Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe
Resource
win10v2004-20240426-en
General
-
Target
72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe
-
Size
184KB
-
MD5
d4183b298c7f469d0273f80310c5ff68
-
SHA1
305479b78fd3e5fe69c249b961a57986c2546418
-
SHA256
72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e
-
SHA512
c9f13312f9c88961d3cb286c894e982e2ef404364b466a6814c988895130dc44326247b6cf4abb12ca53a67e7ad5fbb8c5e1cb80d8472d6e886e63bee7d7d446
-
SSDEEP
3072:U/a3gxoT7VOKd1mWefHLRKs8hllViF7n3:U/jo0G1mZLYs8hllViF7
Malware Config
Signatures
-
Executes dropped EXE 48 IoCs
Processes:
Unicorn-47328.exeUnicorn-64624.exeUnicorn-38065.exeUnicorn-2460.exeUnicorn-47167.exeUnicorn-52367.exeUnicorn-43405.exeUnicorn-21999.exeUnicorn-39295.exeUnicorn-30141.exeUnicorn-8926.exeUnicorn-14126.exeUnicorn-18870.exeUnicorn-49679.exeUnicorn-1822.exeUnicorn-19311.exeUnicorn-24319.exeUnicorn-41807.exeUnicorn-32845.exeUnicorn-11438.exeUnicorn-29503.exeUnicorn-30619.exeUnicorn-44023.exeUnicorn-35061.exeUnicorn-8309.exeUnicorn-35035.exeUnicorn-7466.exeUnicorn-15910.exeUnicorn-33974.exeUnicorn-60699.exeUnicorn-12650.exeUnicorn-4721.exeUnicorn-35531.exeUnicorn-39506.exeUnicorn-56994.exeUnicorn-9137.exeUnicorn-23575.exeUnicorn-10912.exeUnicorn-24317.exeUnicorn-3102.exeUnicorn-3185.exeUnicorn-8385.exeUnicorn-4192.exeUnicorn-191.exeUnicorn-35277.exeUnicorn-13870.exeUnicorn-6325.exeUnicorn-37135.exepid process 3824 Unicorn-47328.exe 4920 Unicorn-64624.exe 4296 Unicorn-38065.exe 2432 Unicorn-2460.exe 1984 Unicorn-47167.exe 1124 Unicorn-52367.exe 4704 Unicorn-43405.exe 4368 Unicorn-21999.exe 3092 Unicorn-39295.exe 1564 Unicorn-30141.exe 3448 Unicorn-8926.exe 3756 Unicorn-14126.exe 2224 Unicorn-18870.exe 960 Unicorn-49679.exe 1172 Unicorn-1822.exe 3760 Unicorn-19311.exe 3400 Unicorn-24319.exe 4680 Unicorn-41807.exe 2368 Unicorn-32845.exe 5116 Unicorn-11438.exe 3200 Unicorn-29503.exe 2120 Unicorn-30619.exe 4280 Unicorn-44023.exe 2728 Unicorn-35061.exe 4300 Unicorn-8309.exe 2576 Unicorn-35035.exe 4600 Unicorn-7466.exe 1544 Unicorn-15910.exe 3400 Unicorn-33974.exe 4016 Unicorn-60699.exe 3896 Unicorn-12650.exe 232 Unicorn-4721.exe 976 Unicorn-35531.exe 1164 Unicorn-39506.exe 1548 Unicorn-56994.exe 3356 Unicorn-9137.exe 2452 Unicorn-23575.exe 3088 Unicorn-10912.exe 4604 Unicorn-24317.exe 4568 Unicorn-3102.exe 5012 Unicorn-3185.exe 448 Unicorn-8385.exe 4916 Unicorn-4192.exe 3852 Unicorn-191.exe 4252 Unicorn-35277.exe 4280 Unicorn-13870.exe 3372 Unicorn-6325.exe 2600 Unicorn-37135.exe -
Program crash 47 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4680 4696 WerFault.exe 72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe 3060 3824 WerFault.exe Unicorn-47328.exe 636 4920 WerFault.exe Unicorn-64624.exe 5092 4296 WerFault.exe Unicorn-38065.exe 2336 2432 WerFault.exe Unicorn-2460.exe 1144 1984 WerFault.exe Unicorn-47167.exe 3804 1124 WerFault.exe Unicorn-52367.exe 3596 4704 WerFault.exe Unicorn-43405.exe 4700 4368 WerFault.exe Unicorn-21999.exe 1952 3092 WerFault.exe Unicorn-39295.exe 2544 1564 WerFault.exe Unicorn-30141.exe 1052 3448 WerFault.exe Unicorn-8926.exe 620 3756 WerFault.exe Unicorn-14126.exe 5032 2224 WerFault.exe Unicorn-18870.exe 1740 960 WerFault.exe Unicorn-49679.exe 4600 1172 WerFault.exe Unicorn-1822.exe 1400 3760 WerFault.exe Unicorn-19311.exe 2884 3400 WerFault.exe Unicorn-24319.exe 2356 4680 WerFault.exe Unicorn-41807.exe 1260 2368 WerFault.exe Unicorn-32845.exe 4892 5116 WerFault.exe Unicorn-11438.exe 5040 3200 WerFault.exe Unicorn-29503.exe 1204 2120 WerFault.exe Unicorn-30619.exe 1208 4280 WerFault.exe Unicorn-44023.exe 4208 2728 WerFault.exe Unicorn-35061.exe 3148 4300 WerFault.exe Unicorn-8309.exe 3804 2576 WerFault.exe Unicorn-35035.exe 4416 4600 WerFault.exe Unicorn-7466.exe 4568 1544 WerFault.exe Unicorn-15910.exe 4868 3400 WerFault.exe Unicorn-33974.exe 2368 4016 WerFault.exe Unicorn-60699.exe 1116 3896 WerFault.exe Unicorn-12650.exe 3096 232 WerFault.exe Unicorn-4721.exe 3044 976 WerFault.exe Unicorn-35531.exe 5008 1164 WerFault.exe Unicorn-39506.exe 3612 1548 WerFault.exe Unicorn-56994.exe 4380 3356 WerFault.exe Unicorn-9137.exe 3508 2452 WerFault.exe Unicorn-23575.exe 3276 3088 WerFault.exe Unicorn-10912.exe 3188 4604 WerFault.exe Unicorn-24317.exe 2256 4568 WerFault.exe Unicorn-3102.exe 1260 5012 WerFault.exe Unicorn-3185.exe 2428 448 WerFault.exe Unicorn-8385.exe 2980 4916 WerFault.exe Unicorn-4192.exe 4508 3852 WerFault.exe Unicorn-191.exe 1404 4252 WerFault.exe Unicorn-35277.exe 1892 4280 WerFault.exe Unicorn-13870.exe -
