Analysis
-
max time kernel
12s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0a8838c58f5117e7dc098d014fbec104.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a8838c58f5117e7dc098d014fbec104.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
0a8838c58f5117e7dc098d014fbec104.exe
-
Size
184KB
-
MD5
0a8838c58f5117e7dc098d014fbec104
-
SHA1
4e54d9c9747696e19c306a22391208ae87d03ec6
-
SHA256
b4cc2a03d8460939d970e5636c8612cac4d83aa5a646af342017376e54337e15
-
SHA512
fc4a587cba165d81da6c543c5bd180958a5d07214da8a500924cb24741977fab50b362fcdeb320540b7a3d965b7aa597388f4ba34fadc153982daa7b4d4bf37c
-
SSDEEP
3072:EhEuonm9VvAmAgjZMF9Rl8SZKOlWbrSlPQSxcfPnHylY5pF6:EhRom4mAgMfRl8NO+3ylY5pF
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 2996 Unicorn-32021.exe 2732 Unicorn-30371.exe 2756 Unicorn-19742.exe 2720 Unicorn-37958.exe 2556 Unicorn-9924.exe 1692 Unicorn-21622.exe 2760 Unicorn-20117.exe -
Loads dropped DLL 16 IoCs
pid Process 2892 0a8838c58f5117e7dc098d014fbec104.exe 2892 0a8838c58f5117e7dc098d014fbec104.exe 2996 Unicorn-32021.exe 2996 Unicorn-32021.exe 2892 0a8838c58f5117e7dc098d014fbec104.exe 2892 0a8838c58f5117e7dc098d014fbec104.exe 2732 Unicorn-22537.exe 2732 Unicorn-22537.exe 2996 Unicorn-32021.exe 2996 Unicorn-32021.exe 2756 Unicorn-19742.exe 2756 Unicorn-19742.exe 2556 Unicorn-9924.exe 2556 Unicorn-9924.exe 2720 Unicorn-37958.exe 2720 Unicorn-37958.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 780 1564 WerFault.exe 94 1516 572 WerFault.exe 125 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2892 0a8838c58f5117e7dc098d014fbec104.exe 2996 Unicorn-32021.exe 2732 Unicorn-30371.exe 2756 Unicorn-19742.exe 2556 Unicorn-9924.exe 2720 Unicorn-37958.exe 1692 Unicorn-21622.exe 2760 Unicorn-20117.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2996 2892 0a8838c58f5117e7dc098d014fbec104.exe 28 PID 2892 wrote to memory of 2996 2892 0a8838c58f5117e7dc098d014fbec104.exe 28 PID 2892 wrote to memory of 2996 2892 0a8838c58f5117e7dc098d014fbec104.exe 28 PID 2892 wrote to memory of 2996 2892 0a8838c58f5117e7dc098d014fbec104.exe 28 PID 2996 wrote to memory of 2732 2996 Unicorn-32021.exe 30 PID 2996 wrote to memory of 2732 2996 Unicorn-32021.exe 30 PID 2996 wrote to memory of 2732 2996 Unicorn-32021.exe 30 PID 2996 wrote to memory of 2732 2996 Unicorn-32021.exe 30 PID 2892 wrote to memory of 2756 2892 0a8838c58f5117e7dc098d014fbec104.exe 29 PID 2892 wrote to memory of 2756 2892 0a8838c58f5117e7dc098d014fbec104.exe 29 PID 2892 wrote to memory of 2756 2892 0a8838c58f5117e7dc098d014fbec104.exe 29 PID 2892 wrote to memory of 2756 2892 0a8838c58f5117e7dc098d014fbec104.exe 29 PID 2732 wrote to memory of 2720 2732 Unicorn-22537.exe 33 PID 2732 wrote to memory of 2720 2732 Unicorn-22537.exe 33 PID 2732 wrote to memory of 2720 2732 Unicorn-22537.exe 33 PID 2732 wrote to memory of 2720 2732 Unicorn-22537.exe 33 PID 2996 wrote to memory of 2556 2996 Unicorn-32021.exe 32 PID 2996 wrote to memory of 2556 2996 Unicorn-32021.exe 32 PID 2996 wrote to memory of 2556 2996 Unicorn-32021.exe 32 PID 2996 wrote to memory of 2556 2996 Unicorn-32021.exe 32 PID 2756 wrote to memory of 1692 2756 Unicorn-19742.exe 31 PID 2756 wrote to memory of 1692 2756 Unicorn-19742.exe 31 PID 2756 wrote to memory of 1692 2756 Unicorn-19742.exe 31 PID 2756 wrote to memory of 1692 2756 Unicorn-19742.exe 31 PID 2556 wrote to memory of 2760 2556 Unicorn-9924.exe 38 PID 2556 wrote to memory of 2760 2556 Unicorn-9924.exe 38 PID 2556 wrote to memory of 2760 2556 Unicorn-9924.exe 38 PID 2556 wrote to memory of 2760 2556 Unicorn-9924.exe 38 PID 2720 wrote to memory of 2236 2720 Unicorn-37958.exe 37 PID 2720 wrote to memory of 2236 2720 Unicorn-37958.exe 37 PID 2720 wrote to memory of 2236 2720 Unicorn-37958.exe 37 PID 2720 wrote to memory of 2236 2720 Unicorn-37958.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a8838c58f5117e7dc098d014fbec104.exe"C:\Users\Admin\AppData\Local\Temp\0a8838c58f5117e7dc098d014fbec104.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32021.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30371.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37958.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47636.exe5⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2034.exe6⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1152.exe7⤵PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39532.exe6⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31765.exe7⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48183.exe8⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25852.exe9⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33486.exe10⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27163.exe11⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43276.exe12⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31798.exe13⤵PID:2096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56742.exe11⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13453.exe12⤵PID:1364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33913.exe10⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 24011⤵
- Program crash
PID:780
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7249.exe5⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12309.exe6⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9365.exe7⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32290.exe8⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28750.exe9⤵PID:572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 22010⤵
- Program crash
PID:1516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47853.exe8⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45311.exe9⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28368.exe10⤵PID:2376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exe7⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exe8⤵PID:1860
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32923.exe4⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51619.exe5⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exe6⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64779.exe7⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58950.exe8⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43115.exe9⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10219.exe10⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12830.exe11⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17320.exe12⤵PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14558.exe11⤵PID:2912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6690.exe9⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4325.exe10⤵PID:1488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55922.exe8⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11070.exe9⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61071.exe10⤵PID:2832
