Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:59
Static task
static1
Behavioral task
behavioral1
Sample
169770d1b39686dba1237519ab827a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
169770d1b39686dba1237519ab827a2d.exe
Resource
win10v2004-20231222-en
General
-
Target
169770d1b39686dba1237519ab827a2d.exe
-
Size
42KB
-
MD5
169770d1b39686dba1237519ab827a2d
-
SHA1
fb5352912ffff67cea1afe02c38a7e19993d7851
-
SHA256
fc39d9f91900bed78a83835b43cdc19375e3278a3878ebfd5bf6e4f5b94d1839
-
SHA512
d2fe537125dd519437de12224d679ef044902abf03bb0185b1288f9f8bd900bb56ce18fc8fb8cee19219e643ed942ad5efe1269c4a97716be632dcc43daa427d
-
SSDEEP
768:n+WwQOIEXqFsVSNAB8pz7T8RQYHhplSm8IIYkYDgn7Tf241WJkBI:+odIqcMA6tTFwpkP7Ykn248J3
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 22 4604 CMD.exe 25 4604 CMD.exe 27 4604 CMD.exe -
Drops file in Drivers directory 37 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts CMD.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts CMD.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts CMD.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts CMD.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 169770d1b39686dba1237519ab827a2d.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts shwizard.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation CMD.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation CMD.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 169770d1b39686dba1237519ab827a2d.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation CMD.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation CMD.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation shwizard.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Process not Found -
Executes dropped EXE 64 IoCs
pid Process 3252 backgroundTaskHost.exe 860 shwizard.exe 3472 shwizard.exe 4856 shwizard.exe 3084 shwizard.exe 3824 shwizard.exe 1780 shwizard.exe 3088 shwizard.exe 2952 shwizard.exe 3756 shwizard.exe 4328 Process not Found 3916 shwizard.exe 208 Process not Found 1780 shwizard.exe 4012 shwizard.exe 828 shwizard.exe 768 Conhost.exe 2108 shwizard.exe 2208 Process not Found 1384 shwizard.exe 412 shwizard.exe 4180 Process not Found 4772 shwizard.exe 4820 Process not Found 1832 cmd.exe 2636 CMD.exe 208 Process not Found 1676 shwizard.exe 5084 Process not Found 4680 Process not Found 1888 CMD.exe 2092 Conhost.exe 2632 Process not Found 4272 Conhost.exe 4772 shwizard.exe 1244 Process not Found 2332 Process not Found 440 Conhost.exe 3512 Conhost.exe 4472 Process not Found 1480 Conhost.exe 4404 shwizard.exe 2076 Process not Found 4292 Conhost.exe 4824 shwizard.exe 4556 shwizard.exe 1712 CMD.exe 3496 shwizard.exe 5084 Process not Found 1496 CMD.exe 3128 Process not Found 4216 shwizard.exe 5012 Process not Found 1292 CMD.exe 584 Conhost.exe 1704 Process not Found 3256 shwizard.exe 232 CMD.exe 3424 Process not Found 3572 Process not Found 1068 CMD.exe 2060 shwizard.exe 1480 Process not Found 2332 Process not Found -
Adds Run key to start application 2 TTPs 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" 169770d1b39686dba1237519ab827a2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" CMD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" CMD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" shwizard.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" CMD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" CMD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" Process not Found -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe CMD.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Conhost.exe File created C:\Windows\SysWOW64\shwizard.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe CMD.exe File created C:\Windows\SysWOW64\shwizard.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe CMD.exe File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe 169770d1b39686dba1237519ab827a2d.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe Conhost.exe File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe CMD.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe CMD.exe File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe shwizard.exe File created C:\Windows\SysWOW64\shwizard.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe Process not Found File created C:\Windows\SysWOW64\shwizard.exe CMD.exe -
Suspicious use of SetThreadContext 38 IoCs
description pid Process procid_target PID 2192 set thread context of 4032 2192 Process not Found 1630 PID 3252 set thread context of 860 3252 backgroundTaskHost.exe 1616 PID 3472 set thread context of 4856 3472 shwizard.exe 26 PID 3084 set thread context of 3824 3084 shwizard.exe 1591 PID 1780 set thread context of 3088 1780 shwizard.exe 1578 PID 2952 set thread context of 3756 2952 shwizard.exe 1564 PID 4328 set thread context of 3916 4328 Process not Found 37 PID 208 set thread context of 1780 208 Process not Found 1589 PID 4012 set thread context of 828 4012 shwizard.exe 1527 PID 768 set thread context of 2108 768 Conhost.exe 1514 PID 2208 set thread context of 1384 2208 Process not Found 1501 PID 412 set thread context of 4180 412 shwizard.exe 2379 PID 4772 set thread context of 4820 4772 shwizard.exe 2434 PID 1832 set thread context of 2636 1832 cmd.exe 1588 PID 208 set thread context of 1676 208 Process not Found 65 PID 5084 set thread context of 4680 5084 Process not Found 2580 PID 1888 set thread context of 2092 1888 CMD.exe 1606 PID 2632 set thread context of 4272 2632 Process not Found 1555 PID 4772 set thread context of 1244 4772 shwizard.exe 2638 PID 2332 set thread context of 440 2332 Process not Found 1565 PID 3512 set thread context of 4472 3512 Conhost.exe 2528 PID 1480 set thread context of 4404 1480 Conhost.exe 91 PID 2076 set thread context of 4292 2076 Process not Found 1476 PID 4824 set thread context of 4556 4824 shwizard.exe 98 PID 1712 set thread context of 3496 1712 CMD.exe 102 PID 5084 set thread context of 1496 5084 Process not Found 1557 PID 3128 set thread context of 4216 3128 Process not Found 109 PID 5012 set thread context of 1292 5012 Process not Found 1482 PID 584 set thread context of 1704 584 Conhost.exe 2884 PID 3256 set thread context of 232 3256 shwizard.exe 1602 PID 3424 set thread context of 3572 3424 Process not Found 2306 PID 1068 set thread context of 2060 1068 CMD.exe 1236 PID 1480 set thread context of 2332 1480 Process not Found 3438 PID 2096 set thread context of 4000 2096 Process not Found 2468 PID 3592 set thread context of 3512 3592 Process not Found 1411 PID 3140 set thread context of 1096 3140 Process not Found 3414 PID 4648 set thread context of 5104 4648 Process not Found 1287 PID 2308 set thread context of 4124 2308 Conhost.exe 3830 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CMD.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CMD.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 169770d1b39686dba1237519ab827a2d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ shwizard.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CMD.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CMD.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4032 169770d1b39686dba1237519ab827a2d.exe Token: SeIncBasePriorityPrivilege 860 shwizard.exe Token: SeIncBasePriorityPrivilege 4856 shwizard.exe Token: SeIncBasePriorityPrivilege 3824 shwizard.exe Token: SeIncBasePriorityPrivilege 3088 shwizard.exe Token: SeIncBasePriorityPrivilege 3756 shwizard.exe Token: SeIncBasePriorityPrivilege 3916 shwizard.exe Token: SeIncBasePriorityPrivilege 1780 shwizard.exe Token: SeIncBasePriorityPrivilege 828 shwizard.exe Token: SeIncBasePriorityPrivilege 2108 shwizard.exe Token: SeIncBasePriorityPrivilege 1384 shwizard.exe Token: SeIncBasePriorityPrivilege 4180 Process not Found Token: SeIncBasePriorityPrivilege 4820 Process not Found Token: SeIncBasePriorityPrivilege 2636 CMD.exe Token: SeIncBasePriorityPrivilege 1676 shwizard.exe Token: SeIncBasePriorityPrivilege 4680 Process not Found Token: SeIncBasePriorityPrivilege 2092 Conhost.exe Token: SeIncBasePriorityPrivilege 4272 Conhost.exe Token: SeIncBasePriorityPrivilege 1244 Process not Found Token: SeIncBasePriorityPrivilege 440 Conhost.exe Token: SeIncBasePriorityPrivilege 4472 Process not Found Token: SeIncBasePriorityPrivilege 4404 shwizard.exe Token: SeIncBasePriorityPrivilege 4292 Conhost.exe Token: SeIncBasePriorityPrivilege 4556 shwizard.exe Token: SeIncBasePriorityPrivilege 3496 shwizard.exe Token: SeIncBasePriorityPrivilege 1496 CMD.exe Token: SeIncBasePriorityPrivilege 4216 shwizard.exe Token: SeIncBasePriorityPrivilege 1292 CMD.exe Token: SeIncBasePriorityPrivilege 1704 Process not Found Token: SeIncBasePriorityPrivilege 232 CMD.exe Token: SeIncBasePriorityPrivilege 3572 Process not Found Token: SeIncBasePriorityPrivilege 2060 shwizard.exe Token: SeIncBasePriorityPrivilege 2332 Process not Found Token: SeIncBasePriorityPrivilege 4000 Process not Found Token: SeIncBasePriorityPrivilege 3512 Conhost.exe Token: SeIncBasePriorityPrivilege 1096 Process not Found Token: SeIncBasePriorityPrivilege 5104 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 2192 wrote to memory of 4032 2192 Process not Found 1630 PID 4032 wrote to memory of 3252 4032 169770d1b39686dba1237519ab827a2d.exe 1803 PID 4032 wrote to memory of 3252 4032 169770d1b39686dba1237519ab827a2d.exe 1803 PID 4032 wrote to memory of 3252 4032 169770d1b39686dba1237519ab827a2d.exe 1803 PID 4032 wrote to memory of 1156 4032 169770d1b39686dba1237519ab827a2d.exe 1628 PID 4032 wrote to memory of 1156 4032 169770d1b39686dba1237519ab827a2d.exe 1628 PID 4032 wrote to memory of 1156 4032 169770d1b39686dba1237519ab827a2d.exe 1628 PID 4032 wrote to memory of 1888 4032 169770d1b39686dba1237519ab827a2d.exe 1627 PID 4032 wrote to memory of 1888 4032 169770d1b39686dba1237519ab827a2d.exe 1627 PID 4032 wrote to memory of 1888 4032 169770d1b39686dba1237519ab827a2d.exe 1627 PID 4032 wrote to memory of 2956 4032 169770d1b39686dba1237519ab827a2d.exe 1626 PID 4032 wrote to memory of 2956 4032 169770d1b39686dba1237519ab827a2d.exe 1626 PID 4032 wrote to memory of 2956 4032 169770d1b39686dba1237519ab827a2d.exe 1626 PID 4032 wrote to memory of 2416 4032 169770d1b39686dba1237519ab827a2d.exe 1766 PID 4032 wrote to memory of 2416 4032 169770d1b39686dba1237519ab827a2d.exe 1766 PID 4032 wrote to memory of 2416 4032 169770d1b39686dba1237519ab827a2d.exe 1766 PID 4032 wrote to memory of 5052 4032 169770d1b39686dba1237519ab827a2d.exe 1624 PID 4032 wrote to memory of 5052 4032 169770d1b39686dba1237519ab827a2d.exe 1624 PID 4032 wrote to memory of 5052 4032 169770d1b39686dba1237519ab827a2d.exe 1624 PID 4032 wrote to memory of 4636 4032 169770d1b39686dba1237519ab827a2d.exe 1623 PID 4032 wrote to memory of 4636 4032 169770d1b39686dba1237519ab827a2d.exe 1623 PID 4032 wrote to memory of 4636 4032 169770d1b39686dba1237519ab827a2d.exe 1623 PID 4032 wrote to memory of 4888 4032 169770d1b39686dba1237519ab827a2d.exe 1622 PID 4032 wrote to memory of 4888 4032 169770d1b39686dba1237519ab827a2d.exe 1622 PID 4032 wrote to memory of 4888 4032 169770d1b39686dba1237519ab827a2d.exe 1622 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 3252 wrote to memory of 860 3252 backgroundTaskHost.exe 1616 PID 860 wrote to memory of 3472 860 shwizard.exe 1866 PID 860 wrote to memory of 3472 860 shwizard.exe 1866 PID 860 wrote to memory of 3472 860 shwizard.exe 1866 PID 860 wrote to memory of 1928 860 shwizard.exe 1971 PID 860 wrote to memory of 1928 860 shwizard.exe 1971 PID 860 wrote to memory of 1928 860 shwizard.exe 1971 PID 860 wrote to memory of 1340 860 shwizard.exe 1613 PID 860 wrote to memory of 1340 860 shwizard.exe 1613 PID 860 wrote to memory of 1340 860 shwizard.exe 1613 PID 860 wrote to memory of 1720 860 shwizard.exe 1611 PID 860 wrote to memory of 1720 860 shwizard.exe 1611 PID 860 wrote to memory of 1720 860 shwizard.exe 1611 PID 860 wrote to memory of 1568 860 shwizard.exe 1609 PID 860 wrote to memory of 1568 860 shwizard.exe 1609 PID 860 wrote to memory of 1568 860 shwizard.exe 1609 PID 860 wrote to memory of 4364 860 shwizard.exe 1607 PID 860 wrote to memory of 4364 860 shwizard.exe 1607 PID 860 wrote to memory of 4364 860 shwizard.exe 1607 PID 860 wrote to memory of 1764 860 shwizard.exe 1605 PID 860 wrote to memory of 1764 860 shwizard.exe 1605 PID 860 wrote to memory of 1764 860 shwizard.exe 1605 PID 860 wrote to memory of 3928 860 shwizard.exe 1604
