Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
56ecbabfc9cc777b3b2385f14765f9d2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56ecbabfc9cc777b3b2385f14765f9d2.exe
Resource
win10v2004-20231222-en
General
-
Target
56ecbabfc9cc777b3b2385f14765f9d2.exe
-
Size
184KB
-
MD5
56ecbabfc9cc777b3b2385f14765f9d2
-
SHA1
56ca5c04d8f054b5f92370247de7124e77bad20a
-
SHA256
3cd779d9675770643b51915c1f9e4e04fef6f6f39eadf723e63eedfdd676e049
-
SHA512
785b5505f0380c9fe312bd8032c68a949e28076ff6110fa3d72c8c4bfac829031334c5cbf117db0b06954d6964e4cc219d8b768d48d7075df1be41b7ad2a5fe1
-
SSDEEP
3072:yTuGomLLPUf0nOjZM3P6vJ016kuMK8qX8SxKra1uNlPvpFC:yTbogC0nmMf6vJ/3stNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2836 Unicorn-17245.exe 2136 Unicorn-54816.exe 2708 Unicorn-59647.exe 2752 Unicorn-27655.exe 2584 Unicorn-28100.exe 2728 Unicorn-47966.exe 1060 Unicorn-45465.exe 1448 Unicorn-57696.exe 1580 Unicorn-12024.exe 2960 Unicorn-53612.exe 2936 Unicorn-7940.exe 1092 Unicorn-35024.exe 1324 Unicorn-38231.exe 1248 Unicorn-42293.exe 2316 Unicorn-13150.exe 776 Unicorn-5729.exe 268 Unicorn-25595.exe 2260 Unicorn-35277.exe 704 Unicorn-39430.exe 364 Unicorn-56513.exe 1460 Unicorn-2097.exe 2328 Unicorn-47769.exe 804 Unicorn-56129.exe 2528 Unicorn-27370.exe 1956 Unicorn-56705.exe 2012 Unicorn-19202.exe 2900 Unicorn-40560.exe 2068 Unicorn-51189.exe 2248 Unicorn-32606.exe 2096 Unicorn-8101.exe 1088 Unicorn-65361.exe 2700 Unicorn-53280.exe 2820 Unicorn-56809.exe 2564 Unicorn-49601.exe 2944 Unicorn-49279.exe 2784 Unicorn-15860.exe 2604 Unicorn-12268.exe 2632 Unicorn-60592.exe 1432 Unicorn-24390.exe 948 Unicorn-28880.exe 2968 Unicorn-65444.exe 2440 Unicorn-28688.exe 2904 Unicorn-42646.exe 2796 Unicorn-38562.exe 1508 Unicorn-17396.exe 856 Unicorn-13202.exe 1900 Unicorn-17827.exe 2152 Unicorn-22103.exe 584 Unicorn-63114.exe 2184 Unicorn-39015.exe 1556 Unicorn-18595.exe 2140 Unicorn-55221.exe 836 Unicorn-41646.exe 828 Unicorn-47074.exe 2468 Unicorn-50774.exe 1016 Unicorn-2896.exe 888 Unicorn-64349.exe 1952 Unicorn-47266.exe 2016 Unicorn-14676.exe 2776 Unicorn-6124.exe 1484 Unicorn-64152.exe 2836 Unicorn-20380.exe 1612 Unicorn-3467.exe 2692 Unicorn-12943.exe -
Loads dropped DLL 64 IoCs
pid Process 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 2836 Unicorn-17245.exe 2836 Unicorn-17245.exe 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 2136 Unicorn-54816.exe 2136 Unicorn-54816.exe 2836 Unicorn-17245.exe 2836 Unicorn-17245.exe 2708 Unicorn-59647.exe 2708 Unicorn-59647.exe 2728 Unicorn-47966.exe 2728 Unicorn-47966.exe 2708 Unicorn-59647.exe 2708 Unicorn-59647.exe 2752 Unicorn-27655.exe 2752 Unicorn-27655.exe 2136 Unicorn-54816.exe 2584 Unicorn-28100.exe 2584 Unicorn-28100.exe 2136 Unicorn-54816.exe 1448 Unicorn-57696.exe 1448 Unicorn-57696.exe 1580 Unicorn-12024.exe 1580 Unicorn-12024.exe 2752 Unicorn-27655.exe 2752 Unicorn-27655.exe 2936 Unicorn-7940.exe 2936 Unicorn-7940.exe 2584 Unicorn-28100.exe 2584 Unicorn-28100.exe 1060 Unicorn-45465.exe 1060 Unicorn-45465.exe 2728 Unicorn-47966.exe 2728 Unicorn-47966.exe 1092 Unicorn-35024.exe 1092 Unicorn-35024.exe 1448 Unicorn-57696.exe 1448 Unicorn-57696.exe 1324 Unicorn-38231.exe 1324 Unicorn-38231.exe 2960 Unicorn-53612.exe 2960 Unicorn-53612.exe 1580 Unicorn-12024.exe 1580 Unicorn-12024.exe 268 Unicorn-25595.exe 268 Unicorn-25595.exe 1060 Unicorn-45465.exe 1060 Unicorn-45465.exe 2316 Unicorn-13150.exe 2316 Unicorn-13150.exe 2936 Unicorn-7940.exe 2936 Unicorn-7940.exe 2260 Unicorn-35277.exe 2260 Unicorn-35277.exe 776 Unicorn-5729.exe 776 Unicorn-5729.exe 1248 Unicorn-42293.exe 1248 Unicorn-42293.exe 704 Unicorn-39430.exe 704 Unicorn-39430.exe 1092 Unicorn-35024.exe 1092 Unicorn-35024.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 2520 2940 WerFault.exe 170 704 1912 WerFault.exe 198 1184 2316 WerFault.exe 254 1248 1056 WerFault.exe 283 2504 1880 WerFault.exe 308 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 2836 Unicorn-17245.exe 2136 Unicorn-54816.exe 2708 Unicorn-59647.exe 2752 Unicorn-27655.exe 2728 Unicorn-47966.exe 2584 Unicorn-28100.exe 1448 Unicorn-57696.exe 1580 Unicorn-12024.exe 2936 Unicorn-7940.exe 2960 Unicorn-53612.exe 1060 Unicorn-45465.exe 1092 Unicorn-35024.exe 1324 Unicorn-38231.exe 1248 Unicorn-42293.exe 2316 Unicorn-13150.exe 268 Unicorn-25595.exe 776 Unicorn-5729.exe 2260 Unicorn-35277.exe 704 Unicorn-39430.exe 364 Unicorn-56513.exe 1460 Unicorn-2097.exe 2328 Unicorn-47769.exe 804 Unicorn-56129.exe 2528 Unicorn-27370.exe 1956 Unicorn-56705.exe 2012 Unicorn-19202.exe 2068 Unicorn-51189.exe 2900 Unicorn-40560.exe 2248 Unicorn-32606.exe 2096 Unicorn-8101.exe 1088 Unicorn-65361.exe 2820 Unicorn-56809.exe 2700 Unicorn-53280.exe 2564 Unicorn-49601.exe 2944 Unicorn-49279.exe 2784 Unicorn-15860.exe 2604 Unicorn-12268.exe 2632 Unicorn-60592.exe 1432 Unicorn-24390.exe 948 Unicorn-28880.exe 2968 Unicorn-65444.exe 2440 Unicorn-28688.exe 2796 Unicorn-38562.exe 2904 Unicorn-42646.exe 1508 Unicorn-17396.exe 856 Unicorn-13202.exe 1900 Unicorn-17827.exe 2152 Unicorn-22103.exe 584 Unicorn-63114.exe 2184 Unicorn-39015.exe 1556 Unicorn-18595.exe 836 Unicorn-41646.exe 2140 Unicorn-55221.exe 828 Unicorn-47074.exe 2468 Unicorn-50774.exe 1016 Unicorn-2896.exe 1952 Unicorn-47266.exe 888 Unicorn-64349.exe 2016 Unicorn-14676.exe 2776 Unicorn-6124.exe 1484 Unicorn-64152.exe 2836 Unicorn-20380.exe 1612 Unicorn-3467.