Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
4a462221db868ffd09975a8f3c7627d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a462221db868ffd09975a8f3c7627d4.exe
Resource
win10v2004-20231222-en
General
-
Target
4a462221db868ffd09975a8f3c7627d4.exe
-
Size
184KB
-
MD5
4a462221db868ffd09975a8f3c7627d4
-
SHA1
e19d2560e1aee3a3327be3d54bc71b65f4e7c8be
-
SHA256
6b2bc1201793f6b70f16a1575d756f7ca776ba224ce929f671616331f4926344
-
SHA512
fc8c4035139be532a460e27221df77415aece10f178cccded26b49196f7ede8cbf1881d23cd0ddac42830224696aaca246adf6f5a3bae57d06edb69e7ad91a7b
-
SSDEEP
3072:gdqTocRrBdAV7eN+MzZ3Gic2Lb9aMR17/bnrxDuPO0ylP6pFg:gdCoyKV7vMRGiciLREylP6pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2464 Unicorn-23837.exe 2340 Unicorn-30495.exe 832 Unicorn-59446.exe 2768 Unicorn-30568.exe 2156 Unicorn-10510.exe 2740 Unicorn-46904.exe 1816 Unicorn-23677.exe 2900 Unicorn-11097.exe 2948 Unicorn-22835.exe 3020 Unicorn-27050.exe 1724 Unicorn-56385.exe 1008 Unicorn-20374.exe 964 Unicorn-62646.exe 2808 Unicorn-65215.exe 1612 Unicorn-35557.exe 1504 Unicorn-6222.exe 1256 Unicorn-39580.exe 3064 Unicorn-39580.exe 2456 Unicorn-19714.exe 1044 Unicorn-62299.exe 1944 Unicorn-62299.exe 1132 Unicorn-29662.exe 1760 Unicorn-61375.exe 764 Unicorn-44977.exe 388 Unicorn-34452.exe 892 Unicorn-34452.exe 840 Unicorn-54318.exe 368 Unicorn-54318.exe 2396 Unicorn-50405.exe 1532 Unicorn-4733.exe 868 Unicorn-36285.exe 1584 Unicorn-10348.exe 1688 Unicorn-56020.exe 2196 Unicorn-39299.exe 1936 Unicorn-59165.exe 2796 Unicorn-42061.exe 3052 Unicorn-26083.exe 2588 Unicorn-43825.exe 2748 Unicorn-56378.exe 2728 Unicorn-10514.exe 2624 Unicorn-6793.exe 2112 Unicorn-46944.exe 748 Unicorn-58298.exe 2932 Unicorn-29840.exe 2920 Unicorn-61936.exe 2812 Unicorn-61936.exe 2880 Unicorn-48615.exe 2804 Unicorn-2559.exe 1932 Unicorn-17391.exe 268 Unicorn-15589.exe 2652 Unicorn-19804.exe 1568 Unicorn-42300.exe 1996 Unicorn-38578.exe 1752 Unicorn-58444.exe 1704 Unicorn-54147.exe 2212 Unicorn-54469.exe 2064 Unicorn-56835.exe 596 Unicorn-27308.exe 2364 Unicorn-39861.exe 1844 Unicorn-55849.exe 1648 Unicorn-8890.exe 2368 Unicorn-24136.exe 2356 Unicorn-8122.exe 1476 Unicorn-34018.exe -
Loads dropped DLL 64 IoCs
pid Process 2152 4a462221db868ffd09975a8f3c7627d4.exe 2152 4a462221db868ffd09975a8f3c7627d4.exe 2464 Unicorn-23837.exe 2464 Unicorn-23837.exe 2152 4a462221db868ffd09975a8f3c7627d4.exe 2152 4a462221db868ffd09975a8f3c7627d4.exe 2340 Unicorn-30495.exe 2340 Unicorn-30495.exe 2464 Unicorn-23837.exe 2464 Unicorn-23837.exe 832 Unicorn-59446.exe 832 Unicorn-59446.exe 2768 Unicorn-30568.exe 2768 Unicorn-30568.exe 2156 Unicorn-10510.exe 2340 Unicorn-30495.exe 2156 Unicorn-10510.exe 2340 Unicorn-30495.exe 2740 Unicorn-46904.exe 2740 Unicorn-46904.exe 832 Unicorn-59446.exe 832 Unicorn-59446.exe 1816 Unicorn-23677.exe 1816 Unicorn-23677.exe 2768 Unicorn-30568.exe 2768 Unicorn-30568.exe 2900 Unicorn-11097.exe 2900 Unicorn-11097.exe 2156 Unicorn-10510.exe 2156 Unicorn-10510.exe 3020 Unicorn-27050.exe 3020 Unicorn-27050.exe 2740 Unicorn-46904.exe 2740 Unicorn-46904.exe 2948 Unicorn-22835.exe 2948 Unicorn-22835.exe 1724 Unicorn-56385.exe 1724 Unicorn-56385.exe 964 Unicorn-62646.exe 1008 Unicorn-20374.exe 1008 Unicorn-20374.exe 964 Unicorn-62646.exe 1816 Unicorn-23677.exe 1816 Unicorn-23677.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 2900 Unicorn-11097.exe 2900 Unicorn-11097.exe 1504 Unicorn-6222.exe 1504 Unicorn-6222.exe 1920 WerFault.exe 2948 Unicorn-22835.exe 3020 Unicorn-27050.exe 1612 Unicorn-35557.exe 1256 Unicorn-39580.exe 2948 Unicorn-22835.exe 3020 Unicorn-27050.exe 1612 Unicorn-35557.exe 1256 Unicorn-39580.exe 3064 Unicorn-39580.exe -
Program crash 8 IoCs