Suspicious use of SetWindowsHookEx 49 IoCs
Processes:
72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exeUnicorn-47328.exeUnicorn-64624.exeUnicorn-38065.exeUnicorn-2460.exeUnicorn-47167.exeUnicorn-52367.exeUnicorn-43405.exeUnicorn-21999.exeUnicorn-39295.exeUnicorn-30141.exeUnicorn-8926.exeUnicorn-14126.exeUnicorn-18870.exeUnicorn-49679.exeUnicorn-1822.exeUnicorn-19311.exeUnicorn-24319.exeUnicorn-41807.exeUnicorn-32845.exeUnicorn-11438.exeUnicorn-29503.exeUnicorn-30619.exeUnicorn-44023.exeUnicorn-35061.exeUnicorn-8309.exeUnicorn-35035.exeUnicorn-7466.exeUnicorn-15910.exeUnicorn-33974.exeUnicorn-60699.exeUnicorn-12650.exeUnicorn-4721.exeUnicorn-35531.exeUnicorn-39506.exeUnicorn-56994.exeUnicorn-9137.exeUnicorn-23575.exeUnicorn-10912.exeUnicorn-24317.exeUnicorn-3102.exeUnicorn-3185.exeUnicorn-8385.exeUnicorn-4192.exeUnicorn-191.exeUnicorn-35277.exeUnicorn-13870.exeUnicorn-6325.exeUnicorn-37135.exepid process 4696 72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe 3824 Unicorn-47328.exe 4920 Unicorn-64624.exe 4296 Unicorn-38065.exe 2432 Unicorn-2460.exe 1984 Unicorn-47167.exe 1124 Unicorn-52367.exe 4704 Unicorn-43405.exe 4368 Unicorn-21999.exe 3092 Unicorn-39295.exe 1564 Unicorn-30141.exe 3448 Unicorn-8926.exe 3756 Unicorn-14126.exe 2224 Unicorn-18870.exe 960 Unicorn-49679.exe 1172 Unicorn-1822.exe 3760 Unicorn-19311.exe 3400 Unicorn-24319.exe 4680 Unicorn-41807.exe 2368 Unicorn-32845.exe 5116 Unicorn-11438.exe 3200 Unicorn-29503.exe 2120 Unicorn-30619.exe 4280 Unicorn-44023.exe 2728 Unicorn-35061.exe 4300 Unicorn-8309.exe 2576 Unicorn-35035.exe 4600 Unicorn-7466.exe 1544 Unicorn-15910.exe 3400 Unicorn-33974.exe 4016 Unicorn-60699.exe 3896 Unicorn-12650.exe 232 Unicorn-4721.exe 976 Unicorn-35531.exe 1164 Unicorn-39506.exe 1548 Unicorn-56994.exe 3356 Unicorn-9137.exe 2452 Unicorn-23575.exe 3088 Unicorn-10912.exe 4604 Unicorn-24317.exe 4568 Unicorn-3102.exe 5012 Unicorn-3185.exe 448 Unicorn-8385.exe 4916 Unicorn-4192.exe 3852 Unicorn-191.exe 4252 Unicorn-35277.exe 4280 Unicorn-13870.exe 3372 Unicorn-6325.exe 2600 Unicorn-37135.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exeUnicorn-47328.exeUnicorn-64624.exeUnicorn-38065.exeUnicorn-2460.exeUnicorn-47167.exeUnicorn-52367.exeUnicorn-43405.exeUnicorn-21999.exeUnicorn-39295.exeUnicorn-30141.exeUnicorn-8926.exeUnicorn-14126.exeUnicorn-18870.exeUnicorn-49679.exeUnicorn-1822.exeUnicorn-19311.exeUnicorn-24319.exeUnicorn-41807.exeUnicorn-32845.exeUnicorn-11438.exeUnicorn-29503.exedescription pid process target process PID 4696 wrote to memory of 3824 4696 72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe Unicorn-47328.exe PID 4696 wrote to memory of 3824 4696 72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe Unicorn-47328.exe PID 4696 wrote to memory of 3824 4696 72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe Unicorn-47328.exe PID 3824 wrote to memory of 4920 3824 Unicorn-47328.exe Unicorn-64624.exe PID 3824 wrote to memory of 4920 3824 Unicorn-47328.exe Unicorn-64624.exe PID 3824 wrote to memory of 4920 3824 Unicorn-47328.exe Unicorn-64624.exe PID 4920 wrote to memory of 4296 4920 Unicorn-64624.exe Unicorn-38065.exe PID 4920 wrote to memory of 4296 4920 Unicorn-64624.exe Unicorn-38065.exe PID 4920 wrote to memory of 4296 4920 Unicorn-64624.exe Unicorn-38065.exe PID 4296 wrote to memory of 2432 4296 Unicorn-38065.exe Unicorn-2460.exe PID 4296 wrote to