Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
0a1d0cf4afe79a7382caf9bb13b9b2f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a1d0cf4afe79a7382caf9bb13b9b2f2.exe
Resource
win10v2004-20231222-en
General
-
Target
0a1d0cf4afe79a7382caf9bb13b9b2f2.exe
-
Size
184KB
-
MD5
0a1d0cf4afe79a7382caf9bb13b9b2f2
-
SHA1
ff0f8ee24c6520624ac80c9caf28211422bb0902
-
SHA256
a478c9d5a0a7466df5286a35ef2ab0e5cf61a26180f8227f5c84d4a425a4abf7
-
SHA512
3d00ee9c431c3931bcffecc508930bfc7b8e560df91c3a71c72e45d6555c1d58457c5a799bb0e3c2b26351cc2547de0a2dc457ac218a693ef01b36c8e8d5f6d4
-
SSDEEP
3072:XW/aomjMV1AxOymDyLES681MoX1sM5mL/K7SxWlnnXNlPvpFE:XWCodSxOlyAS68fErCNNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1784 Unicorn-14181.exe 2756 Unicorn-15266.exe 2784 Unicorn-61130.exe 2664 Unicorn-56372.exe 2736 Unicorn-8603.exe 2580 Unicorn-44421.exe 524 Unicorn-46009.exe 1728 Unicorn-59501.exe 1488 Unicorn-16134.exe 940 Unicorn-61743.exe 2872 Unicorn-57830.exe 1860 Unicorn-21098.exe 1956 Unicorn-35597.exe 1744 Unicorn-20858.exe 748 Unicorn-54237.exe 916 Unicorn-23620.exe 1680 Unicorn-33603.exe 2192 Unicorn-53713.exe 2380 Unicorn-49800.exe 2464 Unicorn-45976.exe 1152 Unicorn-25726.exe 1008 Unicorn-46443.exe 368 Unicorn-13578.exe 944 Unicorn-28305.exe 1988 Unicorn-47403.exe 1972 Unicorn-17362.exe 1692 Unicorn-31979.exe 1640 Unicorn-45919.exe 1504 Unicorn-25669.exe 1436 Unicorn-15166.exe 1612 Unicorn-46557.exe 2644 Unicorn-30543.exe 1528 Unicorn-56630.exe 3032 Unicorn-56630.exe 2760 Unicorn-51072.exe 2848 Unicorn-59920.exe 2408 Unicorn-28592.exe 2744 Unicorn-6697.exe 2564 Unicorn-26755.exe 2684 Unicorn-9193.exe 2808 Unicorn-29059.exe 1784 Unicorn-31882.exe 764 Unicorn-51041.exe 1736 Unicorn-42567.exe 2504 Unicorn-62302.exe 2004 Unicorn-4845.exe 844 Unicorn-65016.exe 2484 Unicorn-37985.exe 2660 Unicorn-37217.exe 1532 Unicorn-6848.exe 2148 Unicorn-8711.exe 2152 Unicorn-31675.exe 1376 Unicorn-3361.exe 2920 Unicorn-50076.exe 1548 Unicorn-20357.exe 2900 Unicorn-50982.exe 888 Unicorn-47967.exe 3020 Unicorn-64495.exe 2052 Unicorn-18585.exe 1600 Unicorn-53696.exe 1724 Unicorn-29571.exe 2720 Unicorn-41801.exe 2872 Unicorn-15154.exe 1164 Unicorn-15154.exe -
Loads dropped DLL 64 IoCs
pid Process 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 1784 Unicorn-14181.exe 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 1784 Unicorn-14181.exe 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 2756 Unicorn-15266.exe 2756 Unicorn-15266.exe 1784 Unicorn-14181.exe 1784 Unicorn-14181.exe 2784 Unicorn-61130.exe 2784 Unicorn-61130.exe 2664 Unicorn-56372.exe 2664 Unicorn-56372.exe 2756 Unicorn-15266.exe 2756 Unicorn-15266.exe 2736 Unicorn-8603.exe 2736 Unicorn-8603.exe 2580 Unicorn-44421.exe 2580 Unicorn-44421.exe 2784 Unicorn-61130.exe 2784 Unicorn-61130.exe 1728 Unicorn-59501.exe 1728 Unicorn-59501.exe 1488 Unicorn-16134.exe 1488 Unicorn-16134.exe 2736 Unicorn-8603.exe 2736 Unicorn-8603.exe 2872 Unicorn-57830.exe 2872 Unicorn-57830.exe 940 Unicorn-61743.exe 940 Unicorn-61743.exe 2580 Unicorn-44421.exe 2580 Unicorn-44421.exe 1860 Unicorn-21098.exe 1860 Unicorn-21098.exe 1728 Unicorn-59501.exe 1728 Unicorn-59501.exe 1956 Unicorn-35597.exe 1956 Unicorn-35597.exe 1488 Unicorn-16134.exe 1488 Unicorn-16134.exe 1744 Unicorn-20858.exe 1744 Unicorn-20858.exe 748 Unicorn-54237.exe 748 Unicorn-54237.exe 2872 Unicorn-57830.exe 2872 Unicorn-57830.exe 1680 Unicorn-33603.exe 1680 Unicorn-33603.exe 916 Unicorn-23620.exe 916 Unicorn-23620.exe 940 Unicorn-61743.exe 940 Unicorn-61743.exe 2192 Unicorn-53713.exe 2192 Unicorn-53713.exe 1860 Unicorn-21098.exe 1860 Unicorn-21098.exe 2464 Unicorn-45976.exe 2464 Unicorn-45976.exe 1956 Unicorn-35597.exe 1956 Unicorn-35597.exe 2380 Unicorn-49800.exe 2380 Unicorn-49800.exe -
Program crash 11 IoCs
pid pid_target Process procid_target 2496 1616 WerFault.exe 144 1232 2420 WerFault.exe 132 2764 1488 WerFault.exe 155 2828 604 WerFault.exe 171 1208 3032 WerFault.exe 191 2260 2608 WerFault.exe 190 2900 1700 WerFault.exe 218 928 988 WerFault.exe 247 2544 2468 WerFault.exe 254 2216 1136 WerFault.exe 264 2808 2432 WerFault.exe 303 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 1784 Unicorn-14181.exe 2756 Unicorn-15266.exe 2784 Unicorn-61130.exe 2664 Unicorn-56372.exe 2736 Unicorn-8603.exe 2580 Unicorn-44421.exe 1728 Unicorn-59501.exe 1488 Unicorn-16134.exe 2872 Unicorn-57830.exe 940 Unicorn-61743.exe 1860 Unicorn-21098.exe 1956 Unicorn-35597.exe 1744 Unicorn-20858.exe 748 Unicorn-54237.exe 916 Unicorn-23620.exe 1680 Unicorn-33603.exe 2192 Unicorn-53713.exe 2380 Unicorn-49800.exe 2464 Unicorn-45976.exe 1152 Unicorn-25726.exe 368 Unicorn-13578.exe 944 Unicorn-28305.exe 1008 Unicorn-46443.exe 1972 Unicorn-17362.exe 1692 Unicorn-31979.exe 1988 Unicorn-47403.exe 1528 Unicorn-56630.exe 1640 Unicorn-45919.exe 2644 Unicorn-30543.exe 1436 Unicorn-15166.exe 3032 Unicorn-56630.exe 1612 Unicorn-46557.exe 2848 Unicorn-59920.exe 2760 Unicorn-51072.exe 1504 Unicorn-25669.exe 2744 Unicorn-6697.exe 2684 Unicorn-9193.exe 1784 Unicorn-31882.exe 2408 Unicorn-28592.exe 2564 Unicorn-26755.exe 764 Unicorn-51041.exe 1736 Unicorn-42567.exe 2808 Unicorn-29059.exe 2484 Unicorn-37985.exe 2004 Unicorn-4845.exe 2504 Unicorn-62302.exe 844 Unicorn-65016.exe 2660 Unicorn-37217.exe 1532 Unicorn-6848.exe 2148 Unicorn-8711.exe 2152 Unicorn-31675.exe 2920 Unicorn-50076.exe 1376 Unicorn-3361.exe 1548 Unicorn-20357.exe 888 Unicorn-47967.exe 3020 Unicorn-64495.exe 2900 Unicorn-50982.exe 1600 Unicorn-53696.exe 2052 Unicorn-18585.exe 1724 Unicorn-29571.exe 2872 Unicorn-15154.exe 2720 Unicorn-41801.exe 2432 Unicorn-19840.