Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
25151a7f3886fa4d575c67862b9639df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25151a7f3886fa4d575c67862b9639df.exe
Resource
win10v2004-20231215-en
General
-
Target
25151a7f3886fa4d575c67862b9639df.exe
-
Size
184KB
-
MD5
25151a7f3886fa4d575c67862b9639df
-
SHA1
78304cfac5b3689b831c49c3cb9be9061dfc1f13
-
SHA256
5e233b5d9eac40e88ad265c2f54fd43847aba2d60ad555fd209cd749cb403331
-
SHA512
8255da9b3441acabaecf491ea47c3efe7f1353db28053061753e179cb60d712503edca1ed5be2369d9f0dfc22fd05424961d20a7ef3080ad3b464bca836b4795
-
SSDEEP
3072:zvFGoWwzi0AUk1OH9dsjLj88TA+pr3QuTU0Yx7rt1aNlPvwFB:zv8oGFj1idWLj8dMEWNlPvwF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3040 Unicorn-31248.exe 2708 Unicorn-44903.exe 2780 Unicorn-40522.exe 2828 Unicorn-59936.exe 3012 Unicorn-63623.exe 2572 Unicorn-38289.exe 3000 Unicorn-42253.exe 1592 Unicorn-25459.exe 1748 Unicorn-55434.exe 1100 Unicorn-35585.exe 2868 Unicorn-10099.exe 2160 Unicorn-6484.exe 1476 Unicorn-62281.exe 2464 Unicorn-22095.exe 2376 Unicorn-36271.exe 1028 Unicorn-60065.exe 2656 Unicorn-65457.exe 2924 Unicorn-19354.exe 2184 Unicorn-39220.exe 2352 Unicorn-35607.exe 1832 Unicorn-60661.exe 1364 Unicorn-44686.exe 1060 Unicorn-21520.exe 2284 Unicorn-63664.exe 1548 Unicorn-6819.exe 884 Unicorn-61832.exe 960 Unicorn-63140.exe 1720 Unicorn-19233.exe 1688 Unicorn-11256.exe 2892 Unicorn-27265.exe 952 Unicorn-2194.exe 2456 Unicorn-33029.exe 1660 Unicorn-43030.exe 2820 Unicorn-33290.exe 2568 Unicorn-47467.exe 2728 Unicorn-37478.exe 2580 Unicorn-1481.exe 2788 Unicorn-24300.exe 2840 Unicorn-63422.exe 2016 Unicorn-15972.exe 2600 Unicorn-5324.exe 2488 Unicorn-31146.exe 1348 Unicorn-13373.exe 1424 Unicorn-46876.exe 1636 Unicorn-43296.exe 1800 Unicorn-29103.exe 2452 Unicorn-27412.exe 1460 Unicorn-45759.exe 1536 Unicorn-12692.exe 2772 Unicorn-12692.exe 2576 Unicorn-12692.exe 1148 Unicorn-53772.exe 1804 Unicorn-40591.exe 1464 Unicorn-64877.exe 2404 Unicorn-5365.exe 3016 Unicorn-18682.exe 2236 Unicorn-4486.exe 876 Unicorn-57481.exe 1676 Unicorn-48289.exe 2668 Unicorn-34204.exe 2212 Unicorn-54719.exe 2976 Unicorn-59400.exe 1304 Unicorn-28458.exe 1568 Unicorn-63809.exe -
Loads dropped DLL 64 IoCs
pid Process 2276 25151a7f3886fa4d575c67862b9639df.exe 2276 25151a7f3886fa4d575c67862b9639df.exe 3040 Unicorn-31248.exe 3040 Unicorn-31248.exe 2276 25151a7f3886fa4d575c67862b9639df.exe 2276 25151a7f3886fa4d575c67862b9639df.exe 2708 Unicorn-44903.exe 2708 Unicorn-44903.exe 3040 Unicorn-31248.exe 3040 Unicorn-31248.exe 2780 Unicorn-40522.exe 2780 Unicorn-40522.exe 2828 Unicorn-59936.exe 2828 Unicorn-59936.exe 2708 Unicorn-44903.exe 2708 Unicorn-44903.exe 3012 Unicorn-63623.exe 3012 Unicorn-63623.exe 2572 Unicorn-38289.exe 2572 Unicorn-38289.exe 2780 Unicorn-40522.exe 2780 Unicorn-40522.exe 1592 Unicorn-25459.exe 1592 Unicorn-25459.exe 1748 Unicorn-55434.exe 1748 Unicorn-55434.exe 3000 Unicorn-42253.exe 3000 Unicorn-42253.exe 3012 Unicorn-63623.exe 3012 Unicorn-63623.exe 2828 Unicorn-59936.exe 1100 Unicorn-35585.exe 2828 Unicorn-59936.exe 1100 Unicorn-35585.exe 2572 Unicorn-38289.exe 2572 Unicorn-38289.exe 2868 Unicorn-10099.exe 2868 Unicorn-10099.exe 2160 Unicorn-6484.exe 2160 Unicorn-6484.exe 1592 Unicorn-25459.exe 1592 Unicorn-25459.exe 1476 Unicorn-62281.exe 1476 Unicorn-62281.exe 1748 Unicorn-55434.exe 1748 Unicorn-55434.exe 2924 Unicorn-19354.exe 2924 Unicorn-19354.exe 2464 Unicorn-22095.exe 2464 Unicorn-22095.exe 3000 Unicorn-42253.exe 1028 Unicorn-60065.exe 3000 Unicorn-42253.exe 1028 Unicorn-60065.exe 2184 Unicorn-39220.exe 2184 Unicorn-39220.exe 2868 Unicorn-10099.exe 2868 Unicorn-10099.exe 1100 Unicorn-35585.exe 1100 Unicorn-35585.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe -
Program crash 9 IoCs
pid pid_target Process procid_target 2068 2656 WerFault.exe 43 1800 584 WerFault.exe 127 884 1892 WerFault.exe 154 1604 1088 WerFault.exe 161 528 1368 WerFault.exe 250 2492 1028 WerFault.exe 275 2984 1876 WerFault.exe 287 1152 768 WerFault.exe 316 1708 1132 WerFault.exe 339 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2276 25151a7f3886fa4d575c67862b9639df.exe 3040 Unicorn-31248.exe 2708 Unicorn-44903.exe 2780 Unicorn-40522.exe 2828 Unicorn-59936.exe 3012 Unicorn-63623.exe 2572 Unicorn-38289.exe 3000 Unicorn-42253.exe 1592 Unicorn-25459.exe 1748 Unicorn-55434.exe 1100 Unicorn-35585.exe 2868 Unicorn-10099.exe 2160 Unicorn-6484.exe 1476 Unicorn-62281.exe 2464 Unicorn-22095.exe 2924 Unicorn-19354.exe 1028 Unicorn-60065.exe 2184 Unicorn-39220.exe 2656 Unicorn-65457.exe 2352 Unicorn-35607.exe 1832 Unicorn-60661.exe 1364 Unicorn-44686.exe 1060 Unicorn-21520.exe 2284 Unicorn-63664.exe 1548 Unicorn-6819.exe 884 Unicorn-61832.exe 1688 Unicorn-11256.exe 960 