Analysis
-
max time kernel
125s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
010ee620b4b6270d3fa9ce238cf2ab2b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
010ee620b4b6270d3fa9ce238cf2ab2b.exe
Resource
win10v2004-20231215-en
General
-
Target
010ee620b4b6270d3fa9ce238cf2ab2b.exe
-
Size
184KB
-
MD5
010ee620b4b6270d3fa9ce238cf2ab2b
-
SHA1
0bf1f444a7b26241f50353bcf6b9a4192634c2e5
-
SHA256
2ced6795a21bdbb504524a7f1b8ee2e8a97946c5370a3bf772c3f00ce5ec40fd
-
SHA512
8c3d1508bfdba6e831b5b3a8f26e1c92665c1288ac61bb4a51cd8fb32b68c79f404f4cbeeb503466e1bddb74ab9e1d18cd7392c69cb4c5eda6be17c36775c755
-
SSDEEP
3072:JUDkomq80mwTaOjdqq9DX7kLsT+JwsIIbXxVGoY0xlv1pFy:JUYo9jTa6qWDX7tVwtxlv1pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2920 Unicorn-59506.exe 3028 Unicorn-10471.exe 2584 Unicorn-43891.exe 2748 Unicorn-20031.exe 2692 Unicorn-4249.exe 2740 Unicorn-15370.exe 2968 Unicorn-32942.exe 2016 Unicorn-461.exe 1988 Unicorn-46133.exe 1416 Unicorn-45552.exe 1996 Unicorn-17710.exe 2568 Unicorn-22117.exe 1108 Unicorn-21794.exe 1580 Unicorn-45744.exe 1092 Unicorn-30607.exe 1020 Unicorn-7062.exe 604 Unicorn-64026.exe 2248 Unicorn-60347.exe 852 Unicorn-64986.exe 1196 Unicorn-44758.exe 2444 Unicorn-7254.exe 1964 Unicorn-60539.exe 624 Unicorn-53969.exe 2216 Unicorn-8297.exe 2128 Unicorn-33740.exe 768 Unicorn-788.exe 2148 Unicorn-10435.exe 896 Unicorn-33486.exe 2324 Unicorn-54120.exe 1984 Unicorn-62267.exe 1444 Unicorn-62480.exe 964 Unicorn-52122.exe 1260 Unicorn-37242.exe 2492 Unicorn-27019.exe 1756 Unicorn-59691.exe 952 Unicorn-23127.exe 2548 Unicorn-43547.exe 2184 Unicorn-59883.exe 2368 Unicorn-35379.exe 1636 Unicorn-10298.exe 1544 Unicorn-46728.exe 2500 Unicorn-10526.exe 1956 Unicorn-13863.exe 2900 Unicorn-27054.exe 576 Unicorn-39306.exe 1244 Unicorn-50428.exe 1664 Unicorn-6250.exe 1060 Unicorn-17948.exe 2140 Unicorn-51175.exe 1632 Unicorn-50620.exe 1688 Unicorn-30754.exe 680 Unicorn-3090.exe 2312 Unicorn-27040.exe 2316 Unicorn-56375.exe 2196 Unicorn-6619.exe 1552 Unicorn-23510.exe 3020 Unicorn-47460.exe 1744 Unicorn-15534.exe 2620 Unicorn-50065.exe 1536 Unicorn-58788.exe 1996 Unicorn-25561.exe 3012 Unicorn-62317.exe 604 Unicorn-38005.exe 2536 Unicorn-58980.exe -
Loads dropped DLL 64 IoCs
pid Process 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 2920 Unicorn-59506.exe 2920 Unicorn-59506.exe 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 3028 Unicorn-10471.exe 3028 Unicorn-10471.exe 2920 Unicorn-59506.exe 2920 Unicorn-59506.exe 2584 Unicorn-43891.exe 2584 Unicorn-43891.exe 2692 Unicorn-4249.exe 2692 Unicorn-4249.exe 2740 Unicorn-15370.exe 2740 Unicorn-15370.exe 2584 Unicorn-43891.exe 2584 Unicorn-43891.exe 2968 Unicorn-32942.exe 2968 Unicorn-32942.exe 2692 Unicorn-4249.exe 2692 Unicorn-4249.exe 2016 Unicorn-461.exe 2016 Unicorn-461.exe 2740 Unicorn-15370.exe 2740 Unicorn-15370.exe 1988 Unicorn-46133.exe 1988 Unicorn-46133.exe 1416 Unicorn-45552.exe 1416 Unicorn-45552.exe 2968 Unicorn-32942.exe 2968 Unicorn-32942.exe 1996 Unicorn-17710.exe 1996 Unicorn-17710.exe 2568 Unicorn-22117.exe 2568 Unicorn-22117.exe 2016 Unicorn-461.exe 1580 Unicorn-45744.exe 1580 Unicorn-45744.exe 2016 Unicorn-461.exe 1988 Unicorn-46133.exe 1988 Unicorn-46133.exe 1108 Unicorn-21794.exe 1108 Unicorn-21794.exe 1416 Unicorn-45552.exe 1416 Unicorn-45552.exe 1020 Unicorn-7062.exe 1020 Unicorn-7062.exe 1996 Unicorn-17710.exe 1996 Unicorn-17710.exe 1964 Unicorn-60539.exe 1108 Unicorn-21794.exe 1108 Unicorn-21794.exe 1964 Unicorn-60539.exe 1092 Unicorn-30607.exe 604 Unicorn-64026.exe 1092 Unicorn-30607.exe 604 Unicorn-64026.exe 1196 Unicorn-44758.exe 1196 Unicorn-44758.exe 2444 Unicorn-7254.exe 2444 Unicorn-7254.exe 852 Unicorn-64986.exe 852 Unicorn-64986.exe -
Program crash 30 IoCs
pid pid_target Process procid_target 2156 2016 WerFault.exe 35 2512 2568 WerFault.exe 39 2172 852 WerFault.exe 49 1068 964 WerFault.exe 60 2848 2248 WerFault.exe 45 2616 1260 WerFault.exe 63 2996 576 WerFault.exe 76 2384 2500 WerFault.exe 73 1820 1536 WerFault.exe 95 1796 1544 WerFault.exe 72 1840 1996 WerFault.exe 94 2852 3012 WerFault.exe 96 1456 1480 WerFault.exe 101 3020 2844 WerFault.exe 132 1128 2004 WerFault.exe 154 2020 2656 WerFault.exe 126 2484 1088 WerFault.exe 123 1540 2240 WerFault.exe 155 2620 2012 WerFault.exe 130 1688 2560 WerFault.exe 218 2760 1712 WerFault.exe 190 2764 1100 WerFault.exe 202 3928 1760 WerFault.exe 242 4072 3040 WerFault.exe 222 4064 2324 WerFault.exe 255 3424 2820 WerFault.exe 277 1884 3648 WerFault.exe 313 1748 3428 WerFault.exe 312 3320 1924 WerFault.exe 191 1964 448 WerFault.exe 278 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 2920 Unicorn-59506.exe 3028 Unicorn-10471.exe 2584 Unicorn-43891.exe 2748 Unicorn-20031.exe 2692 Unicorn-4249.exe 2740 Unicorn-15370.exe 2968 Unicorn-32942.exe 2016 