Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 23:29

General

  • Target

    71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe

  • Size

    184KB

  • MD5

    56b2a57365e053160fec5bebe0830540

  • SHA1

    cf40a8f3e47c9f290525a8564c5c714dd2bd9ca9

  • SHA256

    71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763

  • SHA512

    c0c4ac51c7c327f51898257f39dc83d09630439919495596b9c4495f7d1ddfce848982348aa41bbc805f17823d9a64961aecbb5967c4f2ed7bbc28c4cdcdabbd

  • SSDEEP

    3072:9Xr63konGGkCzVXZWPEn8n/zrlvnqWxiuY:9XNoskVX98/zrlPqWxiu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 31 IoCs
  • Program crash 32 IoCs
  • Suspicious use of SetWindowsHookEx 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe
    "C:\Users\Admin\AppData\Local\Temp\71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-39521.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-39521.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57165.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-57165.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:232
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53823.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-53823.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1908
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-40585.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-40585.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1328
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4980.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4980.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3456
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-42949.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-42949.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2480
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56161.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56161.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:3608
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-8112.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-8112.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:3492
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25793.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25793.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:1572
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-43281.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-43281.exe
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2616
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26499.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26499.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:4692
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-13452.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-13452.exe
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:456
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-57583.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-57583.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:4908
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-9342.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-9342.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2784
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26831.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26831.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2620
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32223.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32223.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:4712
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-49711.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-49711.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:4352
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37049.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-37049.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:4484
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-19727.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-19727.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:220
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3792
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54859.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54859.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:216
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37345.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-37345.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5108
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28383.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28383.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3252
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45871.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45871.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1492
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-10650.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-10650.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4428
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3900
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-33531.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-33531.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:3744
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-51019.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-51019.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:4564
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64231.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64231.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1388
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 464
                                                                    33⤵
                                                                    • Program crash
                                                                    PID:4964
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 744
                                                                  32⤵
                                                                  • Program crash
                                                                  PID:400
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 744
                                                                31⤵
                                                                • Program crash
                                                                PID:3576
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 724
                                                              30⤵
                                                              • Program crash
                                                              PID:3856
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 724
                                                            29⤵
                                                            • Program crash
                                                            PID:4940
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 744
                                                          28⤵
                                                          • Program crash
                                                          PID:4908
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 724
                                                        27⤵
                                                        • Program crash
                                                        PID:1792
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 724
                                                      26⤵
                                                      • Program crash
                                                      PID:996
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 724
                                                    25⤵
                                                    • Program crash
                                                    PID:4476
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 724
                                                  24⤵
                                                  • Program crash
                                                  PID:4608
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 724
                                                23⤵
                                                • Program crash
                                                PID:3640
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 744
                                              22⤵
                                              • Program crash
                                              PID:3540
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 724
                                            21⤵
                                            • Program crash
                                            PID:948
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 724
                                          20⤵
                                          • Program crash
                                          PID:4376
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 724
                                        19⤵
                                        • Program crash
                                        PID:3604
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 724
                                      18⤵
                                      • Program crash
                                      PID:2408
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 724
                                    17⤵
                                    • Program crash
                                    PID:3244
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 724
                                  16⤵
                                  • Program crash
                                  PID:4356
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 724
                                15⤵
                                • Program crash
                                PID:4112
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 744
                              14⤵
                              • Program crash
                              PID:4784
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 740
                            13⤵
                            • Program crash
                            PID:216
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 744
                          12⤵
                          • Program crash
                          PID:2880
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 744
                        11⤵
                        • Program crash
                        PID:4992
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 744
                      10⤵
                      • Program crash
                      PID:4308
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 744
                    9⤵
                    • Program crash
                    PID:4392
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 740
                  8⤵
                  • Program crash
                  PID:2428
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 744
                7⤵
                • Program crash
                PID:4948
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 724
              6⤵
              • Program crash
              PID:2040
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 744
            5⤵
            • Program crash
            PID:4692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 744
          4⤵
          • Program crash
          PID:2616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 740
        3⤵
        • Program crash
        PID:4620
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 728
      2⤵
      • Program crash
      PID:1676
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 976 -ip 976
    1⤵
      PID:5100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2980 -ip 2980
      1⤵
        PID:1296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 764 -ip 764
        1⤵
          PID:3304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2364 -ip 2364
          1⤵
            PID:3700
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 232 -ip 232
            1⤵
              PID:1668
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1908 -ip 1908
              1⤵
                PID:4904
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1328 -ip 1328
                1⤵
                  PID:4204
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3456 -ip 3456
                  1⤵
                    PID:2520
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2480 -ip 2480
                    1⤵
                      PID:2976
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3608 -ip 3608
                      1⤵
                        PID:964
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3492 -ip 3492
                        1⤵
                          PID:3936
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1572 -ip 1572
                          1⤵
                            PID:2264
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2616 -ip 2616
                            1⤵
                              PID:2624
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4692 -ip 4692
                              1⤵
                                PID:636
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 456 -ip 456
                                1⤵
                                  PID:2956
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4908 -ip 4908
                                  1⤵
                                    PID:4432
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2784 -ip 2784
                                    1⤵
                                      PID:404
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2620 -ip 2620
                                      1⤵
                                        PID:448
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4712 -ip 4712
                                        1⤵
                                          PID:2976
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4352 -ip 4352
                                          1⤵
                                            PID:1304
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4484 -ip 4484
                                            1⤵
                                              PID:1980
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 220 -ip 220
                                              1⤵
                                                PID:876
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3792 -ip 3792
                                                1⤵
                                                  PID:4920
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 216 -ip 216
                                                  1⤵
                                                    PID:4584
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5108 -ip 5108
                                                    1⤵
                                                      PID:2984
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3252 -ip 3252
                                                      1⤵
                                                        PID:4120
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1492 -ip 1492
                                                        1⤵
                                                          PID:1424
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4428 -ip 4428
                                                          1⤵
                                                            PID:3976
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3900 -ip 3900
                                                            1⤵
                                                              PID:3216
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3744 -ip 3744
                                                              1⤵
                                                                PID:4376
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1388 -ip 1388
                                                                1⤵
                                                                  PID:4076
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4564 -ip 4564
                                                                  1⤵
                                                                    PID:4844