pid pid_target Process procid_target 1920 2808 WerFault.exe 41 1104 1704 WerFault.exe 83 1044 1912 WerFault.exe 108 2024 2992 WerFault.exe 105 400 312 WerFault.exe 122 2192 2040 WerFault.exe 178 1580 2612 WerFault.exe 169 2908 2136 WerFault.exe 194 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2152 4a462221db868ffd09975a8f3c7627d4.exe 2464 Unicorn-23837.exe 2340 Unicorn-30495.exe 832 Unicorn-59446.exe 2768 Unicorn-30568.exe 2156 Unicorn-10510.exe 2740 Unicorn-46904.exe 1816 Unicorn-23677.exe 2900 Unicorn-11097.exe 3020 Unicorn-27050.exe 1724 Unicorn-56385.exe 2948 Unicorn-22835.exe 1008 Unicorn-20374.exe 964 Unicorn-62646.exe 2808 Unicorn-65215.exe 1504 Unicorn-6222.exe 1612 Unicorn-35557.exe 1256 Unicorn-39580.exe 3064 Unicorn-39580.exe 2456 Unicorn-19714.exe 1044 Unicorn-62299.exe 1944 Unicorn-62299.exe 1132 Unicorn-29662.exe 1760 Unicorn-61375.exe 764 Unicorn-44977.exe 840 Unicorn-54318.exe 892 Unicorn-34452.exe 388 Unicorn-34452.exe 2396 Unicorn-50405.exe 368 Unicorn-54318.exe 1532 Unicorn-4733.exe 868 Unicorn-36285.exe 1688 Unicorn-56020.exe 1584 Unicorn-10348.exe 1936 Unicorn-59165.exe 2196 Unicorn-39299.exe 2796 Unicorn-42061.exe 3052 Unicorn-26083.exe 2588 Unicorn-43825.exe 2748 Unicorn-56378.exe 2624 Unicorn-6793.exe 2728 Unicorn-10514.exe 2112 Unicorn-46944.exe 748 Unicorn-58298.exe 2920 Unicorn-61936.exe 2932 Unicorn-29840.exe 2880 Unicorn-48615.exe 2812 Unicorn-61936.exe 2804 Unicorn-2559.exe 1932 Unicorn-17391.exe 2652 Unicorn-19804.exe 268 Unicorn-15589.exe 1996 Unicorn-38578.exe 1704 Unicorn-54147.exe 2212 Unicorn-54469.exe 1568 Unicorn-42300.exe 1752 Unicorn-58444.exe 2064 Unicorn-56835.exe 596 Unicorn-27308.exe 2364 Unicorn-39861.exe 1844 Unicorn-55849.exe 2356 Unicorn-8122.exe 2368 Unicorn-24136.exe 1648 Unicorn-8890.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2464 2152 4a462221db868ffd09975a8f3c7627d4.exe 28 PID 2152 wrote to memory of 2464 2152 4a462221db868ffd09975a8f3c7627d4.exe 28 PID 2152 wrote to memory of 2464 2152 4a462221db868ffd09975a8f3c7627d4.exe 28 PID 2152 wrote to memory of 2464 2152 4a462221db868ffd09975a8f3c7627d4.exe 28 PID 2464 wrote to memory of 2340 2464 Unicorn-23837.exe 29 PID 2464 wrote to memory of 2340 2464 Unicorn-23837.exe 29 PID 2464 wrote to memory of 2340 2464 Unicorn-23837.exe 29 PID 2464 wrote to memory of 2340 2464 Unicorn-23837.exe 29 PID 2152 wrote to memory of 832 2152 4a462221db868ffd09975a8f3c7627d4.exe 30 PID 2152 wrote to memory of 832 2152 4a462221db868ffd09975a8f3c7627d4.exe 30 PID 2152 wrote to memory of 832 2152 4a462221db868ffd09975a8f3c7627d4.exe 30 PID 2152 wrote to memory of 832 2152 4a462221db868ffd09975a8f3c7627d4.exe 30 PID 2340 wrote to memory of 2768 2340 Unicorn-30495.exe 31 PID 2340 wrote to memory of 2768 2340 Unicorn-30495.exe 31 PID 2340 wrote to memory of 2768 2340 Unicorn-30495.exe 31 PID 2340 wrote to memory of 2768 2340 Unicorn-30495.exe 31 PID 2464 wrote to memory of 2156 2464 Unicorn-23837.exe 32 PID 2464 wrote to memory of 2156 2464 Unicorn-23837.exe 32 PID 2464 wrote to memory of 2156 2464 Unicorn-23837.exe 32 PID 2464 wrote to memory of 2156 2464 Unicorn-23837.exe 32 PID 832 wrote to memory of 2740 832 Unicorn-59446.exe 33 PID 832 wrote to memory of 2740 832 Unicorn-59446.exe 33 PID 832 wrote to memory of 2740 832 Unicorn-59446.exe 33 PID 832 wrote to memory of 2740 832 Unicorn-59446.exe 33 PID 2768 wrote to memory of 1816 2768 Unicorn-30568.exe 34 PID 2768 wrote to memory of 1816 2768 Unicorn-30568.exe 34 PID 2768 wrote to memory of 1816 2768 Unicorn-30568.exe 34 PID 2768 wrote to memory of 1816 2768 Unicorn-30568.exe 34 PID 2156 wrote to memory of 2900 2156 Unicorn-10510.exe 35 PID 2156 wrote to memory of 2900 2156 Unicorn-10510.exe 35 PID 2156 wrote to memory of 2900 2156 Unicorn-10510.exe 35 PID 2156 wrote to memory of 2900 2156 Unicorn-10510.exe 35 PID 2340 wrote to memory of 2948 2340 Unicorn-30495.exe 36 PID 2340 wrote to memory of 2948 2340 Unicorn-30495.exe 36 PID 2340 wrote to memory of 2948 2340 Unicorn-30495.exe 36 PID 2340 wrote to memory of 2948 2340 Unicorn-30495.exe 36 PID 2740 wrote to memory of 3020 2740 Unicorn-46904.exe 37 PID 2740 wrote to memory of 3020 2740 Unicorn-46904.exe 37 PID 2740 wrote to memory of 3020 2740 Unicorn-46904.exe 37 PID 2740 wrote to memory of 3020 2740 Unicorn-46904.exe 37 PID 832 wrote to memory of 1724 832 Unicorn-59446.exe 38 PID 832 wrote to memory of 1724 832 Unicorn-59446.exe 38 PID 832 wrote to memory of 1724 832 Unicorn-59446.exe 38 PID 832 wrote to memory of 1724 832 