Unicorn-461.exe 1988 Unicorn-46133.exe 1416 Unicorn-45552.exe 1996 Unicorn-17710.exe 2568 Unicorn-22117.exe 1580 Unicorn-45744.exe 1108 Unicorn-21794.exe 1092 Unicorn-30607.exe 604 Unicorn-64026.exe 1020 Unicorn-7062.exe 2444 Unicorn-7254.exe 1964 Unicorn-60539.exe 852 Unicorn-64986.exe 1196 Unicorn-44758.exe 2148 Unicorn-10435.exe 1984 Unicorn-62267.exe 2128 Unicorn-33740.exe 624 Unicorn-53969.exe 2216 Unicorn-8297.exe 896 Unicorn-33486.exe 768 Unicorn-788.exe 1444 Unicorn-62480.exe 2248 Unicorn-60347.exe 964 Unicorn-52122.exe 1260 Unicorn-37242.exe 2492 Unicorn-27019.exe 952 Unicorn-23127.exe 2548 Unicorn-43547.exe 2184 Unicorn-59883.exe 1756 Unicorn-59691.exe 1636 Unicorn-10298.exe 2368 Unicorn-35379.exe 2992 Unicorn-50407.exe 1544 Unicorn-46728.exe 2500 Unicorn-10526.exe 1956 Unicorn-13863.exe 2900 Unicorn-27054.exe 576 Unicorn-39306.exe 1244 Unicorn-50428.exe 1664 Unicorn-6250.exe 1060 Unicorn-17948.exe 1688 Unicorn-30754.exe 2140 Unicorn-51175.exe 1632 Unicorn-50620.exe 1552 Unicorn-23510.exe 2316 Unicorn-56375.exe 2312 Unicorn-27040.exe 2196 Unicorn-6619.exe 680 Unicorn-3090.exe 3020 Unicorn-47460.exe 1744 Unicorn-15534.exe 2620 Unicorn-50065.exe 1996 Unicorn-25561.exe 1536 Unicorn-58788.exe 3012 Unicorn-62317.exe 604 Unicorn-38005.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2920 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 28 PID 2040 wrote to memory of 2920 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 28 PID 2040 wrote to memory of 2920 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 28 PID 2040 wrote to memory of 2920 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 28 PID 2920 wrote to memory of 3028 2920 Unicorn-59506.exe 29 PID 2920 wrote to memory of 3028 2920 Unicorn-59506.exe 29 PID 2920 wrote to memory of 3028 2920 Unicorn-59506.exe 29 PID 2920 wrote to memory of 3028 2920 Unicorn-59506.exe 29 PID 2040 wrote to memory of 2584 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 30 PID 2040 wrote to memory of 2584 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 30 PID 2040 wrote to memory of 2584 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 30 PID 2040 wrote to memory of 2584 2040 010ee620b4b6270d3fa9ce238cf2ab2b.exe 30 PID 3028 wrote to memory of 2748 3028 Unicorn-10471.exe 31 PID 3028 wrote to memory of 2748 3028 Unicorn-10471.exe 31 PID 3028 wrote to memory of 2748 3028 Unicorn-10471.exe 31 PID 3028 wrote to memory of 2748 3028 Unicorn-10471.exe 31 PID 2920 wrote to memory of 2692 2920 Unicorn-59506.exe 32 PID 2920 wrote to memory of 2692 2920 Unicorn-59506.exe 32 PID 2920 wrote to memory of 2692 2920 Unicorn-59506.exe 32 PID 2920 wrote to memory of 2692 2920 Unicorn-59506.exe 32 PID 2584 wrote to memory of 2740 2584 Unicorn-43891.exe 33 PID 2584 wrote to memory of 2740 2584 Unicorn-43891.exe 33 PID 2584 wrote to memory of 2740 2584 Unicorn-43891.exe 33 PID 2584 wrote to memory of 2740 2584 Unicorn-43891.exe 33 PID 2692 wrote to memory of 2968 2692 Unicorn-4249.exe 34 PID 2692 wrote to memory of 2968 2692 Unicorn-4249.exe 34 PID 2692 wrote to memory of 2968 2692 Unicorn-4249.exe 34 PID 2692 wrote to memory of 2968 2692 Unicorn-4249.exe 34 PID 2740 wrote to memory of 2016 2740 Unicorn-15370.exe 35 PID 2740 wrote to memory of 2016 2740 Unicorn-15370.exe 35 PID 2740 wrote to memory of 2016 2740 Unicorn-15370.exe 35 PID 2740 wrote to memory of 2016 2740 Unicorn-15370.exe 35 PID 2584 wrote to memory of 1988 2584 Unicorn-43891.exe 36 PID 2584 wrote to memory of 1988 2584 Unicorn-43891.exe 36 PID 2584 wrote to memory of 1988 2584 Unicorn-43891.exe 36 PID 2584 wrote to memory of 1988 2584 Unicorn-43891.exe 36 PID 2968 wrote to memory of 1416 2968 Unicorn-32942.exe 37 PID 2968 wrote to memory of 1416 2968 Unicorn-32942.exe 37 PID 2968 wrote to memory of 1416 2968 Unicorn-32942.exe 37 PID 2968 wrote to memory of 1416 2968 Unicorn-32942.exe 37 PID 2692 wrote to memory of 1996 2692 Unicorn-4249.exe 38 PID 2692 wrote to memory of 1996 2692 Unicorn-4249.exe 38 PID 2692 wrote to memory of 1996 2692 Unicorn-4249.exe 38 PID 2692 wrote to memory of 1996 2692 Unicorn-4249.exe 38 PID 2016 wrote to memory of 2568 2016 Unicorn-461.exe 39 PID 2016 wrote to memory of 2568 2016 Unicorn-461.exe 39 PID 2016 wrote to memory of 2568 2016 Unicorn-461.exe 39 PID 2016 wrote to memory of 2568 2016 Unicorn-461.exe 39 PID 2740 wrote to memory of 1108 2740 Unicorn-15370.exe 40 PID 2740 wrote to memory of 1108 2740 Unicorn-15370.exe 40 PID 2740 wrote to memory of 1108 2740 Unicorn-15370.exe 40 PID 2740 wrote to memory of 1108 2740 Unicorn-15370.exe 40 PID 1988 wrote to memory of 1580 1988 Unicorn-46133.exe 41 PID 1988 wrote to memory of 1580 1988 Unicorn-46133.exe 41 PID 1988 wrote to memory of 1580 1988 Unicorn-46133.exe 41 PID 1988 wrote to memory of 1580 1988 Unicorn-46133.exe 41 PID 1416 wrote to memory of 1092 1416 Unicorn-45552.exe 42 PID 1416 wrote to memory of 1092 1416 Unicorn-45552.exe 42 PID 1416 wrote to memory of 1092 1416 Unicorn-45552.exe 42 PID 1416 wrote to memory of 1092 1416 Unicorn-45552.exe 42 PID 2968 wrote to memory of 604 2968 Unicorn-32942.exe 44 PID 2968 wrote to memory of 604 2968 Unicorn-32942.exe 44 PID 2968 wrote to memory of 604 2968 Unicorn-32942.exe 44 PID 2968 wrote to memory of 604 2968 Unicorn-32942.