Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
0e0fe8175fe2c5e68c8f353e541ae3c9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e0fe8175fe2c5e68c8f353e541ae3c9.exe
Resource
win10v2004-20231215-en
General
-
Target
0e0fe8175fe2c5e68c8f353e541ae3c9.exe
-
Size
184KB
-
MD5
0e0fe8175fe2c5e68c8f353e541ae3c9
-
SHA1
0cf9711769f632b83be57445b6b5751388b49c26
-
SHA256
95ddb8d7162ea7be37c6c887d030f18fb9564236881badc47331c4d04ee0fb92
-
SHA512
5a293c8729bf18a7d306242f1784068eb2d5b1045b8a0f27d98d16f302a4a0e59fa24575e89a61b7332d1ec47e2861d32a9e337cbdc3b57e9799dc8f9239355c
-
SSDEEP
3072:/j9Ro3+sQGAG5yjvdticMvkGtVY6bdfn7wSx2BIQuNlPvpFi:/jTo2rG5MdgcMvVvsSNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2752 Unicorn-9869.exe 2772 Unicorn-41712.exe 2908 Unicorn-64825.exe 2592 Unicorn-36341.exe 2620 Unicorn-30673.exe 2564 Unicorn-60845.exe 960 Unicorn-19896.exe 2632 Unicorn-40316.exe 1644 Unicorn-59366.exe 2304 Unicorn-8774.exe 2476 Unicorn-62059.exe 2372 Unicorn-14825.exe 2424 Unicorn-29770.exe 616 Unicorn-21624.exe 2288 Unicorn-61073.exe 1920 Unicorn-7041.exe 1636 Unicorn-33684.exe 2464 Unicorn-11680.exe 1152 Unicorn-27462.exe 896 Unicorn-15641.exe 2900 Unicorn-52397.exe 2340 Unicorn-18141.exe 2316 Unicorn-58427.exe 2648 Unicorn-9781.exe 1508 Unicorn-7088.exe 1948 Unicorn-54919.exe 2520 Unicorn-18525.exe 2984 Unicorn-48697.exe 1088 Unicorn-24555.exe 2756 Unicorn-5526.exe 2704 Unicorn-14249.exe 2584 Unicorn-15531.exe 2360 Unicorn-53035.exe 544 Unicorn-55002.exe 1476 Unicorn-18054.exe 1744 Unicorn-43112.exe 1372 Unicorn-39028.exe 2308 Unicorn-20576.exe 1500 Unicorn-49911.exe 2276 Unicorn-53248.exe 2912 Unicorn-53248.exe 1748 Unicorn-35328.exe 1136 Unicorn-20938.exe 1544 Unicorn-25044.exe 676 Unicorn-63938.exe 1332 Unicorn-24852.exe 1388 Unicorn-37658.exe 1640 Unicorn-26798.exe 2692 Unicorn-20659.exe 2736 Unicorn-13258.exe 2188 Unicorn-31733.exe 2204 Unicorn-7036.exe 2532 Unicorn-2760.exe 1796 Unicorn-48432.exe 1512 Unicorn-21235.exe 1236 Unicorn-40093.exe 2776 Unicorn-25594.exe 2964 Unicorn-39984.exe 2312 Unicorn-15864.exe 2264 Unicorn-46782.exe 1192 Unicorn-9833.exe 3080 Unicorn-53352.exe 3248 Unicorn-51852.exe 3240 Unicorn-51852.exe -
Loads dropped DLL 64 IoCs
pid Process 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 2752 Unicorn-9869.exe 2752 Unicorn-9869.exe 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 2772 Unicorn-41712.exe 2772 Unicorn-41712.exe 2752 Unicorn-9869.exe 2908 Unicorn-64825.exe 2908 Unicorn-64825.exe 2752 Unicorn-9869.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 2620 Unicorn-30673.exe 2620 Unicorn-30673.exe 2592 Unicorn-36341.exe 2592 Unicorn-36341.exe 2772 Unicorn-41712.exe 2772 Unicorn-41712.exe 2564 Unicorn-60845.exe 2564 Unicorn-60845.exe 2908 Unicorn-64825.exe 2908 Unicorn-64825.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 960 Unicorn-19896.exe 2620 Unicorn-30673.exe 960 Unicorn-19896.exe 2620 Unicorn-30673.exe 2632 Unicorn-40316.exe 2632 Unicorn-40316.exe 2592 Unicorn-36341.exe 2592 Unicorn-36341.exe 1644 Unicorn-59366.exe 1644 Unicorn-59366.exe 2476 Unicorn-62059.exe 2476 Unicorn-62059.exe 2564 Unicorn-60845.exe 2564 Unicorn-60845.exe 2304 Unicorn-8774.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 2392 2432 WerFault.exe 27 756 2752 WerFault.exe 28 1936 2772 WerFault.exe 29 920 2908 WerFault.exe 30 368 2620 WerFault.exe 33 1624 2592 WerFault.exe 32 2096 2564 WerFault.exe 34 2856 960 WerFault.exe 36 2596 2632 WerFault.exe 37 2976 1644 WerFault.exe 39 1492 2304 WerFault.exe 38 2488 2476 WerFault.exe 40 1032 2372 WerFault.exe 43 1576 1152 WerFault.exe 50 1784 2288 WerFault.exe 46 2712 2424 WerFault.exe 44 2040 2900 WerFault.exe 55 2380 616 WerFault.exe 45 400 2316 WerFault.exe 57 2084 1508 WerFault.exe 59 1504 1948 WerFault.exe 60 2536 2520 WerFault.exe 61 2200 2340 WerFault.exe 56 1532 1636 WerFault.exe 48 1524 896 WerFault.exe 54 2788 2704 WerFault.exe 65 1436 2464 WerFault.exe 49 1016 2648 WerFault.exe 58 2196 1500 WerFault.exe 80 3124 1476 WerFault.exe 76 3188 1920 WerFault.exe 47 3484 2756 WerFault.exe 64 3476 2984 WerFault.exe 62 3536 2360 WerFault.exe 70 3528 676 WerFault.exe 86 3604 2912 WerFault.exe 82 3632 1088 WerFault.exe 63 3732 1744 WerFault.exe 77 3896 1748 WerFault.exe 83 4028 544 WerFault.exe 72 4020 1544 WerFault.exe 87 3448 1640 WerFault.exe 91 3472 2532 WerFault.exe 100 3436 284 WerFault.exe 84 3544 2776 WerFault.exe 109 3524 2188 WerFault.exe 