Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 01:35

General

  • Target

    3b8f0c52e61db9389506323003634b77.exe

  • Size

    184KB

  • MD5

    3b8f0c52e61db9389506323003634b77

  • SHA1

    5db6d7bddddc0a21cc3fff9e559ef04ad2f0cbfb

  • SHA256

    16c3f8daae7b438859da9221fe07d22217f7cae34640cd5ea4395e3ce241a735

  • SHA512

    e018577baaf828abacf20fea13b38f147754313c13cd2b8d5553c7a51d4acd3fdbbd6c033bd745c26de7785a4bbbcbd3cd040cb2c61d2717cf3d77fdefeababb

  • SSDEEP

    3072:huRromuxcOAEAmjkMhmrC8PMEXYMuxGldk7xKDCeVylPvpFv:huhowDEAbMYrC8IyBDylPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 5 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b8f0c52e61db9389506323003634b77.exe
    "C:\Users\Admin\AppData\Local\Temp\3b8f0c52e61db9389506323003634b77.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-46313.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-46313.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-25365.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-25365.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63394.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-63394.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-4060.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-4060.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1368
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11835.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-11835.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1376
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63153.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-63153.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2520
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4689.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4689.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1876
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exe
                    9⤵
                      PID:2600
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-31368.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-31368.exe
                        10⤵
                          PID:2368
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32490.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-32490.exe
                            11⤵
                              PID:2496
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34455.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34455.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:3032
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16868.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16868.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1756
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53672.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53672.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3064
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37076.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37076.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2172
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exe
                        8⤵
                          PID:2944
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 240
                            9⤵
                            • Program crash
                            PID:2832
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22940.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-22940.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2180
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22337.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22337.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2156
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7237.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7237.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1768
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-4753.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-4753.exe
                          8⤵
                            PID:2880
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46869.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46869.exe
                              9⤵
                                PID:2320
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41175.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41175.exe
                                  10⤵
                                    PID:688
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-46734.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-46734.exe
                                8⤵
                                  PID:1084
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 236
                              6⤵
                              • Program crash
                              PID:1628
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60972.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60972.exe
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:1556
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3369.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3369.exe
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1744
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8000.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8000.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:3036
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-27980.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-27980.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2152
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-83.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-83.exe
                                  8⤵
                                    PID:1680
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52388.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-52388.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:524
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-32783.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-32783.exe
                                  7⤵
                                    PID:1492
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9889.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9889.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2652
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-42364.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-42364.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2884
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49939.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49939.exe
                                    7⤵
                                      PID:2504
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 240
                                        8⤵
                                        • Program crash
                                        PID:1728
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45755.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45755.exe
                                      7⤵
                                        PID:2348
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44053.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-44053.exe
                                3⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2740
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-65025.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-65025.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:1672
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56983.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56983.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:532
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53160.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53160.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2468
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1696
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-15989.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-15989.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1820
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 240
                                            9⤵
                                            • Program crash
                                            PID:2576
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2020
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-10776.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-10776.exe
                                          8⤵
                                            PID:1660
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38774.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38774.exe
                                              9⤵
                                                PID:1088
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2910.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2910.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1972
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-44182.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-44182.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2384
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-57519.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-57519.exe
                                              8⤵
                                                PID:532
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-27150.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-27150.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1388
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2804
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exe
                                              7⤵
                                                PID:2784
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-55639.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-55639.exe
                                                  8⤵
                                                    PID:2612
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16645.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16645.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2304
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exe
                                                6⤵
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2788
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30879.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30879.exe
                                                  7⤵
                                                    PID:2216
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-3734.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-3734.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2848
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44471.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-44471.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1080
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61935.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61935.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2640
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52615.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52615.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    PID:2340
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14055.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14055.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:560
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12599.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-12599.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2612
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-63529.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-63529.exe
                                                  6⤵
                                                    PID:3044
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14850.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14850.exe
                                                      7⤵
                                                        PID:1008
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-57248.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-57248.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2696
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63939.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-63939.exe
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2620
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-18674.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-18674.exe
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2656
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62603.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62603.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1484
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50615.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50615.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:960
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2252
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exe
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1796
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25944.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25944.exe
                                                            9⤵
                                                              PID:2284
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1391.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1391.exe
                                                                10⤵
                                                                  PID:2724
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-7598.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-7598.exe
                                                            7⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2416
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53310.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-53310.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2756
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2935.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2935.exe
                                                            7⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2464
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-49825.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-49825.exe
                                                              8⤵
                                                                PID:320
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-55576.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-55576.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1088
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-7638.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-7638.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2008
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1668
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-51375.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-51375.exe
                                                                8⤵
                                                                  PID:2068
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1304
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3610.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3610.exe
                                                                7⤵
                                                                  PID:2056
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2027.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2027.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1352
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 240
                                                              5⤵
                                                              • Loads dropped DLL
                                                              • Program crash
                                                              PID:1128
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-49732.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-49732.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1612
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42806.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42806.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2276
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61999.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61999.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:3024
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44843.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-44843.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:536
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-20638.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-20638.exe
                                                                  7⤵
                                                                    PID:2872
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-17977.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-17977.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2556
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14319.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14319.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2240
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17607.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17607.exe
                                                                    7⤵
                                                                      PID:1888
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-62512.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-62512.exe
                                                                        8⤵
                                                                          PID:2868
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe
                                                                      6⤵
                                                                        PID:628
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-61864.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-61864.exe
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2484
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-2264.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-2264.exe
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2860
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48326.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48326.exe
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1732
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23091.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-23091.exe
                                                                          7⤵
                                                                            PID:2452
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-14155.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-14155.exe
                                                                              8⤵
                                                                                PID:268
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16395.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16395.exe
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:2772
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2775.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2775.exe
                                                                            6⤵
                                                                              PID:2800
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3784.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3784.exe
                                                                                7⤵
                                                                                  PID:2172