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\010ee620b4b6270d3fa9ce238cf2ab2b.exe"C:\Users\Admin\AppData\Local\Temp\010ee620b4b6270d3fa9ce238cf2ab2b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59506.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10471.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20031.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13863.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38005.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54123.exe7⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48773.exe8⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28976.exe9⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 22010⤵
- Program crash
PID:1688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45436.exe7⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57419.exe8⤵PID:3276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47662.exe6⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36952.exe7⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65400.exe8⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37250.exe9⤵PID:1676
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58980.exe5⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1990.exe6⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24819.exe7⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22614.exe8⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32344.exe9⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42451.exe10⤵PID:3100
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4249.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32942.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45552.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62267.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35379.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6619.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52670.exe10⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53817.exe11⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28535.exe12⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21647.exe13⤵PID:3708
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16276.exe9⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24129.exe10⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25411.exe11⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exe12⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26340.exe13⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54617.exe14⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1034.exe15⤵PID:952
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63848.exe11⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60548.exe12⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5421.exe13⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21647.exe14⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45305.exe15⤵PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25439.exe14⤵PID:800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50662.exe10⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40512.exe11⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12110.exe12⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe13⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 24014⤵
- Program crash
PID:1884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37553.exe11⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe12⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 22013⤵
- Program crash
PID:1748
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23510.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exe9⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16620.exe10⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38623.exe11⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5172.exe12⤵PID:2788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38554.exe9⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61975.exe10⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27492.exe11⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13151.exe12⤵PID:3560
