Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:10
Static task
static1
Behavioral task
behavioral1
Sample
394765b5a55a976140dc3a9f033759ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
394765b5a55a976140dc3a9f033759ee.exe
Resource
win10v2004-20231215-en
General
-
Target
394765b5a55a976140dc3a9f033759ee.exe
-
Size
184KB
-
MD5
394765b5a55a976140dc3a9f033759ee
-
SHA1
07998538958cf29bc1b09fd8912fb6ef99775c4e
-
SHA256
2656ed3091bc8cade78817a6d1724307815c7b3b254dd67aec61a276ddf16a43
-
SHA512
f0b2c85e9bbbd3509fd6818e9902fb2e4916705d19c6d82a73bc3f3cdac0ee9393e539b6e6361f36bfa57eede9097335a37838abf935722c83863310edeeab5d
-
SSDEEP
3072:ndEhoYbkf0A0sOHIdsv5l8FAIsR6/GWIIHYxrKtO0NlPvwFA:ndSoxF0sjdm5l8MXvmNlPvwF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2680 Unicorn-27395.exe 2924 Unicorn-25400.exe 1756 Unicorn-50459.exe 1480 Unicorn-13806.exe 2880 Unicorn-2109.exe 2708 Unicorn-60869.exe 1656 Unicorn-48700.exe 2800 Unicorn-12306.exe 2964 Unicorn-44424.exe 3000 Unicorn-19920.exe 2072 Unicorn-8222.exe 1640 Unicorn-27102.exe 1168 Unicorn-40676.exe 2820 Unicorn-5119.exe 1568 Unicorn-23594.exe 2556 Unicorn-17926.exe 1820 Unicorn-59281.exe 2528 Unicorn-6551.exe 2440 Unicorn-42945.exe 1144 Unicorn-62727.exe 696 Unicorn-5913.exe 1592 Unicorn-52229.exe 1632 Unicorn-1637.exe 1668 Unicorn-42499.exe 1056 Unicorn-30247.exe 2156 Unicorn-54751.exe 1396 Unicorn-50475.exe 2236 Unicorn-6105.exe 2540 Unicorn-30055.exe 1560 Unicorn-45021.exe 2000 Unicorn-35461.exe 1728 Unicorn-53744.exe 1980 Unicorn-40252.exe 2744 Unicorn-42752.exe 2296 Unicorn-46282.exe 2888 Unicorn-44144.exe 2724 Unicorn-39244.exe 2664 Unicorn-16132.exe 2316 Unicorn-48804.exe 2056 Unicorn-53443.exe 268 Unicorn-56780.exe 2932 Unicorn-55389.exe 436 Unicorn-24684.exe 2524 Unicorn-23292.exe 944 Unicorn-41404.exe 1948 Unicorn-41404.exe 1688 Unicorn-41404.exe 2496 Unicorn-11040.exe 1756 Unicorn-13754.exe 1500 Unicorn-6977.exe 2812 Unicorn-34174.exe 1328 Unicorn-34174.exe 1872 Unicorn-64154.exe 2068 Unicorn-59001.exe 2416 Unicorn-52348.exe 2100 Unicorn-15399.exe 1868 Unicorn-45379.exe 2488 Unicorn-21259.exe 1704 Unicorn-42255.exe 1972 Unicorn-42255.exe 1648 Unicorn-20251.exe 1380 Unicorn-1798.exe 3012 Unicorn-61113.exe 2248 Unicorn-35348.exe -
Loads dropped DLL 64 IoCs
pid Process 2304 394765b5a55a976140dc3a9f033759ee.exe 2304 394765b5a55a976140dc3a9f033759ee.exe 2680 Unicorn-27395.exe 2680 Unicorn-27395.exe 2304 394765b5a55a976140dc3a9f033759ee.exe 2304 394765b5a55a976140dc3a9f033759ee.exe 2924 Unicorn-25400.exe 2924 Unicorn-25400.exe 2680 Unicorn-27395.exe 2680 Unicorn-27395.exe 1756 Unicorn-50459.exe 1756 Unicorn-50459.exe 1480 Unicorn-13806.exe 1480 Unicorn-13806.exe 2924 Unicorn-25400.exe 2924 Unicorn-25400.exe 2880 Unicorn-2109.exe 2880 Unicorn-2109.exe 2708 Unicorn-60869.exe 2708 Unicorn-60869.exe 1756 Unicorn-50459.exe 1756 Unicorn-50459.exe 1656 Unicorn-48700.exe 1656 Unicorn-48700.exe 1480 Unicorn-13806.exe 1480 Unicorn-13806.exe 2800 Unicorn-12306.exe 2800 Unicorn-12306.exe 3000 Unicorn-19920.exe 3000 Unicorn-19920.exe 2708 Unicorn-60869.exe 2708 Unicorn-60869.exe 2964 Unicorn-44424.exe 2964 Unicorn-44424.exe 2880 Unicorn-2109.exe 2072 Unicorn-8222.exe 2880 Unicorn-2109.exe 2072 Unicorn-8222.exe 1640 Unicorn-27102.exe 1640 Unicorn-27102.exe 1656 Unicorn-48700.exe 1656 Unicorn-48700.exe 2820 Unicorn-5119.exe 2820 Unicorn-5119.exe 2800 Unicorn-12306.exe 2800 Unicorn-12306.exe 1168 Unicorn-40676.exe 1168 Unicorn-40676.exe 2528 Unicorn-6551.exe 2528 Unicorn-6551.exe 2556 Unicorn-17926.exe 2556 Unicorn-17926.exe 2440 Unicorn-42945.exe 2440 Unicorn-42945.exe 2072 Unicorn-8222.exe 2072 Unicorn-8222.exe 1568 Unicorn-23594.exe 1568 Unicorn-23594.exe 1820 Unicorn-59281.exe 1820 Unicorn-59281.exe 3000 Unicorn-19920.exe 3000 Unicorn-19920.exe 2964 Unicorn-44424.exe 2964 Unicorn-44424.exe -
Program crash 15 IoCs
pid pid_target Process procid_target 2560 2176 WerFault.exe 182 2352 2552 WerFault.exe 226 1972 2240 WerFault.exe 225 1964 2876 WerFault.exe 209 1816 3052 WerFault.exe 199 2276 2008 WerFault.exe 229 1868 2576 WerFault.exe 231 2800 2992 WerFault.exe 246 2024 1252 WerFault.exe 232 2004 3048 WerFault.exe 257 536 1564 WerFault.exe 255 2596 1156 WerFault.exe 279 984 1992 WerFault.exe 274 2044 960 WerFault.exe 296 2200 836 WerFault.exe 313 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2304 394765b5a55a976140dc3a9f033759ee.exe 2680 Unicorn-27395.exe 2924 Unicorn-25400.exe 1756 Unicorn-50459.exe 1480 Unicorn-13806.exe 2880 Unicorn-2109.exe 2708 Unicorn-60869.exe 1656 Unicorn-48700.exe 2800 Unicorn-12306.exe 2964 Unicorn-44424.exe 3000 Unicorn-19920.exe 2072 Unicorn-8222.exe 1640 Unicorn-27102.exe 1168 Unicorn-40676.exe 2820 Unicorn-5119.exe 1568 Unicorn-23594.exe 1820 Unicorn-59281.exe 2528 Unicorn-6551.exe 2556 Unicorn-17926.exe 2440 Unicorn-42945.exe 1144 Unicorn-62727.exe 696 Unicorn-5913.exe 1592 Unicorn-52229.exe 1632 Unicorn-1637.exe 1668 Unicorn-42499.exe 