Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
8f3ad5753989eb7011f7e4af8f3c3f4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f3ad5753989eb7011f7e4af8f3c3f4a.exe
Resource
win10v2004-20231215-en
General
-
Target
8f3ad5753989eb7011f7e4af8f3c3f4a.exe
-
Size
184KB
-
MD5
8f3ad5753989eb7011f7e4af8f3c3f4a
-
SHA1
11f2a27e042e716541172ae562ff2b30b8a4d1ab
-
SHA256
73dc974d1a0e62c8c133e39b2a98aeff56473177d4c9d931b6c5a400a2f521da
-
SHA512
2f74ad7f3a19cf7ed5ec691992858c29a986c9c9d331466710eb48a54222321d65c6f777fd0b5d6ed858e1f56fd14e1c805c7b7984f6972dd885742713914108
-
SSDEEP
3072:xuCromSxcOAEAmj0MhVrc8AMgXYMvxxldk7xLDCUJylPvpFv:xuWokDEALM7rc8sj0JylPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3032 Unicorn-8076.exe 2804 Unicorn-60266.exe 2808 Unicorn-32232.exe 2640 Unicorn-6042.exe 2840 Unicorn-43545.exe 2624 Unicorn-51159.exe 2596 Unicorn-5139.exe 1928 Unicorn-54340.exe 2924 Unicorn-15206.exe 2560 Unicorn-40225.exe 1316 Unicorn-56239.exe 1064 Unicorn-47646.exe 2304 Unicorn-63790.exe 1044 Unicorn-64729.exe 1524 Unicorn-19420.exe 1340 Unicorn-18866.exe 2972 Unicorn-59514.exe 2308 Unicorn-31480.exe 2376 Unicorn-2145.exe 2092 Unicorn-22431.exe 2444 Unicorn-43213.exe 1372 Unicorn-30407.exe 1356 Unicorn-30215.exe 1424 Unicorn-54527.exe 2008 Unicorn-1989.exe 3064 Unicorn-21855.exe 3048 Unicorn-32798.exe 1772 Unicorn-19669.exe 2208 Unicorn-27283.exe 2108 Unicorn-7417.exe 1776 Unicorn-39535.exe 2772 Unicorn-6653.exe 2756 Unicorn-58455.exe 2636 Unicorn-12783.exe 2668 Unicorn-12783.exe 2612 Unicorn-39103.exe 2684 Unicorn-15196.exe 2664 Unicorn-23727.exe 2272 Unicorn-31341.exe 2908 Unicorn-47485.exe 2552 Unicorn-35595.exe 1204 Unicorn-6452.exe 2164 Unicorn-61600.exe 584 Unicorn-48793.exe 324 Unicorn-27989.exe 1152 Unicorn-44133.exe 2380 Unicorn-48964.exe 2404 Unicorn-56577.exe 2336 Unicorn-30210.exe 2256 Unicorn-47698.exe 2480 Unicorn-59566.exe 1948 Unicorn-61382.exe 984 Unicorn-15711.exe 2044 Unicorn-33753.exe 2032 Unicorn-4418.exe 1012 Unicorn-50090.exe 3000 Unicorn-5165.exe 2124 Unicorn-57319.exe 2244 Unicorn-57319.exe 2112 Unicorn-46966.exe 2052 Unicorn-30629.exe 2820 Unicorn-42327.exe 2940 Unicorn-34159.exe 2688 Unicorn-34521.exe -
Loads dropped DLL 64 IoCs
pid Process 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 3032 Unicorn-8076.exe 3032 Unicorn-8076.exe 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 2804 Unicorn-60266.exe 2804 Unicorn-60266.exe 3032 Unicorn-8076.exe 3032 Unicorn-8076.exe 2808 Unicorn-32232.exe 2808 Unicorn-32232.exe 2840 Unicorn-43545.exe 2840 Unicorn-43545.exe 2640 Unicorn-6042.exe 2640 Unicorn-6042.exe 2804 Unicorn-60266.exe 2804 Unicorn-60266.exe 2808 Unicorn-32232.exe 2624 Unicorn-51159.exe 2624 Unicorn-51159.exe 2808 Unicorn-32232.exe 2596 Unicorn-5139.exe 2596 Unicorn-5139.exe 2840 Unicorn-43545.exe 1928 Unicorn-54340.exe 2840 Unicorn-43545.exe 1928 Unicorn-54340.exe 2640 Unicorn-6042.exe 2640 Unicorn-6042.exe 2924 Unicorn-15206.exe 2924 Unicorn-15206.exe 1316 Unicorn-56239.exe 1316 Unicorn-56239.exe 2624 Unicorn-51159.exe 2624 Unicorn-51159.exe 2560 Unicorn-40225.exe 2560 Unicorn-40225.exe 1064 Unicorn-47646.exe 1064 Unicorn-47646.exe 2596 Unicorn-5139.exe 2596 Unicorn-5139.exe 1044 Unicorn-64729.exe 1044 Unicorn-64729.exe 1524 Unicorn-19420.exe 1524 Unicorn-19420.exe 2304 Unicorn-63790.exe 2304 Unicorn-63790.exe 1928 Unicorn-54340.exe 1928 Unicorn-54340.exe 2376 Unicorn-2145.exe 2376 Unicorn-2145.exe 2560 Unicorn-40225.exe 1316 Unicorn-56239.exe 2924 Unicorn-15206.exe 1340 Unicorn-18866.exe 2308 Unicorn-31480.exe 1316 Unicorn-56239.exe 2560 Unicorn-40225.exe 2924 Unicorn-15206.exe 1340 Unicorn-18866.exe 2308 Unicorn-31480.exe 1612 WerFault.exe 1612 WerFault.exe -
Program crash 10 IoCs