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 28 PID 2408 wrote to memory of 1784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 28 PID 2408 wrote to memory of 1784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 28 PID 2408 wrote to memory of 1784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 28 PID 1784 wrote to memory of 2756 1784 Unicorn-14181.exe 29 PID 1784 wrote to memory of 2756 1784 Unicorn-14181.exe 29 PID 1784 wrote to memory of 2756 1784 Unicorn-14181.exe 29 PID 1784 wrote to memory of 2756 1784 Unicorn-14181.exe 29 PID 2408 wrote to memory of 2784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 30 PID 2408 wrote to memory of 2784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 30 PID 2408 wrote to memory of 2784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 30 PID 2408 wrote to memory of 2784 2408 0a1d0cf4afe79a7382caf9bb13b9b2f2.exe 30 PID 2756 wrote to memory of 2664 2756 Unicorn-15266.exe 31 PID 2756 wrote to memory of 2664 2756 Unicorn-15266.exe 31 PID 2756 wrote to memory of 2664 2756 Unicorn-15266.exe 31 PID 2756 wrote to memory of 2664 2756 Unicorn-15266.exe 31 PID 1784 wrote to memory of 2736 1784 Unicorn-14181.exe 32 PID 1784 wrote to memory of 2736 1784 Unicorn-14181.exe 32 PID 1784 wrote to memory of 2736 1784 Unicorn-14181.exe 32 PID 1784 wrote to memory of 2736 1784 Unicorn-14181.exe 32 PID 2784 wrote to memory of 2580 2784 Unicorn-61130.exe 33 PID 2784 wrote to memory of 2580 2784 Unicorn-61130.exe 33 PID 2784 wrote to memory of 2580 2784 Unicorn-61130.exe 33 PID 2784 wrote to memory of 2580 2784 Unicorn-61130.exe 33 PID 2664 wrote to memory of 524 2664 Unicorn-56372.exe 34 PID 2664 wrote to memory of 524 2664 Unicorn-56372.exe 34 PID 2664 wrote to memory of 524 2664 Unicorn-56372.exe 34 PID 2664 wrote to memory of 524 2664 Unicorn-56372.exe 34 PID 2756 wrote to memory of 1728 2756 Unicorn-15266.exe 35 PID 2756 wrote to memory of 1728 2756 Unicorn-15266.exe 35 PID 2756 wrote to memory of 1728 2756 Unicorn-15266.exe 35 PID 2756 wrote to memory of 1728 2756 Unicorn-15266.exe 35 PID 2736 wrote to memory of 1488 2736 Unicorn-8603.exe 36 PID 2736 wrote to memory of 1488 2736 Unicorn-8603.exe 36 PID 2736 wrote to memory of 1488 2736 Unicorn-8603.exe 36 PID 2736 wrote to memory of 1488 2736 Unicorn-8603.exe 36 PID 2580 wrote to memory of 940 2580 Unicorn-44421.exe 37 PID 2580 wrote to memory of 940 2580 Unicorn-44421.exe 37 PID 2580 wrote to memory of 940 2580 Unicorn-44421.exe 37 PID 2580 wrote to memory of 940 2580 Unicorn-44421.exe 37 PID 2784 wrote to memory of 2872 2784 Unicorn-61130.exe 38 PID 2784 wrote to memory of 2872 2784 Unicorn-61130.exe 38 PID 2784 wrote to memory of 2872 2784 Unicorn-61130.exe 38 PID 2784 wrote to memory of 2872 2784 Unicorn-61130.exe 38 PID 1728 wrote to memory of 1860 1728 Unicorn-59501.exe 39 PID 1728 wrote to memory of 1860 1728 Unicorn-59501.exe 39 PID 1728 wrote to memory of 1860 1728 Unicorn-59501.exe 39 PID 1728 wrote to memory of 1860 1728 Unicorn-59501.exe 39 PID 1488 wrote to memory of 1956 1488 Unicorn-16134.exe 40 PID 1488 wrote to memory of 1956 1488 Unicorn-16134.exe 40 PID 1488 wrote to memory of 1956 1488 Unicorn-16134.exe 40 PID 1488 wrote to memory of 1956 1488 Unicorn-16134.exe 40 PID 2736 wrote to memory of 1744 2736 Unicorn-8603.exe 41 PID 2736 wrote to memory of 1744 2736 Unicorn-8603.exe 41 PID 2736 wrote to memory of 1744 2736 Unicorn-8603.exe 41 PID 2736 wrote to memory of 1744 2736 Unicorn-8603.exe 41 PID 2872 wrote to memory of 748 2872 Unicorn-57830.exe 42 PID 2872 wrote to memory of 748 2872 Unicorn-57830.exe 42 PID 2872 wrote to memory of 748 2872 Unicorn-57830.exe 42 PID 2872 wrote to memory of 748 2872 Unicorn-57830.exe 42 PID 940 wrote to memory of 916 940 Unicorn-61743.exe 43 PID 940 wrote to memory of 916 940 Unicorn-61743.exe 43 PID 940 wrote to memory of 916 940 Unicorn-61743.exe 43 PID 940 wrote to memory of 916 940 Unicorn-61743.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a1d0cf4afe79a7382caf9bb13b9b2f2.exe"C:\Users\Admin\AppData\Local\Temp\0a1d0cf4afe79a7382caf9bb13b9b2f2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14181.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15266.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56372.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46009.exe5⤵