                                                                    Network

                                                                    MITRE ATT&CK Matrix

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22940.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      aed23ffb4f341f1751bd2d14cb412578

                                                                      SHA1

                                                                      dc7cd308092aa3e6af632766ca3ea8e7d6fa2864

                                                                      SHA256

                                                                      4d6a23f4914865ab92e40fbc94d8a2471dcb5ddb01d28ac8c83448307c6ebe47

                                                                      SHA512

                                                                      a650e56eaf48320b6b2b7be1ffe9bca8fe4b11c67e7b0e9c5d275ab15cbbc1b90fd3179d752519beabad9bb0e4b90a2402240bd30554f5ba553938438f9ae92b

                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-4060.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      e2ecdc2a171e9516c9adb7509e182eb1

                                                                      SHA1

                                                                      4ec9614fd04274d11386856d0f5b78513ada60c6

                                                                      SHA256

                                                                      9914132fc3fcfafd84bbfc3de9b26817ce669fdaeeb20a5d634ce02b646d43d3

                                                                      SHA512

                                                                      4eef97f45fe9f9c74686c973602d9d2816c13bdcec76485122ac6b91a120f6b9faa7749baebc2f1fbf8b650459e76a66bbbf54555e9ea706caa79e6145c78f18

                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-49732.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      d50946d8c8ec07dd3fe82c25799fcd92

                                                                      SHA1

                                                                      bcf20de568f557a935e20f2c04558c17af98a125

                                                                      SHA256

                                                                      4c8a4306e203db83d1ccf398223dd2ed9b568ff6b342760ec2ece3ccbd7d7a8c

                                                                      SHA512

                                                                      8d78ac70f284f7ee0ba62d5153d93f1fe82232ff03135f3807e8eb8995f3b891d781588f9067e872ebe5bd3f363d5ee539460cb685a2cc77c8e1b8d9b69db540

                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-60972.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      bf78e2bccdee1c897ef66d78b9e1271e

                                                                      SHA1

                                                                      7e63a2e8c6e87b58b5ff120b200e67c3fe9d6da3

                                                                      SHA256

                                                                      24d33864b41b08055041985d678b87591336038cc4ef5a2fc0396793c499221f

                                                                      SHA512

                                                                      f093ffc941faae705177bd6daafc72e1ec82ecddd8f34fdad3c44984c91988a664ecfb346fb99fe8890327db74139711b9e692af7f3c6591031afdc9f8aa664a

                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-63939.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      fd9a6a7ab54cd6c79afda7099dd2dada

