Analysis
-
max time kernel
85s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:50
Static task
static1
Behavioral task
behavioral1
Sample
aefed7fbac1b17e24485a8ee5cd7e1a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
aefed7fbac1b17e24485a8ee5cd7e1a7.exe
Resource
win10v2004-20231215-en
General
-
Target
aefed7fbac1b17e24485a8ee5cd7e1a7.exe
-
Size
184KB
-
MD5
aefed7fbac1b17e24485a8ee5cd7e1a7
-
SHA1
59fd46c883d5a2ce8b4294521d4059898ab804cb
-
SHA256
f5bf25385a249d64dfb9b7d539577ba614fa824b5bfef9c9c539fd79d12a25ec
-
SHA512
baa6e530ddcac0e99706ea505404e194618266a79ddafc91a06ccd335aa72f2e1870ad2292dda0d02fc42edbbc01f3fd76f1eaad2a204003c7cbcb773629a93f
-
SSDEEP
3072:i7Sxo5Mnf8Ag29AwdTnLF8NebaA6X0fLQ75x86OWV6lPvpFw:i78oKdg2ddbLF8ITHo6lPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1752 Unicorn-27231.exe 2116 Unicorn-65139.exe 1796 Unicorn-41189.exe 2808 Unicorn-33126.exe 2768 Unicorn-13260.exe 2832 Unicorn-57630.exe 2560 Unicorn-3037.exe 1712 Unicorn-26987.exe 2012 Unicorn-28933.exe 2540 Unicorn-59659.exe 2816 Unicorn-31625.exe 1256 Unicorn-56691.exe 1152 Unicorn-22435.exe 2456 Unicorn-42301.exe 2756 Unicorn-34709.exe 2308 Unicorn-50723.exe 2388 Unicorn-57822.exe 2100 Unicorn-12150.exe 1096 Unicorn-59488.exe 1404 Unicorn-39622.exe 1764 Unicorn-34792.exe 2396 Unicorn-6758.exe 1036 Unicorn-44906.exe 760 Unicorn-25040.exe 2968 Unicorn-6011.exe 2648 Unicorn-45461.exe 1636 Unicorn-63956.exe 2368 Unicorn-39452.exe 1388 Unicorn-25062.exe 1684 Unicorn-40006.exe 2908 Unicorn-14454.exe 2704 Unicorn-22623.exe 2664 Unicorn-37567.exe 2716 Unicorn-619.exe 2440 Unicorn-57433.exe 2692 Unicorn-12316.exe 2472 Unicorn-640.exe 2732 Unicorn-62093.exe 2208 Unicorn-31921.exe 2608 Unicorn-37397.exe 1852 Unicorn-47511.exe 960 Unicorn-54288.exe 2596 Unicorn-18731.exe 2604 Unicorn-64402.exe 1880 Unicorn-29591.exe 1448 Unicorn-45373.exe 1700 Unicorn-10562.exe 632 Unicorn-50780.exe 948 Unicorn-27859.exe 2312 Unicorn-1771.exe 2828 Unicorn-22213.exe 1864 Unicorn-35534.exe 980 Unicorn-13530.exe 2044 Unicorn-45648.exe 2324 Unicorn-51678.exe 2976 Unicorn-13338.exe 1776 Unicorn-54392.exe 2644 Unicorn-28304.exe 3052 Unicorn-46032.exe 1592 Unicorn-15860.exe 2000 Unicorn-56146.exe 2528 Unicorn-62923.exe 2088 Unicorn-43894.exe 2228 Unicorn-2861.exe -
Loads dropped DLL 64 IoCs
pid Process 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 1752 Unicorn-27231.exe 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 1752 Unicorn-27231.exe 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 2116 Unicorn-65139.exe 2116 Unicorn-65139.exe 1752 Unicorn-27231.exe 1752 Unicorn-27231.exe 1796 Unicorn-41189.exe 1796 Unicorn-41189.exe 2116 Unicorn-65139.exe 2808 Unicorn-33126.exe 2808 Unicorn-33126.exe 2116 Unicorn-65139.exe 2832 Unicorn-57630.exe 2832 Unicorn-57630.exe 2768 Unicorn-13260.exe 2768 Unicorn-13260.exe 1796 Unicorn-41189.exe 1796 Unicorn-41189.exe 2560 Unicorn-3037.exe 2560 Unicorn-3037.exe 2808 Unicorn-33126.exe 2808 Unicorn-33126.exe 1712 Unicorn-26987.exe 1712 Unicorn-26987.exe 2012 Unicorn-28933.exe 2012 Unicorn-28933.exe 2768 Unicorn-13260.exe 2768 Unicorn-13260.exe 2832 Unicorn-57630.exe 2832 Unicorn-57630.exe 2816 Unicorn-31625.exe 2816 Unicorn-31625.exe 1256 Unicorn-56691.exe 1256 Unicorn-56691.exe 2560 Unicorn-3037.exe 2560 Unicorn-3037.exe 1152 Unicorn-22435.exe 1152 Unicorn-22435.exe 2540 Unicorn-59659.exe 2540 Unicorn-59659.exe 2012 Unicorn-28933.exe 2756 Unicorn-34709.exe 2012 Unicorn-28933.exe 2756 Unicorn-34709.exe 2456 Unicorn-42301.exe 2456 Unicorn-42301.exe 1712 Unicorn-26987.exe 1712 Unicorn-26987.exe 2388 Unicorn-57822.exe 2388 Unicorn-57822.exe 2100 Unicorn-12150.exe 2100 Unicorn-12150.exe 2308 Unicorn-50723.exe 2308 Unicorn-50723.exe 2816 Unicorn-31625.exe 2816 Unicorn-31625.exe 1404 Unicorn-39622.exe 1404 Unicorn-39622.exe 1764 Unicorn-34792.exe 1764 Unicorn-34792.