHA256 5D51A62E14BE8F6A6894E8184CFD036EDAFC906D958E162FC9AC48462C6B2248
SHA384 CCFE3A14FC514667DC8D1ED8CEC4851802F0B5F4414B564B1D769344B7BF0AC65BCADF4535BACA4C60DC63C47C7D0A7C
SHA512 88C4E8A7B76196E91419CCD88A76DDA812E1642A5755220696D65A39CB64D7E2B901603603D109E72EED1727D9FFA5C7C5E9EB56C9D2FE36F374AD3BCFEB8FA6
SSDEEP 3072:InYyy1k/pQ64B/Od9OwOYw4s6pRPZ03sBPy+7mOErEFRRMRZJ1:u41k/pQ7BW/OLv6pRhiEPyzrEFMRZJ
IMP E91C5A3E92623E396D79A8A599CF25A9
PESHA1 0873E72FA4D3955853C00C4F7F7B3ADEDE6D829E
PE256 C0F367BED31FD0CE7C549A19BAB52322C0709EAA6B01D0C40950E901A1072E0A

Runtime Data

Loaded Modules:

Path
C:\Windows\System32\KERNEL32.DLL
C:\Windows\System32\KERNELBASE.dll
C:\Windows\System32\msvcrt.dll
C:\Windows\SYSTEM32\ntdll.dll
C:\Windows\system32\wbem\WmiApSrv.exe

Signature

  • Status: Signature verified.
  • Serial: 330000026551AE1BBD005CBFBD000000000265
  • Thumbprint: E168609353F30FF2373157B4EB8CD519D07A2BFF
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: WmiApSrv.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.19041.1 (WinBuild.160101.0800)
  • Product Version: 10.0.19041.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 64-bit

File Scan

  • VirusTotal Detections: 0/67
  • VirusTotal Link: https://www.virustotal.com/gui/file/5d51a62e14be8f6a6894e8184cfd036edafc906d958e162fc9ac48462c6b2248/detection/

Possible Misuse

The following table contains possible examples of WmiApSrv.exe being misused. While WmiApSrv.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma image_load_wmi_module_load.yml - '\WmiApSrv.exe' DRL 1.0

MIT License. Copyright (c) 2020-2021 Strontic.