                                                                  Network

                                                                  MITRE ATT&CK Matrix

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-10650.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    6a9e02ae338460c1db9783e87e3a81ff

                                                                    SHA1

                                                                    315a6f37b762c1e082aeeac18dccfd545529f504

                                                                    SHA256

                                                                    a728be3848978f6e1c750c41eddff0f18f667d65cd6c9129c8ca23b14b423a10

                                                                    SHA512

                                                                    961d2dcf117ecbe29335541f2c2173ba6f7816e1fd3a1cf6cf31dd246a263c8ec01aee43c4a65083216c3202135c77741e68c3e7ae72ac0b61ce247174377888

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13452.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    3106bd10adf1d2080196364d4d50ac78

                                                                    SHA1

                                                                    f67d5cd31a76c7c20fed009c1f63d3808cf0cfde

                                                                    SHA256

                                                                    4c68d726d9b55fc315cfcb5f85850a574b9eaff42f56b0327c7d78cc9fb7e86d

                                                                    SHA512

                                                                    47824493c7425d5232a6d158f4f9f14d47d746907a79d61015a64f25b1bb696d6b28512014e3f784c5b10c4db3848a4c1e6ec89fc7d709ebea5ca50289a28a7f

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    991914c75495c4beb120fbfe0c82c557

                                                                    SHA1

                                                                    b7d45cc7642498c53d826bb852a5d3dd5cb61d44

                                                                    SHA256

                                                                    31099500b6acbcbc72550614394eff5db13a75105834480d10f2c0ab97ae809c

                                                                    SHA512

                                                                    903352bc91bb5d808a7f8967b9796566006df83dff7b63a0a58051c8f9edcf0882fdd9174f3f92d00f9ea1d531530c5aba602599915649445c8fb3aa807f4a33