1056 Unicorn-30247.exe 2156 Unicorn-54751.exe 2236 Unicorn-6105.exe 1396 Unicorn-50475.exe 2000 Unicorn-35461.exe 2540 Unicorn-30055.exe 1560 Unicorn-45021.exe 1728 Unicorn-53744.exe 2744 Unicorn-42752.exe 1980 Unicorn-40252.exe 2296 Unicorn-46282.exe 2888 Unicorn-44144.exe 2724 Unicorn-39244.exe 2664 Unicorn-16132.exe 2316 Unicorn-48804.exe 2056 Unicorn-53443.exe 268 Unicorn-56780.exe 436 Unicorn-24684.exe 2932 Unicorn-55389.exe 2524 Unicorn-23292.exe 944 Unicorn-41404.exe 1688 Unicorn-41404.exe 1948 Unicorn-41404.exe 2496 Unicorn-11040.exe 1500 Unicorn-6977.exe 1756 Unicorn-13754.exe 1328 Unicorn-34174.exe 2812 Unicorn-34174.exe 1872 Unicorn-64154.exe 2068 Unicorn-59001.exe 2416 Unicorn-52348.exe 2100 Unicorn-15399.exe 1868 Unicorn-45379.exe 2488 Unicorn-21259.exe 1704 Unicorn-42255.exe 1972 Unicorn-42255.exe 1648 Unicorn-20251.exe 1380 Unicorn-1798.exe 2248 Unicorn-35348.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2680 2304 394765b5a55a976140dc3a9f033759ee.exe 28 PID 2304 wrote to memory of 2680 2304 394765b5a55a976140dc3a9f033759ee.exe 28 PID 2304 wrote to memory of 2680 2304 394765b5a55a976140dc3a9f033759ee.exe 28 PID 2304 wrote to memory of 2680 2304 394765b5a55a976140dc3a9f033759ee.exe 28 PID 2680 wrote to memory of 2924 2680 Unicorn-27395.exe 29 PID 2680 wrote to memory of 2924 2680 Unicorn-27395.exe 29 PID 2680 wrote to memory of 2924 2680 Unicorn-27395.exe 29 PID 2680 wrote to memory of 2924 2680 Unicorn-27395.exe 29 PID 2304 wrote to memory of 1756 2304 394765b5a55a976140dc3a9f033759ee.exe 30 PID 2304 wrote to memory of 1756 2304 394765b5a55a976140dc3a9f033759ee.exe 30 PID 2304 wrote to memory of 1756 2304 394765b5a55a976140dc3a9f033759ee.exe 30 PID 2304 wrote to memory of 1756 2304 394765b5a55a976140dc3a9f033759ee.exe 30 PID 2924 wrote to memory of 1480 2924 Unicorn-25400.exe 31 PID 2924 wrote to memory of 1480 2924 Unicorn-25400.exe 31 PID 2924 wrote to memory of 1480 2924 Unicorn-25400.exe 31 PID 2924 wrote to memory of 1480 2924 Unicorn-25400.exe 31 PID 2680 wrote to memory of 2880 2680 Unicorn-27395.exe 32 PID 2680 wrote to memory of 2880 2680 Unicorn-27395.exe 32 PID 2680 wrote to memory of 2880 2680 Unicorn-27395.exe 32 PID 2680 wrote to memory of 2880 2680 Unicorn-27395.exe 32 PID 1756 wrote to memory of 2708 1756 Unicorn-50459.exe 33 PID 1756 wrote to memory of 2708 1756 Unicorn-50459.exe 33 PID 1756 wrote to memory of 2708 1756 Unicorn-50459.exe 33 PID 1756 wrote to memory of 2708 1756 Unicorn-50459.exe 33 PID 1480 wrote to memory of 1656 1480 Unicorn-13806.exe 34 PID 1480 wrote to memory of 1656 1480 Unicorn-13806.exe 34 PID 1480 wrote to memory of 1656 1480 Unicorn-13806.exe 34 PID 1480 wrote to memory of 1656 1480 Unicorn-13806.exe 34 PID 2924 wrote to memory of 2800 2924 Unicorn-25400.exe 35 PID 2924 wrote to memory of 2800 2924 Unicorn-25400.exe 35 PID 2924 wrote to memory of 2800 2924 Unicorn-25400.exe 35 PID 2924 wrote to memory of 2800 2924 Unicorn-25400.exe 35 PID 2880 wrote to memory of 2964 2880 Unicorn-2109.exe 36 PID 2880 wrote to memory of 2964 2880 Unicorn-2109.exe 36 PID 2880 wrote to memory of 2964 2880 Unicorn-2109.exe 36 PID 2880 wrote to memory of 2964 2880 Unicorn-2109.exe 36 PID 2708 wrote to memory of 3000 2708 Unicorn-60869.exe 37 PID 2708 wrote to memory of 3000 2708 Unicorn-60869.exe 37 PID 2708 wrote to memory of 3000 2708 Unicorn-60869.exe 37 PID 2708 wrote to memory of 3000 2708 Unicorn-60869.exe 37 PID 1756 wrote to memory of 2072 1756 Unicorn-50459.exe 38 PID 1756 wrote to memory of 2072 1756 Unicorn-50459.exe 38 PID 1756 wrote to memory of 2072 1756 Unicorn-50459.exe 38 PID 1756 wrote to memory of 2072 1756 Unicorn-50459.exe 38 PID 1656 wrote to memory of 1640 1656 Unicorn-48700.exe 39 PID 1656 wrote to memory of 1640 1656 Unicorn-48700.exe 39 PID 1656 wrote to memory of 1640 1656 Unicorn-48700.exe 39 PID 1656 wrote to memory of 1640 1656 Unicorn-48700.exe 39 PID 1480 wrote to memory of 1168 1480 Unicorn-13806.exe 40 PID 1480 wrote to memory of 1168 1480 Unicorn-13806.exe 40 PID 1480 wrote to memory of 1168 1480 Unicorn-13806.exe 40 PID 1480 wrote to memory of 1168 1480 Unicorn-13806.exe 40 PID 2800 wrote to memory of 2820 2800 Unicorn-12306.exe 41 PID 2800 wrote to memory of 2820 2800 Unicorn-12306.exe 41 PID 2800 wrote to memory of 2820 2800 Unicorn-12306.exe 41 PID 2800 wrote to memory of 2820 2800 Unicorn-12306.exe 41 PID 3000 wrote to memory of 1568 3000 Unicorn-19920.exe 43 PID 3000 wrote to memory of 1568 3000 Unicorn-19920.exe 43 PID 3000 wrote to memory of 1568 3000 Unicorn-19920.exe 43 PID 3000 wrote to memory of 1568 3000 Unicorn-19920.exe 43 PID 2708 wrote to memory of 2556 2708 Unicorn-60869.exe 42 PID 2708 wrote to memory of 2556 2708 Unicorn-60869.exe 42 PID 2708 wrote to memory of 2556 2708 Unicorn-60869.exe 42 PID 2708 wrote to memory of 2556 2708 Unicorn-60869.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\394765b5a55a976140dc3a9f033759ee.exe"C:\Users\Admin\AppData\Local\Temp\394765b5a55a976140dc3a9f033759ee.