97 3556 2312 WerFault.exe 113 3468 1136 WerFault.exe 85 3680 1332 WerFault.exe 89 3716 2308 WerFault.exe 79 3764 1388 WerFault.exe 90 3692 2584 WerFault.exe 68 4264 2276 WerFault.exe 81 4516 2736 WerFault.exe 96 4616 1236 WerFault.exe 105 5036 1796 WerFault.exe 101 4472 1192 WerFault.exe 119 4548 3276 WerFault.exe 131 4704 3248 WerFault.exe 124 4788 3292 WerFault.exe 128 4812 4048 WerFault.exe 145 4840 3316 WerFault.exe 130 908 4356 WerFault.exe 159 4780 1372 WerFault.exe 78 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 2752 Unicorn-9869.exe 2772 Unicorn-41712.exe 2908 Unicorn-64825.exe 2620 Unicorn-30673.exe 2592 Unicorn-36341.exe 2564 Unicorn-60845.exe 960 Unicorn-19896.exe 2632 Unicorn-40316.exe 1644 Unicorn-59366.exe 2304 Unicorn-8774.exe 2476 Unicorn-62059.exe 2372 Unicorn-14825.exe 2424 Unicorn-29770.exe 616 Unicorn-21624.exe 2288 Unicorn-61073.exe 1920 Unicorn-7041.exe 1636 Unicorn-33684.exe 2464 Unicorn-11680.exe 1152 Unicorn-27462.exe 896 Unicorn-15641.exe 2340 Unicorn-18141.exe 2900 Unicorn-52397.exe 2316 Unicorn-58427.exe 2648 Unicorn-9781.exe 1508 Unicorn-7088.exe 2520 Unicorn-18525.exe 1088 Unicorn-24555.exe 2984 Unicorn-48697.exe 2756 Unicorn-5526.exe 2704 Unicorn-14249.exe 2584 Unicorn-15531.exe 2360 Unicorn-53035.exe 544 Unicorn-55002.exe 1476 Unicorn-18054.exe 1372 Unicorn-39028.exe 1744 Unicorn-43112.exe 2308 Unicorn-20576.exe 1500 Unicorn-49911.exe 2276 Unicorn-53248.exe 2912 Unicorn-53248.exe 284 Unicorn-42942.exe 1748 Unicorn-35328.exe 1136 Unicorn-20938.exe 1544 Unicorn-25044.exe 676 Unicorn-63938.exe 1332 Unicorn-24852.exe 1388 Unicorn-37658.exe 1640 Unicorn-26798.exe 2692 Unicorn-20659.exe 2188 Unicorn-31733.exe 2736 Unicorn-13258.exe 2204 Unicorn-7036.exe 1512 Unicorn-21235.exe 2532 Unicorn-2760.exe 1796 Unicorn-48432.exe 1236 Unicorn-40093.exe 2776 Unicorn-25594.exe 2964 Unicorn-39984.exe 2312 Unicorn-15864.exe 2264 Unicorn-46782.exe 1192 Unicorn-9833.exe 3080 Unicorn-53352.exe 3316 Unicorn-6180.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2752 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 28 PID 2432 wrote to memory of 2752 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 28 PID 2432 wrote to memory of 2752 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 28 PID 2432 wrote to memory of 2752 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 28 PID 2752 wrote to memory of 2772 2752 Unicorn-9869.exe 29 PID 2752 wrote to memory of 2772 2752 Unicorn-9869.exe 29 PID 2752 wrote to memory of 2772 2752 Unicorn-9869.exe 29 PID 2752 wrote to memory of 2772 2752 Unicorn-9869.exe 29 PID 2432 wrote to memory of 2908 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 30 PID 2432 wrote to memory of 2908 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 30 PID 2432 wrote to memory of 2908 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 30 PID 2432 wrote to memory of 2908 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 30 PID 2432 wrote to memory of 2392 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 31 PID 2432 wrote to memory of 2392 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 31 PID 2432 wrote to memory of 2392 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 31 PID 2432 wrote to memory of 2392 2432 0e0fe8175fe2c5e68c8f353e541ae3c9.exe 31 PID 2772 wrote to memory of 2592 2772 Unicorn-41712.exe 32 PID 2772 wrote to memory of 2592 2772 Unicorn-41712.exe 32 PID 2772 wrote to memory of 2592 2772 Unicorn-41712.exe 32 PID 2772 wrote to memory of 2592 2772 Unicorn-41712.exe 32 PID 2908 wrote to memory of 2564 2908 Unicorn-64825.exe 34 PID 2908 wrote to memory of 2564 2908 Unicorn-64825.exe 34 PID 2908 wrote to memory of 2564 2908 Unicorn-64825.exe 34 PID 2908 wrote to memory of 2564 2908 Unicorn-64825.exe 34 PID 2752 wrote to memory of 2620 2752 Unicorn-9869.exe 33 PID 2752 wrote to memory of 2620 2752 Unicorn-9869.exe 33 PID 2752 wrote to memory of 2620 2752 Unicorn-9869.exe 33 PID 2752 wrote to memory of 2620 2752 Unicorn-9869.exe 33 PID 2752 wrote to memory of 756 2752 Unicorn-9869.exe 35 PID 2752 wrote to memory of 756 2752 Unicorn-9869.exe 35 PID 2752 wrote to memory of 756 2752 Unicorn-9869.exe 35 PID 2752 wrote to memory of 756 2752 Unicorn-9869.exe 35 PID 2620 wrote to memory of 960 2620 Unicorn-30673.exe 36 PID 2620 wrote to memory of 960 2620 Unicorn-30673.exe 36 PID 2620 wrote to memory of 960 2620 Unicorn-30673.exe 