This procedure enumerates process information such a path, command line, and process id using wmic. Attackers will use this technique to gather information about specific processes on a system such as anti-virus or other security products in order to evade defenses.