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19727.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    74796d6c86faea165ae2a96a2d709261

                                                                    SHA1

                                                                    0614dc637882aca4f5ff61d450ea75b5a94146f8

                                                                    SHA256

                                                                    b5d3180d1d57476539ef7ca3c5dffe84948cac3ed0737eab5497de9dc48cff5b

                                                                    SHA512

                                                                    d663edfde4f2f6c4dbbd630506086b0b417b8d958b8ec9c8cea4d66231c7339439fcb8e4168fc645f195438680b8d79ee3389e3f685908564f85a36d1ab47ca9

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    9d046286589f24874fc77914687b2254

                                                                    SHA1

                                                                    db286cb60d78b1eae969643db7efc01e1d98e3c9

                                                                    SHA256

                                                                    aa65e03d70ead940a7bcdf6c9ce4f9d36e680a528b7d733bf0599a3b07e540c3

                                                                    SHA512

                                                                    51fa76c4189e364db5976cb1d91040381de97ea533689c3cfb655b5879af49807f69804648a41ccd7cd755cbc81b8f8a7cefd288d1b90983caafd7cfa9ac6c90

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25793.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    3921d72f57249fdd3b8a8f55489114dc

                                                                    SHA1

                                                                    1d91fb3c2a1d5a61f867dddb2af4cba11d3010f6

                                                                    SHA256

                                                                    d2efd22b9ae31307f817afb317b44526ba12b1c135c943656f725a2402c928ed

                                                                    SHA512

                                                                    4f953dd2644f096344f4f8654f20a8edae7ef80ec4475ed2ac1c167d72d0784db7346f69e3c58322c0f642e3a11ac8fc9f6fd3ef47f8d8d273bda97399739ded

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-26499.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    1771f66a46b583edad4683d4bd310c62

                                                                    SHA1

                                                                    e554dea3ac33b381b4a62641786078fafba9d364

                                                                    SHA256

                                                                    608999d2b0e37442277eab35fae10526043ce4280f049e66f2339c6b30bf8d60

                                                                    SHA512

                                                                    a2d2091005cc9f6edac9d0b5b8fad361bb8365fea99bae6d9619c16d3c569cdb4c75b6f387d8d20f9ee6b4117bd3769a15ae27baa8570e1a5f48fa04009340c5

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-26831.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    f9ad39732f2ce79d582158b144cf1202

                                                                    SHA1

                                                                    17c9bd1d6dc28fe20bc799c7749dd4a07d22e522

                                                                    SHA256

                                                                    4de87584259697229fb9401c4d06d362194feb5341a56475a6978a86deaeb815

                                                                    SHA512

                                                                    d4ba00941c02cd5da08e3b1da3ddeb7ec5f3228a81c102a1ef446371c486cd76c48178bde65644f0589c218e001a0ab1f874e5145444e0e61067c9805a77423b

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-28383.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    b48ed60508c680bcedd0117d6ee5326a

                                                                    SHA1

                                                                    f24a8ccef5a77761a7192eee8c679c1586c185ad

                                                                    SHA256

                                                                    520b1099b1126940790d46c432fc058bf10ee8182809ac420bb46c5368a91d41

                                                                    SHA512

                                                                    0be84fdc739825c8546f7f890d24865d67a16e9b062b4f4c3cc1de67906ebd1ba8a10ba3c743a0f8c7e90423cb1917a534d99d6d7505501fa4f02b37f7a46e1e

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32223.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    48a6c11204ae4b3c46666cf5d51d3515

                                                                    SHA1

                                                                    aa36df5d9b2f6fba913aaca1ff73e984e464fd28

                                                                    SHA256

                                                                    172381bcb04169a8ea392b3ecfacf0d3be8b6779b734e382494b6e928e0756ba

                                                                    SHA512

                                                                    c5b95731db68af92d0cbd357cd975e9f293e0267b998ce208317abd7c58542b11951dc2a839f70967dcf0b6b699782ce60a455e48f36833962c82fbbacc235c9