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53969.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23127.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50620.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51710.exe9⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16620.exe10⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21519.exe11⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exe12⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58701.exe13⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36374.exe14⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39322.exe15⤵PID:3636
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64808.exe11⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27684.exe12⤵PID:2732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38554.exe9⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35639.exe10⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54746.exe11⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31140.exe12⤵PID:2696
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3090.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48778.exe8⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41508.exe9⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe10⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26361.exe11⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe12⤵PID:3872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29234.exe8⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34134.exe9⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48649.exe10⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26553.exe11⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe12⤵PID:3884
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64026.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33486.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59691.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40226.exe9⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14626.exe10⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33579.exe11⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31960.exe12⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exe13⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36758.exe14⤵PID:3968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37553.exe12⤵PID:3192
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19265.exe9⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54746.exe10⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe11⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57943.exe12⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exe13⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7977.exe14⤵PID:3488
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28912.exe8⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58420.exe9⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57419.exe10⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe11⤵PID:3436
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56375.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18654.exe8⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38960.exe9⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1098.exe10⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30061.exe11⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1337.exe12⤵PID:3032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55369.exe11⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44542.exe12⤵PID:3584
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17710.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7062.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8297.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43547.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17948.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe9⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65301.exe10⤵PID:2780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32420.exe8⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16812.exe9⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46215.exe10⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1093.exe11⤵PID:2368
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51175.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exe8⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26879.exe9⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24626.exe10⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53288.exe11⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61802.exe12⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45305.exe13⤵PID:3596
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53246.exe8⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51633.exe9⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe10⤵PID:3528
