Analysis
-
max time kernel
76s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
8f597cfca0663595b1b033534cb598d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f597cfca0663595b1b033534cb598d5.exe
Resource
win10v2004-20231215-en
General
-
Target
8f597cfca0663595b1b033534cb598d5.exe
-
Size
184KB
-
MD5
8f597cfca0663595b1b033534cb598d5
-
SHA1
cad0555eb580732ed886d3dd4eebc3efdc2e3a69
-
SHA256
6d56797b03d6df5840f05726b09761e331369baf8fc505b252ffcd776d361a34
-
SHA512
633279b552b5cc67b4dfce5361d6f6d93d543eaa3c1b2353a2622342bd09878c9e71ac8e943195138e6161b3aa739c67264e3e13fc18ddbfb796c91aa42969b5
-
SSDEEP
3072:IGvFoJXTnTAaSOjgdxUXzz1ce9Y6pfjkLzVx4I2KY7lXvpL2:IGNoJMaSrdaXzzVQ4D7lXvpL
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2060 Unicorn-65331.exe 2000 Unicorn-12383.exe 2832 Unicorn-64366.exe 2728 Unicorn-11330.exe 2784 Unicorn-61086.exe 1004 Unicorn-28181.exe 1332 Unicorn-7184.exe 2908 Unicorn-3655.exe 1512 Unicorn-35062.exe 1904 Unicorn-43785.exe 2860 Unicorn-39338.exe 1324 Unicorn-61465.exe 1656 Unicorn-19878.exe 384 Unicorn-1678.exe 576 Unicorn-61076.exe 2308 Unicorn-15829.exe 1172 Unicorn-56608.exe 1468 Unicorn-61247.exe 1920 Unicorn-19660.exe 2924 Unicorn-32850.exe 2876 Unicorn-64968.exe 3000 Unicorn-19297.exe 2344 Unicorn-52908.exe 1648 Unicorn-47693.exe 872 Unicorn-56416.exe 1700 Unicorn-18913.exe 2076 Unicorn-40485.exe 2016 Unicorn-16727.exe 1768 Unicorn-52545.exe 2352 Unicorn-48653.exe 2756 Unicorn-25580.exe 2820 Unicorn-9649.exe 2824 Unicorn-55321.exe 2612 Unicorn-26946.exe 2632 Unicorn-11164.exe 2148 Unicorn-55534.exe 1116 Unicorn-38622.exe 780 Unicorn-64065.exe 2864 Unicorn-55150.exe 2812 Unicorn-64470.exe 2880 Unicorn-19908.exe 2168 Unicorn-44050.exe 2736 Unicorn-40520.exe 1340 Unicorn-40459.exe 2244 Unicorn-32483.exe 592 Unicorn-61071.exe 2532 Unicorn-37121.exe 2236 Unicorn-9493.exe 2356 Unicorn-17299.exe 2260 Unicorn-45887.exe 2436 Unicorn-12638.exe 1776 Unicorn-21361.exe 1188 Unicorn-17455.exe 968 Unicorn-6354.exe 2200 Unicorn-4086.exe 2012 Unicorn-48456.exe 1952 Unicorn-49011.exe 1560 Unicorn-60132.exe 1888 Unicorn-40458.exe 1344 Unicorn-11123.exe 2712 Unicorn-65368.exe 2584 Unicorn-33442.exe 2956 Unicorn-23.exe 1512 Unicorn-16530.exe -
Loads dropped DLL 64 IoCs
pid Process 2224 8f597cfca0663595b1b033534cb598d5.exe 2224 8f597cfca0663595b1b033534cb598d5.exe 2224 8f597cfca0663595b1b033534cb598d5.exe 2224 8f597cfca0663595b1b033534cb598d5.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2452 WerFault.exe 2000 Unicorn-12383.exe 2000 Unicorn-12383.exe 2832 Unicorn-64366.exe 2000 Unicorn-12383.exe 2832 Unicorn-64366.exe 2000 Unicorn-12383.exe 2784 Unicorn-61086.exe 2784 Unicorn-61086.exe 2728 Unicorn-11330.exe 2728 Unicorn-11330.exe 2832 Unicorn-64366.exe 2832 Unicorn-64366.exe 1004 Unicorn-28181.exe 1004 Unicorn-28181.exe 2784 Unicorn-61086.exe 2784 Unicorn-61086.exe 1332 Unicorn-7184.exe 1332 Unicorn-7184.exe 2908 Unicorn-3655.exe 2908 Unicorn-3655.exe 2728 Unicorn-11330.exe 2728 Unicorn-11330.exe 1904 Unicorn-43785.exe 1904 Unicorn-43785.exe 1512 Unicorn-35062.exe 1512 Unicorn-35062.exe 1004 Unicorn-28181.exe 1004 Unicorn-28181.exe 1656 Unicorn-19878.exe 1656 Unicorn-19878.exe 2908 Unicorn-3655.exe 2908 Unicorn-3655.exe 2860 Unicorn-39338.exe 2860 Unicorn-39338.exe 1332 Unicorn-7184.exe 1332 Unicorn-7184.exe 1324 Unicorn-61465.exe 1324 Unicorn-61465.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 384 Unicorn-1678.exe 384 Unicorn-1678.exe 1904 Unicorn-43785.exe 1904 Unicorn-43785.exe 576 Unicorn-61076.exe 576 Unicorn-61076.exe 1512 Unicorn-35062.exe 1512 Unicorn-35062.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 2452 2060 WerFault.exe 28 932 2924 WerFault.exe 50 2336 2712 WerFault.exe 92 2192 2704 WerFault.exe 121 2868 2024 WerFault.exe 146 936 1660 WerFault.exe 160 1276 2152 WerFault.exe 185 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2224 8f597cfca0663595b1b033534cb598d5.exe 2060 Unicorn-65331.exe 2000 Unicorn-12383.exe 2832 Unicorn-64366.exe 2784 Unicorn-61086.exe 2728 Unicorn-11330.exe 1004 Unicorn-28181.exe 1332 Unicorn-7184.exe 2908 Unicorn-3655.exe 1512 Unicorn-35062.exe 1904 Unicorn-43785.exe 1656 Unicorn-19878.exe 1324 Unicorn-61465.exe 2860 Unicorn-39338.exe 384 Unicorn-1678.exe 576 Unicorn-61076.exe 2308 Unicorn-15829.exe 1172 Unicorn-56608.exe 1468 Unicorn-61247.exe 2924 Unicorn-32850.exe 1920 Unicorn-19660.exe 2876 Unicorn-64968.exe 3000 Unicorn-19297.exe 2344 Unicorn-52908.exe 1648 Unicorn-47693.exe 872 Unicorn-56416.exe 1700 Unicorn-18913.exe 2076 Unicorn-40485.exe 2016 Unicorn-16727.exe 1768 Unicorn-52545.exe 2352 Unicorn-48653.exe 2756 Unicorn-25580.exe 2820 Unicorn-9649.exe 2824 Unicorn-55321.exe 2612 Unicorn-26946.exe 2632 Unicorn-11164.exe 2148 Unicorn-55534.exe 1116 Unicorn-38622.exe 780 Unicorn-64065.exe 2864 Unicorn-55150.exe 2812 Unicorn-64470.exe 2880 Unicorn-19908.exe 2168 Unicorn-44050.exe 2736 Unicorn-40520.exe 1340 Unicorn-40459.exe 2532 Unicorn-37121.exe 2244 Unicorn-32483.exe 592 Unicorn-61071.exe 2236 Unicorn-9493.exe 2356 Unicorn-17299.exe 2260 Unicorn-45887.exe 1776 Unicorn-21361.exe 2436 Unicorn-12638.exe 1188 Unicorn-17455.exe 968 Unicorn-6354.exe 2200 Unicorn-4086.exe 1952 Unicorn-49011.exe 1560 Unicorn-60132.exe 1888 Unicorn-40458.exe 1344 Unicorn-11123.exe 2712 Unicorn-65368.exe 2616 Unicorn-7615.exe 2584 Unicorn-33442.exe 2432 Unicorn-24890.