Unicorn-59446.exe 38 PID 1816 wrote to memory of 1008 1816 Unicorn-23677.exe 39 PID 1816 wrote to memory of 1008 1816 Unicorn-23677.exe 39 PID 1816 wrote to memory of 1008 1816 Unicorn-23677.exe 39 PID 1816 wrote to memory of 1008 1816 Unicorn-23677.exe 39 PID 2768 wrote to memory of 964 2768 Unicorn-30568.exe 40 PID 2768 wrote to memory of 964 2768 Unicorn-30568.exe 40 PID 2768 wrote to memory of 964 2768 Unicorn-30568.exe 40 PID 2768 wrote to memory of 964 2768 Unicorn-30568.exe 40 PID 2900 wrote to memory of 2808 2900 Unicorn-11097.exe 41 PID 2900 wrote to memory of 2808 2900 Unicorn-11097.exe 41 PID 2900 wrote to memory of 2808 2900 Unicorn-11097.exe 41 PID 2900 wrote to memory of 2808 2900 Unicorn-11097.exe 41 PID 2156 wrote to memory of 1612 2156 Unicorn-10510.exe 42 PID 2156 wrote to memory of 1612 2156 Unicorn-10510.exe 42 PID 2156 wrote to memory of 1612 2156 Unicorn-10510.exe 42 PID 2156 wrote to memory of 1612 2156 Unicorn-10510.exe 42 PID 3020 wrote to memory of 1504 3020 Unicorn-27050.exe 43 PID 3020 wrote to memory of 1504 3020 Unicorn-27050.exe 43 PID 3020 wrote to memory of 1504 3020 Unicorn-27050.exe 43 PID 3020 wrote to memory of 1504 3020 Unicorn-27050.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a462221db868ffd09975a8f3c7627d4.exe"C:\Users\Admin\AppData\Local\Temp\4a462221db868ffd09975a8f3c7627d4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23837.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30495.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30568.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23677.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20374.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36285.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe10⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26123.exe11⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38246.exe12⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1897.exe13⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56780.exe14⤵PID:1032
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17917.exe9⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52350.exe10⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exe11⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18554.exe12⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8721.exe13⤵PID:2008
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15589.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41264.exe9⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe10⤵PID:2692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56020.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19804.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exe9⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36511.exe10⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exe11⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exe12⤵PID:3068
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29662.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59165.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54469.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35080.exe9⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe10⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57398.exe11⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11010.exe12⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35812.exe13⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6510.exe14⤵PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51798.exe13⤵PID:2176
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51177.exe8⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49143.exe9⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48290.exe10⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exe11⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11856.exe12⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1087.exe13⤵PID:296
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2957.exe8⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38111.exe9⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58291.exe10⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20135.exe11⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18213.exe12⤵PID:2812