memory of 2432 4296 Unicorn-38065.exe Unicorn-2460.exe PID 4296 wrote to memory of 2432 4296 Unicorn-38065.exe Unicorn-2460.exe PID 2432 wrote to memory of 1984 2432 Unicorn-2460.exe Unicorn-47167.exe PID 2432 wrote to memory of 1984 2432 Unicorn-2460.exe Unicorn-47167.exe PID 2432 wrote to memory of 1984 2432 Unicorn-2460.exe Unicorn-47167.exe PID 1984 wrote to memory of 1124 1984 Unicorn-47167.exe Unicorn-52367.exe PID 1984 wrote to memory of 1124 1984 Unicorn-47167.exe Unicorn-52367.exe PID 1984 wrote to memory of 1124 1984 Unicorn-47167.exe Unicorn-52367.exe PID 1124 wrote to memory of 4704 1124 Unicorn-52367.exe Unicorn-43405.exe PID 1124 wrote to memory of 4704 1124 Unicorn-52367.exe Unicorn-43405.exe PID 1124 wrote to memory of 4704 1124 Unicorn-52367.exe Unicorn-43405.exe PID 4704 wrote to memory of 4368 4704 Unicorn-43405.exe Unicorn-21999.exe PID 4704 wrote to memory of 4368 4704 Unicorn-43405.exe Unicorn-21999.exe PID 4704 wrote to memory of 4368 4704 Unicorn-43405.exe Unicorn-21999.exe PID 4368 wrote to memory of 3092 4368 Unicorn-21999.exe Unicorn-39295.exe PID 4368 wrote to memory of 3092 4368 Unicorn-21999.exe Unicorn-39295.exe PID 4368 wrote to memory of 3092 4368 Unicorn-21999.exe Unicorn-39295.exe PID 3092 wrote to memory of 1564 3092 Unicorn-39295.exe Unicorn-30141.exe PID 3092 wrote to memory of 1564 3092 Unicorn-39295.exe Unicorn-30141.exe PID 3092 wrote to memory of 1564 3092 Unicorn-39295.exe Unicorn-30141.exe PID 1564 wrote to memory of 3448 1564 Unicorn-30141.exe Unicorn-8926.exe PID 1564 wrote to memory of 3448 1564 Unicorn-30141.exe Unicorn-8926.exe PID 1564 wrote to memory of 3448 1564 Unicorn-30141.exe Unicorn-8926.exe PID 3448 wrote to memory of 3756 3448 Unicorn-8926.exe Unicorn-14126.exe PID 3448 wrote to memory of 3756 3448 Unicorn-8926.exe Unicorn-14126.exe PID 3448 wrote to memory of 3756 3448 Unicorn-8926.exe Unicorn-14126.exe PID 3756 wrote to memory of 2224 3756 Unicorn-14126.exe Unicorn-18870.exe PID 3756 wrote to memory of 2224 3756 Unicorn-14126.exe Unicorn-18870.exe PID 3756 wrote to memory of 2224 3756 Unicorn-14126.exe Unicorn-18870.exe PID 2224 wrote to memory of 960 2224 Unicorn-18870.exe Unicorn-49679.exe PID 2224 wrote to memory of 960 2224 Unicorn-18870.exe Unicorn-49679.exe PID 2224 wrote to memory of 960 2224 Unicorn-18870.exe Unicorn-49679.exe PID 960 wrote to memory of 1172 960 Unicorn-49679.exe Unicorn-1822.exe PID 960 wrote to memory of 1172 960 Unicorn-49679.exe Unicorn-1822.exe PID 960 wrote to memory of 1172 960 Unicorn-49679.exe Unicorn-1822.exe PID 1172 wrote to memory of 3760 1172 Unicorn-1822.exe Unicorn-19311.exe PID 1172 wrote to memory of 3760 1172 Unicorn-1822.exe Unicorn-19311.exe PID 1172 wrote to memory of 3760 1172 Unicorn-1822.exe Unicorn-19311.exe PID 3760 wrote to memory of 3400 3760 Unicorn-19311.exe Unicorn-24319.exe PID 3760 wrote to memory of 3400 3760 Unicorn-19311.exe Unicorn-24319.exe PID 3760 wrote to memory of 3400 3760 Unicorn-19311.exe Unicorn-24319.exe PID 3400 wrote to memory of 4680 3400 Unicorn-24319.exe Unicorn-41807.exe PID 3400 wrote to memory of 4680 3400 Unicorn-24319.exe Unicorn-41807.exe PID 3400 wrote to memory of 4680 3400 Unicorn-24319.exe Unicorn-41807.exe PID 4680 wrote to memory of 2368 4680 Unicorn-41807.exe Unicorn-32845.exe PID 4680 wrote to memory of 2368 4680 Unicorn-41807.exe Unicorn-32845.exe PID 4680 wrote to memory of 2368 4680 Unicorn-41807.exe Unicorn-32845.exe PID 2368 wrote to memory of 5116 2368 Unicorn-32845.exe Unicorn-11438.exe PID 2368 wrote to memory of 5116 2368 Unicorn-32845.exe Unicorn-11438.exe PID 2368 wrote to memory of 5116 2368 Unicorn-32845.exe Unicorn-11438.exe PID 5116 wrote to memory of 3200 5116 Unicorn-11438.exe Unicorn-29503.exe PID 5116 wrote to memory of 3200 5116 Unicorn-11438.exe Unicorn-29503.exe PID 5116 wrote to memory of 3200 5116 Unicorn-11438.exe Unicorn-29503.exe PID 3200 wrote to memory of 2120 3200 Unicorn-29503.exe Unicorn-30619.