36 PID 2620 wrote to memory of 960 2620 Unicorn-30673.exe 36 PID 2592 wrote to memory of 2632 2592 Unicorn-36341.exe 37 PID 2592 wrote to memory of 2632 2592 Unicorn-36341.exe 37 PID 2592 wrote to memory of 2632 2592 Unicorn-36341.exe 37 PID 2592 wrote to memory of 2632 2592 Unicorn-36341.exe 37 PID 2772 wrote to memory of 2304 2772 Unicorn-41712.exe 38 PID 2772 wrote to memory of 2304 2772 Unicorn-41712.exe 38 PID 2772 wrote to memory of 2304 2772 Unicorn-41712.exe 38 PID 2772 wrote to memory of 2304 2772 Unicorn-41712.exe 38 PID 2564 wrote to memory of 1644 2564 Unicorn-60845.exe 39 PID 2564 wrote to memory of 1644 2564 Unicorn-60845.exe 39 PID 2564 wrote to memory of 1644 2564 Unicorn-60845.exe 39 PID 2564 wrote to memory of 1644 2564 Unicorn-60845.exe 39 PID 2908 wrote to memory of 2476 2908 Unicorn-64825.exe 40 PID 2908 wrote to memory of 2476 2908 Unicorn-64825.exe 40 PID 2908 wrote to memory of 2476 2908 Unicorn-64825.exe 40 PID 2908 wrote to memory of 2476 2908 Unicorn-64825.exe 40 PID 2772 wrote to memory of 1936 2772 Unicorn-41712.exe 41 PID 2772 wrote to memory of 1936 2772 Unicorn-41712.exe 41 PID 2772 wrote to memory of 1936 2772 Unicorn-41712.exe 41 PID 2772 wrote to memory of 1936 2772 Unicorn-41712.exe 41 PID 2908 wrote to memory of 920 2908 Unicorn-64825.exe 42 PID 2908 wrote to memory of 920 2908 Unicorn-64825.exe 42 PID 2908 wrote to memory of 920 2908 Unicorn-64825.exe 42 PID 2908 wrote to memory of 920 2908 Unicorn-64825.exe 42 PID 960 wrote to memory of 2372 960 Unicorn-19896.exe 43 PID 960 wrote to memory of 2372 960 Unicorn-19896.exe 43 PID 960 wrote to memory of 2372 960 Unicorn-19896.exe 43 PID 960 wrote to memory of 2372 960 Unicorn-19896.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0fe8175fe2c5e68c8f353e541ae3c9.exe"C:\Users\Admin\AppData\Local\Temp\0e0fe8175fe2c5e68c8f353e541ae3c9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9869.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41712.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36341.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40316.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21624.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58427.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53248.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21235.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe10⤵PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 38010⤵PID:5132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 3769⤵
- Program crash
PID:3604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 3768⤵
- Program crash
PID:400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35328.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39984.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59634.exe9⤵PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 3809⤵PID:4808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 3768⤵
- Program crash
PID:3896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 616 -s 3767⤵
- Program crash
PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9781.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53248.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14021.exe8⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe9⤵PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 3809⤵PID:5284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 3768⤵
- Program crash
PID:4264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 3687⤵
- Program crash
PID:1016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 3766⤵
- Program crash
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61073.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7088.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20576.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25594.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exe9⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 38010⤵PID:5420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 3769⤵
- Program crash
PID:3544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51852.exe8⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe9⤵PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 3809⤵PID:2416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 3688⤵
- Program crash
PID:3716
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 3767⤵
- Program crash
