C windows system32 gpscript exe


Readers help support Windows Report. We may get a commission if you buy through our links.

Read our disclosure page to find out how can you help Windows Report sustain the editorial team. Read more

It is common for Windows users to notice the gpscript.exe process running on their computers without knowing what it does. Further, some complain about the executable using up system resources and causing issues with its performance.

Hence, this guide will discuss what it means and how to remove it. Likewise, you can check how to show file extensions on Windows 11.

What is gpscript.exe?

Gpscript.exe is an essential executable file for the Microsoft Windows Operating System by Microsoft Corporation. In addition, it was developed for the Group Policy Script Application process on the computer. The Group Policy uses the executable file to execute and process scripts.

However, you can encounter numerous variances of this error due to various factors, including malware and virus attacks and corrupt system files.

Should I remove gpscript.exe?

Additionally, the legitimate gpscript.exe file is commonly in the following directory: C:\Windows\System32\gpscript

If the location differs from the above, there’s a high chance it is malicious. Then, you should remove it before it fully manifests its damage to the system.

How can I fix gpscript.exe?

  • Restart your PC – It is the easiest and fastest way to refresh the system and fix temporary performance issues.
  • Run a virus scan – A virus scan will find the malware and other malicious files or programs liable to cause the error or infect the file on your PC.
  • Perform a system restore – Restoring the system will roll back recent changes and software installations causing the .exe errors on the computer. You check what to do if the Restore Point is not working on your computer.

If the error persists after trying the above preliminary checks, go ahead with the fixes outlined below:

Delete Gpscript.exe from the Task Manager

NOTE

Deleting this file from the Windows directory can cause issues with your PC. Only delete this file if you’re 100% certain it’s malicious.

  1. Right-click the Start button and select Task Manager from the menu.
  2. Now, go to the Details tab. Locate the gpscript.exe in the Task Manager, right-click on it, and select End task from the drop-down menu.

  3. Right-click on it and click on Open File Location from the drop-down menu.

  4. Then, right-click the file, and click the Delete button.

  5. Restart your PC and check if the file is no longer available.

Further, the above steps will stop the activities of gpscrip.exe in the Task Manager and delete the file from the system.

Check what to do if the Task Manager is slow to open or respond on your computer if you’re having additional problems with Task Manager.

Read more about this topic

  • How to Delete Windows 11 Saved Passwords
  • How to Download DirectX 12 Agility SDK [Installation Guide]
  • How to Open PPTX File in Windows 11? Use These 4 Ways
  • How to Install Windows 7 Icons on Windows 11
  • 4 Ways to Scan QR Codes in Windows 11

In conclusion, you may be interested in our detailed guide on why exe files are not opening on your PC and some fixes to resolve the problem.

If you have further questions or suggestions about this guide, kindly drop them in the comments section.


Henderson Jayden Harper

Windows Software Expert

Passionate about technology, Crypto, software, Windows, and everything computer-related, he spends most of his time developing new skills and learning more about the tech world.

He also enjoys gaming, writing, walking his dog, and reading and learning about new cultures. He also enjoys spending private time connecting with nature.


В нашей базе содержится 11 разных файлов с именем gpscript.exe . You can also check most distributed file variants with name gpscript.exe. Чаще всего эти файлы принадлежат продукту Microsoft® Windows® Operating System. Наиболее частый разработчик — компания Microsoft Corporation. Самое частое описание этих файлов — Group Policy Script Application. Это исполняемый файл. Вы можете найти его выполняющимся в диспетчере задач как процесс gpscript.exe.

Подробности о наиболее часто используемом файле с именем «gpscript.exe»

Продукт:
Microsoft® Windows® Operating System
Компания:
Microsoft Corporation
Описание:
Group Policy Script Application
Версия:
6.1.7600.16385
MD5:
b0590ae25c847a74a644f3d6e22a4be1
SHA1:
184961313df05c676e4c9a11611980b5c7b9fa97
SHA256:
c879025a1c06f23d08385008940bafe3fa3a16d10edada9d24e5ada14a4195c9
Размер:
24576
Папка:
C:\Windows\System32
ОС:
Windows 7
Частота:
Низкая

Процесс «gpscript.exe» безопасный или опасный?

Последний новый вариант файла «gpscript.exe» был обнаружен 4651 дн. назад. В нашей базе содержится 1 шт. вариантов файла «gpscript.exe» с окончательной оценкой Безопасный и ноль вариантов с окончательной оценкой Опасный . Окончательные оценки основаны на комментариях, дате обнаружения, частоте инцидентов и результатах антивирусных проверок.

Процесс с именем «gpscript.exe» может быть безопасным или опасным. Чтобы дать правильную оценку, вы должны определить больше атрибутов файла. Самый простой способ это сделать — воспользоваться нашей бесплатной утилитой для проверки файлов посредством нашей базы данных. Эта утилита содержит множество функций для контролирования вашего ПК и потребляет минимум системных ресурсов.
Щёлкните здесь, чтобы загрузить System Explorer.