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe"C:\Users\Admin\AppData\Local\Temp\72ce6c03498b7b1750e03e72d7af65c3343da4879ac8248ecaa05a3fd4f6739e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47328.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64624.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38065.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2460.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47167.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52367.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43405.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21999.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39295.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30141.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8926.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14126.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18870.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49679.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1822.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19311.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24319.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41807.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32845.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29503.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30619.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44023.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35061.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8309.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35035.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7466.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15910.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33974.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60699.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12650.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4721.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35531.exe34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39506.exe35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56994.exe36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9137.exe37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23575.exe38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10912.exe39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24317.exe40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exe41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3185.exe42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8385.exe43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4192.exe44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-191.exe45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35277.exe46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13870.exe47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6325.exe48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37135.exe49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 74448⤵
- Program crash
PID:1892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 72447⤵
- Program crash
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 72446⤵
- Program crash
PID:4508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 74445⤵
- Program crash
PID:2980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 74444⤵
- Program crash
PID:2428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 74443⤵
- Program crash
PID:1260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 74442⤵
- Program crash
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 74441⤵
- Program crash
PID:3188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 72440⤵
- Program crash
PID:3276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 74439⤵
- Program crash
PID:3508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 74438⤵
- Program crash
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 72437⤵
- Program crash
PID:3612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 74436⤵
- Program crash
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 74435⤵
- Program crash
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 74434⤵
- Program crash
PID:3096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 74433⤵
- Program crash
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 74432⤵
- Program crash
PID:2368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 74431⤵
- Program crash
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 72430⤵
- Program crash
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 72429⤵
- Program crash
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 72428⤵
- Program crash
PID:3804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 72427⤵
- Program crash
PID:3148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 74426⤵
- Program crash
PID:4208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 72425⤵
- Program crash
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 74424⤵
- Program crash
PID:1204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 72423⤵
- Program crash
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 74422⤵
- Program crash
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 72421⤵
- Program crash
PID:1260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 74420⤵
- Program crash
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 74419⤵
- Program crash
PID:2884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 74418⤵
- Program crash
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 72417⤵
- Program crash
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 74416⤵
- Program crash
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 74415⤵
- Program crash
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 72414⤵
- Program crash
PID:620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 74013⤵
- Program crash
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 72412⤵
- Program crash
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 74411⤵
- Program crash
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 74410⤵
- Program crash
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 7449⤵
- Program crash
PID:3596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 7248⤵
- Program crash
PID:3804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 7407⤵
- Program crash
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 7246⤵
- Program crash
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 7245⤵
- Program crash
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 7124⤵
- Program crash
PID:636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 7283⤵
- Program crash
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 7522⤵
- Program crash
PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4696 -ip 46961⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3824 -ip 38241⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4920 -ip 49201⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4296 -ip 42961⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2432 -ip 24321⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1984 -ip 19841⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1124 -ip 11241⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4704 -ip 47041⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4368 -ip 43681⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3092 -ip 30921⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1564 -ip 15641⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3448 -ip 34481⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3756 -ip 37561⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2224 -ip 22241⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 960 -ip 9601⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1172 -ip 11721⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3760 -ip 