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2836 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 28 PID 2224 wrote to memory of 2836 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 28 PID 2224 wrote to memory of 2836 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 28 PID 2224 wrote to memory of 2836 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 28 PID 2836 wrote to memory of 2136 2836 Unicorn-17245.exe 29 PID 2836 wrote to memory of 2136 2836 Unicorn-17245.exe 29 PID 2836 wrote to memory of 2136 2836 Unicorn-17245.exe 29 PID 2836 wrote to memory of 2136 2836 Unicorn-17245.exe 29 PID 2224 wrote to memory of 2708 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 30 PID 2224 wrote to memory of 2708 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 30 PID 2224 wrote to memory of 2708 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 30 PID 2224 wrote to memory of 2708 2224 56ecbabfc9cc777b3b2385f14765f9d2.exe 30 PID 2136 wrote to memory of 2752 2136 Unicorn-54816.exe 31 PID 2136 wrote to memory of 2752 2136 Unicorn-54816.exe 31 PID 2136 wrote to memory of 2752 2136 Unicorn-54816.exe 31 PID 2136 wrote to memory of 2752 2136 Unicorn-54816.exe 31 PID 2836 wrote to memory of 2584 2836 Unicorn-17245.exe 32 PID 2836 wrote to memory of 2584 2836 Unicorn-17245.exe 32 PID 2836 wrote to memory of 2584 2836 Unicorn-17245.exe 32 PID 2836 wrote to memory of 2584 2836 Unicorn-17245.exe 32 PID 2708 wrote to memory of 2728 2708 Unicorn-59647.exe 33 PID 2708 wrote to memory of 2728 2708 Unicorn-59647.exe 33 PID 2708 wrote to memory of 2728 2708 Unicorn-59647.exe 33 PID 2708 wrote to memory of 2728 2708 Unicorn-59647.exe 33 PID 2728 wrote to memory of 1060 2728 Unicorn-47966.exe 34 PID 2728 wrote to memory of 1060 2728 Unicorn-47966.exe 34 PID 2728 wrote to memory of 1060 2728 Unicorn-47966.exe 34 PID 2728 wrote to memory of 1060 2728 Unicorn-47966.exe 34 PID 2708 wrote to memory of 1448 2708 Unicorn-59647.exe 35 PID 2708 wrote to memory of 1448 2708 Unicorn-59647.exe 35 PID 2708 wrote to memory of 1448 2708 Unicorn-59647.exe 35 PID 2708 wrote to memory of 1448 2708 Unicorn-59647.exe 35 PID 2752 wrote to memory of 1580 2752 Unicorn-27655.exe 36 PID 2752 wrote to memory of 1580 2752 Unicorn-27655.exe 36 PID 2752 wrote to memory of 1580 2752 Unicorn-27655.exe 36 PID 2752 wrote to memory of 1580 2752 Unicorn-27655.exe 36 PID 2584 wrote to memory of 2936 2584 Unicorn-28100.exe 37 PID 2584 wrote to memory of 2936 2584 Unicorn-28100.exe 37 PID 2584 wrote to memory of 2936 2584 Unicorn-28100.exe 37 PID 2584 wrote to memory of 2936 2584 Unicorn-28100.exe 37 PID 2136 wrote to memory of 2960 2136 Unicorn-54816.exe 38 PID 2136 wrote to memory of 2960 2136 Unicorn-54816.exe 38 PID 2136 wrote to memory of 2960 2136 Unicorn-54816.exe 38 PID 2136 wrote to memory of 2960 2136 Unicorn-54816.exe 38 PID 1448 wrote to memory of 1092 1448 Unicorn-57696.exe 41 PID 1448 wrote to memory of 1092 1448 Unicorn-57696.exe 41 PID 1448 wrote to memory of 1092 1448 Unicorn-57696.exe 41 PID 1448 wrote to memory of 1092 1448 Unicorn-57696.exe 41 PID 1580 wrote to memory of 1324 1580 Unicorn-12024.exe 42 PID 1580 wrote to memory of 1324 1580 Unicorn-12024.exe 42 PID 1580 wrote to memory of 1324 1580 Unicorn-12024.exe 42 PID 1580 wrote to memory of 1324 1580 Unicorn-12024.exe 42 PID 2752 wrote to memory of 1248 2752 Unicorn-27655.exe 43 PID 2752 wrote to memory of 1248 2752 Unicorn-27655.exe 43 PID 2752 wrote to memory of 1248 2752 Unicorn-27655.exe 43 PID 2752 wrote to memory of 1248 2752 Unicorn-27655.exe 43 PID 2936 wrote to memory of 2316 2936 Unicorn-7940.exe 44 PID 2936 wrote to memory of 2316 2936 Unicorn-7940.exe 44 PID 2936 wrote to memory of 2316 2936 Unicorn-7940.exe 44 PID 2936 wrote to memory of 2316 2936 Unicorn-7940.exe 44 PID 2584 wrote to memory of 776 2584 Unicorn-28100.exe 46 PID 2584 wrote to memory of 776 2584 Unicorn-28100.exe 46 PID 2584 wrote to memory of 776 2584 Unicorn-28100.exe 46 PID 2584 wrote to memory of 776 2584 Unicorn-28100.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ecbabfc9cc777b3b2385f14765f9d2.exe"C:\Users\Admin\AppData\Local\Temp\56ecbabfc9cc777b3b2385f14765f9d2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17245.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54816.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27655.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12024.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38231.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2097.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49601.