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62646.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10348.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39861.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe9⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57024.exe10⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe11⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18638.exe12⤵PID:1616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1773.exe8⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37151.exe9⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9328.exe10⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11280.exe11⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe12⤵PID:476
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5799.exe9⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35463.exe10⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51271.exe11⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe12⤵PID:2752
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55849.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56901.exe8⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63689.exe9⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2748.exe10⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40782.exe11⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe12⤵PID:2688
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39299.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58444.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe8⤵PID:1448
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22835.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46944.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8890.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21084.exe9⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exe10⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exe11⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9023.exe12⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6126.exe13⤵PID:2296
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24136.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38592.exe8⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23420.exe9⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29593.exe10⤵PID:2152
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58298.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8122.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exe8⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 2409⤵
- Program crash
PID:1044
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2559.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34457.exe7⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30825.exe8⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exe9⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exe10⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56458.exe11⤵PID:1472
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10510.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11097.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65215.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 2406⤵
- Loads dropped DLL
- Program crash
PID:1920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61375.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42061.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42300.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31297.exe8⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16736.exe9⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32743.exe10⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41913.exe11⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24684.exe12⤵PID:2924
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exe8⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-553.exe9⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9583.exe10⤵PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 22010⤵
- Program crash
PID:1580
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38578.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24840.exe7⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2750.exe8⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56448.exe9⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19.exe10⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52701.exe11⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44051.exe12⤵PID:2600
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35557.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10514.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-551.exe7⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60643.exe8⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65436.exe9⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37308.exe10⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20029.exe11⤵PID:2220
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60504.exe6⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59406.exe7⤵PID:1636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6793.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34018.exe6⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36985.exe7⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10818.exe8⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36429.exe9⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe10⤵PID:2672
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46904.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27050.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6222.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44977.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26083.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54147.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22765.exe8⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32776.exe9⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22614.exe10⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26688.exe11⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe12⤵PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 23612⤵
- Program crash
PID:2908
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 23611⤵
- Program crash
PID:2192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 312 -s 22010⤵
- Program crash
PID:400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 2369⤵
- Program crash
PID:2024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 2368⤵
- Program crash
PID:1104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56378.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1869.exe7⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12033.exe8⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29507.exe9⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe10⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32572.exe11⤵PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11938.exe10⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe11⤵PID:2700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62187.exe9⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43304.exe10⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61633.exe11⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14415.exe12⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21887.exe13⤵PID:3060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57528.exe10⤵PID:1584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26662.exe8⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exe9⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64467.exe10⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41705.exe11⤵PID:1308
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29840.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63592.exe7⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33736.exe8⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-975.exe9⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe10⤵PID:2168