Processes
-
C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"1⤵PID:2192
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3864
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:3572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4692
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:1768
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:1452
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1548
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3084
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:5052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2640
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2640
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1080
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:3884
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2332
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:2888
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4008
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:208
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2924
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:228
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4508
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4820
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:5000
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:3056
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:2864
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1480
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:4984
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:4328
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:4304
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:3572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:1124
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4772
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:1372
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:3684
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:4692
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:1456
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:5084
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4680
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:1888
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:4484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:1712
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:3108
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:1772
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:3100
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:584
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:4420
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:2632
-
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:2332
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4472
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3252
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:1096
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1368
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:2836
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2288
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:584
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4104
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2076
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4556 -
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4672
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:5012
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4016
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:1716
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:540
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1568
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:1712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4388
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4376
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2992
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:664
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:1900
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3424
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2888
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:5084
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1368
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2972
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4616
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:8
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:3360
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:4780
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:2968
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:1712
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:1704
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:3472
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:2776
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:4012
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"4⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:208
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"4⤵PID:1780
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"5⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:5012
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:404
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3768
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2800
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4780
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2376
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1068
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:1620
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:584
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:1704
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:396
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:3128
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4304
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:1516
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:964
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:1120
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:1900
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:3684
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5040
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4812
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2688
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:4472
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:4868
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:4928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:4772
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"5⤵PID:1244
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:3444
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:4072
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:3056
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:2032
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:1480
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:2572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:1080
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:1484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:1940
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:4484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:3988
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:3424
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4684
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:3140
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4392
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3508
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:764
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:396
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4892
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:3368
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:1420
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1784
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2076
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:4292
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:3988
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:448
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:2796
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4104
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4820
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4460
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:3984
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:384
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:1236
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3768
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2620
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:1620
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:2376
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:1896
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:384
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:3480
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:4868
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:1236
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4672
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:400
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:228
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1564
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:3000
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:5068
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:4076
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3472
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:3444
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3220
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:468