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6124.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25471.exe10⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33774.exe11⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3631.exe12⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1156.exe13⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50539.exe14⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32143.exe15⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9034.exe16⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31294.exe17⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14263.exe18⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19360.exe19⤵PID:1448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49279.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22103.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36462.exe9⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5185.exe10⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23850.exe11⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3647.exe12⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43414.exe13⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52506.exe14⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49520.exe15⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-345.exe16⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 24017⤵
- Program crash
PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56129.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12268.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47074.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52061.exe9⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57235.exe10⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55930.exe11⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15572.exe12⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65401.exe13⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 24014⤵
- Program crash
PID:704
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57214.exe9⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55707.exe10⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42656.exe11⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6740.exe12⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22216.exe13⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-612.exe14⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14657.exe15⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43101.exe16⤵PID:2596
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42293.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8101.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28688.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32679.exe8⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40432.exe9⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53538.exe10⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23850.exe11⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35578.exe12⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50591.exe13⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25641.exe14⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4211.exe15⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exe16⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5898.exe17⤵PID:800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27347.exe13⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64291.exe14⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24349.exe15⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6297.exe16⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2395.exe17⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41809.exe18⤵PID:2772
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17887.exe14⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26656.exe15⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33978.exe16⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45670.exe17⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41809.exe18⤵PID:2972
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42646.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4474.exe7⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53727.exe8⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23258.exe9⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44737.exe10⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2137.exe11⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55412.exe12⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58043.exe13⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58103.exe14⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46038.exe15⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9660.exe16⤵PID:2776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53612.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47769.