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27395.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13806.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48700.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27102.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62727.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40252.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exe9⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40112.exe10⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24866.exe11⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10527.exe12⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7569.exe13⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12935.exe14⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43330.exe15⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57165.exe16⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24057.exe17⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13073.exe18⤵PID:1620
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42752.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45379.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exe9⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12291.exe10⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46905.exe11⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9245.exe12⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37964.exe13⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55063.exe14⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58732.exe15⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1742.exe16⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28040.exe17⤵PID:1016
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5913.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46282.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27948.exe8⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36028.exe9⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33034.exe10⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12281.exe11⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27819.exe12⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61913.exe13⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15702.exe14⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28084.exe15⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20199.exe16⤵PID:2364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48929.exe13⤵PID:584
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40676.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42499.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48804.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35348.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57159.exe9⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52364.exe10⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27881.exe11⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38820.exe12⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40486.exe13⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1539.exe14⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31052.exe15⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 24016⤵
- Program crash
PID:2352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33744.exe14⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 24015⤵
- Program crash
PID:1972
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50973.exe9⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24674.exe10⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16646.exe11⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63620.exe12⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34020.exe13⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21161.exe14⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49469.exe15⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62759.exe16⤵PID:2232
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53443.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7527.exe7⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exe8⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28758.exe9⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30844.exe10⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53973.exe11⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11845.exe12⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10382.exe13⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20025.exe14⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21905.exe15⤵PID:1508