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2060 2224 8f597cfca0663595b1b033534cb598d5.exe 28 PID 2224 wrote to memory of 2060 2224 8f597cfca0663595b1b033534cb598d5.exe 28 PID 2224 wrote to memory of 2060 2224 8f597cfca0663595b1b033534cb598d5.exe 28 PID 2224 wrote to memory of 2060 2224 8f597cfca0663595b1b033534cb598d5.exe 28 PID 2224 wrote to memory of 2000 2224 8f597cfca0663595b1b033534cb598d5.exe 30 PID 2224 wrote to memory of 2000 2224 8f597cfca0663595b1b033534cb598d5.exe 30 PID 2224 wrote to memory of 2000 2224 8f597cfca0663595b1b033534cb598d5.exe 30 PID 2224 wrote to memory of 2000 2224 8f597cfca0663595b1b033534cb598d5.exe 30 PID 2060 wrote to memory of 2452 2060 Unicorn-65331.exe 29 PID 2060 wrote to memory of 2452 2060 Unicorn-65331.exe 29 PID 2060 wrote to memory of 2452 2060 Unicorn-65331.exe 29 PID 2060 wrote to memory of 2452 2060 Unicorn-65331.exe 29 PID 2000 wrote to memory of 2832 2000 Unicorn-12383.exe 31 PID 2000 wrote to memory of 2832 2000 Unicorn-12383.exe 31 PID 2000 wrote to memory of 2832 2000 Unicorn-12383.exe 31 PID 2000 wrote to memory of 2832 2000 Unicorn-12383.exe 31 PID 2832 wrote to memory of 2728 2832 Unicorn-64366.exe 32 PID 2832 wrote to memory of 2728 2832 Unicorn-64366.exe 32 PID 2832 wrote to memory of 2728 2832 Unicorn-64366.exe 32 PID 2832 wrote to memory of 2728 2832 Unicorn-64366.exe 32 PID 2000 wrote to memory of 2784 2000 Unicorn-12383.exe 33 PID 2000 wrote to memory of 2784 2000 Unicorn-12383.exe 33 PID 2000 wrote to memory of 2784 2000 Unicorn-12383.exe 33 PID 2000 wrote to memory of 2784 2000 Unicorn-12383.exe 33 PID 2784 wrote to memory of 1004 2784 Unicorn-61086.exe 34 PID 2784 wrote to memory of 1004 2784 Unicorn-61086.exe 34 PID 2784 wrote to memory of 1004 2784 Unicorn-61086.exe 34 PID 2784 wrote to memory of 1004 2784 Unicorn-61086.exe 34 PID 2728 wrote to memory of 1332 2728 Unicorn-11330.exe 35 PID 2728 wrote to memory of 1332 2728 Unicorn-11330.exe 35 PID 2728 wrote to memory of 1332 2728 Unicorn-11330.exe 35 PID 2728 wrote to memory of 1332 2728 Unicorn-11330.exe 35 PID 2832 wrote to memory of 2908 2832 Unicorn-64366.exe 36 PID 2832 wrote to memory of 2908 2832 Unicorn-64366.exe 36 PID 2832 wrote to memory of 2908 2832 Unicorn-64366.exe 36 PID 2832 wrote to memory of 2908 2832 Unicorn-64366.exe 36 PID 1004 wrote to memory of 1512 1004 Unicorn-28181.exe 39 PID 1004 wrote to memory of 1512 1004 Unicorn-28181.exe 39 PID 1004 wrote to memory of 1512 1004 Unicorn-28181.exe 39 PID 1004 wrote to memory of 1512 1004 Unicorn-28181.exe 39 PID 2784 wrote to memory of 1904 2784 Unicorn-61086.exe 40 PID 2784 wrote to memory of 1904 2784 Unicorn-61086.exe 40 PID 2784 wrote to memory of 1904 2784 Unicorn-61086.exe 40 PID 2784 wrote to memory of 1904 2784 Unicorn-61086.exe 40 PID 1332 wrote to memory of 2860 1332 Unicorn-7184.exe 41 PID 1332 wrote to memory of 2860 1332 Unicorn-7184.exe 41 PID 1332 wrote to memory of 2860 1332 Unicorn-7184.exe 41 PID 1332 wrote to memory of 2860 1332 Unicorn-7184.exe 41 PID 2908 wrote to memory of 1656 2908 Unicorn-3655.exe 43 PID 2908 wrote to memory of 1656 2908 Unicorn-3655.exe 43 PID 2908 wrote to memory of 1656 2908 Unicorn-3655.exe 43 PID 2908 wrote to memory of 1656 2908 Unicorn-3655.exe 43 PID 2728 wrote to memory of 1324 2728 Unicorn-11330.exe 42 PID 2728 wrote to memory of 1324 2728 Unicorn-11330.exe 42 PID 2728 wrote to memory of 1324 2728 Unicorn-11330.exe 42 PID 2728 wrote to memory of 1324 2728 Unicorn-11330.exe 42 PID 1904 wrote to memory of 384 1904 Unicorn-43785.exe 44 PID 1904 wrote to memory of 384 1904 Unicorn-43785.exe 44 PID 1904 wrote to memory of 384 1904 Unicorn-43785.exe 44 PID 1904 wrote to memory of 384 1904 Unicorn-43785.exe 44 PID 1512 wrote to memory of 576 1512 Unicorn-35062.exe 45 PID 1512 wrote to memory of 576 1512 Unicorn-35062.exe 45 PID 1512 wrote to memory of 576 1512 Unicorn-35062.exe 45 PID 1512 wrote to memory of 576 1512 Unicorn-35062.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f597cfca0663595b1b033534cb598d5.exe"C:\Users\Admin\AppData\Local\Temp\8f597cfca0663595b1b033534cb598d5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65331.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 2403⤵
- Loads dropped DLL
- Program crash
PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12383.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64366.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11330.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7184.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39338.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19660.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9649.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12638.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1284.exe10⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26176.exe11⤵PID:2864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10007.exe9⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60280.exe10⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36155.exe11⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37089.exe12⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24910.exe13⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22080.exe14⤵PID:2524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46196.exe11⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55304.exe12⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19887.exe13⤵PID:1004