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15860.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18595.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5133.exe8⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40323.exe9⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54664.exe10⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26320.exe11⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52096.exe12⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24349.exe13⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24632.exe14⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61990.exe15⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55680.exe16⤵PID:268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45135.exe15⤵PID:1340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28100.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7940.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13150.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19202.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41646.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8449.exe8⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64207.exe9⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12064.exe10⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40238.exe11⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21811.exe12⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64291.exe13⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16630.exe14⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38446.exe15⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45862.exe16⤵PID:780
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40560.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17396.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50774.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47297.exe8⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37090.exe9⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53538.exe10⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7596.exe11⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22226.exe12⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42122.exe13⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21587.exe14⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4211.exe15⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63988.exe16⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4450.exe17⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44549.exe18⤵PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64349.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49674.exe7⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52061.exe8⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25749.exe9⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32786.exe10⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5562.exe11⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54623.exe12⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50804.exe13⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60176.exe14⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45275.exe15⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24295.exe16⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14445.exe17⤵PID:2456
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19606.exe7⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56807.exe8⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32319.exe9⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44680.exe10⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62106.exe11⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34829.exe12⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19832.exe13⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43101.exe14⤵PID:2960
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5729.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32606.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65444.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20380.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8833.exe8⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8802.exe9⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25749.exe10⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51478.exe11⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27960.exe12⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58183.exe13⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29292.exe14⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36033.exe15⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54009.exe16⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11513.exe17⤵PID:1884