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2508 1612 WerFault.exe 133 112 1992 WerFault.exe 211 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 1752 Unicorn-27231.exe 2116 Unicorn-65139.exe 1796 Unicorn-41189.exe 2808 Unicorn-33126.exe 2768 Unicorn-13260.exe 2832 Unicorn-57630.exe 2560 Unicorn-3037.exe 1712 Unicorn-26987.exe 2012 Unicorn-28933.exe 2540 Unicorn-59659.exe 2816 Unicorn-31625.exe 1256 Unicorn-56691.exe 1152 Unicorn-22435.exe 2456 Unicorn-42301.exe 2756 Unicorn-34709.exe 2388 Unicorn-57822.exe 2308 Unicorn-50723.exe 2100 Unicorn-12150.exe 1404 Unicorn-39622.exe 1096 Unicorn-59488.exe 1764 Unicorn-34792.exe 2396 Unicorn-6758.exe 760 Unicorn-25040.exe 1036 Unicorn-44906.exe 2968 Unicorn-6011.exe 2648 Unicorn-45461.exe 2368 Unicorn-39452.exe 1636 Unicorn-63956.exe 1684 Unicorn-40006.exe 2908 Unicorn-14454.exe 2704 Unicorn-22623.exe 2664 Unicorn-37567.exe 2716 Unicorn-619.exe 2692 Unicorn-12316.exe 2440 Unicorn-57433.exe 2732 Unicorn-62093.exe 2472 Unicorn-640.exe 2208 Unicorn-31921.exe 2608 Unicorn-37397.exe 2892 Unicorn-55679.exe 1852 Unicorn-47511.exe 960 Unicorn-54288.exe 2596 Unicorn-18731.exe 2604 Unicorn-64402.exe 1880 Unicorn-29591.exe 632 Unicorn-50780.exe 1700 Unicorn-10562.exe 1448 Unicorn-45373.exe 948 Unicorn-27859.exe 2312 Unicorn-1771.exe 2828 Unicorn-22213.exe 1864 Unicorn-35534.exe 980 Unicorn-13530.exe 2044 Unicorn-45648.exe 2324 Unicorn-51678.exe 2976 Unicorn-13338.exe 1776 Unicorn-54392.exe 2644 Unicorn-28304.exe 3052 Unicorn-46032.exe 1592 Unicorn-15860.exe 2528 Unicorn-62923.exe 2000 Unicorn-56146.exe 2088 Unicorn-43894.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1752 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 28 PID 2096 wrote to memory of 1752 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 28 PID 2096 wrote to memory of 1752 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 28 PID 2096 wrote to memory of 1752 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 28 PID 1752 wrote to memory of 2116 1752 Unicorn-27231.exe 29 PID 1752 wrote to memory of 2116 1752 Unicorn-27231.exe 29 PID 1752 wrote to memory of 2116 1752 Unicorn-27231.exe 29 PID 1752 wrote to memory of 2116 1752 Unicorn-27231.exe 29 PID 2096 wrote to memory of 1796 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 30 PID 2096 wrote to memory of 1796 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 30 PID 2096 wrote to memory of 1796 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 30 PID 2096 wrote to memory of 1796 2096 aefed7fbac1b17e24485a8ee5cd7e1a7.exe 30 PID 2116 wrote to memory of 2808 2116 Unicorn-65139.exe 31 PID 2116 wrote to memory of 2808 2116 Unicorn-65139.exe 31 PID 2116 wrote to memory of 2808 2116 Unicorn-65139.exe 31 PID 2116 wrote to memory of 2808 2116 Unicorn-65139.exe 31 PID 1752 wrote to memory of 2768 1752 Unicorn-27231.exe 32 PID 1752 wrote to memory of 2768 1752 Unicorn-27231.exe 32 PID 1752 wrote to memory of 2768 1752 Unicorn-27231.exe 32 PID 1752 wrote to memory of 2768 1752 Unicorn-27231.exe 32 PID 1796 wrote to memory of 2832 1796 Unicorn-41189.exe 33 PID 1796 wrote to memory of 2832 1796 Unicorn-41189.exe 33 PID 1796 wrote to memory of 2832 1796 Unicorn-41189.exe 33 PID 1796 wrote to memory of 2832 1796 Unicorn-41189.exe 33 PID 2808 wrote to memory of 1712 2808 Unicorn-33126.exe 35 PID 2808 wrote to memory of 1712 2808 Unicorn-33126.exe 35 PID 2808 wrote to memory of 1712 2808 Unicorn-33126.exe 35 PID 2808 wrote to memory of 1712 2808 Unicorn-33126.exe 35 PID 2116 wrote to memory of 2560 2116 Unicorn-65139.exe 34 PID 2116 wrote to memory of 2560 2116 Unicorn-65139.exe 34 PID 2116 wrote to memory of 2560 2116 Unicorn-65139.exe 34 PID 2116 wrote to memory of 2560 2116 Unicorn-65139.exe 34 PID 2832 wrote to memory of 2540 2832 Unicorn-57630.exe 37 PID 2832 wrote to memory of 2540 2832 Unicorn-57630.exe 37 PID 2832 wrote to memory of 2540 2832 Unicorn-57630.exe 37 PID 2832 wrote to memory of 2540 2832 Unicorn-57630.exe 37 PID 2768 wrote to memory of 2012 2768 Unicorn-13260.exe 36 PID 2768 wrote to memory of 2012 2768 Unicorn-13260.exe 36 PID 2768 wrote to memory of 2012 2768 Unicorn-13260.exe 36 PID 2768 wrote to memory of 2012 2768 Unicorn-13260.exe 36 PID 1796 wrote to memory of 2816 1796 Unicorn-41189.exe 38 PID 1796 wrote to memory of 2816 1796 Unicorn-41189.exe 38 PID 1796 wrote to memory of 2816 1796 Unicorn-41189.exe 38 PID 1796 wrote to memory of 2816 1796 Unicorn-41189.exe 38 PID 2560 wrote to memory of 1256 2560 Unicorn-3037.exe 39 PID 2560 wrote to memory of 1256 2560 Unicorn-3037.exe 39 PID 2560 wrote to memory of 1256 2560 Unicorn-3037.exe 39 PID 2560 wrote to memory of 1256 2560 Unicorn-3037.exe 39 PID 2808 wrote to memory of 1152 2808 Unicorn-33126.exe 40 PID 2808 wrote to memory of 1152 2808 Unicorn-33126.exe 40 PID 2808 wrote to memory of 1152 2808 Unicorn-33126.exe 40 PID 2808 wrote to memory of 1152 2808 Unicorn-33126.exe 40 PID 1712 wrote to memory of 2456 1712 Unicorn-26987.exe 41 PID 1712 wrote to memory of 2456 1712 Unicorn-26987.exe 41 PID 1712 wrote to memory of 2456 1712 Unicorn-26987.exe 41 PID 1712 wrote to memory of 2456 1712 Unicorn-26987.exe 41 PID 2012 wrote to memory of 2756 2012 Unicorn-28933.exe 42 PID 2012 wrote to memory of 2756 2012 Unicorn-28933.exe 42 PID 2012 wrote to memory of 2756 2012 Unicorn-28933.exe 42 PID 2012 wrote to memory of 2756 2012 Unicorn-28933.exe 42 PID 2768 wrote to memory of 2308 2768 Unicorn-13260.exe 43 PID 2768 wrote to memory of 2308 2768 Unicorn-13260.exe 43 PID 2768 wrote to memory of 2308 2768 Unicorn-13260.exe 43 PID 2768 wrote to memory of 2308 2768 Unicorn-13260.