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12306.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5119.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52229.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44144.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34174.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39244.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42255.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15883.exe8⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28758.exe9⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25198.exe10⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32510.exe11⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36843.exe12⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41140.exe13⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34695.exe14⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9090.exe15⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37495.exe16⤵PID:1572
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44279.exe8⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41617.exe9⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12089.exe10⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53973.exe11⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39874.exe12⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51498.exe13⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53172.exe14⤵PID:1300
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1637.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16132.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59001.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11227.exe8⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62971.exe9⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38441.exe10⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44300.exe11⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7154.exe12⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 22013⤵
- Program crash
PID:2560
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exe7⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9489.exe8⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29666.exe9⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20554.exe10⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58732.exe11⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-76.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-76.exe12⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8431.exe13⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20770.exe14⤵PID:2760
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23765.exe11⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44913.exe12⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60162.exe13⤵PID:1044
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2109.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44424.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59281.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45021.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6977.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16428.exe8⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41674.exe9⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59074.exe10⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61954.exe11⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10906.exe12⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34420.exe13⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14933.exe14⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53172.exe15⤵PID:2396
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34174.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53744.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64154.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42255.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60257.exe8⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25141.exe9⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12836.exe10⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27819.exe11⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60953.exe12⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58872.exe13⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20165.exe14⤵PID:1864
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20251.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exe7⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12566.exe8⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37393.exe9⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25390.exe10⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55063.exe11⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8187.exe12⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59090.exe13⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11036.exe14⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36675.exe15⤵PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6551.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30247.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56780.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exe7⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34466.exe8⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62198.exe9⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8301.exe10⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53688.exe11⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56542.exe12⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44996.exe13⤵PID:1124