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43792.exe9⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36102.exe10⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63268.exe11⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61722.exe12⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16492.exe13⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51297.exe14⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56401.exe15⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45654.exe16⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-916.exe17⤵PID:2944
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38360.exe7⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28922.exe8⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19766.exe9⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51421.exe10⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-731.exe11⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22709.exe12⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23345.exe13⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47844.exe14⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47699.exe15⤵PID:2564
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38562.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14676.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12943.exe7⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26597.exe8⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41784.exe9⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50113.exe10⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21577.exe11⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26310.exe12⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63715.exe13⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22652.exe14⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12924.exe15⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26572.exe16⤵PID:1696
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53955.exe6⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57235.exe7⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2863.exe8⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52246.exe9⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4270.exe10⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64815.exe11⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60259.exe12⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7766.exe13⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25800.exe14⤵PID:944
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59647.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47966.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45465.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25595.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27370.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60592.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3467.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19436.exe9⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31857.exe10⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5131.exe11⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25184.exe12⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23176.exe13⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22826.exe14⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32852.exe15⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44388.exe16⤵PID:1932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58596.exe14⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15800.exe15⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10423.exe16⤵PID:2348
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24390.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64152.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46633.exe8⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50253.exe9⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23642.exe10⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28126.exe11⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51447.exe12⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52205.exe13⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65334.exe14⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 24015⤵
- Program crash
PID:1184
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56705.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28880.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39015.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32871.exe8⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4718.exe9⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31234.exe10⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53206.exe11⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 24012⤵
- Program crash
PID:2520
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55221.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21470.exe7⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43678.exe8⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49013.exe9⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28069.exe10⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40887.exe11⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63767.exe12⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3879.exe13⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26765.exe14⤵PID:1388