pid pid_target Process procid_target 1612 2972 WerFault.exe 46 2884 1064 WerFault.exe 39 2944 1372 WerFault.exe 49 2896 2444 WerFault.exe 48 1168 2668 WerFault.exe 63 1060 1152 WerFault.exe 77 2536 2208 WerFault.exe 55 1988 2664 WerFault.exe 69 2548 1948 WerFault.exe 84 2560 2420 WerFault.exe 149 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 3032 Unicorn-8076.exe 2804 Unicorn-60266.exe 2808 Unicorn-32232.exe 2640 Unicorn-6042.exe 2840 Unicorn-43545.exe 2624 Unicorn-51159.exe 2596 Unicorn-5139.exe 1928 Unicorn-54340.exe 2924 Unicorn-15206.exe 2560 Unicorn-40225.exe 1316 Unicorn-56239.exe 1064 Unicorn-47646.exe 1044 Unicorn-64729.exe 2304 Unicorn-63790.exe 1524 Unicorn-19420.exe 1340 Unicorn-18866.exe 2308 Unicorn-31480.exe 2972 Unicorn-59514.exe 2376 Unicorn-2145.exe 2092 Unicorn-22431.exe 2444 Unicorn-43213.exe 1372 Unicorn-30407.exe 1356 Unicorn-30215.exe 1424 Unicorn-54527.exe 2008 Unicorn-1989.exe 3064 Unicorn-21855.exe 1776 Unicorn-39535.exe 1772 Unicorn-19669.exe 3048 Unicorn-32798.exe 2108 Unicorn-7417.exe 2208 Unicorn-27283.exe 2772 Unicorn-6653.exe 2612 Unicorn-39103.exe 2636 Unicorn-12783.exe 2756 Unicorn-58455.exe 2668 Unicorn-12783.exe 2664 Unicorn-23727.exe 2684 Unicorn-15196.exe 2272 Unicorn-31341.exe 2908 Unicorn-47485.exe 2552 Unicorn-35595.exe 1204 Unicorn-6452.exe 2164 Unicorn-61600.exe 584 Unicorn-48793.exe 324 Unicorn-27989.exe 1152 Unicorn-44133.exe 2380 Unicorn-48964.exe 2404 Unicorn-56577.exe 2336 Unicorn-30210.exe 2256 Unicorn-47698.exe 2480 Unicorn-59566.exe 984 Unicorn-15711.exe 1948 Unicorn-61382.exe 1012 Unicorn-50090.exe 3000 Unicorn-5165.exe 2032 Unicorn-4418.exe 2044 Unicorn-33753.exe 2124 Unicorn-57319.exe 2244 Unicorn-57319.exe 2052 Unicorn-30629.exe 2820 Unicorn-42327.exe 3016 Unicorn-22269.exe 2940 Unicorn-34159.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3032 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 28 PID 2324 wrote to memory of 3032 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 28 PID 2324 wrote to memory of 3032 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 28 PID 2324 wrote to memory of 3032 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 28 PID 3032 wrote to memory of 2804 3032 Unicorn-8076.exe 29 PID 3032 wrote to memory of 2804 3032 Unicorn-8076.exe 29 PID 3032 wrote to memory of 2804 3032 Unicorn-8076.exe 29 PID 3032 wrote to memory of 2804 3032 Unicorn-8076.exe 29 PID 2324 wrote to memory of 2808 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 30 PID 2324 wrote to memory of 2808 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 30 PID 2324 wrote to memory of 2808 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 30 PID 2324 wrote to memory of 2808 2324 8f3ad5753989eb7011f7e4af8f3c3f4a.exe 30 PID 2804 wrote to memory of 2640 2804 Unicorn-60266.exe 31 PID 2804 wrote to memory of 2640 2804 Unicorn-60266.exe 31 PID 2804 wrote to memory of 2640 2804 Unicorn-60266.exe 31 PID 2804 wrote to memory of 2640 2804 Unicorn-60266.exe 31 PID 3032 wrote to memory of 2840 3032 Unicorn-8076.exe 32 PID 3032 wrote to memory of 2840 3032 Unicorn-8076.exe 32 PID 3032 wrote to memory of 2840 3032 Unicorn-8076.exe 32 PID 3032 wrote to memory of 2840 3032 Unicorn-8076.exe 32 PID 2808 wrote to memory of 2624 2808 Unicorn-32232.exe 33 PID 2808 wrote to memory of 2624 2808 Unicorn-32232.exe 33 PID 2808 wrote to memory of 2624 2808 Unicorn-32232.exe 33 PID 2808 wrote to memory of 2624 2808 Unicorn-32232.exe 33 PID 2840 wrote to memory of 2596 2840 Unicorn-43545.exe 34 PID 2840 wrote to memory of 2596 2840 Unicorn-43545.exe 34 PID 2840 wrote to memory of 2596 2840 Unicorn-43545.exe 34 PID 2840 wrote to memory of 2596 2840 Unicorn-43545.exe 34 PID 2640 wrote to memory of 1928 2640 Unicorn-6042.exe 35 PID 2640 wrote to memory of 1928 2640 Unicorn-6042.exe 35 PID 2640 wrote to memory of 1928 2640 Unicorn-6042.exe 35 PID 2640 wrote to memory of 1928 2640 Unicorn-6042.exe 35 PID 2804 wrote to memory of 2924 2804 Unicorn-60266.exe 36 PID 2804 wrote to memory of 2924 2804 Unicorn-60266.exe 36 PID 2804 wrote to memory of 2924 2804 Unicorn-60266.exe 36 PID 2804 wrote to memory of 2924 2804 Unicorn-60266.exe 36 PID 2624 wrote to memory of 2560 2624 Unicorn-51159.exe 38 PID 2624 wrote to memory of 2560 2624 Unicorn-51159.exe 38 PID 2624 wrote to memory of 2560 2624 Unicorn-51159.exe 38 PID 2624 wrote to memory of 2560 2624 Unicorn-51159.exe 38 PID 2808 wrote to memory of 1316 2808 Unicorn-32232.exe 37 PID 2808 wrote to memory of 1316 2808 Unicorn-32232.exe 37 PID 2808 wrote to memory of 1316 2808 Unicorn-32232.exe 37 PID 2808 wrote to memory of 1316 2808 Unicorn-32232.exe 37 PID 2596 