                                                                      SHA1

                                                                      ee4ede33c6318608e1f5ea820a26311bc43d1338

                                                                      SHA256

                                                                      6b273278255f6427c7a85235fb0c84a47144cbaddcffd50313d30a202a9e47ff

                                                                      SHA512

                                                                      dcc361a44ae58c8d330ab56a538ebfe13e87698d2b3e67cd18d7cbbef71c856b88b395a68c3609b475e2d514e858d8681150031d29722b20ea670f1f6a2e818e

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-11835.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      ae06fb1a1aead7c9d75b0514926b9831

                                                                      SHA1

                                                                      6cf667e3a6c0044027cbbe9927c403bffaeb98fb

                                                                      SHA256

                                                                      41872902369662b6fd736a66dd3ec332d6e05e97d8fef90548d7dd6e16aa2556

                                                                      SHA512

                                                                      19ec203d344971e67145b4bb4c472bb31b5932e90a51b6704e658735eca40580fba485c319842e75a84cf1c65804e21a613f04dcd2532444992449cb4e5f3e64

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-18674.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      bf1680f24075175d262775efc046aeb0

                                                                      SHA1

                                                                      ffd6e2c3d6058d8d477430cca0e94119a005afd0

                                                                      SHA256

                                                                      ce293440c63458cdb85b673a04df62c28e8683ea4fe6ac5d8a219c79d2f265d8

                                                                      SHA512

                                                                      98ed501d2b9301424107c048ce43c3719f4705cb8ba6e4465e07bdc453cd87121ee61d63d42309ca4608e9f1b28fbc24666c27379c862fc0d6d85af996e34ca6

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-2027.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      58f9125195de2ac254e22b1a6e1d781f

                                                                      SHA1

                                                                      f26cbfafa5220bcc2fc598c711e9a860fb196a34

                                                                      SHA256

                                                                      e746c0e0427276239679fc9c1dc8ae584d6d8dd708e9bdb8f469c1c16fb7d4d8

                                                                      SHA512

                                                                      480e1002a34390032cec9c2219a00c1bc683a90edbea9e548e4ee478624d894d7b167caac2d44802096c0493f8a3c28bce8b9881962e3dfaec9a1d083179a541

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-25365.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      c1e71561448a577e5beeb7a99882da02

                                                                      SHA1

                                                                      e2c60c5ab860c9a2a913ff37cd49b084534e2541

                                                                      SHA256

                                                                      4eff1e494a9b2c42083e27ba57612ed473c4a53ab9d833ead7597e9973e4ba13

                                                                      SHA512

                                                                      4cf7e6ac0b4af1f71a780c00b8351281a2f5c890655c0af2d9ac090009c7afdf3793e1cd008a6f9a007357bb7a4ade7ef66e7a7075acca6cb4d1b2cfda0037f8

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-3369.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      3129e1660e0a57e9cef09b90d6135911

                                                                      SHA1

                                                                      16462d79ecd5a18f714bfcbad9a76a1f6b7aedbb

                                                                      SHA256

                                                                      0b6d821e67619dc3096027c321c88f32b55c2f5d6af991ae42ff4bac769572c2

                                                                      SHA512

                                                                      17bef1c0b58897fbb617d3bfa83939313f81790aee024d7754831d15a615dbc5720fb17cfc67d661d77f556655e2944b79b7c8fd9ab401b1c10e8ce3618b1223

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-3734.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      9450a5d761fc47e812c57820329b7c31

                                                                      SHA1

                                                                      c3d7647e36a2d82ff7ee823f851afd0f02fdb135

                                                                      SHA256

                                                                      78d767a0e00e89b2ed5ac80d6ac33e2cb2949be316080bd2c1426a6d1d8471dd

                                                                      SHA512

                                                                      331c494ec2de510ac4a4e497248de80c607c91013c9dc1b88d0b9c2d095b0a82859ec93c33b9b247fa91564b4d2aca01b2e599780256e0356bee6fa024db9c8f

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-42806.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      d84a4d12cdfd459cddcc7730267cab0b

                                                                      SHA1

                                                                      9084e00725d7d9389cf5bb7d2aa26c0e27162c54

                                                                      SHA256

                                                                      4b3cbcfab5e5a1eca5c42a1ccf243b9f1d42a3d180308d6698fe2274fac85926

                                                                      SHA512

                                                                      87b7e6d5e0ca9cf333a6924c7b977f4bd02f526b0812a199aed8eb05b7acb2d6e8d63835a68f590ef6e792a267f74ea543534dc18997413a838586114f7ba361