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35277.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51189.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13202.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25471.exe7⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42710.exe8⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7383.exe9⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40705.exe10⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6180.exe11⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48422.exe12⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57719.exe13⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54009.exe14⤵PID:1704
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57696.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35024.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39430.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65361.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2896.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49316.exe8⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31449.exe9⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31857.exe10⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11955.exe11⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44613.exe12⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18516.exe13⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39542.exe14⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17398.exe15⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5965.exe16⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27284.exe17⤵PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2950.exe16⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18037.exe17⤵PID:1980
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63114.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12258.exe7⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53509.exe8⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51286.exe9⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56190.exe10⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36694.exe11⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52698.exe12⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52317.exe13⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36033.exe14⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12260.exe15⤵PID:524
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53280.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17827.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34106.exe7⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6991.exe8⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22376.exe9⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48546.exe10⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13756.exe11⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44696.exe12⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61598.exe13⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19832.exe14⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63848.exe15⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13739.exe16⤵PID:1908
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46403.exe11⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1764.exe12⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55249.exe13⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39344.exe14⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15597.exe15⤵PID:2532
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53460.exe9⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9423.exe10⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16850.exe11⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34829.exe12⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45654.exe13⤵PID:2908
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65107.exe7⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53509.exe8⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2754.exe9⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23419.exe10⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-87.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-87.exe11⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49065.exe12⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exe13⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48147.exe14⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61938.exe15⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40610.exe16⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7299.exe17⤵PID:2632
