Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
1bb0772cf048290f0a63ea732ce6645a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bb0772cf048290f0a63ea732ce6645a.exe
Resource
win10v2004-20231215-en
General
-
Target
1bb0772cf048290f0a63ea732ce6645a.exe
-
Size
184KB
-
MD5
1bb0772cf048290f0a63ea732ce6645a
-
SHA1
9393f4612ea79157e810af45d8f155ec435fd95e
-
SHA256
0948f21978a9931b86cf232e2a49d2c816307970e46adc5462e0cc680eac9d63
-
SHA512
dfed6f94dafa4fe4e9f0f6d13e8d64b8643e2a470ecbe6ac65259dc54a6bae63555668f1a42dd49f132f57fa3bc416541d53eed8185d9ef903933559050a6679
-
SSDEEP
3072:M4HiocVfjhIlEjAd1AWvzFbObM6G/HI0QYxA2P4b7lPdpF1:M4Co41Iltd6WvzXoTV7lPdpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2560 Unicorn-50349.exe 2824 Unicorn-21678.exe 2820 Unicorn-35937.exe 2760 Unicorn-26131.exe 2756 Unicorn-22025.exe 2632 Unicorn-42275.exe 3004 Unicorn-5710.exe 2964 Unicorn-24507.exe 2948 Unicorn-41227.exe 1964 Unicorn-53266.exe 1588 Unicorn-57371.exe 684 Unicorn-13487.exe 2932 Unicorn-716.exe 1512 Unicorn-45127.exe 568 Unicorn-49533.exe 1708 Unicorn-7369.exe 2372 Unicorn-22829.exe 1408 Unicorn-6269.exe 2356 Unicorn-4852.exe 1136 Unicorn-8381.exe 1536 Unicorn-21489.exe 2256 Unicorn-7613.exe 1820 Unicorn-5345.exe 1072 Unicorn-7229.exe 608 Unicorn-27323.exe 1100 Unicorn-7457.exe 2284 Unicorn-60187.exe 2512 Unicorn-23217.exe 1752 Unicorn-56975.exe 2384 Unicorn-60374.exe 2540 Unicorn-46799.exe 2736 Unicorn-30271.exe 2708 Unicorn-59222.exe 2700 Unicorn-33260.exe 2232 Unicorn-64323.exe 2296 Unicorn-18652.exe 2720 Unicorn-3000.exe 2180 Unicorn-35974.exe 2288 Unicorn-35974.exe 2292 Unicorn-16108.exe 2628 Unicorn-5413.exe 3036 Unicorn-50701.exe 2140 Unicorn-37702.exe 3032 Unicorn-51386.exe 1664 Unicorn-5714.exe 2856 Unicorn-33229.exe 672 Unicorn-64292.exe 2956 Unicorn-1900.exe 628 Unicorn-1708.exe 1524 Unicorn-21936.exe 1232 Unicorn-25466.exe 2756 Unicorn-41418.exe 1384 Unicorn-41453.exe 1196 Unicorn-11350.exe 3068 Unicorn-46135.exe 396 Unicorn-62580.exe 1216 Unicorn-42714.exe 2460 Unicorn-41483.exe 1952 Unicorn-21617.exe 956 Unicorn-41483.exe 2544 Unicorn-10922.exe 344 Unicorn-59391.exe 3004 Unicorn-46584.exe 304 Unicorn-37093.exe -
Loads dropped DLL 64 IoCs
pid Process 2232 1bb0772cf048290f0a63ea732ce6645a.exe 2232 1bb0772cf048290f0a63ea732ce6645a.exe 2232 1bb0772cf048290f0a63ea732ce6645a.exe 2560 Unicorn-50349.exe 2560 Unicorn-50349.exe 2232 1bb0772cf048290f0a63ea732ce6645a.exe 2560 Unicorn-50349.exe 2824 Unicorn-21678.exe 2560 Unicorn-50349.exe 2824 Unicorn-21678.exe 2820 Unicorn-35937.exe 2820 Unicorn-35937.exe 2824 Unicorn-21678.exe 2760 Unicorn-26131.exe 2824 Unicorn-21678.exe 2760 Unicorn-26131.exe 2756 Unicorn-22025.exe 2756 Unicorn-22025.exe 2820 Unicorn-35937.exe 2632 Unicorn-42275.exe 2820 Unicorn-35937.exe 2632 Unicorn-42275.exe 3004 Unicorn-5710.exe 3004 Unicorn-5710.exe 2964 Unicorn-24507.exe 2964 Unicorn-24507.exe 2760 Unicorn-26131.exe 2760 Unicorn-26131.exe 2948 Unicorn-41227.exe 2948 Unicorn-41227.exe 1964 Unicorn-53266.exe 1964 Unicorn-53266.exe 1588 Unicorn-57371.exe 1588 Unicorn-57371.exe 2932 Unicorn-716.exe 2932 Unicorn-716.exe 2964 Unicorn-24507.exe 2964 Unicorn-24507.exe 684 Unicorn-13487.exe 684 Unicorn-13487.exe 3004 Unicorn-5710.exe 3004 Unicorn-5710.exe 568 Unicorn-49533.exe 568 Unicorn-49533.exe 2948 Unicorn-41227.exe 2948 Unicorn-41227.exe 2372 Unicorn-22829.exe 2372 Unicorn-22829.exe 1588 Unicorn-57371.exe 1588 Unicorn-57371.exe 1512 Unicorn-45127.exe 1512 Unicorn-45127.exe 1708 Unicorn-7369.exe 1708 Unicorn-7369.exe 1964 Unicorn-53266.exe 1964 Unicorn-53266.exe 1408 Unicorn-6269.exe 1408 Unicorn-6269.exe 2932 Unicorn-716.exe 2932 Unicorn-716.exe 2356 Unicorn-4852.exe 2356 Unicorn-4852.exe 1136 Unicorn-8381.exe 1136 Unicorn-8381.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 1412 1628 WerFault.exe 104 1376 1984 WerFault.exe 103 2144 1108 WerFault.exe 113 3052 1576 WerFault.exe 209 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2232 1bb0772cf048290f0a63ea732ce6645a.exe 2560 Unicorn-50349.exe 2820 Unicorn-35937.exe 2824 Unicorn-21678.exe 2760 Unicorn-26131.exe 2756 Unicorn-22025.exe 2632 Unicorn-42275.exe 3004 Unicorn-5710.exe 2964 Unicorn-24507.exe 2948 Unicorn-41227.exe 1964 Unicorn-53266.exe 1588 Unicorn-57371.exe 684 Unicorn-13487.exe 2932 Unicorn-716.exe 1512 Unicorn-45127.exe 568 Unicorn-49533.exe 2372 Unicorn-22829.exe 1708 Unicorn-7369.exe 1408 Unicorn-6269.exe 2356 Unicorn-4852.exe 1136 Unicorn-8381.exe 1536 Unicorn-21489.exe 2256 Unicorn-7613.exe 1820 Unicorn-5345.exe 1072 Unicorn-7229.exe 608 Unicorn-27323.exe 1100 Unicorn-7457.exe 2284 Unicorn-60187.exe 2512 Unicorn-23217.exe 1752 Unicorn-56975.exe 2384 Unicorn-60374.exe 2736 Unicorn-30271.exe 2540 Unicorn-46799.exe 2708 Unicorn-59222.exe 2700 Unicorn-33260.exe 2232 Unicorn-64323.exe 2296 Unicorn-18652.exe 2288 Unicorn-35974.exe 2292 Unicorn-16108.exe 2720 Unicorn-3000.exe 2180 Unicorn-35974.exe 2628 Unicorn-5413.exe 2140 Unicorn-37702.exe 1664 Unicorn-5714.exe 3036 Unicorn-50701.exe 3032 Unicorn-51386.exe 2856 Unicorn-33229.exe 672 Unicorn-64292.exe 2956 Unicorn-1900.exe 628 Unicorn-1708.exe 1232 Unicorn-25466.exe 1524 Unicorn-21936.exe 2756 Unicorn-41418.exe 1384 Unicorn-41453.exe 1196 Unicorn-11350.exe 3068 Unicorn-46135.exe 396 Unicorn-62580.exe 1216 Unicorn-42714.exe 1952 Unicorn-21617.exe 956 Unicorn-41483.exe 2544 Unicorn-10922.exe 3004 Unicorn-46584.exe 344 Unicorn-59391.exe 304 Unicorn-37093.