37601⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3400 -ip 34001⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4680 -ip 46801⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2368 -ip 23681⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5116 -ip 51161⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3200 -ip 32001⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2120 -ip 21201⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4280 -ip 42801⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2728 -ip 27281⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4300 -ip 43001⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2576 -ip 25761⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4600 -ip 46001⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1544 -ip 15441⤵PID:3052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3400 -ip 34001⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4016 -ip 40161⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3896 -ip 38961⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 232 -ip 2321⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 976 -ip 9761⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1164 -ip 11641⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1548 -ip 15481⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3356 -ip 33561⤵PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2452 -ip 24521⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3088 -ip 30881⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4604 -ip 46041⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4568 -ip 45681⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5012 -ip 50121⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 448 -ip 4481⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4916 -ip 49161⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3852 -ip 38521⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4252 -ip 42521⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4280 -ip 42801⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3372 -ip 33721⤵PID:4424
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5204c3d07cc454c464b8ada6b7eef9db2
SHA12e65e5dd77a1750f722c9693c04a23810393e5f0
SHA256428fc310d86885913a18d45f6c3676454bfefac043d1771caa46200623a93091
SHA512129ba795ee8dd32e4206bacdbbca0adf63f76d8b749abf99726e2905859c357b2d45025769e68aca7f15a2b8c6d102cc7f0d7df02848114afd6cd40f8f1c3830
-
Filesize
184KB
MD548b2057dcf4c60176491cb6b8019406e
SHA1ebba4126e6be50819d556a83693e1ee9f4372c19
SHA25661932907facae2c093d8bcfd06b716bd33d5063f63b6006d3221983eb7722166
SHA512e86cd39a0db1182ad42d5654154140aa18dfa37cf978ab4bbc23c5629d72f9da8dca08537ee83304f87943925e403687087270aac0d8373edbc9d76d91ad0d87
-
Filesize
184KB
MD52f379cb0e301b3ee04a8a6de74cb0b0b
SHA1affb6acd51097987bd1f555d6dc5336095ce2642
SHA2561f43fae13fb86fca218b91d45b018f7dcdba50e2ab80ade289726673dec8afeb
SHA5122965f8d44579563f38ab8754ee3249c69c59f15193e4f2b2765ee6ef2b247076080a5b8a6852a1180079fb02fa145f5fd9a3a80291326d173f74bcc41c7be64b
-
Filesize
184KB
MD5c3fe2743a9bfbd44607542bff295f6e7
SHA1a729281554a5694b4d623ea2869109fd00e4bbc9
SHA25609053fcaaac71173667e4332abebcf98758160e7a810a82102647d10b8db2fd7
SHA512ca4cc50507b88fbd9976079e585de870227a2c1767a234bd7f4272dfad665d4e92cb0b81f190ff34f9218328cdb82aa3ce06e263cabe21af1af3118e6d5c652f
-
Filesize
184KB
MD58029328a918c26d05fac88ed4d0472bc
SHA143675223bdad33f80e6a6a50c46980d73c65a9dd
SHA2562beb6ade5a037737d882f11b893e70d81ccc0c67d25ea257df4d8e150b45317d
SHA51279168576fd5498bc2a6443e1423656392ba7534bee8888770265ccb61238ad9cc573885f806ef98e2c43e912b318b6bb701f1b04c23344ce448152c674797ad7
-
Filesize
184KB
MD517ea03560d77ed45330a55530da4e1ef
SHA172ae051310bc0f35537c2b29b49480be2689b65c
SHA256a14022ee2a0adbfcfab2ae32ad92330f3586a6c51d9fc03d3d4bdd8fa3e2db25
SHA512b267f13e9d98b4d264a88dd7f218d49a392c938216b1850fbbed8d68063fd3e5bc912e8572671e60450124690e3b18f53d1ed4ac52a1664e8da4e25516f0d5dc