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49911.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31733.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exe8⤵PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 3768⤵
- Program crash
PID:3524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 3767⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 3766⤵
- Program crash
PID:1784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 3805⤵
- Program crash
PID:1624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8774.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27462.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48697.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20659.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe8⤵PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 3728⤵PID:5200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 3727⤵
- Program crash
PID:3476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 3766⤵
- Program crash
PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24555.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63938.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7036.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe8⤵PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 3728⤵PID:5292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 3767⤵
- Program crash
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48432.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12345.exe7⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25239.exe8⤵PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 3728⤵PID:5300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 3807⤵
- Program crash
PID:5036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 3766⤵
- Program crash
PID:3632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 3765⤵
- Program crash
PID:1492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 3684⤵
- Loads dropped DLL
- Program crash
PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30673.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19896.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14825.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15641.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15531.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35371.exe9⤵PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 3809⤵
- Program crash
PID:4840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 3768⤵
- Program crash
PID:3692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 3767⤵
- Program crash
PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53035.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13258.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15256.exe8⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62205.exe9⤵PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 3729⤵
- Program crash
PID:4812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 3768⤵
- Program crash
PID:4516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 3687⤵
- Program crash
PID:3536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 3766⤵
- Program crash
PID:1032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18141.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55002.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9833.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24824.exe8⤵PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 3728⤵
- Program crash
PID:4472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 3687⤵
- Program crash
PID:4028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 3766⤵
- Program crash
PID:2200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 3805⤵
- Program crash
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29770.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52397.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18054.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2760.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exe8⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55983.exe9⤵PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 3809⤵
- Program crash
PID:4788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 3768⤵
- Program crash
PID:3472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 3767⤵
- Program crash
PID:3124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 3766⤵