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33740.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10298.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30754.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52286.exe7⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11658.exe8⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5353.exe9⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe10⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40512.exe11⤵PID:2068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12042.exe9⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30253.exe10⤵PID:1892
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50423.exe7⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4398.exe8⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-906.exe9⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47149.exe10⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43444.exe11⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exe12⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe13⤵PID:608
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6479.exe9⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56293.exe10⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe11⤵PID:1732
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43891.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15370.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-461.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22117.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60347.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39306.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45597.exe8⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18902.exe9⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63454.exe10⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe11⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49721.exe12⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33406.exe13⤵PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55450.exe12⤵PID:4016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 23611⤵
- Program crash
PID:2760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 23610⤵
- Program crash
PID:1128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 2169⤵
- Program crash
PID:1456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19649.exe8⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-340.exe9⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe10⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28260.exe11⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exe12⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33188.exe13⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64589.exe14⤵PID:3600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37553.exe11⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28397.exe12⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45305.exe13⤵PID:4008
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 2169⤵
- Program crash
PID:3020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 576 -s 2408⤵
- Program crash
PID:2996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 2367⤵
- Program crash
PID:2848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 2366⤵
- Program crash
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64986.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52122.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37242.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46728.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25561.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26111.exe10⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9266.exe11⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44347.exe12⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57362.exe13⤵PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 23613⤵
- Program crash
PID:3928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 23612⤵
- Program crash
PID:2764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 21611⤵
- Program crash
PID:2020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 23610⤵
- Program crash
PID:1840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30941.exe9⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12774.exe10⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59401.exe11⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44542.exe12⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27433.exe13⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35674.exe14⤵PID:3404
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exe10⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1088.exe11⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37902.exe12⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe13⤵PID:844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13952.exe11⤵PID:2712