Unicorn-63140.exe 2892 Unicorn-27265.exe 1720 Unicorn-19233.exe 2568 Unicorn-47467.exe 952 Unicorn-2194.exe 2820 Unicorn-33290.exe 1660 Unicorn-43030.exe 2456 Unicorn-33029.exe 2728 Unicorn-37478.exe 2840 Unicorn-63422.exe 2580 Unicorn-1481.exe 2788 Unicorn-24300.exe 2016 Unicorn-15972.exe 2488 Unicorn-31146.exe 2600 Unicorn-5324.exe 1424 Unicorn-46876.exe 1348 Unicorn-13373.exe 1800 Unicorn-29103.exe 1636 Unicorn-43296.exe 2452 Unicorn-27412.exe 2376 Unicorn-36271.exe 1460 Unicorn-45759.exe 2772 Unicorn-12692.exe 1536 Unicorn-12692.exe 2576 Unicorn-12692.exe 1148 Unicorn-53772.exe 1804 Unicorn-40591.exe 1464 Unicorn-64877.exe 2404 Unicorn-5365.exe 3016 Unicorn-18682.exe 2236 Unicorn-4486.exe 876 Unicorn-57481.exe 1676 Unicorn-48289.exe 2668 Unicorn-34204.exe 2212 Unicorn-54719.exe 2976 Unicorn-59400.exe 1304 Unicorn-28458.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3040 2276 25151a7f3886fa4d575c67862b9639df.exe 28 PID 2276 wrote to memory of 3040 2276 25151a7f3886fa4d575c67862b9639df.exe 28 PID 2276 wrote to memory of 3040 2276 25151a7f3886fa4d575c67862b9639df.exe 28 PID 2276 wrote to memory of 3040 2276 25151a7f3886fa4d575c67862b9639df.exe 28 PID 3040 wrote to memory of 2708 3040 Unicorn-31248.exe 29 PID 3040 wrote to memory of 2708 3040 Unicorn-31248.exe 29 PID 3040 wrote to memory of 2708 3040 Unicorn-31248.exe 29 PID 3040 wrote to memory of 2708 3040 Unicorn-31248.exe 29 PID 2276 wrote to memory of 2780 2276 25151a7f3886fa4d575c67862b9639df.exe 30 PID 2276 wrote to memory of 2780 2276 25151a7f3886fa4d575c67862b9639df.exe 30 PID 2276 wrote to memory of 2780 2276 25151a7f3886fa4d575c67862b9639df.exe 30 PID 2276 wrote to memory of 2780 2276 25151a7f3886fa4d575c67862b9639df.exe 30 PID 2708 wrote to memory of 2828 2708 Unicorn-44903.exe 31 PID 2708 wrote to memory of 2828 2708 Unicorn-44903.exe 31 PID 2708 wrote to memory of 2828 2708 Unicorn-44903.exe 31 PID 2708 wrote to memory of 2828 2708 Unicorn-44903.exe 31 PID 3040 wrote to memory of 3012 3040 Unicorn-31248.exe 32 PID 3040 wrote to memory of 3012 3040 Unicorn-31248.exe 32 PID 3040 wrote to memory of 3012 3040 Unicorn-31248.exe 32 PID 3040 wrote to memory of 3012 3040 Unicorn-31248.exe 32 PID 2780 wrote to memory of 2572 2780 Unicorn-40522.exe 33 PID 2780 wrote to memory of 2572 2780 Unicorn-40522.exe 33 PID 2780 wrote to memory of 2572 2780 Unicorn-40522.exe 33 PID 2780 wrote to memory of 2572 2780 Unicorn-40522.exe 33 PID 2828 wrote to memory of 3000 2828 Unicorn-59936.exe 34 PID 2828 wrote to memory of 3000 2828 Unicorn-59936.exe 34 PID 2828 wrote to memory of 3000 2828 Unicorn-59936.exe 34 PID 2828 wrote to memory of 3000 2828 Unicorn-59936.exe 34 PID 2708 wrote to memory of 1592 2708 Unicorn-44903.exe 35 PID 2708 wrote to memory of 1592 2708 Unicorn-44903.exe 35 PID 2708 wrote to memory of 1592 2708 Unicorn-44903.exe 35 PID 2708 wrote to memory of 1592 2708 Unicorn-44903.exe 35 PID 3012 wrote to memory of 1748 3012 Unicorn-63623.exe 36 PID 3012 wrote to memory of 1748 3012 Unicorn-63623.exe 36 PID 3012 wrote to memory of 1748 3012 Unicorn-63623.exe 36 PID 3012 wrote to memory of 1748 3012 Unicorn-63623.exe 36 PID 2572 wrote to memory of 1100 2572 Unicorn-38289.exe 37 PID 2572 wrote to memory of 1100 2572 Unicorn-38289.exe 37 PID 2572 wrote to memory of 1100 2572 Unicorn-38289.exe 37 PID 2572 wrote to memory of 1100 2572 Unicorn-38289.exe 37 PID 2780 wrote to memory of 2868 2780 Unicorn-40522.exe 38 PID 2780 wrote to memory of 2868 2780 Unicorn-40522.exe 38 PID 2780 wrote to memory of 2868 2780 Unicorn-40522.exe 38 PID 2780 wrote to memory of 2868 2780 Unicorn-40522.exe 38 PID 1592 wrote to memory of 2160 1592 Unicorn-25459.exe 39 PID 1592 wrote to memory of 2160 1592 Unicorn-25459.exe 39 PID 1592 wrote to memory of 2160 1592 Unicorn-25459.exe 39 PID 1592 wrote to memory of 2160 1592 Unicorn-25459.exe 39 PID 1748 wrote to memory of 1476 1748 Unicorn-55434.exe 40 PID 1748 wrote to memory of 1476 1748 Unicorn-55434.exe 40 PID 1748 wrote to memory of 1476 1748 Unicorn-55434.exe 40 PID 1748 wrote to memory of 1476 1748 Unicorn-55434.exe 40 PID 3000 wrote to memory of 2464 3000 Unicorn-42253.exe 41 PID 3000 wrote to memory of 2464 3000 Unicorn-42253.exe 41 PID 3000 wrote to memory of 2464 3000 Unicorn-42253.exe 41 PID 3000 wrote to memory of 2464 3000 Unicorn-42253.exe 41 PID 3012 wrote to memory of 2376 3012 Unicorn-63623.exe 42 PID 3012 wrote to memory of 2376 3012 Unicorn-63623.exe 42 PID 3012 wrote to memory of 2376 3012 Unicorn-63623.exe 42 PID 3012 wrote to memory of 2376 3012 Unicorn-63623.exe 42 PID 2828 wrote to memory of 1028 2828 Unicorn-59936.exe 44 PID 2828 wrote to memory of 1028 2828 Unicorn-59936.exe 44 PID 2828 wrote to memory of 1028 2828 Unicorn-59936.exe 44 PID 2828 wrote to memory of 1028 2828 Unicorn-59936.