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18239.exe10⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4270.exe11⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exe12⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62558.exe13⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3116.exe14⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 20015⤵
- Program crash
PID:1248
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56513.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56809.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47266.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18154.exe7⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62362.exe8⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36102.exe9⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38204.exe10⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38230.exe11⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44032.exe12⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46038.exe13⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43615.exe14⤵PID:2592
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD51b6a3e961160de432ea4fc2b16f4b78b
SHA1895728c59321b2021f1fd16e89d291e846af313d
SHA256a251e1a95229301cb84465a72ac7fe768f6d49fd87697cb3c4a9caecda1ac5bd
SHA5126d98b3ea7b5801657e73af157cca0e04a541233ec9d837e3d004b0238f062073337674c6de611b990630e511b0c47aa18abf5f9cf4903c3baea2e0c05300ab04
-
Filesize
184KB
MD5af677ed0d820e3a8e41b7d7b0e80ccfa
SHA1c16f4723fa0c8445bd0f131df3a2e22e776d8d25
SHA25614e64068847950c059caf346eefd2fcd489d51b0d82c2fd56407f907a1764c12
SHA5129c202337bfd79aa1c1dd98fd0c59acd5d591baf61e37df432c4b662e2651b3ed80c18758813a79e4bad0bf9bf2d77c5cab1848fc6e7555ea6bab088c16d593ef
-
Filesize
103KB
MD562c5b51cd5b7b30fa6e85c10353e438f
SHA17d0e2b922a64a80c0c2e0eb30bc741c0fd5d8785
SHA256a79df0d15131d1f5e8d60327818d0023280e8469eaf02fa08fa7585a1ce3c353
SHA512c74f87197bd1075806fec846745ca2d23d39e8106e59d8c9692310d4e124514a7c7473480d11dd0bd8bf67741db9e36134da99b448792694556b4a847babcaef
-
Filesize
184KB
MD5b62e9d44ff38d74bb2571dda06ccb188
SHA1fc9f36bb27086b8c18464b0ddc2a25aaff5e3b47
SHA2561f32b048d704f69904bbb5f0b07189e55fc9bfd046060087dc91b5aadfaaa606
SHA51227d5907fbc4651c031a85689c2d350b6c26bbe3ba9d99125c294afaaa1f304ab8dde296b1ef559daff1a6635520cf1a34c7666219e4fad06756788b6cec4771c
-
Filesize
184KB
MD5b221dd3ac55e4751087b94befac1dc92
SHA17dfb46210f3f970d3ab54ff87e2ef15fd3a58089
SHA256ec5e06220cab006cc5ac1f2c59d8bbb298a41c5661db6661ca15c5e765d82c4e
SHA512a0973b3813d37e34637eb6ff7b022b32669f4eb23f38ddb600441e92a27e0b534b465cd04f1ed14c1de5ee5138726e780667035d46aa3966ed780a1c425caef8
-
Filesize
184KB
MD5c0867b657b7090aaa6944794ff2d8519
SHA140750e2ca0058869de2dc1e28fb48221a154747c
SHA256e320593d8c4027014f1bbf8eec4ec4aa850ea8b207924c1aa3ce16f9f3ec5fb4
SHA51200e93ad9629a4bc3503c87ae61b1f0dd1c1ab78340668018a53f3be0ba4ab0ce35250f0452e7d08a5d29417178e9d0b0d834777dd5aa18c8614f46ef24d4d3b5
-
Filesize
184KB
MD569eee1cb050e3e092855bed35996f030
SHA12fcf397072bb0a5382732e16319ec54d6df79fbe
SHA256693c51cda0aa21167d4baf1dd6b7e5f8494d1a7ada0185f055c7c58d6b7e07ff
SHA512c725d3bb2e96b9e9e849845a7fd46695a7efac0e5d77ac0a3f98cb52dd1af6193f80ac09699b0183fd3faa780afb5a55f13769d193752903824eae2806b21b6a
-
Filesize
184KB
MD5f3fbf56d45bfdeabede0d946c1d86010
SHA193360e98acd1f72ac9a66032a5ea4575261abf8f
SHA2563fb383a208ea7b9250a33719f34c874fbaffbbe09d70eb6f1c6aabf173c89791
SHA51280ea85c146ec9a89b7e28a204b149d4e9ec76c9a71b7b56eb770bb2f95a606714066b3ac0a1d4bff03d07e86acec3c69cfa57f29820d8082135a63f9fbdd680c
-
Filesize
184KB
MD522d05d64126882fff2177cf482671ee0
SHA1fbf809919acb671d7e2ae183a4c7458585908776
SHA256674b7864c49c84e241324fee6fa8f30b6f548b7e93427c7ebb2bcd3fe1f5b33b
SHA51234e0baca20bbb95e914f4cf94e22e77cbd22717513444c874ae06dda3b35da48666ffcd4531ae9aa149ca23765682410f8c11ef25feae7e09370eb4f04f42e78
-
Filesize
184KB
MD52a960da7f318137193f4a57c9dffdb4b
SHA1b71da6ae695716430863aec91d1cc4ae9a630c1c
SHA25697056156de3af19d67b6b48faca3860934c2d34bed7905455419254a16c7f379
SHA512e8d330b204ce4af436039709f38b52165d19932e24d9570c0d55159a8f8a5932f5d0d13b16e17cb7efab1c327a4aff8555d6cd2ef31c1304d48e69bf8efae99f
-
Filesize
184KB
MD56272498b8a50b145209687793c2611c1
SHA16ef0e35f96400b9a3742194b171f17bdc997deea
SHA256f09fab072c21fb112710867a032ef230019b000c5f0347a8ecd401b08e9e0b5e
SHA51216ea08331b9467c79dfad324878084fe2035f7120bec6a7b01ea7defd399fbfceb77de0d46d33058429481d632de5ade73c5c19d894a10be68e362af65557fce
-
Filesize
64KB
MD51702a54dcc6525f236a14177ab20dc39
SHA1ab57307bc17942e3291afa325d15bc55d0a365dc
SHA256bbf66d017238ab4fd81886ae6bced0c2ba4d136c9c9f64ba581bfbc38d14d535
SHA512022c1153cc64d8203feedf9f2a078d92bc08e369ea8df27adcd34d5f54a307e24451e7ad311767f0a5c505f9a2bfaca83a7f0cdeb89c596e127144f832eeba67
-
Filesize
184KB
MD5501877bc62236c7b4539b70bbfa61b41
SHA130cc52040157102932545bc598550468027756f7
SHA25679b20b057f73a5d8b235fb8060e0e4d4f4ce7c62c35b14d5c73d5442366105de