-
Filesize
184KB
MD5a7497afef7346bea4e17012b48c0fbe5
SHA11e02c2b023e159585f2fa7f0d4dc465c3608d3d1
SHA256720bcbfe01c0b174365dd21356941dbb9eae0a2850693363278e06537f2c3047
SHA5127ead8fc7acb00032caf4c8ab276c986609d8350f061aa54321ee6eb95bfa031e4fb578973e3a1133bb8374599a98ef4b4ef572a44b4608ecbdec12e213c27de5
-
Filesize
184KB
MD5f861f6bcb59e1a9a312ffcd243c11c38
SHA17212b43bb12cafbdb204606a3eccd133df8bbbe9
SHA256e889ecee35b4410d5520da785976d650dd14c546db07fe4f1c3f8c45a09d0ae1
SHA51221fdc75c5a197d4a4c36e5d7bdd134a31bd313d29a89bc713984ef14da5dc8a858766d736e25ace5b917b5b824552e6ad4d0b8c941a908a96468b432e791a2af
-
Filesize
184KB
MD5cf44d6bc82139d7fef5d8bc2e6237cf2
SHA1c528aaafc92ad808fa3dcb42eddb4ea35da8c110
SHA256e44397a8e448ce95910dba8db1bf7674af1d8767da6990680aed1b3aa2dd298a
SHA512c6379e9448b9a87fe2fffcdcbfd53d085cb882958bd092237fe384eba5bee2ed2adc9c0ed4f7173e592c67146ec787cd16c31d1b599350214f902c2a1bba6ce9
-
Filesize
184KB
MD5a9f290e0bf0645c745374d1ad83b3ac2
SHA1a79638b05f9924ec4c091de27cbb41d08205d3e5
SHA256ab3cb15c76d317e74a46f350f271253e4838feb094ed4b7b36191946e7bec48a
SHA512f9ea758b3abdbe3c9bbf317f2091572bf84fcbc51ed0022cb96c170c476b74a2fe8a46db64b9c54242a45a2c25afcfefadda127f3dbabd7dd8f761ef5269edfb
-
Filesize
184KB
MD57a36ec19b996a59d3b792230c69e6615
SHA102eb2152aa6f9ff514923a7964fe34e87fe41d2e
SHA2561bc08bee3e0d5f896010a2f5213058f424fe331f8c0ac4207926c3f398462299
SHA512a2c7fc25566fdcf762edb9c986a9a46549f53dc84ba547cffa1ad848072ead71a3093164d27f3adfa787de68d6bd71fa79ea420c3069f9aecea9e7164f395273
-
Filesize
184KB
MD5060fdab3ee0e7410ee52d78db5c88744
SHA154327e9d6d9f50fc094b4fa7d8215406e6b4277b
SHA256db8f03910931fedb82f7d1a72e29574d2b73048a13973a2646f74b7bdc4a2ff9
SHA5120bf4f012e5d484ede788fedc3e0465206f0d91397bdd3117725fca6464489bdbcc04599cb847f2deb75aaede02b5fe5b80ea7484a987d2e18490d3c76ccfde81
-
Filesize
184KB
MD59c90824bb42b7fe28bbe973f93c627c6
SHA174e988682022c37ddbadf36a5e20a0a69fa9c1ed
SHA25677d0417a7b78a372c0505398f938f7c6a79a8a4dd5053403d9004f72e1016a2d
SHA51213df53d693c3f637d1add59a75e49f541cd2397afe99e17e3cea3ada9181248473cfee86e71270c6fb77915a993d08d7fd7d9de094d6b9b76306d15869336706
-
Filesize
184KB
MD587c5abd3b41422caacaf723872cec92d
SHA1645ecea84e41e60a2706e7e3ea1ead2a77779d7e
SHA2561bfa4ed4e521cc0d47807fc0a2d6c6091adfd7f8c7f4e0d295b3c23613965d2d
SHA5121ad3e90bfe1614cc20f4f0858eaed27db69ffce5731ccb090208b12e33e113f8707042a3569e81183e0fa97908368aa470a10fd9ed681e3a9d5843651bcf2107
-
Filesize
184KB
MD5c86305246cfd873d97ae109e340438ad
SHA16ab729093116f96718790e5ea4953665d93b2795
SHA2564bcef0ccea5e1a52fc9cb223a117625a6794dc80ec6b0c7c7f706d29c98afb82
SHA512078556e34744185b518ffd4c93bfe9e8db6b5cb086200c0efee3e0640314ed65c2dcf5036064b27f14686b91ff4e951354d6c92a6f0b1de479b8d7cde6f30f1e
-
Filesize
184KB
MD5cebe5426abe4e9a3ade07dbb1d0e43d2
SHA1f8e4db6e6cd54e35678c241dc89aece9fd52260c
SHA2562e67908e72a208bdb63d0f3eb53b6aeaddf403dd93041f25f77f516a15e85f50
SHA5123947a55f805d29fb4b201184f0e26df6f9db89627ff385ab7a5168ee7424f95118cedb4ae09ac116fefb4d10f8383923d238b5416e3c6ea5cb5fbd84d00a406d
-
Filesize
184KB
MD5518c4d4d1dbced6f37bd5a575c319996
SHA1b9174433ac285c4ebd3a4ef0d95749dcaee86ded
SHA256d3a5d823c6d52f0b70fcd012c39e81998924f7eb52b4b4ef9fa89015374b1c88
SHA512449f59dffceb94cef70ed6ed9033a1d6e3ce97b33248d5eb0136271fa0a9b77a57c882c3e5222a462a50629d77a02ba2385166eb0faa49aa2dec4613f69d292f
-
Filesize
184KB
MD5bd76c55008d747062dd767596e7129d1
SHA1b4aa3301808bbfea06c6a78fc95e524e8a682f12
SHA256d808fd9a204e63bc7115958bb339933cf6cba7e41cf0e666e372f2e6ee67d6ed
SHA512c3814962170585cf1c4ae08d3040af78c1e7b66757c8ca0fb672418d33bffd510e7608fd0951ca85339192dc4ce6bf74a7387dc9c753eb6d4db82d1b50693083
-
Filesize
184KB
MD5c52291b74c13254e7870c12b05a08e5e
SHA1ad8614b90743a916f6d9725d5173e745f9a394c7
SHA2567596046ec39286f3aace525f03a029146c5be650b9ec33625e4699e19e9624a0
SHA5126411b4b6683d63149ec565d019e9e954f241302ba11012fc2ef8adde67c5d11689418dda692a72927cf1823cd75228e9f8751f70806e3cbca36d0dd46a713520