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\25151a7f3886fa4d575c67862b9639df.exe"C:\Users\Admin\AppData\Local\Temp\25151a7f3886fa4d575c67862b9639df.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31248.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44903.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59936.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22095.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6819.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24300.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12692.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63809.exe10⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26493.exe11⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22862.exe12⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45173.exe13⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13688.exe14⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65358.exe15⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8396.exe16⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49123.exe17⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56024.exe18⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61573.exe19⤵PID:2764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63422.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27412.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49252.exe9⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe10⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26493.exe11⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63966.exe12⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40963.exe13⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62845.exe14⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49554.exe15⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33998.exe16⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16462.exe17⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47044.exe18⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41887.exe19⤵PID:2264
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-842.exe11⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12992.exe12⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27740.exe13⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57183.exe14⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15253.exe15⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49898.exe16⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10946.exe17⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48060.exe18⤵PID:1476
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61832.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29103.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28458.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13282.exe9⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49114.exe10⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44331.exe11⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21241.exe12⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58866.exe13⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exe14⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44918.exe15⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36850.exe16⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25556.exe17⤵PID:1224
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34204.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32021.exe8⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64767.exe9⤵PID:584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 18810⤵
- Program crash
PID:1800
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60065.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63140.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40591.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40923.exe8⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14994.exe9⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63359.exe10⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21289.exe11⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20167.exe12⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12488.exe13⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9513.exe14⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exe15⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25556.exe16⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40790.exe17⤵PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32691.exe16⤵PID:1108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13724.exe13⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13153.exe14⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51793.exe15⤵PID:1588