Комментарии пользователей для «gpscript.exe»

У нас пока нет комментариев пользователей к файлам с именем «gpscript.exe».

Добавить комментарий для «gpscript.exe»

Для добавления комментария требуется дополнительная информация об этом файле. Если вам известны размер, контрольные суммы md5/sha1/sha256 или другие атрибуты файла, который вы хотите прокомментировать, то вы можете воспользоваться расширенным поиском на главной странице .

Если подробности о файле вам неизвестны, вы можете быстро проверить этот файл с помощью нашей бесплатной утилиты. Загрузить System Explorer.

Проверьте свой ПК с помощью нашей бесплатной программы

System Explorer это наша бесплатная, удостоенная наград программа для быстрой проверки всех работающих процессов с помощью нашей базы данных. Эта программа поможет вам держать систему под контролем. Программа действительно бесплатная, без рекламы и дополнительных включений, она доступна в виде установщика и как переносное приложение. Её рекомендуют много пользователей.

.. /Gpscript.exe

Used by group policy to process scripts

Paths:

  • C:\Windows\System32\gpscript.exe
  • C:\Windows\SysWOW64\gpscript.exe

Resources:

  • https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/

Acknowledgements:

  • Oddvar Moe (@oddvarmoe)

Detections:

  • Sigma: https://github.com/SigmaHQ/sigma/blob/c04bef2fbbe8beff6c7620d5d7ea6872dbe7acba/rules/windows/process_creation/proc_creation_win_lolbin_gpscript.yml
  • IOC: Scripts added in local group policy
  • IOC: Execution of Gpscript.exe after logon

Execute

  1. Executes logon scripts configured in Group Policy.

    Gpscript /logon
    Use case
    Add local group policy logon script to execute file and hide from defensive counter measures
    Privileges required
    Administrator
    Operating systems
    Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
    ATT&CK® technique
    T1218
    Tags

    Execute: CMD

  2. Executes startup scripts configured in Group Policy

    Gpscript /startup
    Use case
    Add local group policy logon script to execute file and hide from defensive counter measures
    Privileges required
    Administrator
    Operating systems
    Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
    ATT&CK® technique
    T1218
    Tags

    Execute: CMD

Информация о файле Описание
Размер файла: 37 kB
Дата и время изменения файла: 2017:03:18 20:25:54+00:00
Дата и время изменения индексного дескриптора файлов: 2017:11:05 07:07:54+00:00
Тип файла: Win32 EXE
Тип MIME: application/octet-stream
Предупреждение! Possibly corrupt Version resource
Тип компьютера: Intel 386 or later, and compatibles
Метка времени: 2026:12:12 23:34:47+00:00
Тип PE: PE32
Версия компоновщика: 14.10
Размер кода: 26112
Размер инициализированных данных: 13312
Размер неинициализированных данных: 0
Точка входа: 0x6940
Версия ОС: 10.0
Версия образа: 10.0
Версия подсистемы: 10.0
Подсистема: Windows GUI
Номер версии файла: 10.0.15063.0
Номер версии продукта: 10.0.15063.0
Маска флагов файлов: 0x003f
Флаги файлов: (none)
Файловая ОС: Windows NT 32-bit
Тип объектного файла: Executable application
Подтип файла: 0
Код языка: English (U.S.)
Набор символов: Unicode
Наименование компании: Microsoft Corporation
Описание файла: Group Policy Script Application
Версия файла: 10.0.15063.0 (WinBuild.160101.0800)
Внутреннее имя: gpscript
Авторское право: © Microsoft Corporation. All rights reserved.
Оригинальное имя файла: GPSCRIPT.EXE
Название продукта: Microsoft® Windows® Operating System
Версия продукта: 10.0.15063.0

Фрагменты данных файлов предоставлены участником Exiftool (Phil Harvey) и распространяются под лицензией Perl Artistic.

TL;DR
– GPO scripts can be defined for user and started with GPScript.exe /Logon
– Logonscripts do not show up in Autoruns.exe

I started to play around with GPscript.exe here the other day and found some interesting stuff and I want to have this documented for the future, so therefor I wrote this blogpost for you to read.

I know from previous experiences that GPscript.exe is responsible for triggering logon scripts when you define them in Group Policy. After thinking a bit about this binary I did a strings on the file to see if could see anything interesting, and sure enough I did.