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12481.exe6⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe7⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26584.exe8⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe9⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exe10⤵PID:616
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19714.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43825.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27308.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27512.exe7⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe8⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23018.exe9⤵PID:1624
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56385.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4733.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47098.exe7⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23181.exe8⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exe9⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe10⤵PID:2052
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48615.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57684.exe6⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22439.exe7⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe8⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17082.exe9⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exe10⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe11⤵PID:2496
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50405.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32347.exe6⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48759.exe7⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe8⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44497.exe9⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exe10⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exe11⤵PID:1196
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21398.exe8⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30113.exe9⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43595.exe10⤵PID:1620
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25911.exe5⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27877.exe6⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20133.exe7⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39930.exe8⤵PID:2780
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD541cdede790b75dcc30b8a4b9cdaa4ea9
SHA1cfda89e73165ff17f873ff29b1b9cd180c447bb7
SHA256ee20421517b3caf7c151060169d6a8267dff67b14ea169702cb286f1622adf7d
SHA512f9e987a5aaeff61b962cd4e98984dcaba21af1b54e9bbdce899d808fcae64ed8f4e5f57796f12f2c67f5e4426b10b9bc8c15a8bbe1417cfdc9e4b969acd7d706
-
Filesize
184KB
MD5589c692800a65ca7596fb62c9c8d1e5e
SHA1420bb89e5f8484eff6985768c10d0bc46b412efb
SHA256ba2ef04f3e4ecc6af39112dc9e97ea3d76236a5e4640b45a34c3557e57e1644d
SHA512c14443df27bb4476982636da26f34cc66b29d0a268a3de7faba9fc84d529550245706dcf81bef4a8334228924f65b85a0cf684c18ca6dfb04e7e372d6579387a
-
Filesize
184KB
MD517027fecdc3dcaed01e63dee37190faf
SHA16f8fa1ce5e1ac4208c2db758314857c4953c4bab
SHA25617055e06ab9b050734d6febd1d8b2a0428525cd59399ee2b08d27cbb9c0ed5e1
SHA51235b07503d4dba4262f6ad64d83c11521de6cf7ef0d59ed03d8869037b377f6666a191a510ca72e474d83b1aeda808d537cf91d20fbb9efd2e90e2645772b960a
-
Filesize
184KB
MD5e20bfea239e766a124c6195051dc9163
SHA1dc20263c52b61a56c7fcb436936c422ac0875c64
SHA256a8920bb406112ae9841dfc66bfb23d81c5041e4e13b0dc963162b0a4a9008c3d
SHA5121f244a481809991dda07d994acfeb582ab53f60fcdff95a87a118239991e8aede90ffae8befcb8c1bf88abb1f7c64a297f7b3c3f84db5c3f34ed24fe91c83ba0
-
Filesize
184KB
MD5c983004a7eb30c589c2f906105b69721
SHA135df810f533f55cb9e995ae9ac41c9f8054578e7
SHA256ce8cb385b105d9998f5f6cade3899fa2e45fb3b819dd2a135e08259c4d31feb1
SHA51277e77bb72ae14b43fbbc5dd6dca1566f183852a6edd355ae460a5fc7efb4486330bde7850d55da1d5e9fb8f9d4b87d2b91a5564e6344e63376a7926d6d407fd0
-
Filesize
184KB
MD5a46535aa4a26b3cb8af5f4e0aa51e167
SHA12a1fb138efef07ce0f7ac2321f6737e9bcd1da67
SHA2568eb826e01cbe95b8534aa3419bd97a03006873d6795a4cd4146a778db9c48310