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25459.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6484.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35607.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2194.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64877.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32084.exe9⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20515.exe10⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45629.exe11⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6687.exe12⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21896.exe13⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3194.exe14⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32330.exe15⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61101.exe16⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1256.exe17⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65000.exe18⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48148.exe19⤵PID:1640
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35096.exe9⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43675.exe10⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27836.exe11⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40964.exe12⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1819.exe13⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56289.exe14⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9846.exe15⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47044.exe16⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55944.exe17⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58993.exe18⤵PID:576
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31146.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59400.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38189.exe9⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44150.exe10⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33485.exe11⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-286.exe12⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 24013⤵
- Program crash
PID:1604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61900.exe11⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6118.exe12⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39841.exe13⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31989.exe14⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44262.exe15⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65139.exe16⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7318.exe17⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13419.exe18⤵PID:2448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33029.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12692.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5197.exe8⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8750.exe9⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24727.exe10⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41017.exe11⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11569.exe12⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5064.exe13⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60476.exe14⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32145.exe15⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19096.exe16⤵PID:972
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exe8⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exe9⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40810.exe10⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13688.exe11⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14643.exe12⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exe13⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59972.exe14⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12496.exe15⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25780.exe16⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44932.exe17⤵PID:2260
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24530.exe14⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5307.exe15⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48721.exe16⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-376.exe17⤵PID:2456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60661.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43030.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5324.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57481.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44420.exe9⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52915.exe10⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54554.exe11⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26651.exe12⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49766.exe13⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29332.exe14⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56954.exe15⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26791.exe16⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49587.exe16⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25030.exe17⤵PID:1828