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 2409⤵
- Program crash
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58788.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2182.exe9⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49567.exe10⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51996.exe11⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17866.exe12⤵PID:976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 23612⤵
- Program crash
PID:4064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51093.exe11⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56794.exe12⤵PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 21612⤵
- Program crash
PID:1964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 24011⤵
- Program crash
PID:4072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 23610⤵
- Program crash
PID:2484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 2369⤵
- Program crash
PID:1820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 2408⤵
- Program crash
PID:2616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10526.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62317.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50807.exe9⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe10⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26169.exe11⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57889.exe12⤵PID:3908
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 21610⤵
- Program crash
PID:2620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 2169⤵
- Program crash
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe8⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-340.exe9⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57315.exe10⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26169.exe11⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exe12⤵PID:3212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33469.exe11⤵PID:3168
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 2408⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 2407⤵
- Program crash
PID:1068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2366⤵
- Program crash
PID:2172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 2405⤵
- Program crash
PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21794.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60539.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-788.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59883.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47460.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30941.exe9⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe10⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56794.exe11⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64589.exe12⤵PID:3464
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49141.exe8⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39131.exe9⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe10⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55312.exe11⤵PID:2528
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15534.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe8⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43978.exe9⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59728.exe10⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51093.exe11⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26963.exe12⤵PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 23612⤵
- Program crash
PID:3424
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10435.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27019.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50428.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45789.exe8⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59359.exe9⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38768.exe10⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48446.exe11⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe12⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37250.exe13⤵PID:1708
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1061.exe10⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46791.exe11⤵PID:2520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39514.exe9⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37471.exe10⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20746.exe11⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43828.exe12⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53335.exe13⤵PID:3260