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2560 2232 1bb0772cf048290f0a63ea732ce6645a.exe 28 PID 2232 wrote to memory of 2560 2232 1bb0772cf048290f0a63ea732ce6645a.exe 28 PID 2232 wrote to memory of 2560 2232 1bb0772cf048290f0a63ea732ce6645a.exe 28 PID 2232 wrote to memory of 2560 2232 1bb0772cf048290f0a63ea732ce6645a.exe 28 PID 2560 wrote to memory of 2824 2560 Unicorn-50349.exe 29 PID 2560 wrote to memory of 2824 2560 Unicorn-50349.exe 29 PID 2560 wrote to memory of 2824 2560 Unicorn-50349.exe 29 PID 2560 wrote to memory of 2824 2560 Unicorn-50349.exe 29 PID 2232 wrote to memory of 2820 2232 1bb0772cf048290f0a63ea732ce6645a.exe 30 PID 2232 wrote to memory of 2820 2232 1bb0772cf048290f0a63ea732ce6645a.exe 30 PID 2232 wrote to memory of 2820 2232 1bb0772cf048290f0a63ea732ce6645a.exe 30 PID 2232 wrote to memory of 2820 2232 1bb0772cf048290f0a63ea732ce6645a.exe 30 PID 2560 wrote to memory of 2756 2560 Unicorn-50349.exe 33 PID 2560 wrote to memory of 2756 2560 Unicorn-50349.exe 33 PID 2560 wrote to memory of 2756 2560 Unicorn-50349.exe 33 PID 2560 wrote to memory of 2756 2560 Unicorn-50349.exe 33 PID 2824 wrote to memory of 2760 2824 Unicorn-21678.exe 31 PID 2824 wrote to memory of 2760 2824 Unicorn-21678.exe 31 PID 2824 wrote to memory of 2760 2824 Unicorn-21678.exe 31 PID 2824 wrote to memory of 2760 2824 Unicorn-21678.exe 31 PID 2820 wrote to memory of 2632 2820 Unicorn-35937.exe 32 PID 2820 wrote to memory of 2632 2820 Unicorn-35937.exe 32 PID 2820 wrote to memory of 2632 2820 Unicorn-35937.exe 32 PID 2820 wrote to memory of 2632 2820 Unicorn-35937.exe 32 PID 2824 wrote to memory of 3004 2824 Unicorn-21678.exe 36 PID 2824 wrote to memory of 3004 2824 Unicorn-21678.exe 36 PID 2824 wrote to memory of 3004 2824 Unicorn-21678.exe 36 PID 2824 wrote to memory of 3004 2824 Unicorn-21678.exe 36 PID 2760 wrote to memory of 2964 2760 Unicorn-26131.exe 35 PID 2760 wrote to memory of 2964 2760 Unicorn-26131.exe 35 PID 2760 wrote to memory of 2964 2760 Unicorn-26131.exe 35 PID 2760 wrote to memory of 2964 2760 Unicorn-26131.exe 35 PID 2756 wrote to memory of 2948 2756 Unicorn-22025.exe 34 PID 2756 wrote to memory of 2948 2756 Unicorn-22025.exe 34 PID 2756 wrote to memory of 2948 2756 Unicorn-22025.exe 34 PID 2756 wrote to memory of 2948 2756 Unicorn-22025.exe 34 PID 2820 wrote to memory of 1964 2820 Unicorn-35937.exe 38 PID 2820 wrote to memory of 1964 2820 Unicorn-35937.exe 38 PID 2820 wrote to memory of 1964 2820 Unicorn-35937.exe 38 PID 2820 wrote to memory of 1964 2820 Unicorn-35937.exe 38 PID 2632 wrote to memory of 1588 2632 Unicorn-42275.exe 37 PID 2632 wrote to memory of 1588 2632 Unicorn-42275.exe 37 PID 2632 wrote to memory of 1588 2632 Unicorn-42275.exe 37 PID 2632 wrote to memory of 1588 2632 Unicorn-42275.exe 37 PID 3004 wrote to memory of 684 3004 Unicorn-5710.exe 39 PID 3004 wrote to memory of 684 3004 Unicorn-5710.exe 39 PID 3004 wrote to memory of 684 3004 Unicorn-5710.exe 39 PID 3004 wrote to memory of 684 3004 Unicorn-5710.exe 39 PID 2964 wrote to memory of 2932 2964 Unicorn-24507.exe 40 PID 2964 wrote to memory of 2932 2964 Unicorn-24507.exe 40 PID 2964 wrote to memory of 2932 2964 Unicorn-24507.exe 40 PID 2964 wrote to memory of 2932 2964 Unicorn-24507.exe 40 PID 2760 wrote to memory of 1512 2760 Unicorn-26131.exe 41 PID 2760 wrote to memory of 1512 2760 Unicorn-26131.exe 41 PID 2760 wrote to memory of 1512 2760 Unicorn-26131.exe 41 PID 2760 wrote to memory of 1512 2760 Unicorn-26131.exe 41 PID 2948 wrote to memory of 568 2948 Unicorn-41227.exe 42 PID 2948 wrote to memory of 568 2948 Unicorn-41227.exe 42 PID 2948 wrote to memory of 568 2948 Unicorn-41227.exe 42 PID 2948 wrote to memory of 568 2948 Unicorn-41227.exe 42 PID 1964 wrote to memory of 1708 1964 Unicorn-53266.exe 43 PID 1964 wrote to memory of 1708 1964 Unicorn-53266.exe 43 PID 1964 wrote to memory of 1708 1964 Unicorn-53266.exe 43 PID 1964 wrote to memory of 1708 1964 Unicorn-53266.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bb0772cf048290f0a63ea732ce6645a.exe"C:\Users\Admin\AppData\Local\Temp\1bb0772cf048290f0a63ea732ce6645a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50349.