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21361.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29873.exe9⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63269.exe10⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-550.exe11⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9232.exe12⤵PID:2940
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55321.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45887.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7807.exe9⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45781.exe10⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7924.exe11⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37000.exe12⤵PID:636
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57563.exe8⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34676.exe9⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34021.exe10⤵PID:1588
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32850.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 1887⤵
- Loads dropped DLL
- Program crash
PID:932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64968.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48653.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61071.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7615.exe9⤵
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26422.exe10⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63856.exe11⤵PID:2832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59457.exe9⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-856.exe10⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30976.exe11⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35953.exe12⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11671.exe13⤵PID:1208
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24890.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33742.exe9⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35828.exe10⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46238.exe11⤵PID:1716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48251.exe9⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33192.exe10⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8189.exe11⤵PID:240
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9493.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62244.exe8⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38324.exe9⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15735.exe10⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55470.exe11⤵PID:2900
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25580.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17299.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54761.exe8⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31500.exe9⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62901.exe10⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17432.exe11⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51962.exe12⤵PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe11⤵PID:1492
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51232.exe7⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30789.exe8⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45086.exe9⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25429.exe10⤵PID:1164
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3655.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19878.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56608.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40485.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44050.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39385.exe9⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9232.exe10⤵PID:2504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19711.exe8⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58085.exe9⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7042.exe10⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41049.exe11⤵PID:308
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40520.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58160.exe8⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20722.exe9⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48267.exe10⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32886.exe11⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46238.exe12⤵PID:2700
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16727.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40459.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23.exe8⤵
- Executes dropped EXE