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\aefed7fbac1b17e24485a8ee5cd7e1a7.exe"C:\Users\Admin\AppData\Local\Temp\aefed7fbac1b17e24485a8ee5cd7e1a7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27231.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65139.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33126.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26987.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42301.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6011.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47511.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23858.exe9⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43718.exe10⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32701.exe11⤵PID:1448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34718.exe8⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61761.exe9⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43718.exe10⤵PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23852.exe9⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3593.exe10⤵PID:772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54288.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2861.exe8⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15601.exe9⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25052.exe10⤵PID:1056
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45461.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37397.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54392.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exe9⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exe10⤵PID:2760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21060.exe8⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18316.exe9⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46240.exe10⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28508.exe11⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13406.exe12⤵PID:1160
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28304.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exe8⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51694.exe9⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20532.exe10⤵PID:2592
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22435.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34792.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22623.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35534.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20158.exe9⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30267.exe10⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59478.exe11⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38238.exe12⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exe13⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20779.exe14⤵PID:3576
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31252.exe10⤵PID:2380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-292.exe8⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52550.exe9⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5290.exe10⤵PID:2876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13530.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32410.exe8⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60438.exe9⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64086.exe10⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 18811⤵
- Program crash
PID:112
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-619.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22213.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20158.exe8⤵PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16675.exe8⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 2409⤵