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46876.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48289.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10210.exe8⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14534.exe9⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37273.exe10⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37233.exe11⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4337.exe12⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4685.exe13⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36293.exe14⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33231.exe15⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46861.exe16⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44260.exe17⤵PID:1660
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46162.exe9⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63359.exe10⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33832.exe11⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57998.exe12⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23180.exe13⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22504.exe14⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30320.exe15⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42888.exe16⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62271.exe17⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41318.exe18⤵PID:1044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63623.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55434.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62281.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44686.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33290.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45759.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37383.exe9⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6833.exe10⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9156.exe11⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55119.exe12⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28964.exe13⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35361.exe14⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31124.exe15⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exe16⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exe17⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7669.exe18⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22330.exe19⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13465.exe20⤵PID:552
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3647.exe9⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30294.exe10⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44689.exe11⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exe12⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16313.exe13⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64188.exe14⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57404.exe15⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11400.exe16⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29629.exe17⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exe18⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56024.exe19⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10928.exe20⤵PID:2740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36158.exe18⤵PID:852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47467.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18682.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51490.exe8⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26493.exe9⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13823.exe10⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37428.exe11⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35629.exe12⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8545.exe13⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exe14⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46132.exe15⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 24016⤵
- Program crash
PID:528
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13966.exe10⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10941.exe11⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28311.exe12⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16810.exe13⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65488.exe14⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 24015⤵
- Program crash
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34032.exe14⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10022.exe15⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-156.exe16⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 24017⤵
- Program crash
PID:1708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 23616⤵
- Program crash
PID:1152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 21615⤵
- Program crash
PID:2984
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21520.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37478.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12692.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27344.exe8⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-903.exe9⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10100.exe10⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22160.exe11⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25241.exe12⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-876.exe13⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exe14⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15440.exe15⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58077.exe16⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49907.exe17⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31176.exe18⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22599.exe19⤵PID:1808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46117.exe18⤵PID:1964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36271.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5344.exe5⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20560.exe6⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25767.exe7⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60524.exe8⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47365.exe9⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61762.exe10⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50212.exe11⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58856.exe12⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43491.exe13⤵PID:2452
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40522.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38289.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35585.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65457.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 2406⤵
- Loads dropped DLL
- Program crash
PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27265.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4486.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22080.exe7⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31902.exe8⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29855.exe9⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33575.exe10⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34756.exe11⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57378.exe12⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28149.exe13⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3700.exe14⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exe15⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65000.exe16⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22112.exe17⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60031.exe17⤵PID:1348
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49887.exe12⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62427.exe13⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36744.exe14⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43909.exe15⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10022.exe16⤵PID:2484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19354.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63664.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1481.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13373.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54719.