wrote to memory of 1064 2596 Unicorn-5139.exe 39 PID 2596 wrote to memory of 1064 2596 Unicorn-5139.exe 39 PID 2596 wrote to memory of 1064 2596 Unicorn-5139.exe 39 PID 2596 wrote to memory of 1064 2596 Unicorn-5139.exe 39 PID 1928 wrote to memory of 2304 1928 Unicorn-54340.exe 42 PID 1928 wrote to memory of 2304 1928 Unicorn-54340.exe 42 PID 1928 wrote to memory of 2304 1928 Unicorn-54340.exe 42 PID 1928 wrote to memory of 2304 1928 Unicorn-54340.exe 42 PID 2840 wrote to memory of 1044 2840 Unicorn-43545.exe 40 PID 2840 wrote to memory of 1044 2840 Unicorn-43545.exe 40 PID 2840 wrote to memory of 1044 2840 Unicorn-43545.exe 40 PID 2840 wrote to memory of 1044 2840 Unicorn-43545.exe 40 PID 2640 wrote to memory of 1524 2640 Unicorn-6042.exe 41 PID 2640 wrote to memory of 1524 2640 Unicorn-6042.exe 41 PID 2640 wrote to memory of 1524 2640 Unicorn-6042.exe 41 PID 2640 wrote to memory of 1524 2640 Unicorn-6042.exe 41 PID 2924 wrote to memory of 1340 2924 Unicorn-15206.exe 43 PID 2924 wrote to memory of 1340 2924 Unicorn-15206.exe 43 PID 2924 wrote to memory of 1340 2924 Unicorn-15206.exe 43 PID 2924 wrote to memory of 1340 2924 Unicorn-15206.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f3ad5753989eb7011f7e4af8f3c3f4a.exe"C:\Users\Admin\AppData\Local\Temp\8f3ad5753989eb7011f7e4af8f3c3f4a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8076.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60266.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6042.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54340.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63790.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54527.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15196.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14636.exe10⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16531.exe11⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4657.exe12⤵PID:2880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25061.exe10⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28778.exe11⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49289.exe12⤵PID:2412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23167.exe9⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15186.exe10⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46017.exe11⤵PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20806.exe10⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19767.exe11⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51209.exe12⤵PID:1876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31151.exe11⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41500.exe12⤵PID:2876
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46966.exe8⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18389.exe9⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22564.exe10⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2714.exe11⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56275.exe12⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35085.exe13⤵PID:2012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6590.exe9⤵PID:2404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23727.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2208⤵
- Program crash
PID:1988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1989.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31341.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15711.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15955.exe9⤵PID:2716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33753.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53448.exe8⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35244.exe9⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41990.exe10⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61733.exe11⤵PID:2272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17848.exe9⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56964.exe10⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30914.exe11⤵PID:2596
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19420.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30215.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12783.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 2408⤵