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:4672
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"5⤵PID:2296
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:2068
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:1896
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:400
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul5⤵PID:4812
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"5⤵PID:4788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"5⤵PID:3980
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"5⤵PID:664
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"5⤵PID:3928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com5⤵PID:4548
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip5⤵PID:912
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"5⤵PID:4072
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:4400
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:2208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1620
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:1996
-
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2384
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4672
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2632
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:2376
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2428
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:448
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul5⤵PID:664
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"5⤵PID:4712
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"5⤵PID:4464
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"5⤵PID:4704
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"5⤵PID:4460
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com5⤵PID:2776
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip5⤵PID:4500
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"5⤵PID:584
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:2896
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:2384
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:2720
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:2952
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:3592
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:4420
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:4296
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:1736
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"4⤵PID:2020
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:2332
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:336
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:3928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:4648
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:372
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:4736
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1244
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:620
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4648
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:1136
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:336
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1524
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2416
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:3632
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4104
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:912
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3444
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:2428
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3000
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4104
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4164
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4472
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:384
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:228
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1696
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3500
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2160
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2864
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2960
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:428
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2800
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:3604
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:912
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:1476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3000
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4680
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2192
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4136
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:3828
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4736
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4260
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4960
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1560
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3368
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4460
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2420
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4788
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:3572
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4656
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:4960
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4348
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4328
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:1236
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:3592
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:228
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4260
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:384
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2896
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2160
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4980
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:2720
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:4072
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:1760
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:540
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:1940
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:3572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:3588
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:1596
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:3588
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:2332
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul5⤵PID:2864
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"5⤵PID:1548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:768
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"5⤵PID:4472
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"5⤵PID:1476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"5⤵PID:1348
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com5⤵PID:4860
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip5⤵PID:1096
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"5⤵PID:2096
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:1828
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:2924
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:4788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:208
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:1736
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2068
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:2572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4616
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:2232
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2800
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4452
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:5084
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:3604
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2844
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4020
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:3608
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1480
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:8
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:1772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3580
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2844
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:948
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:964
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2656
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3684
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:1900
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:680
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:876
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:3504
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2684
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:1236
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:3064
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1404
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2656
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4812
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4472
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4360
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3516
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2404
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:1696
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:1140
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"5⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul6⤵PID:2992
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"6⤵PID:4676
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"6⤵PID:2208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"6⤵PID:1244
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"6⤵PID:4900
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com6⤵PID:2556
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip6⤵PID:764
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"6⤵PID:4268
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:528
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:4244
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:2924
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:372
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:1560
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:4712
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1480
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4956
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2776
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:2784
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4108
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1372
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3368
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:396
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4672
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4440
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4648