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21678.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26131.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24507.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-716.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6269.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56975.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33229.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28775.exe10⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45706.exe11⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34560.exe12⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57796.exe13⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33173.exe14⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58438.exe15⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43151.exe16⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36490.exe17⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4329.exe18⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36562.exe19⤵PID:1620
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64292.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37093.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34945.exe10⤵PID:1592
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60374.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1900.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23606.exe9⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 20010⤵
- Program crash
PID:1376
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4852.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46799.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1708.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54550.exe9⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64820.exe10⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe11⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64736.exe12⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8450.exe13⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56985.exe14⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46586.exe15⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exe16⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7143.exe17⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61825.exe18⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe19⤵PID:1980
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56425.exe15⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47958.exe16⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56049.exe17⤵PID:2400
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 37611⤵
- Program crash
PID:2144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44763.exe9⤵PID:1748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21936.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39174.exe8⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21941.exe9⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35608.exe10⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36854.exe11⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36203.exe12⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17029.exe13⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18397.exe14⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51423.exe15⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62981.exe16⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exe17⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51580.exe18⤵PID:1044
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38572.exe13⤵PID:2508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50354.exe11⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13638.exe12⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe13⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13614.exe14⤵PID:940
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45127.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27323.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37702.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13522.exe8⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9117.exe9⤵PID:3056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59391.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59823.exe8⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19355.exe9⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9064.exe10⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41543.exe11⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42186.exe12⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 24013⤵
- Program crash
PID:3052