- Program crash
PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50090.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9595.exe8⤵PID:2796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39103.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47698.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47366.exe8⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10311.exe9⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51017.exe10⤵PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exe9⤵PID:528
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15206.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18866.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39535.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6452.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4418.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37854.exe9⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5944.exe10⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11406.exe11⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29445.exe12⤵PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54696.exe11⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59310.exe12⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13922.exe13⤵PID:3056
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12153.exe10⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12584.exe11⤵PID:580
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5165.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24149.exe8⤵PID:2952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61600.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55347.exe7⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61733.exe8⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12553.exe9⤵PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42848.exe8⤵PID:2188
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7417.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27989.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34159.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43993.exe8⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2693.exe9⤵PID:2380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3323.exe7⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55472.exe8⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2008.exe9⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16119.exe10⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63668.exe11⤵PID:1972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61790.exe9⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17801.exe10⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21548.exe11⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35085.exe12⤵PID:1984
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22269.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14060.exe7⤵PID:1792
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43545.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5139.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47646.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22431.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12783.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59566.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40464.exe9⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40672.exe10⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22061.exe11⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25466.exe12⤵PID:608
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53079.exe8⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29878.exe9⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24811.exe10⤵PID:1596
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61382.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2408⤵
- Program crash
PID:2548
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 2366⤵
- Program crash
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43213.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 2406⤵