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33531.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    861bb6d17221a0519e29f51bcca40d14

                                                                    SHA1

                                                                    6797e4611850bbec20c4b459e55e09066e067766

                                                                    SHA256

                                                                    e41d315c925a55092f09827be80f2695add2f360cfdb8ef3203ed571e933484b

                                                                    SHA512

                                                                    0a6a18be33f94a7b328bbce08aee15066bc4d815109cbcf5ed6eee592b1f9462d95b59873e26e9646fc6acf1358d8f08eb27c31f89f75340a0e23760db9dee57

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    3e12e3aa8367e5c4662b665deaedd22b

                                                                    SHA1

                                                                    e4063c395f2a24e73437f864388753b2afeeb5b0

                                                                    SHA256

                                                                    cda64a83e847e2ee029e01e8f9d49447cd8437a4c76ba190b9055bdcc121392d

                                                                    SHA512

                                                                    96f093d7c73aaa6c5fc6796f87e6a354f59c188a5349e92824175de6b55223ef1f6dfaf6f64473af9e08fc1cb1de1e333f9c0cda3c6a9da637675a66483d2299

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37049.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    a2af781add670f75dd32830d3b9d8e52

                                                                    SHA1

                                                                    aa118fd7382a163f9aaa97ba5d0854df6ecb46b5

                                                                    SHA256

                                                                    6861322cac6d1e0a5ed1043fcc57f68db9d942d512945be9dd3a1cf3f6bcab54

                                                                    SHA512

                                                                    eeadf1f46225147399547a1f22444b1fa6675cc9dc63387f7e06a04d3fac324921426252dfaf5c6ed7a8a003b0ae575c07a6beacb96728594b48928e849cf581

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37345.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    b4d61f66cc8dba7ee8904ae0b2946172

                                                                    SHA1

                                                                    4143bcb1fa417eb221833da23b13d532ef996ce2

                                                                    SHA256

                                                                    4b13da2b218f1cc3af6dc8ca808c56212f614951fb10a2d6b4594266679a1807

                                                                    SHA512

                                                                    d64bde9bd5686ff3bf910ba0ffcb565c21ea4abe5b4c5b0cb8c4470aef8e97cd9b2d60d90289e081f9caa8c1b46ed979d4a97fdf89e787c433c95c4313f5b69f

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    7a15276a0d4f5dd9d1a5567bf724a837

                                                                    SHA1

                                                                    70761f99e647ca531905651d44cd62f9de014af9

                                                                    SHA256

                                                                    f25472aab4686d3f263f132dc7e8c1b5cbc2e6c0c82574b6388f46e725588c8b

                                                                    SHA512

                                                                    ca1c329440d7e61ae758d31f15fc92cf36354cf200d087b9a65932c14588846370d4a9cbaef660ac2ac8c1cb2c71dcce6e63f10653af34831114ab09f816d8ac

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-39521.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    9d5e72615c94bea0229009f49d19eeab

                                                                    SHA1

                                                                    c8f650aa98880c3dcf8bef03bacea8a69843454e

                                                                    SHA256

                                                                    cb53b8f9062d61796d5897147308de8d31eeaf176497aa52e0f536f3e670e80b

                                                                    SHA512

                                                                    8afd9a51f7c406de3366f68cf5ba1832d46497454812e1229a1cee0f5c192ea60675eacf7f2e30879cd0dad418c69ff4f4150270c9aeb686d30b7cd908e3bdf3

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-40585.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    481800033f74d91f672fd19f71879e0e

                                                                    SHA1

                                                                    61ddc9f3242ffd1a3596c254b865e565a56b97e1

                                                                    SHA256

                                                                    940fbd4cbe1d24fcd756f29dab03f91e825d6314d9b2f1578ec154b50f90f465

                                                                    SHA512

                                                                    01f02bfed0be525c7b856d578e8809c5cb3902d97a2d7bb81187566d7a2d5d8618c910df0875c0db777dc125aa4e57ecc9f9e66e788907f050d800418ba3b6cf