- Program crash
PID:2508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-292.exe7⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33168.exe8⤵PID:2636
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3037.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56691.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59488.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57433.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50692.exe8⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46411.exe9⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42431.exe10⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8471.exe11⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-73.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-73.exe12⤵PID:3188
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26742.exe7⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38238.exe8⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64603.exe9⤵PID:4084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37567.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45648.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44662.exe8⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36292.exe9⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27089.exe10⤵PID:3268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18574.exe7⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61377.exe8⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55918.exe9⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42097.exe10⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31734.exe11⤵PID:2148
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39622.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14454.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27859.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25804.exe8⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30075.exe9⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39058.exe10⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15893.exe11⤵PID:2528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6940.exe9⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32400.exe10⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31277.exe11⤵PID:3540
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5938.exe7⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17932.exe8⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47226.exe9⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16306.exe10⤵PID:3908
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1771.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25804.exe7⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45856.exe8⤵PID:1680
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13260.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28933.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34709.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44906.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-640.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46032.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exe9⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3240.exe10⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10225.exe11⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6663.exe12⤵PID:3616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45648.exe8⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exe9⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26260.exe10⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15844.exe11⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24282.exe12⤵PID:3852
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15860.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45560.exe8⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exe9⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22862.exe10⤵PID:1884
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31921.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43894.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53069.exe8⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47947.exe9⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exe10⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42097.exe11⤵PID:3748