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51386.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55126.exe7⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58126.exe8⤵PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54789.exe7⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe8⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55494.exe9⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42804.exe10⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46458.exe11⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10011.exe12⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10096.exe13⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe14⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17045.exe15⤵PID:2728
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5710.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13487.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8381.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30271.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41418.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34872.exe9⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62900.exe10⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13033.exe11⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7528.exe12⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3613.exe13⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22670.exe14⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56622.exe15⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49394.exe16⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24681.exe17⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe18⤵PID:592
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1319.exe12⤵PID:2416
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43034.exe9⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8401.exe10⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35608.exe11⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exe12⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18315.exe13⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36059.exe14⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27184.exe15⤵PID:1820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21425.exe12⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7768.exe13⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38753.exe14⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe15⤵PID:1164
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62038.exe8⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8541.exe9⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe10⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exe11⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47749.exe12⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13819.exe13⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42492.exe14⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13422.exe15⤵PID:2416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43836.exe11⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33.exe12⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33685.exe13⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe14⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10205.exe15⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14461.exe16⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7936.exe17⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51196.exe18⤵PID:1140
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41453.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59222.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25466.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41598.exe8⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe9⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7035.exe10⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43764.exe11⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58438.exe12⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37728.exe13⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe14⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36059.exe15⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11254.exe16⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe17⤵PID:1748
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22938.exe10⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54574.exe11⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33576.exe12⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2964.exe13⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59105.exe14⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61825.exe15⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2041.exe16⤵PID:1720