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47854.exe8⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48773.exe9⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48446.exe10⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64808.exe11⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35468.exe12⤵PID:2928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59546.exe9⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6443.exe10⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54378.exe11⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49246.exe12⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe13⤵PID:3492
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1227.exe7⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50444.exe8⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5421.exe9⤵PID:1520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6250.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62125.exe7⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18902.exe8⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53231.exe9⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1034.exe10⤵PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 23610⤵
- Program crash
PID:3320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2369⤵
- Program crash
PID:1540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15565.exe7⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe8⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11309.exe9⤵PID:3960
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46133.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45744.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7254.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54120.exe6⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50407.exe7⤵
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50065.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54891.exe9⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17575.exe10⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57419.exe11⤵PID:3304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe8⤵PID:1220
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44758.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62480.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27054.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62509.exe7⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30771.exe8⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59214.exe9⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53288.exe10⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15260.exe11⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46727.exe12⤵PID:1804
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34833.exe7⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20616.exe8⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24122.exe9⤵PID:3656
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD527d7cc15ba99d31079c21d794ed9d345
SHA14fcac03e85d5c1b300fe0ae8ce75ba80b1472f7e
SHA2560dbcc76d3871900bd2c09b8a35f2715e924093839556fda92b5c7dca85755606
SHA51231a230f793ec73c20e3b2911f8cad4f8fdddbdaa6454f03910ec73b6f7ccef42ab7450b6e4c687ade120080db2173afda92cdfb4df70d6d811d3a76d94ea6653
-
Filesize
184KB
MD5cab89f920bba8f417485ff43e502421e
SHA19d439c0aa442150b60d4198be856f0b219e3157a
SHA256efde01fc30e9bf2c0b97fae941195de967d452786d152de6d902126e00b876b0
SHA51212931976420cca6f9334a7030a440d71d32ce8fa60c77715aa23ed9b3fde34ee0ae4db60f780eb7ee0bc5b979debdc1ccedb8ea84c7f4a412f3e66036bc8ba9a
-
Filesize
184KB
MD5334211b8e30fe783a6c19a373e706b9d
SHA13052667975ae595af5eb5d97d831ed2de3b3402f
SHA256b45c0559a1abe772275a8bf669d59cf0a3626d5fdd629d242f57025fcd9713b0
SHA5125e27f58a16fb4b34f43862c08cdf9bbb647326e005e3cf6719743f8969d7d26349fa78bb75023df008dc7cf7e4a719e6edead4779751578466b13d031f1658da
-
Filesize
184KB
MD557bc6818d2fb84a319d574fbceddb29e
SHA1e54c2a4a2fa2d7eac49048974d9e4538716ad093
SHA2563c1320b5ef559420b48dd62f2fdc551f27dad22a8adf9f8b7903703bf98b648e
SHA51298cd37bd38850363af133efa443a1645e9649575a214568a99be9c3793697df45d6628db166f2c88613f6180d8c4ce617e26e2af54662aef104a822ac48f7a5f
-
Filesize
184KB
MD56f73245f877225964b6c26ddb67e2a65
SHA16353f9dbf2251f20d8052d7a6f2d0c64e9807cfe
SHA2562631818e9e00ab5a0818fda226ac25dedfb1308632ce98c15f89b67694308ce4
SHA512c8cb0127e25d7b62497506a657a1ca3b1491703b7f161d97cde8ac7d120ee20a172885b32286be1b8ea3960935c349ffd4a73c20e34e600f6e4cf207878a73bf
-
Filesize
184KB
MD58b17ac8d07f6b04e776873b541daa8e4
SHA110ec36971edd3e1989c1355f752078b5696d5e7f
SHA256f8df1e4c94dd6fabc377e6d86a4b1b0cc62392dc707fd4bd949d2f662736f68e
SHA5120e89dc10a4cb95dea6dda51e58108e3c40632c4b7fb0ad368d17f4e7348d76e18fbe77d3cffc032f25607ee3c1cdf3213fd36291c84c8b7271b3469ff39c70dc
-
Filesize
184KB
MD5a3c14cb6a56e447ea0790ee5aec97be5
SHA14cd6901f82950e16a462d46adabbc442b918e391