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16530.exe7⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6092.exe8⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39720.exe9⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35247.exe10⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23701.exe11⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47167.exe12⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45709.exe13⤵PID:2032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25843.exe12⤵PID:1512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43637.exe11⤵PID:2468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12003.exe10⤵PID:1712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27633.exe9⤵PID:2420
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61247.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52545.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32483.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45716.exe8⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22616.exe9⤵PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54439.exe7⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23140.exe8⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62901.exe9⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29316.exe10⤵PID:2116
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37121.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29380.exe7⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45999.exe8⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17069.exe9⤵PID:2488
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61086.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28181.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35062.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61076.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47693.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38622.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6354.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6136.exe10⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20177.exe11⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23571.exe12⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11121.exe13⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exe14⤵PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42698.exe13⤵PID:2772
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51808.exe9⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6611.exe10⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26695.exe11⤵PID:3012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4086.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47361.exe9⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61100.exe10⤵PID:944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64065.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34149.exe8⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7763.exe9⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56440.exe10⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60519.exe11⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59388.exe12⤵PID:1364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56051.exe11⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28832.exe12⤵PID:2312
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56416.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55150.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65368.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2409⤵
- Program crash
PID:2336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33442.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63264.exe8⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54904.exe8⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16856.exe9⤵PID:2068
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15829.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18913.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64470.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8767.exe8⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22040.exe9⤵PID:1116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30126.exe7⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15547.exe8⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39715.exe9⤵PID:1668
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19908.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11123.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8282.exe8⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25553.exe9⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56440.exe10⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8573.exe11⤵PID:2960
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43785.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1678.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19297.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26946.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8165.exe9⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2392.exe10⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59372.exe11⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36015.exe12⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-898.exe13⤵PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 38013⤵