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21489.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18652.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11350.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16336.exe8⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe9⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55110.exe10⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19867.exe11⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6032.exe12⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23010.exe13⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8788.exe14⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14461.exe15⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe16⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19484.exe17⤵PID:2820
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15377.exe10⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49701.exe11⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39684.exe12⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe13⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18736.exe14⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exe15⤵PID:808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41227.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7613.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33260.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46135.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46979.exe9⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe10⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7144.exe11⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4682.exe12⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54064.exe13⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5624.exe14⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27118.exe15⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38369.exe16⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7936.exe17⤵PID:1880
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50354.exe11⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45669.exe12⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61175.exe13⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30187.exe14⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46287.exe15⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exe16⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43609.exe17⤵PID:2568
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41610.exe12⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5221.exe13⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe14⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9112.exe15⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45271.exe16⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7936.exe17⤵PID:2012
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42714.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50897.exe8⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe9⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50.exe10⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20033.exe11⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29738.exe12⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26348.exe13⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40083.exe14⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26625.exe15⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19898.exe16⤵PID:2724
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64323.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62580.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15079.exe8⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe9⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55961.exe10⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1740.exe11⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63541.exe12⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41713.exe13⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe14⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62981.exe15⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe16⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-900.exe17⤵PID:1008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5345.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35974.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22821.exe7⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe8⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50045.exe9⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28066.exe10⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47589.exe11⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40073.exe12⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe13⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63391.exe14⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exe15⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28534.exe16⤵PID:1216