- Program crash
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6653.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30210.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6639.exe7⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5944.exe8⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14068.exe9⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61038.exe10⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27687.exe11⤵PID:2248
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41210.exe6⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28345.exe7⤵PID:2396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64729.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30407.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 2406⤵
- Program crash
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58455.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46219.exe6⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60329.exe7⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39904.exe8⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60280.exe9⤵PID:2720
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38024.exe6⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61284.exe7⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21495.exe8⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exe9⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64534.exe10⤵PID:2908
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32232.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40225.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2145.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21855.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47485.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42327.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41611.exe9⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47719.exe10⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25932.exe11⤵PID:1804
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34521.exe7⤵
- Executes dropped EXE
PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35595.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52140.exe7⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23952.exe8⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32019.exe9⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10114.exe10⤵PID:672
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19669.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56577.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58279.exe7⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55145.exe8⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10578.exe9⤵PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53378.exe8⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13684.exe9⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61038.exe10⤵PID:884
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47734.exe6⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43220.exe7⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41222.exe8⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46684.exe9⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57509.exe10⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54515.exe11⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13351.exe12⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61255.exe13⤵PID:388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35609.exe10⤵PID:1420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30902.exe8⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61038.exe9⤵PID:588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8912.exe7⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9787.exe8⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46731.exe9⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27687.exe10⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35085.exe11⤵PID:968
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31480.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27283.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44133.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 2207⤵