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55389.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61113.exe6⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4533.exe7⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55737.exe8⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3350.exe9⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27720.exe10⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56391.exe11⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11373.exe12⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25100.exe13⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23869.exe14⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12606.exe15⤵PID:1776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50459.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60869.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19920.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23594.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30055.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41404.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exe8⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19500.exe9⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28758.exe10⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9484.exe11⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42624.exe12⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42764.exe13⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exe14⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 24015⤵
- Program crash
PID:2800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14590.exe11⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9899.exe12⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53833.exe13⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9334.exe14⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47409.exe15⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25352.exe16⤵PID:1672
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13754.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23911.exe7⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5021.exe8⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54170.exe9⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26968.exe10⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9448.exe11⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18935.exe12⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42806.exe13⤵PID:2988
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35461.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41404.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1798.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44331.exe8⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46801.exe9⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34788.exe10⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53895.exe11⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8301.exe12⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21592.exe13⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11980.exe14⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62759.exe15⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12715.exe16⤵PID:1736
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exe9⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56116.exe10⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46708.exe11⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42681.exe12⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39028.exe13⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27819.exe14⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7476.exe15⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exe16⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19680.exe17⤵PID:2188
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7953.exe13⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51415.exe14⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58488.exe15⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2209.exe16⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7920.exe17⤵PID:2452
