Suspicious WMIC Execution Via Office Process (e1693bc8-7168-4eab-8718-cdcaa68a1738)
Office application called wmic to proxye execution through a LOLBIN process. This is often used to break suspicious parent-child chain (Office app spawns LOLBin).
Office application called wmic to proxye execution through a LOLBIN process. This is often used to break suspicious parent-child chain (Office app spawns LOLBin).