- Executes dropped EXE
PID:524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14183.exe6⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19854.exe7⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24601.exe8⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63335.exe9⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41172.exe10⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35495.exe11⤵PID:3008
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59501.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21098.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53713.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45919.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42567.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15154.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42457.exe10⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58309.exe11⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49735.exe12⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39749.exe13⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18440.exe14⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1299.exe15⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15049.exe16⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33499.exe17⤵PID:3020
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62302.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23365.exe8⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6440.exe9⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6389.exe10⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24634.exe11⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50543.exe12⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60749.exe13⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6284.exe14⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30529.exe15⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1774.exe16⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37984.exe17⤵PID:1960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11260.exe15⤵PID:1724
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25669.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37217.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7033.exe8⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exe9⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exe10⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38870.exe11⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59634.exe12⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42482.exe13⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26126.exe14⤵PID:2096
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49800.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30543.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8711.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe8⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22725.exe9⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3612.exe10⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63652.exe11⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17395.exe12⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33643.exe13⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44471.exe14⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37080.exe15⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3487.exe16⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-665.exe17⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-653.exe18⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8287.exe19⤵PID:844
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45874.exe12⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20092.exe13⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19440.exe14⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-73.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-73.exe15⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21572.exe16⤵PID:2300
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39107.exe9⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37726.exe10⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59833.exe11⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28659.exe12⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9448.exe13⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48035.exe14⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11484.exe15⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28782.exe16⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15859.exe17⤵PID:1384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8603.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16134.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35597.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45976.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15166.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4845.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64495.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53785.exe10⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39253.exe11⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1826.exe12⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22157.exe13⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61498.exe14⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41905.exe15⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16971.exe16⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16658.exe17⤵PID:1176
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53696.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5461.exe9⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6881.exe10⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25118.exe11⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19367.exe12⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40050.exe13⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37080.exe14⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14442.exe15⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49198.exe16⤵PID:1780
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65016.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50239.exe8⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8864.exe9⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63827.exe10⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35975.exe10⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42321.exe11⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32403.exe12⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32046.exe13⤵PID:2472
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46557.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6848.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29571.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34159.exe9⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1282.exe10⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47048.exe11⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58245.exe12⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34167.exe13⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46018.exe14⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31239.exe15⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33479.exe16⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41573.exe17⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24893.exe18⤵PID:2768
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3768.exe10⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26281.exe11⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16880.exe12⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58720.exe13⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3723.exe14⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exe15⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3398.exe16⤵PID:2016
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41801.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36022.exe8⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42030.exe9⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49660.exe10⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28774.exe11⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37381.exe12⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6487.exe13⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52983.exe14⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9826.exe15⤵PID:1376
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25726.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56630.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54589.exe7⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47776.exe8⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exe9⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40181.exe10⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53762.exe11⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63475.exe12⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22045.exe13⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9900.exe14⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16383.exe15⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33532.exe16⤵PID:856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20858.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46443.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37070.exe7⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exe8⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9632.exe9⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43888.exe10⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57690.exe11⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15114.exe12⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60749.exe13⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15350.exe14⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63202.exe15⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60577.exe16⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37576.exe17⤵PID:932