-
Filesize
184KB
MD5278e01fc10f9206929d46ede110eb4e4
SHA1662e677fa731baf2507f82b1f9ea5fcd4b4d434d
SHA2561e7729e293d36bf8509019f59f13f59ae675eb46a02147303462e32cc0cff563
SHA51256d61e3c28fee2574465365df460e694eb15b23c2993f58478a1882f827264530cfd660ed1811b4ac3c1d292f6bda31ecbfdad904d5d76e0a1d63d0de192e75a
-
Filesize
184KB
MD5d3477a79338af25f1d47f0ede3db3663
SHA1a9b948661ffa920155147d1b12ddc902390cfafc
SHA25686c2db53857034c286dd693bc8aeced23729b04d3bba9a021a1e721f245df204
SHA51230ec5f239346d02f9fa3a005d2f002253271e3daaf4fcc69fbedb4fc7702a02cf2babb4ed0d0885fea5fe5e6d14311967ea34314130b2d147e7dcea93f45d268
-
Filesize
184KB
MD541dda62251473e2e37902cee8917ba97
SHA1171bdf301b126e30d9b974397c38453317289388
SHA25606d9d342c8f3e769c026ef4894438d197e89bc27f6c462c413c7ec35d473319a
SHA5124d8bad346b89c3ecba67a56950170fe60312d92f9fb3769d44a0738d7bcf72895559116a5ebbd02b1c5e496766ae24e167b8916d95dfb0776d792f3aa1060e97
-
Filesize
184KB
MD5e48238aceb34f2537af625aa31fba7a1
SHA144fc058839067751fe8e8a6721dccf7c04a3576c
SHA2560c1cbfc3c7e93cf15dfe44d6bb351b8fb71bd1f61c5e6559aa7a261282cec5c9
SHA512f3091827cdc58ee46e17634c20c95852d38299ef2717736a792ac702d0d1d3e273475a96f5ba069168d0b0caf5ba1183d3797b61081240e1330bb6baf5da17f5
-
Filesize
184KB
MD573c4c940940c2f4a764ae6287d17bc62
SHA15047d7a3faf5dd9f17d3e720735c04ffee15999f
SHA256bd22d48bafaa12cd2d1d0f8ae4d6a08588db95b22085361042d9c4c7d82facab
SHA512dce57e0ccb59bd693ab2b8b77321410d6915b38db4d89c86d1375ae0466d5f2542a7a8f3f48a8b43b3b7027baefb40f99ed685952a89c76b086462b14d2fa22e
-
Filesize
184KB
MD50e9e186dc0e6a3d1e7f66455b2471900
SHA11b78da1dcc79f27541b27b5dc91d9f1b38b3d7b6
SHA256167be687405a984e5301620a0f038a92c6874fc3bce2399bbf209f07218ce169
SHA5124054e41ccd220cb9d16bbf6669cd5bb65f0572eb596ee31089420456415f3d56dfe820ca71b907300c8aee98c055159d70d1b6f52c700abfb701992126447c54
-
Filesize
184KB
MD50c98ed4a998980bd3b5f637ad0923267
SHA1e01939d5dfeb2bfe9ae5d12b3c14f5ef96d0127c
SHA2563ca300f9434190f404ce98e0d862e3ff0afc37726ab131c30a9497ca08a9ba03
SHA51293c88b2d0cdd33c43b1f7113433a60dd2c264c0f5b9cf4ac93d5de28d8efddb6925087b5abe796ff8e6514ef66e4e0914c4b55c9199ee6b815f9efcb0bcf869d
-
Filesize
184KB
MD582f828dbdfb04a989d6e25e0a6ab54ea
SHA17f44b717a41eb30a966c70dd2d9061950ebf926b
SHA2566fdec00a431e1f9179733e17ff9a0489669fd9d29b9cff6ec2084e792c0b2184
SHA5128eb9ddf744a3c39cbf9fd579e6a84eb53f525b41109c122822d6e1ab2000e933716fda4a1f072d0267de8a25a942c361f239c17876e016308226de1f921e90de
-
Filesize
184KB
MD50f29fd242bda06251e4dd25c3d9375e1
SHA1f8514bdbfc466a303f3538d2c35eb50c14bb6774
SHA256a3f42fce67a7df70b28138d87032786b505459a4c5aa059bb7f8fd03e73c3d58
SHA512a3ebe5c2ef369b111c42a38c09d214bd996b55c69a160bd2c80ad7cfdb8954298657ab124fd35551bb027982d0997369c6e055cc7bae95c9df0b68d98fe35e49
-
Filesize
184KB
MD50abeafb910beeb0491711857144b9cc8
SHA1f3caa4a6d383bdee4d79c071bda7ff612ed390b5
SHA256e038f2fb532cf3863a2420d51e75d4f32a41af2c8d3f7050268f7366df350932
SHA51285365adf6cefbbc1e3788e19dd10cd69c1f639a6799904d72eac3799ccfd7a7030b657c4ac67ced854959886dda6a7045323fe52fa72bdc38ea6d48871c0b9f8
-
Filesize
184KB
MD5575f51b64df106ac43c6f4df2d9c8c04
SHA1af80e9fbe65672dced59064de06dd3d1a55e16f5
SHA256f406913eb11b36be1ae39d881e8f3bf3868d4eb66d6a8d6e6ea9a52221c19f15
SHA512f35ea1e6a8d7e9610153804c5c5d527076d6cb44147930a1d0b7c0b5d72eee5f18e50e511767c7414979fda84ba77ca9fcd713be7f6ea1ec01c48e71fa14358d
-
Filesize
184KB
MD5d9a667d3a2f07940079184913292dd44
SHA1dced4fa732dc1a82f2e05e11b6c19cc75010fde8
SHA256b0ffe8197dad51409eb78952d02936d8e990d32e59360481b6d0fa351c2992d3
SHA51262e0b68c6c25da5ee654d6d86c5b9518b6eddca45b4b6d3dffc30a0089bb51815229b22700732ee73dba018dc3e7124be0d6fb4815987fb4aafa5f91e42d9117
-
Filesize
184KB
MD54a8e330acbb46c2797068bf791c9f485
SHA1097957242e046475333a7fc64a08fd240914fbdd
SHA25626616e9e649a20399f94052a3d6fbb6c9d7723026727aa967ec9c29de082ca2d
SHA5123fd690ed6dab405bef948db1ccb195242807e3c7d26dc2b6d385b969b07c727bc7e4669c0190d4f087afa6bf3f690409e2c611e9790f84a4062294f37810d33e