- Program crash
PID:2040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43112.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40093.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5848.exe7⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe8⤵PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 3728⤵
- Program crash
PID:908
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 3767⤵
- Program crash
PID:4616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 3766⤵
- Program crash
PID:3732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 3685⤵
- Program crash
PID:2712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 3764⤵
- Program crash
PID:368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 3803⤵
- Loads dropped DLL
- Program crash
PID:756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64825.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60845.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59366.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7041.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54919.exe6⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42942.exe7⤵
- Suspicious use of SetWindowsHookEx
PID:284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15864.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36907.exe9⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe10⤵PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 38010⤵PID:5276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 3769⤵
- Program crash
PID:3556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51852.exe8⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6974.exe9⤵PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 3809⤵
- Program crash
PID:4704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 284 -s 3768⤵
- Program crash
PID:3436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 3767⤵
- Program crash
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20938.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12402.exe7⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe8⤵PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 3808⤵PID:5124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 3767⤵
- Program crash
PID:3468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 3766⤵
- Program crash
PID:3188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18525.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25044.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe8⤵PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 3808⤵PID:5168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 3767⤵
- Program crash
PID:4020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 3806⤵
- Program crash
PID:2536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 3765⤵
- Program crash
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11680.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39028.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23363.exe6⤵PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 3806⤵
- Program crash
PID:4780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 3765⤵
- Program crash
PID:1436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 3804⤵
- Program crash
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62059.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33684.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5526.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24852.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exe7⤵PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 3767⤵
- Program crash
PID:3680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 3726⤵
- Program crash
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37658.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53352.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe7⤵PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 3807⤵PID:5148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 3766⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 3685⤵
- Program crash
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14249.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26798.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exe6⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55983.exe7⤵PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 3727⤵
- Program crash
