forked from p15670423/monkey
Agent: Fix malformed WMI query in WMIExploiter
This commit is contained in:
parent
e76b46c8ca
commit
98f8a5b48a
|
@ -65,7 +65,7 @@ class WmiExploiter(HostExploiter):
|
||||||
wmi_connection,
|
wmi_connection,
|
||||||
"Win32_Process",
|
"Win32_Process",
|
||||||
fields=("Caption",),
|
fields=("Caption",),
|
||||||
where="Name='{0}'".format(self.options["dropper_target_path_win_64"]),
|
where=f"Name='{ntpath.split(self.options['dropper_target_path_win_64'])[-1]}'",
|
||||||
)
|
)
|
||||||
if process_list:
|
if process_list:
|
||||||
wmi_connection.close()
|
wmi_connection.close()
|
||||||
|
|
Loading…
Reference in New Issue