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59212.exe9⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43546.exe10⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56878.exe11⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30359.exe12⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe13⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14491.exe14⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56049.exe15⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2041.exe16⤵PID:1808
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21617.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14415.exe7⤵PID:880
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35937.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42275.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57371.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22829.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7229.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5413.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exe8⤵
- Executes dropped EXE
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62038.exe8⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46092.exe9⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35608.exe10⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31680.exe11⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62440.exe12⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3946.exe13⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58796.exe14⤵PID:2376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48735.exe11⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44756.exe12⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32554.exe13⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe14⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7719.exe15⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45214.exe16⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe17⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52213.exe18⤵PID:2484
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44871.exe10⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50235.exe11⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24588.exe12⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55683.exe13⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44841.exe14⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15124.exe15⤵PID:616
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50701.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46584.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62900.exe8⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28602.exe9⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32531.exe10⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe11⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37771.exe12⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64458.exe13⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5624.exe14⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36059.exe15⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43520.exe16⤵PID:2808
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7457.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35974.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62900.exe8⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45514.exe9⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exe10⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30645.exe11⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12576.exe12⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30359.exe13⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33826.exe14⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17357.exe15⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exe16⤵PID:2124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30296.exe13⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63391.exe14⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe15⤵PID:1764
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48735.exe10⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3645.exe11⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58438.exe12⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61241.exe13⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31965.exe14⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe15⤵PID:1992
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5708.exe11⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe12⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63391.exe13⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27975.exe14⤵PID:1196