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2935.exe8⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51544.exe9⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9656.exe10⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54785.exe11⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62415.exe12⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51267.exe13⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3249.exe14⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42803.exe15⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20593.exe16⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60264.exe17⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25065.exe18⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29880.exe19⤵PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8813.exe19⤵PID:2100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10099.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39220.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19233.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43296.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14322.exe7⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14534.exe8⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-251.exe9⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 24010⤵
- Program crash
PID:884
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11256.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15972.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53772.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34311.exe7⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49114.exe8⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46093.exe9⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46036.exe10⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40833.exe11⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4177.exe12⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39618.exe13⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37709.exe14⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exe15⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17354.exe16⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11452.exe17⤵PID:2868
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54398.exe13⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exe14⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40790.exe15⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48060.exe16⤵PID:2904
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5365.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34493.exe6⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11720.exe7⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62811.exe8⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30955.exe9⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63550.exe10⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10149.exe11⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44955.exe12⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26791.exe13⤵PID:2928
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD557f3b97ef518c595b2c46455602abf41
SHA1f5d265c50c449c4c6bf8dacad287295bf9e800af
SHA256baa7f14c828db4d684f5ad45dbdab519c7a7317c8f43c58166900395b9b78ea2
SHA512a7af54a3f7114ccc73e4a33b6bafc7fab67bb10fd25cef247a1e5b0500c27de00e830bdbbef37167ef63eafc6a7938dee73f36a1d635788869201fe60b7b43ed
-
Filesize
184KB
MD564a99a29e61c6ee7fb6917c15e327f74
SHA178928fb95bddf9ecabc26bcae9e9015eccc89c1b
SHA256793e73cca23b603c9394b46e091500fe5694d82330107a4182a414fe31646fa6
SHA51245db1230471068a573d9241266b9bfa736f1a294e5ebf4f1cb4d476a001e181962382f90b744d1902ca87cba97aeea2a415f07ce6c528885b52391e0ca9d968e
-
Filesize
184KB
MD58d7eaac35d39f6ed4d968fd25564e895
SHA11c318a217874ad4349ecfcf3ad4d112a98e887ce
SHA2562749cfdd3d735e1627105095dee1ee9d6546da0ded6c6bef47e204cc5eaad6d0
SHA5127b4a61efb83bdee1d31b8717332c2ace45c8683e6458fbb8e477ab4c2d272203cdaff46ae54f0e6e107a4e1a566e74bb47403f0b47bf03f03385693c245a3ce1
-
Filesize
184KB
MD522c2005553dbb16deadf53a3241d5060
SHA13a0798c6fc83b93eb2af694cc7edc4e4035b664a
SHA256bd932fb048900a563ccd2164393baad45586478c301f7801ae42a43a8440c17f
SHA512fdad653197c5c9f9bcbb5a61ef28bcb7ad6b31fc2343bc4a1a012de45f066a4df76b4227b0cb40e1c9a4ed5ec54ed80756a546730639884268866a4237400237
-
Filesize
184KB
MD5fe50b1ecdadbbd76b80864fcb5f7df89
SHA154fe76c10117582d8924f6cb036c496c2d83f446
SHA256d591456641667b08e13e525f3f446b1c1b040e9ae897214513c262b6e4214fa8
SHA5122cd34b9bc914736f6e1463ab405eb888cde8662bfccf7187c1330ed4935cc1af54c8bb1a5cbb8f81c57c46e37500c296abb6dbb6ad9444b44e908596a4f04ffd
-
Filesize
184KB
MD5e9b56aa1008c9f3345029a7bbf109578
SHA1ae0663f8831a8a45328c4713d68d3ea90195b79f
SHA256d33f44e4f36c29034840a06055857803949bb50b4345b3ddb95b3da69e7b821a
SHA5126e6668e1552bd6fb28f5e4e5eb0c67bd8c7d0049e4db29688dc184b2945097738455c560b81f3c46e6fb9bef37ef070762082a4c972b359b3a1e94eb7c6bf8c1
-
Filesize
184KB
MD5a5a3f779147fad07d3f22eaf8d732e33
SHA16e4b37290cffa30cc52c8c64118ba00e884e175e
SHA2564961f514f3c3ed1ea8a4c85fa8e7466f4f1318738cb029ba381bab97d01a8e0e