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18813.exe7⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55586.exe8⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53313.exe9⤵PID:1952
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25040.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62093.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51678.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43256.exe8⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59670.exe9⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11896.exe10⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43858.exe11⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31277.exe12⤵PID:3548
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54117.exe7⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5015.exe8⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61481.exe9⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18031.exe10⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62086.exe11⤵PID:3656
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13338.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40926.exe7⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56634.exe8⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57916.exe9⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32784.exe10⤵PID:856
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50723.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25062.exe5⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55679.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38248.exe7⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20532.exe8⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9704.exe9⤵PID:3408
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40940.exe6⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15685.exe7⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42815.exe8⤵PID:2840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64402.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4615.exe6⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17247.exe7⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26806.exe8⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54821.exe9⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44178.exe10⤵PID:2936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6940.exe7⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58487.exe8⤵PID:2108
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41189.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57630.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59659.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6758.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12316.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56146.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24481.exe8⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43718.exe9⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41445.exe10⤵PID:936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4615.exe7⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17247.exe8⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14693.exe9⤵PID:1032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62923.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44325.exe7⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7921.exe8⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21108.exe9⤵PID:1020
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57822.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39452.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10562.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13743.exe7⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30184.exe8⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26479.exe9⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62571.exe10⤵PID:1648
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18382.exe6⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3432.exe7⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39058.exe8⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57096.exe9⤵PID:2924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27360.exe7⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23848.exe8⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35356.exe9⤵PID:3956