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:336
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:2360
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3000
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:948
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2284
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3376
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1380
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1548
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3504
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:1140
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1416
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:3592
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2288
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1944
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3136
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:4420
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"4⤵PID:4952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:4484
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:2028
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:2384
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:3828
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:2376
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:2636
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:4836
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:2404
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2288
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1380
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:5012
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4252
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:4224
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4328
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4520
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4748
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:620
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1372
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4828
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1504
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2656
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:1516
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:3928
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:5024
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3992
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:316
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2360
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:2116
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2032
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3000
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4304
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:3988
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4548
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:1420
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4768
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:3156
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2336
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:3640
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4876
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1236
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2556
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2328
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1280
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:1944
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1080
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4792
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:1140
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3220
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:540
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:1480
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:4288
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:3992
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:232
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:2556
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:2384
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:4652
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:4124
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:3572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:4508
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:4928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:3000
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:3980
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:4820
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:1900
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:3368
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"5⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul6⤵PID:2384
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul7⤵PID:4020
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"7⤵PID:3368
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"7⤵PID:3608
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"7⤵PID:4696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4780
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"7⤵PID:4344
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com7⤵PID:4308
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip7⤵PID:2688
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"7⤵PID:4464
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"6⤵PID:1524
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"6⤵PID:1584
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"6⤵PID:4124
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"6⤵PID:4788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com6⤵PID:528
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip6⤵PID:1704
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"6⤵PID:4472
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:4712
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:3516
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:1508
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:1996
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"5⤵PID:4728
-
-
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4656
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:1668
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:3424
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"4⤵PID:3572
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:428
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:3604
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:3220
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"4⤵PID:3136
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:1772
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:1120
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4288
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2684
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:2452
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:468
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3608
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2116
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:396
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4652
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4748
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1848
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4616
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4016
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:1136
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:3608
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:1120
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:4500
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:4892
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:232
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:428
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:4420
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:3056
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:1400
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:4892
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:3392
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:4108
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:2952
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"5⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:3592
-
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:3328
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2948
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:468
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3988
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2684
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2796
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2844
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4768
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:3992
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4124
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4676
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4712
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:2836
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4228
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:1944
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2776
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3828
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:1008
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4788
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1140
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:8
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:3608
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3864
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:4000
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4548
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:540
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4224
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1940
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4924
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1452
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:796
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:4332
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2952
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:468
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1928
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4444
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4484
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4676
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:3592
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:4760
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3116
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:1760
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4020
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3444
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:584