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-420.exe5⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45177.exe6⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30505.exe7⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46426.exe8⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4854.exe9⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52680.exe10⤵PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16286.exe9⤵PID:2588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10032.exe7⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45503.exe8⤵PID:1780
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9924.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20117.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51235.exe5⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9813.exe6⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19020.exe7⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65281.exe8⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1049.exe8⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exe9⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22534.exe10⤵PID:1420
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64691.exe6⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22537.exe7⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1197.exe8⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44267.exe9⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54869.exe10⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12830.exe11⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3287.exe12⤵PID:2304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24838.exe11⤵PID:1640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9347.exe9⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13022.exe10⤵PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8942.exe8⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13452.exe9⤵PID:2232
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21551.exe5⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48101.exe6⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25677.exe7⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51669.exe8⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17949.exe9⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8296.exe10⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31714.exe11⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52244.exe12⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exe13⤵PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20479.exe12⤵PID:852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9840.exe10⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43583.exe11⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exe12⤵PID:3020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38316.exe9⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14801.exe10⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45451.exe11⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29406.exe12⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2602.exe13⤵PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31361.exe12⤵PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1948.exe11⤵PID:1724
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15033.exe4⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42486.exe5⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33845.exe6⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63369.exe7⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23546.exe8⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18887.exe9⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exe10⤵PID:1920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3951.exe9⤵PID:588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3488.exe7⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exe8⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35908.exe9⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40345.exe10⤵PID:2456
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19742.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52789.exe4⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27115.exe5⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61126.exe6⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42013.exe7⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49137.exe8⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53011.exe9⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12062.exe10⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26256.exe11⤵PID:2424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32814.exe10⤵PID:1904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52305.exe8⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exe9⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21814.exe10⤵PID:1208
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56450.exe4⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39774.exe5⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42483.exe6⤵PID:580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16395.exe3⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2610.exe4⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52190.exe5⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14360.exe6⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29706.exe7⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51102.exe8⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4901.exe9⤵PID:1520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26560.exe6⤵PID:888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32324.exe4⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50181.exe5⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45177.exe6⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31576.exe7⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33678.exe8⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21346.exe9⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4278.exe10⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59504.exe11⤵PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63183.exe10⤵PID:1000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50489.exe8⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exe9⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe10⤵PID:2916
-
-
-
-
-
-
-
-
-