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-42949.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    16a935469dacf54227b598b1b6c2c559

                                                                    SHA1

                                                                    85dbe56614104c26b50ee46cbbd49de56b493cf0

                                                                    SHA256

                                                                    1c32d873fd4de47275873c351a573fbe244b35c138e9f64de7a42ab39f301207

                                                                    SHA512

                                                                    e0c9a85d6d90e123ca04ca910961911c8659049b88c3f03c770fb9a49f392842a47ffdff01adfabb436450c8769e4109af7abb6aadda5c10df32e4fe6930ac58

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43281.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    bef8776cad55f0f6d07b69fd9a0b64ae

                                                                    SHA1

                                                                    54f6196db17efc4caa6842d11922d74b4a577782

                                                                    SHA256

                                                                    b11e7942049c69d54644d11dffaae53f66b905d11eb292a660318d3803cc94a3

                                                                    SHA512

                                                                    27ab36c3b85aef28c1de20e81c0f409986e1238a0ae08f394d31e4c8b44dcb23f9f6bc5d877eef4e2dc58708fddf6a775db79456eca2532c932e5a752aaeebe1

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-45871.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    839eeecc98da1e80503464ecbb94dd16

                                                                    SHA1

                                                                    6bb9efc55781dbdd3456c600de99153f82761b7e

                                                                    SHA256

                                                                    0a9433f77f4f392cbf53a65a66cd976757aeac54afde9ba0799b64cafebcbd2a

                                                                    SHA512

                                                                    c3f5ea22a23a7da70c2c539d1e87822bb7488bdec731613368a821c3209263f528bb7542ab032624badfcd9fcf74bf31ab52c7581441a4e6228237cd8e464774

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49711.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    2cd0e689ac4e7ac625fa3aff267482d1

                                                                    SHA1

                                                                    914c82856ee4bc62ab384322c277b0eb326818ed

                                                                    SHA256

                                                                    4dc65f50796b9ff1fc81c14e24887283d380949e14d373ebbb1c72c14d7f305d

                                                                    SHA512

                                                                    24838b7a70a8f7433009493889ffad9ceaea30434c2ad86ddbb6effd8dbf608102add3af66cb183007bcc0690936c5d43c86b2e03cd90915f6a2ac5e47230c18

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4980.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    9916657107a76716d72d2e42f482ee40

                                                                    SHA1

                                                                    4d09ef26cb146400a51b3935502e13f925c20d4a

                                                                    SHA256

                                                                    96bf2cbb9f95a13bc1bc9e0432e7ac7b1ef6c9f72460f57a174b3629ea4caf39

                                                                    SHA512

                                                                    1a82d80e466a86ae93d115bb6c94e7f4a846c87832221f7b28e1069d4f100a35c13a9d1b022b61c619b65486b552fa39a52dbf64bb1ea814e1b90486a78b92a3

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51019.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    5e9e4849073eddeee79fec774e8d1572

                                                                    SHA1

                                                                    4aec8d0599a1ab5941eb45e08e4699c31758ec72

                                                                    SHA256

                                                                    0dc31da619ea2d51709f9b6b6e3047cc52c7af4ff75d7c32d1828d64cedc3e15

                                                                    SHA512

                                                                    71232498bad5f550b3b79404b0de3999938614175620af97d34e37b7926e889a9b5b2f7459cdeb5942b84e3bf04176e562754de21957949c614233858d504c04

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53823.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    d03261e68b0debc154e3de332d0c9f96

                                                                    SHA1

                                                                    e628ec03ba7d0e577fa3a5a52e05269381619e75

                                                                    SHA256

                                                                    047a856ddc1b2f3b25a6269479837ca83bb523d5ca11c89bbe72818820554166

                                                                    SHA512

                                                                    2a2ffded97168da7fb76d60752b0fffdd6b9eaaaad0ec4d47a82633667ad03f68f3373acc1e91a7fed16fad67c8f3ee1b208cb8f5da3654fe99705c2838d7b81