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3620.exe14⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43250.exe15⤵PID:2780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60003.exe12⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43662.exe13⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6765.exe14⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47518.exe15⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36392.exe16⤵PID:1656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17926.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54751.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24684.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21259.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28379.exe8⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20159.exe9⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35639.exe10⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16091.exe11⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2302.exe12⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62707.exe13⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1887.exe14⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47518.exe15⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21050.exe16⤵PID:2688
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23292.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64704.exe6⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4834.exe7⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27149.exe8⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19085.exe9⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exe10⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12769.exe11⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50180.exe12⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53911.exe13⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-299.exe14⤵PID:2944
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40199.exe6⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59738.exe7⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35639.exe8⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63620.exe9⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55639.exe10⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51415.exe11⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30724.exe12⤵PID:1652
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8222.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42945.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50475.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41404.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40008.exe7⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4533.exe8⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22873.exe9⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40216.exe10⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47839.exe11⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9100.exe12⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55857.exe13⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47134.exe14⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26805.exe15⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26478.exe16⤵PID:2884
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39208.exe9⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6998.exe10⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14694.exe11⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6007.exe12⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11482.exe13⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50948.exe14⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33896.exe15⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36836.exe16⤵PID:1348
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26790.exe11⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12935.exe12⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62240.exe13⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31701.exe14⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43901.exe15⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47941.exe16⤵PID:2388
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11040.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64320.exe6⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33423.exe7⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38825.exe8⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54305.exe9⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15899.exe10⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17409.exe11⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50180.exe12⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49277.exe13⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21971.exe14⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42614.exe15⤵PID:2844