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50780.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46608.exe6⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46520.exe7⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29660.exe8⤵PID:2676
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31625.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12150.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63956.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18731.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32218.exe7⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64802.exe8⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57916.exe9⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30454.exe10⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64849.exe11⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55688.exe12⤵PID:904
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43078.exe6⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22670.exe7⤵PID:2720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29591.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15882.exe6⤵PID:2096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40006.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45373.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13743.exe6⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30921.exe7⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28598.exe8⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64785.exe9⤵PID:2792
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59415.exe5⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21907.exe6⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45664.exe7⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54356.exe8⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63176.exe9⤵PID:3864
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5dd700fb23bb706798c3741fc7a688390
SHA117bfa7e28e544120196a3111e00052341163d2d4
SHA25696ea145a9077ad70ebe8dbcdf807404daa287585fa52e01af30d9830b89f21d2
SHA512a80411b9cbfc17cc9014cd4c4fbfb177f15b9fcac14ab6796e894b9024480e719789c7d9a79d1949ec11328e8120331c20a011e359f39f0e82064e85d1e23843
-
Filesize
184KB
MD5e3edf062bd1987bb3022673288c5f03d
SHA132cd0ab7b2638ed6fe960a0787dc418d3363ddf5
SHA256313cc07d3d749dc3ca2e0a5039876cc9a1080f72099aa00b914fea9548ca725a
SHA512d733215ce88c7d640a0373c4d1c4ea33c12f4ee9dd0b8999d7a37a66011d94ecb1ea0b1ff2d312d35b41941f137ad9ecd4b3bd329abce341bfe79ccaada1a5a5
-
Filesize
184KB
MD5fdc5f9a82fbf1bda5ae78170a93eb75d
SHA1460667fe061676f9977b8a77a1b1d57551502e03
SHA256f4288fca063de1473fc4f098f857c4734055a26fce5389621676a810894007be
SHA512b28f69f20acc2be272bca63528133966174401d74a1fd00284647a8fc65409ec56dc363bb6497859723c8ee66157fbbcbb0f850249fb97476cd36d94505f2ab0
-
Filesize
184KB
MD59b68202cf249858fda4953024628912b
SHA18181ce38fc467f8e5e2f69444bcf686f5847241e
SHA2568557c90f7fa40472aa98a1857935d1f768f1733d38fc10a864ff31b8669f302d
SHA5128096e29db91b04e58c7330ce48ec8cac50146940a06933a44fa4fbfcf8a4fc3d8d607eb016532047982d4d7d45ed695f235e304cd98cf8bd170d45ef17688bf1
-
Filesize
184KB
MD514359e8e0f69d366f494dcc5ba6280c7
SHA10c35dfcac1a549d296e1107041ecbb2428d8e5d1
SHA2561137a00058c1941dbfddc49f3007e90c11b8cc930bab222aff865d855aaa2d99
SHA512c8c36bf9048a42ef1838377b95efa5e84d4ed476cc86152b22ec3916d18861a435f099ef7f98aa9bfb6e88e904cc3e1d872449810b2b63abf5dee1849c395582
-
Filesize
184KB
MD51460117825780e3418f680db2a13c521
SHA18bf919e0520519dc36ca3f48eda9bd4ada95dd37
SHA25658b9b1f1cd8c6dc49b77d6110d30eba8dde9d14f8084cf3e3b6bfa29822456b9
SHA5121b3bce9bdb8bd6567dbbcab0f3fd8ac150b408196081c6c93aeab3b678fcca453b78c01b282304271e9fd0a63d1c219db5d90e25fd3c5c4b17e31496a8d8e908
-
Filesize
184KB
MD518f2a9483129a4ca3a0ff8cfe3d34679
SHA1d0e9120d9f04c61602c62d9dc7c3daf9ed3317aa
SHA25645da875fecdb20c0f6546e85c792dcbecf5ad66ee1b90af2333f9f606163ae53
SHA512c58a8e39f48fae0afbea05e5b025f9aaf525ab55ca42a8c1092767fe1d987e07fe705f5d37f031281f4e6a0fb4b5574ddaa6cf11c29c380e1df999b8d92faecd
-
Filesize
184KB
MD541aa0e3197849f4eed11b1f68d187429
SHA1d4fff769ebaa22c4a391d10fdc1d0c39192fe050
SHA256deaa861bd8a46a39d005b0a24676aa30436c3687b2c7c5fa3e53b50877c7e2af
SHA512868328ca0a0fdcc0edb3b7be9cb84b25bf2f6d03a9c5778e4fc31856b237ed2ea459ebf6afc022a255e16602481b067dce736bfdda0721a6b3a2aafd8a6ddefa
-
Filesize
184KB
MD5545adbd196de18250a8d4018fa9c9ed8
SHA1168f825b00719ef9b28adc8980656a31d91a1364
SHA256c15140f05de1dbb09f28f107b9a5986991d9c0eb599caedf8ed62f19f23179ff