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-54859.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    9982d8afddcbeb4f4336ff4b89dfe58e

                                                                    SHA1

                                                                    14845bc05685d35d07bbed907c9ad554bcda05d4

                                                                    SHA256

                                                                    341cf267ad20d8e4f56c9faf0b31cd323ced59270a000293ae7a6885963057ce

                                                                    SHA512

                                                                    29759f265a1257db54c6245205927acf53dd9265fac6a635ea12a3598bce1c0c205624784a8a64b139bbb6acab2705d45203ffcad7ad0d335ff52bfdce54ffb6

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56161.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    e7c4cf40956b70ad74ed2d2f5a4bffdf

                                                                    SHA1

                                                                    5294021feb59f3439b00657fa37f15a9be6cf8ef

                                                                    SHA256

                                                                    7f08e747aec8d539743b36dedac516704f094bf08f7a3de7a52883b665739c34

                                                                    SHA512

                                                                    15fe0705bb9e487074743882d14b13e94aa98e3773b22cb7c23d959677ed40e154ca24cedd03c7bc34350f08a49e99c7d111d8b0e861ada747878cdc1f622eec

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57165.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    5f1ea9dd54fc2b8cc717eea6e46c1ad6

                                                                    SHA1

                                                                    96fbb4e4a53ca3c8f0cbd7f657cf17f36fd9e609

                                                                    SHA256

                                                                    23196a0f26c972789b2dfb80dbb7da96f3321137db3f5894f66e7fe62b9fc195

                                                                    SHA512

                                                                    8620656833690d392166b5465a0a1996fb18d8dbc066b788c80db298dc16b97b19e7dc8a87807b52326642b7593adaa323428e09cb140f36af3ab42aa7510414

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57583.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    ffe23b4517a78e9e36af8ede86cb3911

                                                                    SHA1

                                                                    719f96ea07c4f8ef725b24c403123bb011cab000

                                                                    SHA256

                                                                    c543d49ac182041191a27818ed0434d48fa6cbecdf85d6a0109448c1fd55246f

                                                                    SHA512

                                                                    1561f0610f6a3aed1b5980ee298e0fe6225723c7fb1908ba8de3db0712b51a0b8a09137cc16343376def8cd48e4c61d8cf2be36e09471ab116f0033a85ae6374

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64231.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    7b90b99b459af59fcc11b95e1a2ecc6f

                                                                    SHA1

                                                                    7bf46cd2f050fe1112057f51ab6062affe4ce1ce

                                                                    SHA256

                                                                    f93c2e967e71c311525d7d75f2caedaf128672e3133576c4076f10c06ac84e05

                                                                    SHA512

                                                                    2a5e9eec4b4fbc7e9c39c3926c8247ab5d3664895272183eae33f1ecf50cd4a13bd2e6377a125b3986e3c53afa197d2e916dc48f167681e2a41e22c6d0855ecf

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8112.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    2c12d09e9986079ae14385e64e4c553c

                                                                    SHA1

                                                                    50f73941b38a9c4db62537afa18f04193dda42ae

                                                                    SHA256

                                                                    d794e76f87b1bd01c734641f8e64b8f24230757b4b1abbf822c3df902eeab8d2

                                                                    SHA512

                                                                    bdebdda07c475606ad1d376920d630c94216f4db0d37528d97d16b2547b44bfa83906400e026cc39f596c19d16aa767bdaebd6b775f86f397e580bd9fb8a9796

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-9342.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    17e5044dc793e3c1bd0ac80f957c5e67

                                                                    SHA1

                                                                    f88b3748cf5b59e8d29ab91ba3351b8f257dfc81

                                                                    SHA256

                                                                    038de3736a7214a936892f14be53d67fb68783a3bd7cfab8919beec5e28ef667

                                                                    SHA512

                                                                    434a3e2ad17eca989380b80a60fe102aaef1029289137ff60a3c03c2a90c2444c81af362739bce21e2bd4897372504ddc98f203c6e2c98986c3127bc83c2520f