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53266.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7369.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60187.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3000.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10922.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58705.exe8⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23372.exe9⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31528.exe10⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30359.exe11⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28505.exe12⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10096.exe13⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-665.exe14⤵PID:1156
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16108.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22821.exe6⤵PID:2396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23217.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5714.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23606.exe6⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 2007⤵
- Program crash
PID:1412
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bb99b41c7d8c8f274572bc8c64097197
SHA113b3b9729802516ae2bcdd0693ba7e280ba51967
SHA256495e97945fa05297e201804ba9a80a54f9c8722f751525bf567950de45202c46
SHA51286973ba001b01eadc3b42388b331da67ad5a80dbb6ac91843187ff92c3d55fd355bb0b4fc3a783b4f27f36de4afbbf593a938020baeaaa23d96b82cc062978f0
-
Filesize
184KB
MD50bf31ef78d10da5011161bfd6b5e2874
SHA146022193be51380d5be54be6b22ffb862431b260
SHA2564bc51b292e9d30c415728d83abe0105cb94fba014936f9b7b358862bfdc70caa
SHA512dc7872b1d4ef1e2fd3a63cb418ef589cc43d8e3062eaa169f9d0bbe9e793e4d81975f9993c6d92f16fc92e770480dee0567fe1aed62a40875cc14f5f29e61c01
-
Filesize
8KB
MD576df8ad9bd52c640bffa479bc2d890b0
SHA1c4ebe655c25bc1c713b228e2daa61b50b8cfd2f6
SHA256de82dc77ee077e47287f6763f453a5da1562efba94082aa38899a92b2ac2bfec
SHA512879cf840502d980029ec3ef18ddddfa559adf859d4602e747429ff7f9baae77e09cff19678c47bb673ae9788d6058f0351f7b89d5507a6d7d2ecb2bc97503193
-
Filesize
184KB
MD5a4c7fed3e6340c278fe1eef1379a4a40
SHA121ae505b9985c9db1ac340d98db7e7781d6a1bc8
SHA2560314cadf582f3b1a40b020c15545bbbf2a0af4496282bafb662b87f772b8a8bd
SHA51214272a1509dfbb09fe112d9b5dc73e54e13efa54ed376052188a1cb5925db5cda28393eb8303e83e14d69ab391ac8fe8fa6ec03661eeaf281ffb8f35cb70ac57
-
Filesize
64KB
MD5c6d74ab9b8884503c8a16b5e71edef4d
SHA1e67f01bcc1075429976b90c52660cac599022022
SHA2564402a81ff20f46ba8a8d9fae40e882a6f5de6ec6c7b5274e9bbdad683fbf8629
SHA5128853201a759b43a6ee0fb3253e9768ec73593bfe6723c56f20e42bff7f4962ab4c251750cc8fda256e7b0b48d7483c9b18fc16ac5d889290d7b10b5f2ec80716
-
Filesize
184KB
MD5d261fb4c5538fc92a8797ac2b0b10121
SHA17de56316b60602e1c0ee438badfc284fcca4e1ed
SHA25677268ae885abb0f232e51e0a193ad98238ec55cfedbf51fd89a9af8a2bf4d526
SHA512bf7aaf474940d7aba742fe3e62d0de19db96079060d200f60d504e2cf2953b0f9aabf355f4223aea6d19ab2430293ee22f3bd705cdfd4ce110cc5b6823f3195b
-
Filesize
184KB
MD5bf98aac072fe797c57b3747d871a93cb
SHA1046b07f3bd17dab3d5077952d35f086d31496759
SHA256c98785c1458e717845ad27a9fd7fc03b41e6a5c4cbdfe070b53a2c5a8a713c1d
SHA5125b2c1f4c5b09aab47057ecff4099a341f800cd7acaa1b95957a99640aa37ca3cd10c238e47d4d9d01bfc1d2976de946ffebf4f821db8176e6bd3f12bccf55637
-
Filesize
184KB
MD57cda72f773fd7a88be35e9323dffbd0d
SHA1d270dcc97dd4349c0c89ed32a550c9d23a2761d9
SHA2565f21ed010efa9c8c9fbeff47e298b998646b4ce32e8d4fdf0eac443c553bb513
SHA5120b6a76d4d3eb9a03cffc828f9c0fe7fdb58b6cec8229ec6061ae66da085ff46906263c43b3b6b18e4673bf19541c1c477e472e68f60a42ec09769a51b68222c8
-
Filesize
184KB
MD5895304ddcca85f3a5af4423d93fb5964
SHA12fe17e53fc553da65df4654cccc0cbae30c1efe3
SHA256fe1faa638630732b2a35748805b52df43f92bff950992bf029dcddb6bc16142a
SHA512de675b2b57d2c21a67d2f0bc063e046493d7666ea543ac9445402bb1c9bd222a5f8b8202b1cf4bae9a4222cf57f7b9782f8d922ea535a56eeb9d90b52157aeb2
-
Filesize
184KB
MD56152543b4da4b47f9e2e8f79fa5b6616
SHA1966c9816fb60de2b12cf7afa5257cee76c6ed902
SHA2566ad1d62a03d96acc337e728782dcfe4d6940ed28a058c5bb703ccc74503e5ed7
SHA51207b3b5d954710dad52ce9adfd68eb9920e3ec4d92a10d8891777aa4d294202d931f9a39406565fc9c124e3d434a1f0dd12ec0fdfe55573c64c93a7795803a99a
-
Filesize
184KB
MD5590c1899b2f2c558bf9b46d36a5cec89
SHA1ef1676e81faf0f941a971e7b7572983481b19d9c
SHA256a19197e614881981ac48d58cf315877aa9467e49312bca88ced1e00f5af4ae95
SHA51221f2816a3e570576f154b64850e9096ed56f8c6635de9a443a270b0a9a0a32304041455188bf75ac862344a1cde7f638f191b607805427d1918e1521b4549da5
-
Filesize
128KB
MD5d338620ee7c5bc3a5bf45a56b4790c0f
SHA14e2dc7e795d79f24fc1586bdacb0eeb8cd321c6c