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40166.exe9⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56538.exe10⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49743.exe11⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe12⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32031.exe13⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58293.exe14⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13361.exe15⤵PID:2712
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6697.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31675.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63587.exe7⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45524.exe8⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22809.exe9⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32932.exe10⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32147.exe11⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58720.exe12⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54801.exe13⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19211.exe14⤵PID:2580
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19840.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5461.exe7⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30136.exe8⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36227.exe9⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53954.exe10⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26478.exe11⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30779.exe12⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52440.exe13⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19071.exe14⤵PID:2132
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61130.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44421.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61743.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23620.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17362.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31882.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3361.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58154.exe9⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35498.exe10⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47956.exe11⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14695.exe12⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9961.exe13⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-178.exe14⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 22015⤵
- Program crash
PID:2544
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8714.exe8⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exe9⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36342.exe10⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58034.exe11⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16315.exe12⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22465.exe13⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55317.exe14⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17515.exe15⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33287.exe16⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3571.exe17⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22008.exe18⤵PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 36818⤵
- Program crash
PID:2808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 37617⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 38016⤵
- Program crash
PID:928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 36815⤵
- Program crash
PID:2900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 37614⤵
- Program crash
PID:2260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 604 -s 37613⤵
- Program crash
PID:2828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 37612⤵
- Program crash
PID:2764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 37611⤵
- Program crash
PID:1232
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50076.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63868.exe8⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60556.exe9⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36620.exe10⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61626.exe11⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exe12⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55375.exe13⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40960.exe14⤵PID:1188