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6105.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52348.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42769.exe6⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39209.exe7⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18954.exe8⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40102.exe9⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31223.exe10⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27990.exe11⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20253.exe12⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63994.exe13⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11944.exe14⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exe15⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31025.exe15⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11916.exe16⤵PID:2488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 24015⤵
- Program crash
PID:984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 23614⤵
- Program crash
PID:2004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 23613⤵
- Program crash
PID:2276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 21612⤵
- Program crash
PID:1964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21383.exe11⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30803.exe12⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16709.exe13⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25352.exe14⤵PID:524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 21614⤵
- Program crash
PID:2200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 23613⤵
- Program crash
PID:2596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 23612⤵
- Program crash
PID:2024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 24011⤵
- Program crash
PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30490.exe10⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50948.exe11⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29049.exe12⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1633.exe13⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-162.exe14⤵PID:2264
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56474.exe9⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21383.exe10⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49796.exe11⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55343.exe12⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34890.exe13⤵PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 23613⤵
- Program crash
PID:2044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 23612⤵
- Program crash
PID:536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 23611⤵
- Program crash
PID:1868
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD55c7f3b4d99b0266a5c7b4e541cabdba8
SHA12f411e09c6cf17492bade255597a4498b18c91da
SHA256960d2730fbfd4b7c9cddaa1e58ae90546fed04308d77cb5f94b69a48899f06e7
SHA512625d41f62c2347478bccd47bc7d97a653bd42b9de48947d02c4a63544c48823c47dbedc4ae30142f40d116c4dd2688550b679aa38760239edf085feec77040f7
-
Filesize
184KB
MD58a2486d2db986b65ec298b5b11c334fa
SHA110d2b6468c5d317e0127bf24a4703d1af053eec1
SHA2569bb416beabb6f3dca60f47414a21a3ea5cba43620ebd63d988b545999b69d038
SHA512cc82574a98c7f33275fc2eaf0e6c07b04882727ecd793d29f8736f31e89c1dfeaa87f72be44432a2d7f2fc7cbaf75ef08b80e8d5a7946675096bcb8b25ee69b6
-
Filesize
184KB
MD5607c5b897284c3a2766430e14f13ecdc
SHA121b27cd9f7271c3b3e96f0ee3995cd3baacb3662
SHA2569c06343cb64f5af445b1097d9cbf0ebb3781ae63175466862488ac740ad73ef8
SHA51285e8b2c2032c08d27087e14fca4179dc1791c368b3b53d9148925b96bfb06abb4bfe9f72025554ee45ed94a367bcc811d0a50d9e2e9749fa2fa78005e57ca5c8
-
Filesize
184KB
MD5d970420b2eef49725b5c376bc61de1af
SHA128c741170ce1c0da1f871dc050d6c15e1cc770e6
SHA256553c1ba53a0f33ba84e4947797ea711ba28d531a8a0afaee5fa75f4413817d7a
SHA512709ccb97dc1d36d0a9b863a9f0ef0762cfc257b10c1b21f0adc4d014d5e45aef98be69ae09d4fe05a47677351fe4108335b91d0c9614ecb322badc8bc937d82d
-
Filesize
184KB
MD58477c2327800ba7b9c8f2a1c8ce5feb5
SHA199c08905079927ae77bab17db6569f6d97f8d7d1
SHA25600ee223315f04e90c220792328923ce6731c5cea9715eddbd2f1da1502fc5109
SHA5127a21351e8ebfeae00eb1a68d3d1565facc2757eaf8db46024d6f171e2e69e052126eb20387f55286eaa72c12cf48721c839ac50b7ecc29260ccf3ef743875533
-
Filesize
184KB
MD5f840379f82556ed0bed3c0360fed4016
SHA19977942c2729e901e3e6101920f23deebbc82294
SHA256ca5da4a1444f0f7e01a54dd4fddf1c575070fb8a64faaf92b40bf46b7aaa9cc5
SHA512628cc17bbcf0dbfb3d40d25010ac682da5c3bd66ed8bbdca18890e02c8b4904250d059a5674bbe2b5645a2c499fcac369d63d10f3fc3a5a745170f6ac954cf18
-
Filesize
184KB
MD5b178ca378d12a00e754c73e609aae7b6
SHA1b7ad41e5f6805cfeb4e89e72a78b0e748839ce28
SHA25654ce90f84c22f1909d8eded492512d8df096e341286f6c055cbabe01683c643d
SHA512348af57b8d6f9d0352487b26f50c71da5736fd6425ad31cc25f55d217f1d87c7cd985ea39171a0bc44562459e28111b90b2120628dd093bced162fc37765db3c
-
Filesize
184KB
MD51fd353258f5bbc982c8e496f117750b4
SHA1f5904e2443edd51af98ee16d278e24a740b34e77
SHA256f7b75ad73127633d7ee7c7a81cc95f07e6dd01332ed1f998044cc8b8c88cff46
SHA512f876718083d81f844bbce5e4071833bf1f4b32346e0e0020faa3b3703264862a6c839abdecf01e3b93e77b34c16afbee7922317f782b876433fc30da969743e4