SHA51299ec6718e5e2a21bc41f616173119a65dab659dd7b54ab45e5624c5db0483e258e82e9e9993f33b8aed1a6910438d281b7b74eaff79618c3833530384c780f09
-
Filesize
184KB
MD5c644acf5a249d6c471efe933010274e4
SHA125cb6a381df06ebbeddaae3d875f56d8374d8729
SHA25614dbad41ae553ec125e6091da2491620f07142aad6f5ec5a1e1d3ee92b361c50
SHA512c90b3c0b8500dd861df6fb9211223e241f360ecd9702b7a48ffec1fe179af80668c0446470de25a137b5e255f779dfb499cd8452eaff227e6beb9caa0cc30a3e
-
Filesize
184KB
MD5f2c217a9a90df7731b54f310539cbb30
SHA10eb9852cd2404bef273e5b660b100317ca922d62
SHA256bdd6bc9cd49bf134e8cb9c5833c8dfa884784e0ff4b1d55f6faf39376f71d887
SHA512241cad8cbebc5b00524d4a4400846ed9e10ac9901ff0d0068e1a54e5942350731753372c1a21952b1e07cbba50651ae85408f22db0084320f927b654d1463a12
-
Filesize
184KB
MD538eeae17b77a08d5266820a45f0f1abb
SHA198fb38d9d9aa1879686fea0c36569da752f90dba
SHA256d18e30e040d131ab14e1798d8ad05d0169a36693c75b50f26b6474bef14f74cd
SHA512612f944a2d369f2b5427888edfba4adc631be3b128cb51d942029144a7f2ec8eee229ac7e549a4023f0adb30a6dfbc8511ab2f32fd155cea17800d48b4dc1456
-
Filesize
184KB
MD545d12fa541d56e8226e20ec3c1da3163
SHA122cbe7506c2a46b40f8f38a996bbac5595f82192
SHA2560d2f9ae99dec080718f94234adf2e0f85b9cf085ed216983d3fdb2367e37352e
SHA512493892a9fae2d51bc042e3c7b831e921737417f2250149ce59e354e8d6d9e7f290f7905001d19c8879a922851d3aeb633cc115814634dcc51acbf822195ec6de
-
Filesize
184KB
MD5a2edbda564d44c3deb1e882fb4c2e09e
SHA157e8fcc313147ad4cbb11bbbfe05fd05e14f0d6c
SHA2565000da64dc2f3579f46a211b77610d31241dd9742dbb3ffd800d223e4e8cb899
SHA512ee5b5d7e1a545408ecf721b1606771454d569ebe4b5289db144a4bc3d55a9cf8b8efbb7c8c1ebfcd4eb3b104a55e39ceeda539efb9b84cd0cdec4b3549ffee36
-
Filesize
184KB
MD5555dce7909f29b675e7c15ddeb549541
SHA1bd3aa19e9c210c85505ee0f84f788db2d7c19077
SHA2561abbcd7c1250e3a9246180b04b8ee05d7bd53176a3599e8db753935c7a4df48d
SHA512ee71a87888f113bae7e8f3f49ec1234e253bf6d1aa32a3faa09b682db6a880dec49a812e34323286215e151d272a2c1cb3679bb28a1e263397387a02dd6f3fb5
-
Filesize
184KB
MD590fbca1e00334d7a25d2ac7f16869c4b
SHA18086c193bfdb44d9f6e9a12dc04b78d0b4ef0124
SHA256c7f8c3c5104a06557fee00abf53ad0086930357e676f7645a88a59352d9268df
SHA5127f0d4d5159722a5867e72004bcd0b1f6dd6f23242607ced964c34e2a6b4033991f4577c94a03c411dddd3e55b6ea7f712de4af3dd264097cdd25bd73f158a628
-
Filesize
184KB
MD5d1ad3dc3d6649847cf9b7c452aaca907
SHA1d05ef09a78a84337fb4de81d5858a27e1e2a41c5
SHA256e10ae9e8dc45e1585e6b06de68d735173104fb93777206bfe2c0c2fb00fb6820
SHA5122805c69151da7719700cf2b7c7ce89fc5b6ac152cb52e2f890c6dfaeb4e685f7841f0c3ec975822395a04117c5585fb5a2d731f36ddd2e1dab2267978c59afea
-
Filesize
184KB
MD587e9febce2a2907a6805581a57ac34bd
SHA1388f429849761c3564b1a3ee4767f4e6fd37a7be
SHA25633605f7b8734fee3b9daebc117c3879edc89306ab6030d4b60d404132b3d88ad
SHA5124584a11cdf0daf9f9631916cbcff91b892fe5a20ac96a4c1202d153c9e3a51481d030210c16152cc14385b25312764c778c99f0625d862ae48a8898aac687994
-
Filesize
184KB
MD5488280da848baeeef66e809cc40a542b
SHA1892f8190afbd1353c0005653e0bbb1cf8b2bb0f3
SHA256d0fc7d994123f4abf83de75fd1b13d55a4cf4a48f2e31e20a2f516382cc95820
SHA512316a3955a2322a707a769ea1fd6ee5fe9393bbb1d83fc2702c22a4243e6638576a4c1f8bc626dfc579e594444ec5f20eee150cefe4f8e42e97d6b042daa4ad84
-
Filesize
184KB
MD5d1ec00d852a2339dfb4513a6a04819b9
SHA13835216f0f5b3e1c43a574e2d7dddd2183045177
SHA2569b286b621683ef520c2fd0a399b590c835c2e4d7d6694dbfab9669779bc29a05
SHA512206ca95e8bfdba762f67c975e042ca13f31e57c87bb4cf4e24a03474e7c805dad6e36b6eeb16ab8c0b7296496a6320e3033bf2d0f8c2cd00d7cc715529a8376b
-
Filesize
184KB
MD542ea33994e3aef8e987ad6396a936451
SHA182883ffb77d3b15e11a1f979228372c1bf54d947
SHA2568a54efb1c850f67e026761604fa4274e39706d14c9c087b2773d695428b32190
SHA512108a03eda533e5d3fd766ee66e9f92d26c55eeaa1fbdaf7dab44ebd537fbd9165925e76fa5f48d7950786e116f9bf5be31b866b9dd67e4bbdc5c64b99dc11cee
-
Filesize
184KB
MD545376305da4564a2a05c84876f281dde
SHA1d40c5308224d581245ae37c40fad59cefb352390
SHA256e35bbc3589d55005670fe93fa4babaf935bcfc610735dc7632281542e829eb90
SHA51219984883c75fec4feafeedd898799817921ff5d64dc116309f160ec72d937a40f141ff6ba3492e45dfe8366cf4d2c3ed35414930460e6f7143ecda7a8ce553c4
-
Filesize
184KB
MD52cf078be7cf8417ae90d65991c1f721a
SHA165aa1c00d6e3ca6b27a0a3e1d2e59e57efd9418a
SHA256be8297176847097c6fa1a74124922aa8d4863667a47e941aacd3f6f6f4e2f862
SHA512ae225f1e2099c829c7b1cd378172c882722dd7400a514893de9034b6a1b592a1323378a2e817bbc2623dd5dfd016f57fd09f0bd28c69cf89c1053bc85428b6b6
-
Filesize
184KB
MD584b2f6bd006fe85f58d068fb60c6a7e3
SHA1c3dc5c63ba9c749d746f223a7ca53dfa8f0b90fb
SHA256e5c5d9f436bab01b1bb1ccb040b11df25bb0e79bc4014743e2318016a89c71ac
SHA51279e37794d6c0f778914eb100fc99d7994cede6433210510c7503c9b20d23f5a7889efb52aae81e02fed6bafa4bb1154a39ef6af3a574ea3373a75b27d3948ab4