- Program crash
PID:1060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 2366⤵
- Program crash
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48964.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58087.exe6⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21134.exe7⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54050.exe8⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2527.exe9⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15735.exe10⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48875.exe11⤵PID:2520
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56239.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59514.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32798.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48793.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14828.exe7⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48819.exe8⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14688.exe9⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 24010⤵
- Program crash
PID:2560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31771.exe8⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46731.exe9⤵PID:1880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45098.exe7⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18005.exe8⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26840.exe9⤵PID:1476
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21902.exe6⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3866.exe7⤵PID:2080
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD59958fb8f9853eccff8bd8edb6a614476
SHA176dded6e89a908c322db433f6e815e98f02af2bf
SHA25653d4979603821e5f459bc143db94780c0b6fbf24489f0adf677805da96af7e1e
SHA5123e59d2e36fc4fa7ec2c291f60e4250bce706de06df2899b55872be1d88c67e0e65131a197348d7f0429b9f260880d9afaa655a99e7c4936a4c4e178bc3ad4de1
-
Filesize
184KB
MD5939cc1f16a49ce413a97eb672817da1b
SHA14386a6dc5083966b2fda44b5da129a1ae3e3cdfe
SHA2567b42a1e5c14296d53a525dad657b6555cf41f143d9e67a62baa910f78eb9f643
SHA51248136e37b2fc1e45a5345e86692aa766bea631b1d5cf4db19832eb7d1ac3ee76c33633302c5076032f38dc65153ee50808ae57cc71092518213f765cd2477b89
-
Filesize
184KB
MD53c122600cd5d83197cbed92125af6a1b
SHA12c5d05761a42235be277a11088267dc941b60ab2
SHA25615bd902df91764cc20937d1f7212f0c13b0efd2f1d13e698db940b732da7569a
SHA5123d91d48390c562961aab60bea91ae9c40ee575fcb9f3885d0ec019dc22cbc73bf385cd6c46c4715ea2fdd2446d5832ff7248f6f7c419a455f3f7b1c63ae4ada9
-
Filesize
179KB
MD5df1ae23f5c333db7db013a69a6a2389f
SHA1933ef75facf922278c1582496657a4a9b058e97c
SHA2563711e42d3c11684ab4e7367bb8f380bfd0d22c866cfcd966824e31da7e0e866a
SHA512bddfe9ed00b820b71328bbec823d1fc125762afd97ae3c5d0ccf8a1c657e17ee753c0e621e3276cc608855a84b10782ded32fdfac90aea2536032de1b3898068
-
Filesize
184KB
MD53e60c9a0cade7def1270e398cd011615
SHA18522bba352dfeee1c251956e80cfc9a45056d811
SHA2567954791d57818420aa4881dd61e2601bd2caeef02443f40e65ca8fc0f05fc8ca
SHA5122d4745e06d202cbc623052243eb33b6fde87c6b0c5bfbae662b6598eafbd91bf5b32d1aec121ef97d3808b64200a72cd5ba5361754101610470b2b8286825825
-
Filesize
184KB
MD57df444eb85937af0431c5618e4bb23d8
SHA1f53e2fbe907e9e7f057dbc993c23e771551ef5b6
SHA25685fc72836e19e30c873ac819ca81fa37970e4debc3328db6864f6ec4d1680238
SHA5127ddebd327b47f8e745b85b96df08977bf5390c7c23d0e77d4f2d5b6230d8bda4dd01f76bb6caacb7aaf850dbac3d8bb9d3a343fc2d0718ed274727622733d388
-
Filesize
184KB
MD51f239d2c568aa6744893608767e1a52c
SHA1d0c3816f5f3a8b424a386c4ada7296196fadd4a2
SHA25694404afb10089ffc187b37e38eb7d0fd78a58a8c32e0bc71abfe5ef9c35933a0
SHA5121e9911501f1363f972832f86334040164434b040b7ce54f91b8b3ba184534167296e44307fd8cc1e659c815140ee648c1dd7bc14f5bcafc582322b7ff157704a
-
Filesize
184KB
MD5cc7eab19abcd313ac01cb4a9a195891b
SHA10c67f352423c2b02770733ed22557ebc44f47c8a
SHA25681d3432142aed06162e2fc55b56fa92273a1885759de77c508b22ef86efef17c
SHA512163c6c897f8c57428379b375f06d930ce859542ff89799e22505b0a43604f81cd3ee47adbeec4772c205a7a8fd2e3fa7f6414b7b51144e2f6fd9545d261cf225
-
Filesize
184KB
MD5747a02c01af86dd34fb12e64e99702e8
SHA19df4cbc9fec068911eee8d199eb55e400ba20854