It turned out that you could supply the following parameters to the binary:

GPScript.exe /logon or GPscript.exe /Startup

If you have anything defined in the Group policy (Local group policy – gpedit.msc) under logon scripts it will execute if you supply /logon to the binary. That means you can execute the defined logon scripts at will with the command:

  • GPScript.exe /logon

. When you add a script the group policy editor writes to the following registry key location:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Group Policy\Scripts

In my example I defined a simple batch file as a logon script (C:\data\Dummy.bat).
When this is defined it adds these registry keys (exported in .reg format):

Windows Registry Editor Version 5.00
[HKEY_USERS\S-1-5-21-1848305745-3675528341-1622750934-1001\Software\Microsoft\Windows\CurrentVersion\Group Policy\Scripts\Logon]

[HKEY_USERS\S-1-5-21-1848305745-3675528341-1622750934-1001\Software\Microsoft\Windows\CurrentVersion\Group Policy\Scripts\Logon\0]
"GPO-ID"="LocalGPO"
"SOM-ID"="Local"
"FileSysPath"="C:\\Windows\\System32\\GroupPolicy\\User"
"DisplayName"="Lokal gruppepolicy"
"GPOName"="Lokal gruppepolicy"
"PSScriptOrder"=dword:00000001

[HKEY_USERS\S-1-5-21-1848305745-3675528341-1622750934-1001\Software\Microsoft\Windows\CurrentVersion\Group Policy\Scripts\Logon\0\0]
"Script"="C:\\data\\dummy.bat"
"Parameters"=""
"IsPowershell"=dword:00000000
"ExecTime"=hex(b):00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00

It also writes some info to the scripts.ini file under C:\Windows\System32\GroupPolicy\User\Scripts  and to the gpt.ini under C:\Windows\System32\GroupPolicy
The content of that scripts.ini file looks like this:

[Logon]
0CmdLine=C:\data\dummy.bat
0Parameters=

The content of my GPT.ini file looks like this:

[General]
gPCMachineExtensionNames=[{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{62C1845D-C4A6-4ACB-BBB0-C895FD090385}]
Version=2020567
gPCUserExtensionNames=[{42B5FAAE-6536-11D2-AE5A-0000F87571E3}{40B66650-4972-11D1-A7CA-0000F87571E3}]

A lot of the different GUIDs can be found here.

Remember that the testing I did was against local group policy and not a defined Domain Group Policy. It is also important to understand that you need local administrator permissions to conduct these operations I am explaining in this blogpost.

After struggling a while with getting the registry keys and files in place for an attack I ended hitting my head against the wall. I reached out to the awesome Darren Mar-Elia aka grouppolicyguy on the Bloodhound slack. After some discussions he taught me something incredibly interesting. You don’t need to add those registry keys at all.  Thanks again Darren!

All you need to make this work is:

  1. Add the Scripts.ini file in the correct place with the correct content (0CMDLine… See above)
  2. Add the CSE guid (gPCUserExtensionNames=[{42B5FAAE-6536-11D2-AE5A-0000F87571E3}{40B66650-4972-11D1-A7CA-0000F87571E3}] to the GPT.ini
  3. Increase the Version number of GPT.ini to something that is higher then what is currently in the file
  4. Run gpupdate (populates all the needed reg keys)
  5. Run Gpscript /logon and the script executes!!

Another cool thing that I discovered is that this technique this does not show up in autoruns.
You heard me right, user logon scripts do not show up in autoruns. (Mind blown)

I have not tested this if the computer is joined to a domain, but I am assuming that this persistence trick will work there as well, unless there is a domain gpo that overruns the setting.

If you want to go with computer startup scripts, you must know that it shows up in autoruns. You can define a startupscript for the computer as part of the group policy and get GPScript.exe to fire the script. The only “stupid” thing is that you need to get GPScript.exe started as system and supply the /Startup parameter. That means you already need to run GPScript.exe as system for this to work.

If you want to execute a Powershell script instead, you need to create a file called psscript.ini instead of script.ini and place it in the folder – C:\Windows\System32\GroupPolicy\User\Scripts

In my example I have a script called dummy.ps1.

[Logon]
0CmdLine=C:\data\dummy.ps1
0Parameters=

Detection (Blue team):

I would monitor for changes to or new Scripts.ini files.

# “Responsible disclosure” #

I tried to reach out to Mark R. on Twitter about this a while back and I also wrote him an email. I have not gotten any response. I therefor decided to post this, since the technique is already known and publicly available in Hexacorns blog here:
http://www.hexacorn.com/blog/2017/01/07/beyond-good-ol-run-key-part-52/

It was not until after the intial discovery of the persistence technique that I figured out that it was already discovered by Adam – @hexacorn. He has written an excellent blogpost about this here .

# Update #

Darren Mar-Elia has reached out and got contact with Mark Russinovich and this issue will be fixed. An update for Autoruns will likely be available within the next few days. 🙂

Понравилась статья? Поделить с друзьями:
0 0 голоса
Рейтинг статьи
Подписаться
Уведомить о
guest

0 комментариев
Старые
Новые Популярные
Межтекстовые Отзывы
Посмотреть все комментарии
  • Деактивация ключа windows 10
  • Скриншот экрана windows 10 с прокруткой
  • Input not supported при запуске компьютера windows 10 что делать монитор acer
  • Слетает разрешение экрана windows 10 после перезагрузки
  • Intel core i7 3770 windows 11