-
Filesize
184KB
MD5a5a4015897bc30e66933e78baf2679fa
SHA1be88a57156919793e7acca14369e638acd6f8419
SHA2561cc1cb9d0342658d7cd593bfaa808f67a0ec23db424e0ffa1918a0e748ea765f
SHA512db00b402a44b03f3850b1d4c835c8aadd955356b454f885ee9524fc74d6306930995aadf0c9018e4292e36940a4d5bbcec5c833380bc7f0bc146153896080a2f
-
Filesize
184KB
MD58be8c4930d26aea96d0fdee369a32215
SHA12378944c7848ae8c8424ec1681eb8d85777ef4b9
SHA256a20288c8044fbb474d9833f0fe7f0d8815cd9e7136be52fb3b78de0bfc4eee92
SHA5127fa8d2075d74cd8fd6da2bb52dac8dc5ca09e1eb3a11d74e4420c54286beb7fea1ce5977c297cfa7a9dc0029ef356b6fb06a8021d40aab13d09d4de01b572fb6
-
Filesize
184KB
MD50a8d02408c60f9691d87e44a58de720e
SHA1577ea7913060cda7ca997f623da9b6086fde0ce3
SHA256d6f82beabf13cc218eb8aaca9268ffbb4e520d93201ecee44890773885fec974
SHA5123ab74fae0c4bdfed851771736b40ad50150a6fc42d51d8c143f835bd42b383250466ae6849696a07f863e80525166a1620bf3f1c6974731e39871fc87f895307
-
Filesize
184KB
MD5d8a228a5ce694cb1b347080f5d0728d7
SHA1ff8767569880f84f57c499054ec1a34de04ce4e1
SHA256cc7b0b005bf1756a240e4bae99798d67479925067d5a0576c784c786c5abe58d
SHA5123f4e8fc0a641cadceba031f47d87db4c743351c43bb4b6ec5b9c7b48a2c86de987383aa1342a0f5d9280ccde1c5a002153cc596f497501a13413e94a8e9893d4
-
Filesize
184KB
MD56ebf1a183734cce8d74224d873b279ce
SHA1f8d2136df236f6a1197f1f00c6419efa9d2a3412
SHA256fc628273ee781eb47e9209431c96fd93f656e1ba43f6d030e6ec0c08f271e0bd
SHA5123cb23f5602b881616e3746ddf1a3357d6367370ed9a6c6eb2ffc1fe399b6d90ed56480484eab895f13fe8e0aeb3b5c3a5a84a1558c40ad6075019a2ed83c02ac
-
Filesize
184KB
MD58ee90399fc12dae50da1f29233c9c599
SHA12df2c1907790142fac5ddf30c63c02516bc3f22a
SHA25626cc2ed160da170d66905b6dbcd370765b166db3365fbc769249a252309be4c1
SHA5129dddd60c62ac91e37bb9f4b07167beaf23e7fb30f3762f0f51f78aebc845b5ee02fdd492bbe98922ea1d324cdd3a6ccb81e6e601ece7135c987ebe96e02302ea
-
Filesize
184KB
MD5d3c00c23b5f76af1b35219c2049b4f83
SHA1cf5d09e3a81a7677f0ed372839367b1bff478a70
SHA256d31ddb76103e7b88bd3687d622e5bca905e61376afb3027df9a376fe203a17dc
SHA512520d0488a42306b56a7dac6ac2adeb221e5504b67aadf8d90f6411c62b1672c0334b95b09ab9cc6a6efeba95fdadde4b6ddf143eb0eae397871aa087bbba6e09
-
Filesize
184KB
MD5a9286f75296f8694d4486de1e0dddef5
SHA1759b3b1063930979e628be1863f38e1dd402f953
SHA256ae00587f30ff7b879862a54dff11f09db593c85fc247ee44b371a5ab86932416
SHA512dfaa7816ac5a94dd862636694887db83caf82ceb98fabc5ceb811ffbce4f8d6d5de8455e4ae97305f54af4593f299a407ec15ae54d6ea8d6fb0333ca2f7a89d7
-
Filesize
184KB
MD50adb201b632de790234883ab5bcd5323
SHA1b419bcb49e54a6af80bd113d4709900b924d96af
SHA256e00f1a5945c39dc40833a3279189507dbe60b000789fbb63758f42dad8b9bdbe
SHA51293aaaf11c4e3d83991e1a638844fda33c08f5da0ea6f9e7957351bc2b0679784b9df438e554433778a2264c7748183d1164d7ed6ae1b9da505c183435bdf0ef3
-
Filesize
184KB
MD5443033fcefdce090205885a13d89fc99
SHA164b7f2e40284bc3b6b1513008e416396f4beea30
SHA25628570ede86d03466f66102a8d3cc232158498ff250201190434117db65c8fd33
SHA512b44811841db212f082a03f5805b28a9f8eb7c4a303001c06c3816c41b1290bc00a7e7ac2fab12ff56efb67bc0a1a6bd65a6f288199680cc6df45e2cd6c460cc2
-
Filesize
184KB
MD57d95e24d8fc766b4e0636f0a061da727
SHA1644fef6229f0a8fd811fa2ae26ac35ac8fa5e0fa
SHA25693ee637cbe282eccef7bd417f13f4938b79bef2dccf38b5437754961ee79f509
SHA5127c6043d631451b65e0d1c50722be6145043744e0f6d6b02aedca02b9fe12907580d32b294a484edbe55392a57f254bc8ce0fdf89ccc1b80fcf9652101fb698a4
-
Filesize
184KB
MD55fc4c4a52875a15d0e2fd1cad9ceb8c9
SHA1a5ab26ef2217f4b03e1283417bcb42bdffe6eed3
SHA25681396c683615ff230204b6b793451f215a41cdd698bd1851112acc547ab0fb1d
SHA512cb733fa8aee9ff4062e3c3afa9d63a2c40035e18edd456931e9566e4d54fb0c6185ebd1ad3c7a5a136b640352c28699d977b90c8097623653c39cd98d8bccc99
-
Filesize
184KB
MD551d5c69cc58768e12516b3a0ad3381c4
SHA119acfa437b10ec3425b432f5e8148b6cce1340cd
SHA256f51d0da1ed39f51fd971741443143b81c2aef3f2aeab80ac13ede286796c9afc
SHA5127102204636df121be7b7c2aaab6a6dda4b0fa551c0da215d876f60643d6a600fa65e99e55cce151c116b8975bb36b4f74398723312ee5bce1c768eeb4c0237cb
-
Filesize
184KB
MD5f23a84cadd2f01bca17277f2dfc1f428
SHA177c244e467dc43a96cf3832d6c33956c23044321
SHA256037dbb6d8b643f1af9de589a2e850711ce2958cba48e6f04820f524398803e20
SHA512307730f43db9a6a0923ca60a6eb1e63a951800c3b6346f8c4dd794752fece5c74d0288a845bbf042061fe57d42f6ed9cf1178d6720aa507cc86fcb076e0fc586
-
Filesize
184KB
MD58e369ccd5a7e3f4fa6a8abf237c5305d
SHA16cc319e7383b71af2ea9ca521779f94442912cd2
SHA25645953ebd1dc47af2cd60eddcf560af1ed5b9199fc44ea1d99faa0e229fbf4bc8
SHA512b648895527ee34b7f613486413084229e7882b5a653a00f1ead25f3917fbef2b9dd7529b13cc681cd814f267c615ea3b2acc2e68084d3822848c1e61b1708f23
-
Filesize
184KB
MD5f2cf5bfc130311d9494eb9b71f1c06e2
SHA1f13f6381a4a5275325ea3e4e3490b3b97b43d049
SHA256e5b2813ca8bdcb03cf16ccde912e4d5abdb81483418af88455925ef83c010f17
SHA5127a66a056fac91e4642e80d426fecce5bdb9fdc58e95adcc087afbf0e035659a502248c22e3f684f08cc14615b9f0d0106c31d2bcf692685c647fee4d494e05c3