SHA256c22cdd872a6db8c6598476dfa5e7f103e2252f6123da82d92eb60947bdb90be3
SHA5121455876e97f09884e7044ae3782999c7b1d8bbba5c59003109024c0244f8dc10ea9e9193d282b61ef8f61f62cbce0c17a18b14bc50ed5e270606c8d066d44bf1
-
Filesize
184KB
MD52568cd6bb643c09c30f69dcf2636e441
SHA194f8f73286511358ccd1360f3f7ada05ff876d17
SHA25615c03622b6f593bd8406bee3ffadddc2c25ff1db8bc45bfaf0d5d867e70c6506
SHA512c4c1701facddb0c26f38768e59eb98b96fc724d9fc3666d3a9f837d38923c84d2f9d62efb41eab92276dbcd0e354209b9da9fc9799b9ffa063cec1c47c7fde95
-
Filesize
184KB
MD5624b2372cdeb9239cc3f9cc55d7c7a3d
SHA14588ed9512cc50d7ab411d348fe7ae761ceed87c
SHA25621f22e3a4af996401ff115fd64346ad98586e97aa5aa9a3593b0f872b67bee30
SHA5121abe03193120249492c0f2967bf4e9e7effef2a8dbbfe2fcf8b68e577e278e4cf719f8b10cbafbf4cbbc7dde1a3254550b8a7afddfb5fc86c439ace78606adff
-
Filesize
184KB
MD532853b33360d6ceba6d05e1ec1b57e35
SHA10579ecab8e8d086523b940dbb8f39a2d49fc3c91
SHA2560776a11da5ab2891b72c32082b932e819210f60850de3213244fc0bbfa39de36
SHA5128838f7600a3f641fec3af1bad41c512214bb42754bbbe3117208118259d27293fe801bcf22a6cc71c1c77f5dafdda2e1c6374176799f62920ca7e5966b418320
-
Filesize
184KB
MD5f8b6b878de1b77e8f5d1e9e1444de21e
SHA1f82edfcd1250d4862b23aca769fa137546db3ec9
SHA256ced73f390b0c3f85fdd331915498f8bd3be1882a66acf93ddc282b9d43e25801
SHA512fed745def0dbce73d28495ca5e084dfec6d0bfa342bc74a5ab7bb9f867921eef877be00b0d5be4472bbd645cccaf87446e55e1e02ffe991153788399a767a663
-
Filesize
184KB
MD5c398f60df1a04d0e2214e3699e1cd8e4
SHA1ab332bc786f4d5e2b67fd5ee11d0704ce4988491
SHA25612c20a3c97d99f3af5444c737449f5cfba184e24cae94d153851d83812f8227a
SHA512f926fbe72ef811b46541917779bc7d8b5a3232ded9a1d7eb21002ed21591a1142518d69b2af542b219967606620712bd2da244cc2d7e883bb2b7e4c91e421495
-
Filesize
184KB
MD52a9e35db6de6c59a4a3be3a0bbcfbaad
SHA19ab07bc24a55e9b4992dac52e0ffa1b80f9c1c1f
SHA2568079622c87e14e0e0752f2d77b5ce936518e755443aae02b9f03c2616ad188df
SHA51248cd24ec70a1982b7e769b5d7c7335b741785dbc2d4a408d843eec341cfd4cf59aa9223ebe39a587c017a24f86669fd43169b84e90f916d259b4ff226ca25f00
-
Filesize
184KB
MD55fbd6cde1905561434da3c91250a7ac2
SHA1954f9f3e27fec642519b796ea93bf95589b755fd
SHA256e97d669480260e6728739cb339ffbc8a3e02b91ba09b63f11450cce243929982
SHA5122bd859fd007ca20ab6c86ddc148ec84200d062a40a18cbeb383f8a5654967a361425e17b9367a6a515ee6b70a573538bb810452203f26bbb2c5ffc83e75641ac
-
Filesize
184KB
MD56081e885164a41014b47742d9389ebe0
SHA1a4191fd830019a4ee281750403689d0d3d139f1f
SHA25653f8530a17f625cf2e2092f7c3d5a8ccbd3f7515681d98c15b259b288636ac2a
SHA512dad931a2e82b714c461a5fe1db7f91eccbacd5554696872dc84ff2a28b9171b5f6bbc3ec63c6b47332d82ca130012a2ef0279de8efc0f02f22ca228b784d3b46
-
Filesize
184KB
MD56d4ee5a8a74dd120dfc6e1f0f60520f8
SHA1e0eedd21c4abaa3d3f446a665e400907c86f2fa7
SHA2566a814fd4310bd548a9be3c7f5083c641f4ead7af45c9b486563b36891b013b2b
SHA5122b24ce2bb1fb1e35dc15476cee9eff67ab21c1035b2b5ba994de7682a08435db2a93d3a75190d366843ff5cb9d3fb50392b4f96a981417d131da8220639abe82
-
Filesize
184KB
MD51baee5eb245767cc5711ff3334d8917a
SHA185b051bd7a2cab7755ba35ff2da45c99a1918095
SHA256dc1ce82cb1cc88e4e2271c496da75f8e9093f8ecff87a97da372f85b4f0a8078
SHA512ba5e7b5f4abb3e0a5e9eb3e29604eda282c490f07586e50ca41f17a68523eed857c30c5ade524c8c520621b9077e84e06d3c705a477f601a2f83ff279f0d76ef
-
Filesize
184KB
MD5848d73d47a55c255e82cf392121216fd
SHA10e0a3736d487a576dd318e379e34f68731f9dac1
SHA256202a866bdd2927577995403ca4ed57658a5af4ca7f1157ca0035ee7540085f5a
SHA51247e4c55eaa7c607180b91d4a9aa0166d192e08756c925823263946d50992e2437ea6e8c4118590c31c6f40200b90eef07015f811be87acd2491a16280bdcca3f
-
Filesize
184KB
MD5cb2e46f1798df1b9f45df75c6c495e1e
SHA1cd2553f3037462628baaf06f1bc6f78ffd5d637c
SHA25605962f4d6f3035898a164c1248ce0c08110733e1320e46d90bafc916d5e2a0be
SHA512c6274784a9c4c192aba1d951eb79238dc5453591c1e9055a61294a0e7e890f91815783cf86c49d360f0bbda4ebf51c0ea3dc546832faa46ad1af1c03e0f2ac40
-
Filesize
184KB
MD592e515f8d330a3713546eafa1e5211ef
SHA1c943dbb384c9650409ccd82fb283ad2e302428fe
SHA256b70f33e4e89983682af42ddbd9c34fcd630286fe6bbc67702412453e59a86f2f
SHA512e60c61fe0312c39f7a756752068356eef2903ff4c385e50ccad5cfa6a24a2950efe147d168f2e4f75c8d8b1c966cefaa093fbe237c9e350d6e22dde95b41414e
-
Filesize
184KB
MD5af4c520fddffc54025324c510c5467b0
SHA13e5b1d148b124455a6e9911b7b79fd7e418fc8a6
SHA256deb17c775dee683c45c1b21ba2eb9896025c18e491690fa3ca84d2a6b631fc7c
SHA512184f9385f5af4ed92bc0ebf4c731dcddbe43019f52bbb21f1688a7b9364cf1c425506a3720609d4fab36550619868f48d6d8beaa0aa0433a521a0f4264fb0438
-
Filesize
184KB
MD5b8b75c1731e2173723fe496e0a19a5e2
SHA10a6fa799bda8e87887b19f057155dc9324755801
SHA256da151b7c995f4f63e0f986056f6dac80f941ba6a7d25a190b75e3b93aa01785a
SHA512aea0ede475d9eed5d8b74b6606159e405a67b03056f7db81a838e394b6e5c470ca5df9224c425c071a688bd718b0eb4dd91526f9d7cceca25b1b4bd432fb39ce