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-44053.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      614254b40aa09932df98963d761b8662

                                                                      SHA1

                                                                      46aa605e9a284abd08caccdcc06069399b8ee6e3

                                                                      SHA256

                                                                      234c375c72075ba04213d711f42b053d42898d4e663246829fdd3abc03a14e09

                                                                      SHA512

                                                                      0ff9c74c2fea9938d86546642b7f6630538978de7fe48fa8430aa7a305dbdab759ba57e53be779a0d1f9ea2a536e183b2cd9da192eb1ed3175660648d157f56c

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-46313.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      502668e52d40a09c1355f98fb96554d1

                                                                      SHA1

                                                                      7437c2ddf836002ec6ec0d74277ae435731079d5

                                                                      SHA256

                                                                      4ee53c38dbf586880c59492387fbdeb50e745f94f4861e2bff156151768cd2be

                                                                      SHA512

                                                                      dee5a458320278943bffe4d6dda9827c2c0c0d6f6d0548719ff73c8c41ffb5d304887f697f1bbb8cf6499ba90c92eebfa4a2f37bdca1ec3c02a044e988ba45d6

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-56983.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      d1dc030a5a5eb4ee64a99f5f383b6a83

                                                                      SHA1

                                                                      7daf87ed219e6c086791b9e8dabf673fbf1f1afd

                                                                      SHA256

                                                                      eaa38e0377ccf2406a86a6aea50a3bf29b42fdcd9b886f045d5262325f890aca

                                                                      SHA512

                                                                      137940c383d17161d7a0746900685480104fd533346cdf2f9121910afd47d27f964bd07d508d2b7912c9b673d23cdc9206965990ecaf0dea0129ad14fa9a2b6f

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-57248.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      3270ba65a6c824ce4acdd7307c64fbbd

                                                                      SHA1

                                                                      1209956f8cc9ae686458f037f359b1bac43da56b

                                                                      SHA256

                                                                      cafb07bc4eb3f1436fc64c234b0f43a76b1c96cc3b67a5d066e6a6cc44012e7a

                                                                      SHA512

                                                                      11f555cd714576139c5bca159d6039521acfd37ca6dd43f5b714c4bfe5252cb0068a1836b432938fdbe0ff0978ad52422a781b33cd797bb121704186637a8754

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-62603.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      4387a8a618fdb5927d46d6905cb1bcf5

                                                                      SHA1

                                                                      3d4fa5d02195ef587cfe64718df707b5c10a3a54

                                                                      SHA256

                                                                      42a9cd235f25c4cf772abf9a7100924697e68ecdf6843c0df8fb8dad3c07ce77

                                                                      SHA512

                                                                      e662581456c9c12c43ab49224b1681ded6ccd8540c9ce83ec7a3ee92e3f878d09be06d66c89b4107aa47894731a31902accea69e22a2e78dbb5879dca7616d87

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-63394.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      f2c92768b514f43c07376a44a6a9291c

                                                                      SHA1

                                                                      30f7c84faa2959b70f4f379225a377aa55e41ea5

                                                                      SHA256

                                                                      c070ac4b5206bc76cc2932600c05a7b2e24642f923f4025deb369ef3f8ef54b0

                                                                      SHA512

                                                                      1b24ecb9d90841ca3e55587150a394873415d2bfe835d8f3e0ccd1e835d041696e15cfe6628a3fa7f5b3560ecf0d50f7a21af4497603b6d9ffd9d67647253543

                                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-65025.exe

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      10adfc52c039387e84ae7e6381618c19

                                                                      SHA1

                                                                      3da2db48d133899b88f7295f11f2907cdf0510df

                                                                      SHA256

                                                                      aed0c2299f45e9a52238e1510a9633a07a56eaa1ec9599659dd0561f96764ceb

                                                                      SHA512

                                                                      8f17539b985c93df00a4883bb35481707e36930baa3da03f3daa4344ea19aa3f026d98d94afef5382ab1fd8f79fd1af770dbdcb0b71b3f202c5c257b84b82ec0