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51041.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61323.exe7⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17619.exe8⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49660.exe9⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25793.exe10⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34707.exe11⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56565.exe12⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50679.exe13⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47602.exe14⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18130.exe15⤵PID:2640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45801.exe13⤵PID:2572
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-384.exe7⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12288.exe8⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exe9⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14241.exe10⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63202.exe11⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13445.exe12⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50693.exe13⤵PID:2116
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31979.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29059.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12902.exe7⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36598.exe8⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38594.exe9⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4105.exe10⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60556.exe11⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42153.exe12⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26169.exe13⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22045.exe14⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5491.exe15⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39232.exe16⤵PID:1576
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exe9⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22714.exe10⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56225.exe11⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-543.exe12⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14281.exe13⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32046.exe14⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31126.exe15⤵PID:896
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33603.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47403.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26755.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18585.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60974.exe8⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33508.exe9⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55841.exe10⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60749.exe11⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30779.exe12⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46034.exe13⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11364.exe14⤵PID:820
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9193.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20357.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58154.exe7⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48575.exe8⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37333.exe9⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32600.exe10⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34103.exe11⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41981.exe12⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25249.exe13⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exe14⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33447.exe15⤵PID:2628
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25325.exe6⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22067.exe7⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44956.exe8⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7529.exe9⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10377.exe10⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42180.exe11⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55375.exe12⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24655.exe13⤵PID:1632
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57830.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54237.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13578.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56630.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50982.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3977.exe8⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43405.exe9⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22465.exe10⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22157.exe11⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11978.exe12⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35667.exe13⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33518.exe14⤵PID:1508