PID:4548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 3686⤵
- Program crash
PID:3448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 3765⤵
- Program crash
PID:2788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 3764⤵
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 3683⤵
- Loads dropped DLL
- Program crash
PID:920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 3762⤵
- Program crash
PID:2392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD57d0d28919bb96cbfa67bf18fd8ce89d3
SHA1f2fe7377cd08c0a2c188ecab4e3387142fff140e
SHA2563aa9eccf060e09abd796cc49a99df1bb14801df4025223fcd1a7e77491a65f10
SHA512a17d6560ff001c458770946b0bc55dfd7ffd9cf72afd3de86817a6b98e0ee5af50455d4337d79e0d5662e3d2e78e0439f754059c15db1422be4bdb32c5169b12
-
Filesize
184KB
MD5e966ac693315467967966cebe4f3d59c
SHA1cb451428c3d8ae3091c596a9f4ee7f61f610cc52
SHA256b04c46e54045a36f59362276681769607aa7278253d41d427fa0b643ca19c6ec
SHA512ec52db3721a04504442f61eaed271556f4618a71ee55681ab0b946e5384f98a76e687145246a99a021dfaaed2d74039795dc21627b169174bd4a218e3ee152ee
-
Filesize
184KB
MD58b926638223132e00026d1535c1c9487
SHA1a7d3b91ee6590e34f177ffd912f738881093392c
SHA256a0e3ba9637c8fab1a38703449adca82be2fb587691b1b9b080d6c4cea0ba82b6
SHA512245ed4a4a14c3d8f9cc9276d6779fc74f34c89e963daa2e46937d8bf59b7f14a9f8aa08d537b40ed294d9c00c59bd5d2139c580a3295e29801177bdd0bb28ea6
-
Filesize
184KB
MD5a2e4e888914591521e1c9640c3413938
SHA19d706047582bf29b9682884fd1df792f429cf74d
SHA2563183691fad8ca90d0c3954267ca2d02ab23800edd9471a5abb4dcaac8340fba5
SHA51241dec55a6a79be4a898625cea92b7fcee6fb8666cf3bc3697945fa05de07aed7b89b515bd112f1b3d1e5e5cbff1d51a0d19ed0fa38903120ecb724d6c61f93a9
-
Filesize
184KB
MD514aa5fb36e93cb40f0b7b487ab50fb3a
SHA1902f3f35a8d3ed57df29fe66b65d515c9cd7a97d
SHA2565c37e96f14c289e0048c25ea2a3ee5ac1d1c60b1447e280fcc19a972d3fe629b
SHA512899fb96acef9b5564cdef3cf30d49fedd92c5bfcbb1491e99add638ae1d0e4a8b3d9a374b640171589da7c94ac83f0e786a27ae28809738103105a70b783a752
-
Filesize
184KB
MD50ba5cfe2d585ac47b0cf22a4abd53c11
SHA1e5df45e5ac047e4e57dfbe75f2fd938cf15d262c
SHA2564945f7a08610732c4f9430a19c1f3c6fd9d74ad5b5507e13b0ba6c9bf7282187
SHA512b581212aece3475c085df987090b05dcc3d7510e5e9badb83b7f9f8179d1a9f27b2f22ff72153cc9ed9c58ef52a8f86ecc87b65def879fc72db8e1b89bfafbec
-
Filesize
184KB
MD50d6543f9bc7e79ea7eb75a6866cba547
SHA1bc4f618ac7efb8ce62463caa3ac17754582ee1f7
SHA2566796ffad5296ff0f4ad9ed21e1a54168fcb0af35a07570c6babb6432ee4c0477
SHA512bcc36092a670fc0dc6d43d55e53842acac4d6ba757b2327a0a564b21c30ac4151b91ba010e7ea8ebcd501b3fba95ed1a62a9368a0e78a0c9b23e58240d6997fc
-
Filesize
184KB
MD56b26ebccdf40f7aac630d661e94f2856
SHA1eb73ba1d22ac2a531d442e0419afe5fc6fdb9125
SHA256d3bce44874ee07b7f62b0ce028efe000cfd8ee89db484041d041e95e8b49157a
SHA512293f65b1fbcf1eb541fdf0cb849ac961cf82c7d31579ad8fa53c730a8a6bda2b203555e0b8fa7066ce2438aaaec6989bdfe57f784c11210d41397af27b4756bd
-
Filesize
184KB
MD5a3dc061d70cf444f66c5eef4909c7e2b
SHA1c36f6e42b4138048747205a56809e19cb14299be
SHA25673887733a053b6561d8e3ae65203ba72f73986073292c027185e54de1172c684
SHA512a85ec878826316995d4b479865ce2b0c5d78f4046268322ceef3967a832067a975b76574cc805180f1d3111982d214e48cafe716979950802ae1d7eccf6039af
-
Filesize
184KB
MD51bb9167d5e44a76ed906353e0172d3c4
SHA1ad7a6aa456bff343d1bfa08fe6ab3b83fe11f83c
SHA25627233249ed4fe6829b1f20cdc277a7a91986dc872e679fe3c97de45fe4209cdf
SHA512b0da7a22c5a87ba18fb109d2017c911af3a0f3fc1e339735cc931025f7c33e9b765e16d9b32c593405fe1084f22248099a850ccc56bf4b734ea5d9530181b835
-
Filesize
184KB
MD5a3be2fe65ba1a0fbaa0c44ddfca07bbf
SHA10059aee5852597ea62aa17ac5ffbcd3fc6c9ac5c
SHA2561659cd5b0ea1e50b5eb8345ade97b218c0e94f65b9ac80ea6fbc2dbef2c30a66
SHA5122bdfbdc334fecdf93e09b270bf429b6e5e52d353bb46a62853c6e18715f59593ac2a6eec19d57530b1e9c809359edde9553d98a27758161add28921d18a31196
-
Filesize
184KB
MD5e52120c88fccd23e0d6ce2a4cc9e8a32
SHA166b5e887bb90da6f3f37944e7f64f3cf66b5011e
SHA256780bd808b846e62a178956f3e13f383b6cf49f58c6c416484cd2fada42a807f4
SHA51246365026d80871d48bca82aa7292869d0a9b8be6a2a6e01568ce094298adf9a1ad74595e911d1f2cc0fcb0ece4ce61a450bbbb99e1e9cba20d4226060efbc619
-
Filesize
184KB
MD5d6bdea94551ad44ace5efa667b483f00
SHA1f9f4da0c11bcb7dfca59e5b03bde57b1f20a5f28
SHA256e47753e8f1296453519e8bdd6713f87605f9682d826167f1e64af4649c489472
SHA5121e4a26272eb990e10d0d5530c1fe42b476e0efd0ab7a92af7e0fdfae762e965ac2a4215685b36432f69a56824634d81eef3801a578b255ef1f191bcdf00cd112