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4104
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4440
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:1236
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:5024
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1456
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3368
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4604
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:1476
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4728
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:2440
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:5116
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3064
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:316
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1456
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1848
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4020
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4072
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:1140
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵
- Blocklisted process makes network request
PID:4604
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:796
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4164
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:680
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:3884
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3992
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:3392
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4376
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:232
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1008
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4616
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:948
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4684
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:1484
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2020
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:1236
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1940
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3572
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4228
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:2428
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4684
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1516
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:584
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:4228
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:5108
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4296
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:2636
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:2952
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:1716
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4756
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:5108
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2308
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:4124
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2568
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2924
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4680
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4684
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4648
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:5104
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4960
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:664
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:5068
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4980
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4136
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2328
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:544
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1852
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4108
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1772
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4672
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2420
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4816
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:1184
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3592
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵PID:1236
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:2836
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:2284
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:4052
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:1516
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:1900
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:3140
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:3368
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2284
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2844
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3128
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:4296
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1704
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3080
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:228
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1768
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:3992
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4332
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:5040
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4548
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3256
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4332
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:3324
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4444
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1992
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:3640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:5084
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4016
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:620
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1244
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:2924
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2952
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:452
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4956
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:400
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4440
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3140
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:1096
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1488
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:5112
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4328
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1568
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2556
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2836
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4812
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:1832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:2796
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4328
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1452
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3328
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:3656
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4072
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4672
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:3988
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2192
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:428
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4416
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2952
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3392
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2836
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2384
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:452
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3612
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:560
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4460
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3508
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:3592
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2160
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:3608
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:2664
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2404
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1452
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:1760
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1260
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4648
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4000
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2332
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:440
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4616
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:3080
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1448
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3284
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1784
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1480
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:1896
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2404
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4692
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:404
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1860
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:1896
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:1396
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:2948
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:2796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1396
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:1784
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3252
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4812
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:1832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:2656
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:1068
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4732
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4788
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:2620
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:3460
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4900
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3588
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1420
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3128
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:1496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:964
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2376
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4464
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:3572
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3864
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:680
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:3768
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4824
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:1504