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 36011⤵
- Program crash
PID:1208
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51072.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37985.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15154.exe7⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39145.exe8⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52084.exe9⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14241.exe10⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38656.exe11⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6295.exe12⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3227.exe13⤵PID:2692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6331.exe11⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24893.exe12⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65251.exe13⤵PID:2532
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28305.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59920.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47968.exe7⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64100.exe8⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1889⤵
- Program crash
PID:2496
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e48aa656fbab8818773ca4a0b66026cd
SHA17d4c9d43046e3dbf1d3f22fb2ca42d2c15053edf
SHA256bb2640197f33a1716f90edec7f62430502c9a9f6a69d9a67ba17a1668cee3cbc
SHA51224c406dd85cf04bf96e9fe082ea19d57f43e09962d8af27506f71425829440d5f54c1fe75419c7a039b33cc645b8057a2e2d58af90b6c036ff59a603ef5ffdc1
-
Filesize
184KB
MD5cc798b386bc20bd750ed0cde3d8f0314
SHA19a4407a2e40c73fa32dc35f5fdb2aaadad8ea282
SHA25629a8ff29f000d62900bb2107c9146fde2feb81515def47742692b62e001aba95
SHA51206dbd3d2de9e48d945bae5d227a0120f4eb59894192759b381edf1b406ff2130f696889518fbbd6ef7ac40a5d3e3672bff61c67f4cbb7995a487c07f85b74761
-
Filesize
184KB
MD5623d5256dfbf30386620709ac4cf26cc
SHA1fcc6c4c9edcd0771034ada6cec868745ba7c9d6e
SHA2560901b6929ee6c39aa3f8d942fc3b2e001f8702f4983d8576035b50f1029713bf
SHA512d428781f913c254ba1ee02e7dd249b0d07b8f63b6e10936f72ef70bb421e0fbe66291262228d7009f1d0701de5a06866b2bd9d6e1909e7024a285839ca5ca529
-
Filesize
184KB
MD5cb9954b8c645e06d7fbe2350b4ac8425
SHA1e8596fdef4c56d3f9eda215754db1833f4f64772
SHA25648f04321d9c7231a2766304f201c047348f7608a6a5ef5f4a20393580cd952d0
SHA512bcd4e9f3f7f748f541f388592cfe54ce991c6233ff43166dd2058c0f48d196664863902a791d024ee4d6e6f33ea45aa1e0b7873b6c3c55c308e4f770795fcdc7
-
Filesize
184KB
MD5f6f799a70dddb726b47964f8490c0c9f
SHA148eca5c0352bc258edb1fd6d46b82945faf42e47
SHA25682aed7fc6c06d158d5679f370768ba8bf18c1027e973136f585d0c9464a1b353
SHA51235bd0bc1853029e11fc6cd547e2c71f2e6bbf4f7f60ae86e4848bcba7dea424e959f09e27d532135da52ef0bace29fa27362184d0181926620af8df61532d4b3
-
Filesize
184KB
MD5c4764c39a981fd9163da05866a37a3f1
SHA1e20ede66804261854719652c04103ba93cdaa159
SHA25607c001b85cd5f1301edf2f2ad8f730f3eddfc3269722ac02b799dff317341c99
SHA512e22d9577082cbafe1fc8eb671ccc910b375d5e2e631f8fbcfe5c99012c4c2e617402c9cdc0d9ae4ca66dd92564e1d57a35c1fafd6e88cf13f9bb386ea5a28ed9
-
Filesize
184KB
MD500b14ba58a566aedd2fa3f5816f2d51b
SHA1e67bf4594a6121408a2f53d8e479ac2371c3a0b3
SHA25685ef1b6c8b7fa98049b97c57db635184fa0c5ff38f32094b9b099da79d268fbf
SHA51271f959d4b373b1d5e718f32f354da57f4bec9abe45798d6e9619ae5707f7bf90de733519c0a974785330ed8b8697d53b27febbe38730a966b89a7a28f66aa8a0
-
Filesize
184KB
MD538507df9aebd27416673047a1871c6da
SHA1439a0562a9814788aebdf4462c6d6c4c992f6927
SHA25640f33dd82da7b3c8717a6b357a697d84cf3b94d7ad857875f6a283a91634708f
SHA512f07c14184bb65d2d72a8f43d6e9536fcd3417a3b226a4045d030a3b38de50f9411de03a3a27b6842e47918500f84121278638833edf99538152b3bd9c43960ba
-
Filesize
184KB
MD51beaad32f09be908a740d81959be9a1b
SHA16f1a581fa73006804da1389cc70d0a37616733b2
SHA25677768575086995cae9c294d27a820cead4752e9573f78f6943192c47c59b899b
SHA512235825bee2f68bfcd422a2aab9cde0f1336fc74aa92421b7f61b8015992acbe57c84132d83846c492804c67441ea2436e5bf6bc1db6fb6aa2f9e3c6b8412b9b0
-
Filesize
184KB
MD5e46935a6eaacb0b2d176cb791d69f283
SHA1feae65bb464bd4f88f03e7dc78469259b28c8275
SHA2568fedbbcdeb9b12bed597371a13876a331c15360f7511504f6b0089f7a94cc53b
SHA5122f9d3874ad2dafda0de6a7a7e6311264342ac9108a6fd486a3e6ab93e48439a03184dd4df0aadce2a316232be6f1af71c8040aaa9e4792b55015f05804d37ea0
-
Filesize
184KB
MD5b91beeceb7bb972307566cc556764e77
SHA1435fd8100fd06bf87c5fc2b4fa953786c43130a3
SHA256bf001073edb09af7f7b3463edf4dfb60ca156efb7e2d369145b3fa89f0e0d929
SHA512daa2ee99a03cf361e9da413b4d2dd272d5b6ed51ba24789a112d33f72c8a2138155b81017a23bf59363fc83d0f493b37e927c113b163f39d5949d1a6b7601098