SHA51294a7a35e032130d3281225cf86d4be32254de84336987ad6a0830a20ee483a46d389a3fd149527fc97e7d001e5dad167b8cdd0489dc652f533ee8b54750d5a8e
-
Filesize
184KB
MD51e7761be95367832886a7b573f7b012a
SHA18155cc871e720034df3c6e2b027bd528f9ec8b7d
SHA256b47ec8eb8ff9f7354a75fc3748f452cbd74813e884430998cf9c7179ba008c43
SHA5124a0b1fe1142dfca1726ab288fe9ecc03a78abf15fb405bd6e3bbe0c1156b1a80ce3b9cf4e4b796f583e5d5b678f42e927bc35c733cdb1fb30d88eac73c750264
-
Filesize
184KB
MD593425541724a6700e9864da47bcc0840
SHA1a171a93fdff697a5d572e5b9f17e9c846080bad3
SHA25639ec12b5bfd727e9630ac0dfd3e1677538e0bfbb56ee1810851c7ea9526deb4b
SHA51282e495ab06602685c014de1d8eff0d4f78e8ee1e84014cb34be629dceb0920286cc5b0ad11b8c0ee2eb9104c3810be3d5c90b1824422ed1d9f7c47bb4ff4fdc0
-
Filesize
184KB
MD5b85c77092f27dbafc432694c27e1e9a3
SHA1192ec349211694c37e909f4bc56cff2abe1ceb70
SHA2563d71244f83604ea53edfd999a17362f2fbdafec4efb566a12882a4259693f0ef
SHA512e9054b71b93b60c232736942d56016833e1df98f0c7a04210b23262992726b85da607d7191a0c5fb67c913d04a52098026f4446b48fa8dd562119a1975936fe5
-
Filesize
184KB
MD5df400ac80e41d1ed8fd95d0bb3f764bf
SHA1abee1f0e5c836ae6a38ee57e3f7daa968d10520b
SHA2569acc39a362243ca465262f7cc24594212811e4b19baf50cfd9b0f2d7efe6c3df
SHA512530bfcfbe22a8922c620924f570c46529f19d206edffbb13b49369675ad16d7e8bfe0c6d4fc705ebf34c8b1cea9fc3c4cb4baddc95b6947394a4a1c9cff2d430
-
Filesize
184KB
MD587d325963e37c474d319d8503b743588
SHA18b9068cb54d48a91d35cf390eabf12f89e393cf7
SHA256e5ac93282d87bf4164993205b08f85725fdf528509229b40942b9713f4014a01
SHA5127bb26f421cad833ef9c9f13b599545a90fc2b62edbc6face8d86e9a388a2975059cbdfa1a5443ac8d547a03e9e61f6e87e55e9412e7bd3bc02404837c1cbc9d9
-
Filesize
184KB
MD536dd5ffefa69ebd34ed1bc4889dded4e
SHA19287dc7c2d7f120962694b223d0c771a30af62d7
SHA2569c5651676ae3626c1a658d047c92fbccc4669abeb66ff7fed6dfb14fff6f771a
SHA51209c43d1dee6625233985ea99b3864c252ab41bf93e58213fd743bee29c17a5b17e84df73738c725c0b707ae9153bad4f946066ffdcc00869bc4097a4c606f22b
-
Filesize
184KB
MD57f87850308376dbef1ad3a7cca80ddfd
SHA1d00b1c8823a8f59541bca38e732a4d386e3f1a3d
SHA2567b4d9688455f60a273c55221e01e7f574c8df38af22e0dd86f04cf522e85bc16
SHA512f7a26446c92194a33f4e04bdf8660e398e50ec45ae57fa20d7cf09e4ba353986f9c39211c2ebf29b60c122bee0bcf2f83d0240ffe42899219d9a0728014ce727
-
Filesize
184KB
MD54671b607c428fa678fa02e56e03a15f1
SHA120a8784db6c1b15b5021e66dd02aa7d8cbc519d1
SHA2562b83da2c54b49fea64635d094521b6e41d1402469cee55592fb66b59dc7d7b04
SHA5127185b1e3a3e6dc30ecfaefad4d55f4239975c2be54bed69c66e6ec155319b8c504f01d827954f2405e106369d1ab580bc6b151f42902a50f2ed1a1bd75391190
-
Filesize
184KB
MD521f7d05098c74bd2012d3a65abaf6325
SHA134da1cc65d8cc9276920fdf963a9d5de8cdaed4d
SHA25665ea46e27cd3c03badc500f10aed8967cf809028bbf3665b2f09db0eaccfaf29
SHA5126f0034e0615093f056ec44eb1310bb7575c15c4ca694c065059d72590711dace96b16bcdd59255690d48731312eaa518437d7c5ed4c0d76bf215f39cff0d862b
-
Filesize
184KB
MD52d26f890ebf8596a3af1ecce55d53a51
SHA137b5f1ef21444ac61662bc3f82465866660d1db6
SHA25681719f3802c311f760d92417b28c613df43d9b9526e9e0a249106bad34183238
SHA5124fd0b3f861326e5cd075a93f93e9ff1f04225959d90c454bf3d0fab1f86569be313fa394f091f85ad1f0d564ef24207aedab02121357f5ec7ffd356c820b133d
-
Filesize
184KB
MD52b15f6fb858a7ab98b8e3d5785be0875
SHA1db3c14e1576ddf51107639edc5b971ae15ed4def
SHA2565edcf65ec4b134bcfad87a66729271f51507348eb7ff1f4e7ae05597af3550d4
SHA512acf1a53c0ead990097f95eda0524ec91c5df3b2b195fc08347dc8029f4d071b5a93cc1c02841eac1f4918572b75448ba2f6c1eb8d777075578075509daa64607
-
Filesize
184KB
MD5468cb80bbb9bd4c529c3f271fc36e375
SHA1e4d4782be443a1cd80ca655dad93725702552331
SHA25698ad293b3249b19a4ebc727b0bf10ecd590bd85c23d0e114c22183a17b5b75ec
SHA512b09bf67805dacacf1e243757926621d74210d02c7e30a2d89f2021e6a6fa6a808428dab018bdf4fbba72e1f36ff9636b3b4afc22a46673297cc75cd03a688e08
-
Filesize
184KB
MD583a754e8952db957c43f6c99cac66c40
SHA18f41382b2dade90925544725cad9192ba0cc7052
SHA2564a2a41ea3477e79b58622d75f295d3e078cdb03c512a922a9a9509b8ca09221b
SHA5123e9d03ad7cd2c72633f4920fe5af4bcf00ecdccf413ac5afea0cd23d061db1aeed2f3eec5225e43218cb69367ac598a751758909c53b707fc3537d8ef0b4c914
-
Filesize
184KB
MD560f68aad7167cea04df7d12ca2462afb
SHA1c492c72d8aa38e3721026ed56d5f6627a735db5f
SHA256b45a52705bf7edc05b21a4d0120827e7070275fcd959a999e952439cdbdd47d5
SHA5123b019844d2c393ac40ffbce6d2493ee23bb10c530104e8f7bfcb69e95a9ba34eb6714c49f9a5c061f431c641f391e8a524e89dd70846ff02537e49b6125fdadf