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1488
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4608
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:4420
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1752
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4392
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4180
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4868
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:1124
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1528
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4260
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:1560
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1860
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4772
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:404
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1144
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:2556
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2108
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3884
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4360
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:964
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:1900
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2688
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1348
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:2796
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:2208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2620
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1144
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:2208
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2636
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of SetThreadContext
PID:2308
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4180
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4192
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2612
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2116
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3600
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:2288
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:412
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2972
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:464
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1860
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1372
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:3588
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:1944
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:2864
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:768
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:3480
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4180
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3668
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:3640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:4332
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:1488
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4108
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:1752
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:4472
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1832
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2924
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:4760
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4328
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:4420
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1368
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4608
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2612
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3668
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4696
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1712
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:3100
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2428
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3656
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1484
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:468
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4776
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:3928
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1764
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4364
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1568
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1720
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:1340
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1928
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\169770~1.EXE > nul1⤵PID:4888
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4636
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:5052
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2416
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2956
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1888
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1156
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4124
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:1120
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4676
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:5084
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:3064
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3924
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:4616
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:964
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"3⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul4⤵PID:2620
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"4⤵PID:3992
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"4⤵PID:4924
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"4⤵PID:4796
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"4⤵PID:4652
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com4⤵PID:228
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:3328
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"4⤵PID:2360
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2864
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:4192
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4164
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2068
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:3696
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2836
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:3608
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2548
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:3980
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:468
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:2452
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:3572
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4296
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:3924
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:2416
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4016
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:4388
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:428
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:4728
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2360
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"3⤵PID:3116
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"3⤵PID:2020
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:3472
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"3⤵PID:5044
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:4408
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:4444
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:3588
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:1560
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4816
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4452
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:2832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1236
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:5024
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:1716
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3992
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:468
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:4788
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4792
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4064
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:4820
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4672
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:2440
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:4680
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:3128
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"2⤵PID:1528
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3252
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:3460
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2428
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:4652
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:964
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:468
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:4768
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4180
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:2404
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:3640
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"2⤵PID:5084
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul1⤵PID:2896
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:1928
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:3376
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"1⤵PID:1380
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"1⤵PID:2384
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:4508
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:3116
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"1⤵PID:4344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3864
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\shwizard.exe > nul2⤵PID:4388
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"2⤵PID:4892
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"2⤵PID:1944
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"2⤵PID:4900
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.zip"2⤵PID:4184
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com2⤵PID:3460
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip2⤵PID:1348
-
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"1⤵PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5169770d1b39686dba1237519ab827a2d
SHA1fb5352912ffff67cea1afe02c38a7e19993d7851
SHA256fc39d9f91900bed78a83835b43cdc19375e3278a3878ebfd5bf6e4f5b94d1839
SHA512d2fe537125dd519437de12224d679ef044902abf03bb0185b1288f9f8bd900bb56ce18fc8fb8cee19219e643ed942ad5efe1269c4a97716be632dcc43daa427d
-
Filesize
3KB
MD5a3ba37f0afdc1fd9a69f4f44cdbc26e1
SHA15d667022420623974407a1157933b08c52e72d2c
SHA2566d63d07049c5eeae2802b8fd9f4294e8a4620643dca5e6c4dbe1d0c09e60a4c5
SHA512edf6413cf88bb1b5e7e5e04cc1f786ab934f41a18abd85dc77456f282be83f828559e09727f2b97fa2a50c46c95190b610c2cf28db24bdd7112d71a4a33826e8