SHA2560ced6c8a3ff87a80f3d18eefc0471cf8fae1f33bcdad9496055dfdb5c91a046b
SHA512bc443ae68945fd19bf86a79cef0578ada9d4ee6220b8fecda8cf285539a1e1b722d3ecd2fb279cb024a572bac2f332692350fa7911af0f279e6e905c3a85ab68
-
Filesize
184KB
MD5c704b1b3f83f3b7c8dfb78e34cf0f8e2
SHA11d003528b0392c984a552b2db5e14df1003212ea
SHA256f2a95541e96487cd2759d937a5bc1b954355741683bdd25fbc3995d0149a55a2
SHA512e162040aff1b77094dd08b317802a67aee49775d75f1f7240725289e5fe2ba32bb90bd1b51cf3849e84361026753b89675fa47a7b63e608ba4b577d682a0f471
-
Filesize
184KB
MD53b7cb503e7531804fe7e22425e423dbd
SHA1fc2e21bffb5f15e0c647a85825f1de5d77ca3d4f
SHA2565664eaceb95cf54a1a21aec702eeb4e57b83f19be2ee0faaff1fc6504c86b7fd
SHA5129ba355830f3fdb281ab87c6e9d6e271e4039d9d852748847841ad78972920083b6a6886d643c9849e16ae78dc6ace27c2d73c78b3a41c11f69613d2aee4e51cc
-
Filesize
184KB
MD5f2e2ae468b9a3726dce16e4032c14b42
SHA1905e006c731262bcb143b46236fc4b9ae1413c76
SHA2566324933b88c4eefd59d087f0361b3de6554d0a28772e3ad6a55c42b8fbfbcbad
SHA512a5323f1dd1fe3f0214d517a7fca754a7842cfeed4092292303074ad80b46e0b9b306e41ca5be337160cb505e27969d1d844bcea807b0a8367e1b318851be78e7
-
Filesize
128KB
MD5ff5fa243159922e308cf97d0230703fe
SHA167698a3bede2739a1c3c4a3eb0e888b378d4e38e
SHA2560fd79fcbbe0f2956c6e3105b13af071be7af6a5af2f201412aa0f51525c18e1b
SHA512f9370af9a653d27fbd1f5490c2c5213fa3a0892ca47185faedff235fe7a6a448e84f11bd0668bb5752e1b6d6f65a14ac799f64ed6514e9e721d2d254d1b44e7b
-
Filesize
184KB
MD5383ec81c7590a1b98fdbbbb19b963df7
SHA199a7539b99cf0cd67ae6dcd1383b36e77fa5a02b
SHA256e544c5deb0d63a36029cc75269d9caf30bdec41f76b7b05890f924dad16b7402
SHA512321ba43f7977d36e9e79a2f36f6b3d56a9d03835295bdffef71509d3561ad86e4bcb68455bb9c1ed6d83b3236701cf65fa1bf4c5e5063d59caddbda8b20c8288
-
Filesize
184KB
MD501dde977e333d0df2093d72c9dd53de7
SHA184188dbfc770eac081189f686e7c37f2e250a2b3
SHA2562747a4ec5f6d977e06bbc155d510d4ebe6e4bb08d88bf68412987848f70d8a7e
SHA512b906c3bd8160992c188c885852ca436b5aff77a4d8143eedf478f243900acaddb81fdd78ecf445e2f126917692003c7f5a71a3f96c698f2c6ebdb3e4a6a5f213
-
Filesize
184KB
MD5a69bd59f485fb581315cda8e44770324
SHA192c72373ed257d11725a06ea2b18ca7c854a5221
SHA25651ba20502e5750f368361ce35e83cf7dcf33a85bafa38c293fe10ef7ff6bf0a3
SHA5124b1ea5d66767a1945c246003673dcb27bb5772395f55db7528950b09b3a87657cd536f9eef1b4f9b5ff0c36db81a281fc58febbd488bc7a0e3ad7b2dc5283dc6
-
Filesize
184KB
MD531615f7f43952a3033332fdd938c822e
SHA1bbc733e91ee54beb6cef0cef324097c84b920937
SHA2564a2b421cd6b6bb2a3e6f73659644d00b9ae4008d5bda1ba8fbfe06c69a08258c
SHA512144472f4f59c614b888b2579ae7e07a5dba6386b04ced252efd0c979f8e2a21098ce4ead3c2d0f4e27797b2e979da9d4147ccec85f7593d3e8cc70f7801c2f02
-
Filesize
184KB
MD568b95eef2f12aa4344c7b9a632a01402
SHA1a6b225e0ad8b4afdbbd15b223b5105534e11cd12
SHA256215a119f6a28fd7fe339a8f4848ee603ab33d4e9d5e3ad4d04e77e1ce29d1847
SHA5125242449cb76f0e6d2d99f06001dd5aa59d0a2b96407a7cc172576ca9ab116c0d0b4ddc0f6a7dba0125435d6aefd3be733a99b7beb1284c56dba235d56c4441cb
-
Filesize
184KB
MD5fd31740485b8f570014b11341c203473
SHA12a72e115e408c3e14fcd6096bf986af3be779ee7
SHA256779b531b806a6192a6dd29290a4018c23ac73780a952a7c831a1daaf8895e924
SHA512b3a231ac1668481b6cca2ce0da847f4d9d91d519a5fa653c832dc066308f63bbfd8b420aa26f312dcc30e0ce90c2a60a71370a8aa74af33791ef80afa8c72a0e
-
Filesize
184KB
MD50ab509627d782108bd0c2cd0dada55dd
SHA1ba62c8c43025fbb2f67c6ae0b51f04081d19c596
SHA256ec3183478ea7050b0e1ce9ee0ef3374dfe816e90cc0465623159efaca39b8b61
SHA512803288343f32885c52d1721bc026d6de4b2f8bc6c04e9ac7afdda4cc1dbe94b7834bcb30d0077dfa227fa30c507415a9e89ac747e45da850fd6cde789008f390
-
Filesize
184KB
MD531d71d186af22e8042a01e28996440ba
SHA1ab0b1911c507b8cdadde45cf9ee4fd3a4bbe3303
SHA25613e444156b6a397e16286a5026d397bc451ed76b6683c5987c76308d73213182
SHA51201c2846e30633ff7466fc2b935aa50b879b0500571647cbc34192617eb0b9517cc63f56a0b41675d691cc5097be82fe95ec088b810eb38ee3f1c4d883c845d5c
-
Filesize
184KB
MD5112a0ae574ea599e820d7c98dcf9b015
SHA1fbb15846b901f3cdadf4fc889f4b847e1e57ef20
SHA25645968830001f322fe399ae6e9c27d97a2cc8b1bddbad0636b06009cfe552f813
SHA5126fb352bcd2ca18fb714135f5d821195c5fbd718b15588039c50823dbe4e996cfc32136264b7587b96a020982502215b88ac0466991244f6c822d6567c0ef51bd
-
Filesize
184KB
MD52e4ba587661091695d13e6968bce6812
SHA18185b1b8e3a3b7f2096fde260fdb3e31339cafe8
SHA256ba89ac7687a1c010e0c378424638e642862bc3ba6b457bcabc8bb6dbad067b2a
SHA512a7572a5621093aeef81600c1601fae559bd5dadbc59d936110b79038ddcc12efeca0b6e9b8f54db90f52cbb0f7927a5dff813ff3307e96752a1640fd59cf8f28
-
Filesize
184KB
MD547fae94a175c0899e32ce7d76c4280fd
SHA15ab5e0852619e3010c0c1ec6239dae8490683ba3
SHA2560dcfeafecca39b43e8813deecbb45be05e545baac1bc6e3cd20c7586060c9899
SHA5124c63dd5343eac94413ab726dd69c8a4f71ab2ee8949de84177127cf055c012a29c88bf14c1b9c8c737b87b1876fe655cc4fddcf5399811d725a6a5d32a804dd1