-
Filesize
184KB
MD57176a878568363c6c816e5cb1db3dcd6
SHA11db0ff80c833d7f643866139e2a65e447a2c289c
SHA256e911183c866a768a75db67797fe8a403908fdefb058f9a86a719376aec6eceef
SHA512320d0ec79d22019e11f5e3177e8f4fcaad7e22c21610a734e1113a77c502211351dd9c65970340469d88725b3227f4c1d20eeb4ca8d0f3a2aa54979197eda5eb
-
Filesize
184KB
MD56555fc5f7ca201df9abda21b328aef8f
SHA183f8d41c8d230d41a0de5a085c72b030b610e967
SHA256c6b09e6777a152f745fa1470b0c7deaf30cc795880371c6d9f1b872f2d1bb62a
SHA512f868b1dcd8daaaaa9db98ebd71ab9824c34fd60772b881a0b606a6fecad1b8f3b11007fcbf1b5158ed2ad401fad8d5806eaaa427b3512fc4932270c90cf98696
-
Filesize
184KB
MD5637fe62cbc03d062e3fd7ad811bbdeb8
SHA13278926552dcf5fb163a1e842bf19caa2988b8d0
SHA256adc344fe7aae32c1781e8043c6e34a440d39b60afa400127609fed04d5c8bfcb
SHA5122b4df266fdd8b28f93b9dd8dea7c92675a1643f2ed1d3cbe6dd4052a9670cc5b2307a8dd051076fb9f7c9d3aea5c5059c6d8475a49133e4c69d9ab25d996eb42
-
Filesize
184KB
MD5cb4c6e61d1463960a29fdeca40c2e785
SHA15eb00de862ff72794167ff1f02e394f239541cdf
SHA256e2361959641aea88e0c2cf21b9e1780a465199bb6320804cc74b5bc9c71a720d
SHA512029a7849430c81583498d50963604f976628da5ada30702f1fc83757b38089aee63ad3ce6dee368b92323bd05def9803e397f2d4a244bb51a561c89e1e44f810
-
Filesize
184KB
MD5a65dd0080a8c475745161f0841913845
SHA1df884f261a7ca1d697d1c044023539d6695d893a
SHA2562fd9db8a84ab448ace71ccab2459e99886a41ad5da39e8803f33e056229e832d
SHA512aa3980a06c9594c78e4a74de1e454592c63bdd373950c16c1d8c51c3cb478e49e4af3dd4371c3d9502f7333b5e44103caaabcf6ce8ee5ba6fb099f115548a7fb
-
Filesize
184KB
MD52fa9e26b8f64e62b1243c5506482a3d8
SHA1d04c3d08d189a5509183de64bfb342ae4efc4066
SHA256a68f8bd4379e8c34fb42030117dab089c2c6bce960429df0832e106368552487
SHA51262fb1cfdd2cb047c3ef7c9ec244e447ca514a8e4734902c67328fc0ddccb2652a0e20fc666d1eab1de256a496a5493f06486c89e729242dbc9097de9314b8867
-
Filesize
184KB
MD534881f6861e83588a7807f55ffa98c70
SHA1e4d3a7640cfa8d0f0e74f8161d7a533bb7d8d37b
SHA2568d3e75893da347d2d1e8cea911a2d31cf113162aad32c006376a167e163257af
SHA512202d6aef550315d7fe3032943ed8f5dbba033f6352003a034118109e5eeed184f2c3980976259c7753177ebc36b329e0efa50e7b0e61271d4d9e2ca5ac402649
-
Filesize
128KB
MD571357ea8ccfb70914f2557bd94a60319
SHA15afcdc1dc65df675eeb5c3548436a8fb2e4b91c4
SHA25620e16adf86539c6502e223d5a7f31554306bf05cefb61a13cfea7c6e5a6afc07
SHA5122900daf3507a52ebd545d030c73acfd969690c963acd4d2e2e9da2a9d90f4d7612a91461c272cd629032752d89ea3cff21894b05b977f0ad7cba0971f81a5f80
-
Filesize
64KB
MD55dde130360836ee8115f533a494d4398
SHA11f6dda8592e5e25a3220518a9f1d8363d6f930d0
SHA2568a94bb4820b5c56779895be4d3b49131a35cea9f01fa862e445cffca7b1bdf25
SHA512fc5f892ec7832d49bad2ad38e25460f2dee88674e2343428515c9431c53c81a41c09238789a9a1da9d68cebab8de5f9c0c03363d862fed536921efff7e77c5b5
-
Filesize
184KB
MD5ca2bfe9834608c8e1679e8436b0a3c12
SHA1c0294d66273777891f732c4fb0711ee921f27df8
SHA256b022e752aa27156ca4fded42fbe267b131840d3f5881a2827cd7b4f71675398d
SHA51262781e0003462b268d0c137513ff0cbc796b79a0c1487b2a77f6cce032ad88bc5a665bf2e0438cf2995b843d3fbb62e4da85c63d313450045ff89192d610c766
-
Filesize
184KB
MD5397d88a4018f8786f31292ff5b954b64
SHA15588e95529aa236e44a5d9b72fa80f93704ce2d4
SHA25635b63c5210ad3b8a3e9f007cf38288e27f72c29c76d5b96328ea93b96d54e598
SHA5122e97c173a4526aaa28e5ef4e9a0a00b7d3042a507eebe31a03bfd9138d1eec06d2b2e520849b399929e45c807aaecc7a5901fb7a3b2c26e8f763c1fb7064944e
-
Filesize
184KB
MD52ab7669ab29642e6cadbbc879050613f
SHA198d9d1b7e405cbf951b05fa606cc1c6abc2c673d
SHA256b56c24e6e27bf9a6e97314d142849e1b0c67ef1e8c3e4810805e10bcdc91fd45
SHA512d3d3efe3a6dbe8a1194122f5f9b4ca4ebff9c80310f66c1c9a16ac7bfb3dc19fe5fc9457aba9ca7dbf57a5640d44204b19d1399f1c55a5f283f2a7ea3078ecbd
-
Filesize
184KB
MD5643eb5a6f7820ff106574b1ef49dffcd
SHA11ee9cb0a8aedd58ddde5ffaf44b68ac76f89bb9c
SHA256a7539385609baf8f6be9b8028083e0053ca801825b1b1a544111b3b1f842cce1
SHA51274a77925dc3585d6dd0cff95bf31894ad0506232fd96d94bae60c8e61ab5c584a5cf728cc13f8f2b061b9db794e9d4db27e27e2fd825321176f326460fdcc608
-
Filesize
184KB
MD58e3f6373c7ce534bc716b5287aab9846
SHA1fa6d3d159db9775c887967916bab45ee33b00b04
SHA256e8aeaa33cec509ca40e0e58cd738900b8f377a755f0e61a51fc2a84e3cf63be2
SHA512118f8db5820b14369038054f5757f7d72d646dfafa0a4ca49bc3c320c77daab6fafa3e93467cc9862c29ce965a83856916d48764601b4eadb2ac2271577850fc
-
Filesize
184KB
MD56973c5ef7ae384648605ffe19976dae9
SHA178d22dcb8e9c970541485d40e02d5b501c19a283
SHA2568b05efd48e65f702694237a1430c9996a4b04aba7716be658c9caf3c2f137d20
SHA512f2001a6d3e5b95c23e04f202badfb6e6345d94b5a4fa37961f9ddd65312cf92690cee63d1548d152ae4015fe5982f4ed6a36537607520b489b239ee55e1c84a8
-
Filesize
184KB
MD56e1d31e523c6267b45680237f668b11e
SHA11c952bb7d98ebaf88ff5fdd231387cd16fd12a44
SHA2560d04886d233ff27d02e415d29b0aeb1df3fac44b5320257ce7b1a44948ba0f48
SHA512f6a67201d346af32bcb629dfd637190d8399d6ea14cd39dcf51bc53b3ed9b8413896b63dba31886569b434ff50ef4877db4f464e7c0deaddab1a57f79828e7b0