SHA512e6d703ab0964410f119dfa81f8f29bc32ad293519bce3fc5a6fa133ec91899b28b1458b31b25cc3342adce8679e4089b2ab9b2806b3d5904ad4ae50a739e183b
-
Filesize
184KB
MD5c43d7238760be038d19bc2a4201af89a
SHA1a95ccb0ce8dc42486328a5f4b876c4487a132e64
SHA256ab8c6a7dde251e0f69a84972453c7f488876db509b9910b90001a1680f9fa870
SHA51235c276abb9aeaecfd57b7987e57f40c9d683170f8e57f6893436e4e2c862e1f14536a385293f26c0484ab25c2a02feb64774a6acec465fe9b0cb7f3e0fe2cd0b
-
Filesize
184KB
MD5843d5071009586e4456cd9f26d6e6aa5
SHA1d1fa136d3e999bb2514a30241b1f39217e408b34
SHA2562b8f0424fe8dbee3bb802dd5812227eac119a3901690a1c1f81e384b363a6e95
SHA51241b62d4ba25324b16c33926151840a75cbc9947eee12317264e31bf2807060befc562f993202d895b33f453db947dd858ea320e09d5f40802f689bb05384c0c5
-
Filesize
184KB
MD54849aa23c28168c77c086dd84e12fdd8
SHA123c0a0b8e7713ac35c91f0affd0dad02a6d068b5
SHA2561c93f02bcaee3ec7c90e281c99692e088b3d79f5c2e3a5398428ceae234f343f
SHA512d0c5ca5277052affb793fcd0a3c2ce9c2a6932a0707d73d7a57807a29bb7820275e836e94107cda06b4395cb2707e323f3dbe02b1388f3720ce85d485a36196a
-
Filesize
184KB
MD579db5968ed0a4fbfb9f3848f3bef3a34
SHA1be20e669906e7c68b9d9b41fc76019eddad96d23
SHA2564b0c6b60c095aad13efe1028fa58ee0f78f543133e8a032b9adb0bba71ce6842
SHA512b382512a699867b5347cb6aa7dc2d0b65092a0631b3947020d7f80f33584301e06c95a7a592e83dcf3663e388abc35fb233cd54aa238ef1bfd7c76b8a12dfdc6
-
Filesize
184KB
MD5f20fae846f4ba14622943c4016c634ca
SHA15a1ca50323cca6cb2a002dcb5d3dcf61b1a56cb8
SHA2562776ead44106ab7c95916c83f9fec72c1fd5f11e004efd0b6465384abcdd4b55
SHA51265f78a52c85a7986f168f3dc0f12f03a10176b326cd6e2c62da1a7083cfa414849944145198e29868b1e61c1530da6f18075a52eb36c53100ed9e88032c9e32e
-
Filesize
184KB
MD5e2113dc1e4779f4798d36c424b2a20d1
SHA11988dc46c5bdbed79950c7d0248ee11bb86a77a8
SHA256e52d20f602f98a9e5827c6b0a3bd4b22df3946acb577d45a7293ec1960cca7c0
SHA5120f8f48a7fe64727b6980395e35e7700ec45c6a365e46988e615b072beceef6aef4c836b395b2baaad3d98d91898bf25fc5120b0376316b327658e459a8026516
-
Filesize
184KB
MD593406f8b23ecf5d52c336664328bd627
SHA136a49440f4cb18f7f85503aed679407c8525623a
SHA256c447877335fbbb9395ad8f4ba2e48ba0e0830f40f6d3c428b9ca87c46d44b590
SHA512035e4fdc1af625dbb13541d18f9ea1b7755cf0e1e0087bf1dbecaceb7ffb75a5fd77e38e4296f7d8eb00e00b357cda52c9c93e893094e7e2d56314e8d8c6541d
-
Filesize
184KB
MD5c2b84c880e47ad7ef98292a6734daacb
SHA140b3d4e449076a6d77a37e639f533fbdb2f2859f
SHA2567584c9f48ec3d2e4ad13a5dca3151660c49af200bdfb5c25ae409cecbbc72ab9
SHA5121652a34a59e4bce11dfbd175f58a6ea27c369d50c2b0086157b0e913bbcfe3773062a1beec2929d23318d1ccbae5bf79f1ece45516dbbc95971f6c8e71d848fe
-
Filesize
184KB
MD503380832449a05a18aef460233267748
SHA147fa3510d3cc9b22f678181ec3258d66741a6d69
SHA256b087dff58fde4704c6cc4a13f67faec88567d75e942317316b61cfaeb71e17af
SHA512ee60315ee9d26e4b8823fdd39a19da80c07a9dda1c921d98cde9cd3034f64ee86eb8ee4b96423f8a382cc1442bd8931387fcaab9f6cede9e4c3cecc38f6f8a48
-
Filesize
184KB
MD5f08057ef3a2565a80572e14221e6a946
SHA1965aac1c674bdfa1e02e5c96ba08e80de0286986
SHA25656d9c40e1c6dd6659db4eb5a22c9fe93c7de7d8da2638e3d34fdac91071d86c9
SHA5124880ea4f78cd3609c471c94896612a824f3398006b0d8d4f87675be2d2b68f87781e39622dee775e2072a55019d0d96cbf848ec8454b1a47a810b4e5263f8a04
-
Filesize
184KB
MD5de6e570d20759593390ac7d34c766cc4
SHA194a1726450e76045380eee720e06ab72ae038d4f
SHA25615d480d09267f184e0cbe830eaa0a0a0ff719ef3b345268e3ce4b5177705dbc1
SHA51262173de992b7d84734dfb514cb2f5319cc908dbf2bc02b4b390588aea2088f370050f8325b40a6aa3a3baa75ee77a8707dc74efd2a46840fb04e240a77958ded
-
Filesize
184KB
MD5446e1f84e50b7d3d27c416e31cdb7928
SHA1bc1ffab826624f0c3d1a89af2b153ad6ca704cd1
SHA256706f0f510269d6d7b664270ddf02bd90dadc2a8f472e66a9d7a7476916e71ef5
SHA5124961d774003f47594cf6b95a5cf84b75cec2e7d870774283030d7f8f00411027498fc8b22cc7f0bb1932a812721f574c14008e47ad3212df6e0a43eef94b1554
-
Filesize
184KB
MD5ab0a532c242c4db44c6101a502bc5668
SHA137fe936b4be03d1d7250693046238306dfe0667f
SHA256264d29f35070c14c6e6dcc67bf1e1dd990f74a31c631c6557961f1b2f5ddf167
SHA512ad9feb7f9fb04f22bd57792e95ddd9e96bbb0b37992cfc443f6e62a4576d7ca8eabfac1e72be0ef5a212f212b2258620081a4a6515daf203939000179a54a34b