SHA2561d2aadd1b2af565254dbebe844df1d96ac085363c3f0c8965a9b6992647643d8
SHA512109f05ce871fedd09670cca797e7f5b67f7982b3a9bbed961ccc0300433220093121e5d161fa0db43fbd37bf651f36e2d48912232fc8d3e36422618afb119c7d
-
Filesize
184KB
MD5b7844873edbd73464a5cbf3a58fe57ff
SHA19e3c281c5495b73982c817568efe715de0ae590e
SHA2564edfe85e7c5f9c53a05116019c4190e3332809e119cae20d5e79919225a8b4fc
SHA512ca2697ee897f06539e4c9b34bd477a3f8118461aab04fbcb4a206a044e1ed6936cb868f9366c5f7321e5680c592da305509fb23c14e4ab8bf05913b05a3eccbb
-
Filesize
184KB
MD510814abf76b74e832b79c4bdbfab45f0
SHA1738f2db058a7c14a16dd25d1e86be18320e84db3
SHA256d4dc201d31a24d9e173e65dec90961774b4439b1ff4ae6c0074673b400cfb9f3
SHA512aa4f21a5acf9b32d4c75145b1a5ad6a57f835b74405bedc2942dc93a27d22a8d4a0fb9a12ebc7b44ae2ddda5c911f42b3e5b8936234eb9419fbd97864574f4fd
-
Filesize
184KB
MD59f07bddba16c2d27e0cbc5b6573d0e7b
SHA17828a83c9340c4addd511453ac93351b91e39f92
SHA25641b44dd21d1afeb36d74d8eb895497cfca00804fb23e359bbeea423ed99871b3
SHA512fca7485327f701dd4f53995da2c8443c5b587df4f37394f1a16ce7a9572f8fa368b651caee6dd9eb545320a7e4c2a1d237bcd0e5f99d14107e4d998ace0c32a7
-
Filesize
184KB
MD5e2ca110f2e802c7c597f02f3968b68ae
SHA1105962514812e555870811e84a6af78fc9a02992
SHA256077b1cad74cb8aff6f0e3c5f8c73f8c128ce20653a94f16e405e316e60595320
SHA51261ede8378e0ca73d0eb870bfc3892209ac333581e5e847d374be4273997583be9e66908e71528c918d17961447c1e01d783f1c93fad54fb0a47906d4d035919d
-
Filesize
184KB
MD5940d5ba8ee9452b5bc2254d5b738fbdd
SHA141c6bbff87ef2dce97b19231718ffd1206dd6684
SHA256cb7e6c8af321a798253ccecc14c354e5f0a6e390b6b20fb07b158cef38e21335
SHA512e3fece29f90597b44c26ae703dce3b17e0b7e6b84f5269218f33349307b8d0c7b84c52b2b10744039ce7c094ec276a9510e09b14742b9f3c7810541cc782c44e
-
Filesize
184KB
MD504e1ce9dd6653fa971605254b8a4d4cf
SHA15e7396394956cc49d7928ae24a02f0a82212a36d
SHA25606a0c78d3cd4108515544b356b10a322c45f58839f183c4f29455ff7f4b3b457
SHA5122e227912d7a18dcd22c777ec154b1576313bc861e54641428632292c78145e4f48abd76711cee7ce858a945257c9306d4e383a5597f58c16b7fb98071676aa7e
-
Filesize
184KB
MD51cee52e48600a3e1e700d72b2d3f16f6
SHA1bceb068bfb697b3da0312ab3c43179dac5b64f71
SHA256960ecf0ca242934955176f89178ee842ee6df9e356d93b31cf10d9b732af8dba
SHA51209d09373f1b7f545712e84fac3d35c4eb003ee9d09604c570446a808c5b7f514cc4c7dff92b93e60d0529e4dec1717a4b554ec71ac89f461bd3cdde38ea5f5ef
-
Filesize
184KB
MD5aa729309243fbd00dc11a5ad9087307c
SHA1e46e7e76ffef9b86be4b71fb118122741a801c76
SHA25601a62659c14f9a8c5934d100b8da3d583e00619f7fed18e1d4992373c2729fad
SHA512426bd4ca8f9979a9ca4dd5bbfeade4706761b903e93abc6a275e7477689b1d3179cfb88879a6fa11f49768a040add25054d0f1028e2b81a9471b5370681052a7
-
Filesize
184KB
MD505ca7b10d47fdc84214c98d2dfa1d7f9
SHA1ec94081114b2d56b0c9894b47b4e14bfdad4989d
SHA256643d82cf70e7ace46a9029b2c929e05f30f5ad30b64302eabfe5e1da42ef538f
SHA5125f3a7a7df66d69ebf2faad251d05dc8d2181ff79da59ed35fbea94f6b60b49b002c198f2bf61f67e7004cb07e1228ac181be842a2be16d06ddc1cf9fb9c58d6d
-
Filesize
184KB
MD552489a4c7e9c20c22869b29853fae91f
SHA1158d8885dafdc3b83fec40e045f2135d44d77799
SHA256cb662da2103d4db7f0a69f123524b832594f2446097b883cd9d68c035b81c186
SHA5127ff24b0a7ca50efcdf2ae335fe60e23028ceb035f1059b246093ea0fee3e07884299f110cb89c004fc144b241b0ce98edbf98093c07b1dd659e0ab0d147fbc81
-
Filesize
184KB
MD5ab16df6ac1a20cb247244cf432670d8a
SHA11ad8ab126637dadce4da2eb7e1e2f8a8d5521864
SHA256a115d23ebfb689c91fe9d20fdd7c731f04071b8dc985b95253c3860f021d4834
SHA512d597630865f43f2c92178d7fa3634767d6a2b9bf5ad36e7005dd9ca03a284640bafa90ec3364a45bd2e03e9e8d4c408941aa507c081a599509cc7adf54c463a4
-
Filesize
184KB
MD5cfc84c618dc88736ecff19435f3bd73b
SHA131ef0a3c5be9e02b1061eb8514d8cb2deb34ee1c
SHA2561b836d8a60ed3100e90147519119a599068b6e7f0bc20c440a1652c07161a025
SHA512ebd167144f5c9a8a3cf4ebdcd8fb142d32c1a4be04957450a033bb3119e8f73525a3ea5ab840fdab2580ab1b90be8dea08b4a9367d35923547d33610098cb8d7
-
Filesize
184KB
MD5e52cfcec222512886cee99b2df597840
SHA1f803a9f319552816f1598a1e746377c7aa427c66
SHA2568a7b581e98233556dcd6798a42a1a7ec10559b8f48b759d60aa8ee259bc0bf84
SHA51238529b335e72830c09343314353ba4de12c0e3fd76bbbff8cd3b36974fac18b460faa53711c16ae8ceed9eaa97a485df75c88ed05cc9435643631a1656a69aec