SHA5125a56614154df21d23cd7ea1ed0a6c8041286f12d2a8fd1cebec77c7ee49712c296e27effd23d74c62698813290c5aa290645b8948112e5b68aee89350bd8c30f
-
Filesize
184KB
MD5067310fb62f8fe19aacf794477509242
SHA147e3c8c40f8e11e585731b7379d10ace3b96a88f
SHA256ec08491d60c52eb14a3674c20d8b1bd4005cb463bf570634f9238344d40b0fcd
SHA5128002c161fe2372e835b459698d2d832dd232ca9b3e4eeb41a02e81e839c5c65eead94847dd8400bc5cf402b23a7b6ef0e14e5b8744bd14f5358621ae1ed3b47f
-
Filesize
184KB
MD541f97082bc067e9381401873e6588c48
SHA1218c8d1acb704e5b0c401beb82059dd161791b7d
SHA2560e33ab4f37d86cb3c32d5aaaa89f7123d78d6af0b8fe89dbeca1e6ae24c29571
SHA512a39e85ae26c8cb70aea607c0fa06e84c698a4701df19f02219a45a4a720d3f42b91ac2acdf315e1a25f47dfe2b8f73a88ccf1bcf6e19ab45c3bbbe3471c62282
-
Filesize
184KB
MD5ee167f89e7e0cc72693de30c7adf27cd
SHA12911b83f6f3c7800629255fdb2bbcc9b7c3801c8
SHA25629357369191143c224dec2a8f23f17844ca184c35ce3255178e05993d78bd3ee
SHA5120c5d8a58f597452ac80e0179e8c8230a1a6e698b67f8b645794b46b94bfafbb89a1e531c6ac7de12adf9c7abb202c34c49d444cf74817a32b7a5626c9581b04a
-
Filesize
184KB
MD522a1debb8b97ae54841f577001812498
SHA13d90743b63fffbab65478544e8d486fc44fece43
SHA256b00dfbb186f2e3b613dab21ccf3eb6b97b6b5863a5a16282b90f889b755ebe55
SHA512add81ec0299d6129844113022598f3624c6c61a38fcc6353c9e371d1a7ad4c46cb003756da7fbcf4ebdb013d7564798a4c54c3f1e9e2bd3b1282bc3693d74e00
-
Filesize
184KB
MD59d51b9a948a63881c8b308176969ce5c
SHA17c9a643fe18949e8dd9fa73449cf5202ee288541
SHA256cb0b6bd6b1ccef2e5de55bd1004cbae30a049c37da7a9d83ac33302c77a4bf95
SHA512152cda0781a389720fa505335799e7693533c312892deb7cd20ae65a8ea62ea441ff5eeb1023a20da49f5183757c218e6bdb997cca04d2602063d8507df19257
-
Filesize
184KB
MD5c645e65476b478705aaf896db4f2ab3a
SHA1c98638bdd435e0316424cc7464357f6eef95492d
SHA256dc08f04a14688ae990100c8509c6ca9e3ddb71277c5155d6a959036512d7b40a
SHA5128fc03b61e11e89d7e34dda660107fab02f09b9c1353e46e28eae6a2c9abdbe928c6f9bcc1ad80a3d5b4864a2b82bbf4969723973daabaf09d306ff34bf4d42f7
-
Filesize
184KB
MD5bdbfb29cbf8616600758888fd6d5e421
SHA173d5fbed0a4fe3b17472f85b9dacd54c00fc13fb
SHA256639faebc9c65772b4ecbb7740c1179c842407d942c1c49b54b0407a7ffde9d41
SHA51248c21a27cae5191b6c65a398cf918bdddd7aeb31d36f60c12db56b6739291c34ddf01356470702c13cc5e536582a40e0dff2ddb7bfd29f7219767533252f18eb
-
Filesize
184KB
MD5285e1c4378f66aca5e71af5b0abfe29d
SHA14efb277b4e7f7b99a717f0cc26089f80624cf94b
SHA256d217c3a71e65038887d37215be154584933648c66b0278d8d34d5b32cec5edb9
SHA5120ded402021d8c947b8da2e559b046de6269dfcfca56775b6a19fe1c4a5f9457233fb8a75dc3d199395833af3776a01be29d936d7af00eaedbb89d616ac2726f8
-
Filesize
184KB
MD5546d0bc8676653c6cd2f756f336ee77a
SHA1a120e861735e7c04cd4f678960cff9e38b61637c
SHA256b240f167854f760037fe80d88a870f12d6c7d0babd72dae21c8756adb33235fa
SHA51225af6ff3ca749fa97481d135313983ce80f522e502aa17fa057f08cca2d9e539dc0ff720f165801f59dbd80be095cafcf8b924e74e53dbf0937c8cd3c4f247b6
-
Filesize
64KB
MD5f5ce69fb61b7010052d3aa98afbde19f
SHA1a18b5507ef45a58b8db40ea4337beffec81aacd9
SHA256d25563be5c1aefad4df0498052f5bbf8a368a5d28757ef12e87e5b2baffc1963
SHA5121c83b997b97194cae768ec6f328f2f10d61f754a24818817c076af65504daa8fccbf3131349323a866365517a70a6121a35181a75422ea8ff71d2570d5f588a7
-
Filesize
128KB
MD5ff6c18cb8e7c94c3d2ac466ccf64e163
SHA16ce3f32388a3f8186466b8585267ebc3965b405a
SHA256e963d320f635f95740a03c967e4a490844966f1b1558440ff00c8f2d2e571591
SHA512f97baf1ac3e9c7bba03150c36db4bfe1f3138a744882276595937162ad0a23e1d8e6c77e8ce2f1794fbef1c5e0f0f9b94e535d39116103f145fa798b248127c8
-
Filesize
184KB
MD53bd62eaf817b6c8a4e227ecb4c6835f6
SHA1acbdd8324d3035822d581a9a100fd8927aca9715
SHA256b4085a4370ee8f5a37094c3f89ab7cffa660d912a047bbf0da6d8a833137c594
SHA5125ae4a2e60d78e724e6e701d3f1260ca8bdb719871361ac41e12e0133a6f59d102a1a0529068695328d651227536b434e9e2c124b9c0c045d75404f220f3114e9
-
Filesize
184KB
MD5fdf9ee91b4bea3a753b57b41c613c061
SHA1e5899adf8129564e50ee56252abcdc75aeb73d86
SHA2560bc11bded706c838e080d24b341678d21a90971c35e5d4c662e54facd092dcce
SHA5128d81c970a734612b3fc0274699b711fa0aff08d2e6acfd5c5e175f03e48db075a0b98cd5cf42eeedd017ff29ca0b8ab78f53a720520cf15fe2f04cca7726624a
-
Filesize
184KB
MD52249aaf0b8009c224007e414cfb455de
SHA17040bf9a178d71d7d2ca10c007d766b90bf0e130
SHA2567cce19f93beef0c2afc5163fcdf56733fdbdc2b84e3d725f360e2c6848de7743
SHA512e1ad110fc0694aac38681fe9f874357960d0cf424d63e72c1fbcd41a64fd08daeafd6986660b6935cd8c09abb79bdcab3e9a1e0ee2e9e22f0422e36fce70ac38
-
Filesize
184KB
MD51a9661397ec444d6c502646d5b8bcc78
SHA15d537f03489e6aa230a8b46116302054c04c4f80
SHA256f0d975bc89b7776fa82dd9d710c843ea834f358e7d26896c1623f492fcb6acb4
SHA51226469d4e8da83a0aed1bd94e42911d41f6320bac3a61663e6290c50389a756e55976255da1d5995797a36c6c6cc5a4c0d59ffb103958f6ae6f63b9c630b4fb54
-
Filesize
128KB
MD54871a07b629a15bf39d070cef3ecd678
SHA15cbb00a4ebc4384bc65a191bba2212a7a5071f0b
SHA25613699a3de279609cc9adc1ebf12b86d3513af758aa26dcadfb31cb09d16cb3e6
SHA512286155a21139a2825ef5e2f53d03ab36e107d9b0447947f4f7cf122c0aa2084ac79da0b42a6e2cb732fb4a83db4d92a4fb4c942d46c3d1dc870efd761ba57332