<<< Hide Navigation Hide TOC >>>
Xwizard.EXE Execution From Non-Default Location (193d5ccd-6f59-40c6-b5b0-8e32d5ddd3d1)
Detects the execution of Xwizard tool from a non-default directory. When executed from a non-default directory, this utility can be abused in order to side load a custom version of "xwizards.dll".
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
DLL Side-Loading - T1574.002 (e64c62cf-9cd7-4a14-94ec-cdaac43ab44b) | Attack Pattern | Xwizard.EXE Execution From Non-Default Location (193d5ccd-6f59-40c6-b5b0-8e32d5ddd3d1) | Sigma-Rules | 1 |
Hijack Execution Flow - T1574 (aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6) | Attack Pattern | DLL Side-Loading - T1574.002 (e64c62cf-9cd7-4a14-94ec-cdaac43ab44b) | Attack Pattern | 2 |