- Program crash
PID:1276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 37612⤵
- Program crash
PID:936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 37611⤵
- Program crash
PID:2868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 37610⤵
- Program crash
PID:2192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20972.exe8⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38324.exe9⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51443.exe10⤵PID:1156
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40458.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2361.exe8⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19866.exe9⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58288.exe10⤵PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38422.exe9⤵PID:1012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11164.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17455.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39577.exe8⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36160.exe9⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63264.exe10⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30452.exe11⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7805.exe12⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19093.exe13⤵PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12060.exe11⤵PID:2920
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44216.exe7⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39860.exe8⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exe9⤵PID:2916
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52908.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55534.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48456.exe7⤵
- Executes dropped EXE
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49011.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31985.exe7⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39092.exe8⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33415.exe9⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61422.exe10⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7997.exe11⤵PID:2520
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD54c2146d8499d8cc8ef2dce19a600dd19
SHA19702878296d97c493603feb64e8eb67436a88caa
SHA256c647ec610cea2a47a3fe47d3a5bedd31a597a7646a8f562c3d4395e7c6f4b4c8
SHA512d803d681cde708d33808a89a8f2cc661a3468c1b4fac9f312e02e114974cd715e9d00685864160f4be0886572868bde8b84caee99132f4c2db36fc99fd471440
-
Filesize
184KB
MD59951935c27d121e9cecf543438c5631a
SHA162a9f1c9ea640962ebd48e70829f92bc5c8aff82
SHA25611930a2095af2bdb491867e363e189102ab11ce60963a1094da58aabc2ec6763
SHA512c35ee61da3e3ccb3d6b84c9c7d1be1553802916f74364c1b59d4de57974049ebc2ff6d962e059317d20f09afdae789242359331670c3fd0fb2978315eebee0ba
-
Filesize
184KB
MD5659bd66db52d2188d0a7bd65038499ec
SHA1a473fe3cff9251e1075b749ecf2d79f2d30fd356
SHA2563ae06f0458d86922598d82dbb509eef6e03b3be3502d9ded22e740875179c9b8
SHA512323792808eede2eea309a3d4ffb224c58ced44114d6cc103f0eb031bb298589db80158b31950e51424743f02af6963eaea1aa6c9cda7dbf0130a46625f3d4085
-
Filesize
184KB
MD5b3224b1978c396267fa26d9c3d88fea2
SHA13c56faeda359e442d9259dd35ea52ac074d35c54
SHA256333975b530a17eca57327bb56780701acc0c6b4069beb78cbe8904a041f40885
SHA512d951f748acd4e0d3573ed243c30dc2a38e4fcb345619a396769c71df75cfea7920824ecbed709b0d3b19a9f0b9f9d381a1cae7976cf04610961725c36dc4bbb5
-
Filesize
184KB
MD51b23b0454a154b1c52f776821312116e
SHA1e70d5222880a29b8c5db5bde465895f4c90bec72
SHA2564c7dabaa5163f254a255600f42f0b1758c61cd8d86901938da23ca7f82c28f17
SHA5121e0a63be873c9918de599bc289a18a01e8ea906225716d4c572235e5ba1ccfbb4796c4a6ebd19fa465a26bfb2c85b5fe5e05f73c903e6da4b3b607f683ebfb0e
-
Filesize
184KB
MD588980873c4581aa8d9758431ef974e2e
SHA187fb4e351a3cf829d0607ed268340bd50a37205b
SHA256c2d818d163d4c66e8c2ed4ae5f3b730ceec6d5a3a529aa6829fa91f8924645d9
SHA5129d5c338318f37773cf93132bfbc8d6ffd4ce3b885225d1c3cd7fa7e6f78f762595d31a3cb130e942d08aa01a5c1d6fa2b30521352ffe47e1a6c9541f6034242c
-
Filesize
184KB
MD5c03f14d8bead9576f1b59e948652d0b1
SHA140603e717f359d472ddd52ab5804cc4966fed4dd
SHA2564a47432893660c6c4386a5b2904aa9bf0ec2babd3b4cf261b9e4d42abce5ce0a
SHA5128cd0b4048d51fdbddeba8eb3e46fe01c74cc533f461eecbd61b53aa5354b022d6caae7d36e0d496a819f91f0b06c02cd612ce8d15f2497a403d2f812ac69b190
-
Filesize
184KB
MD5d337a420be930b80c497ede2d6cbef1c
SHA1e5e1878ad3717a08a698907365cbecb476709e10
SHA256f188752fc9661556955c7256374e32addbfe2adb8ccd527ac9b80d38d75dd88a
SHA512500bdf356ba968c16521b25e3861fbb0c86b086235b37527a7796ab188d3465e60a501db56b40cd4460c2018f5f7b969ac3b668e812b57f94d2380a0ed4bc134
-
Filesize
184KB
MD5ca5a79d2cb9b6100dc977108a802b835
SHA1abc1607a371dd308c35c557b2d265ae0444b98fb
SHA256891ee92539db8f0253b82ad4673f32506e5a83bfd6b02e3dadd98c305bc310d0
SHA51226143ff206cae292caaf4a698231845270551a6033a9f5386dcf1bb6811149da6b3264d9a930458c58dab64bf3da860a9b560278742956cd46516effbbdb8526
-
Filesize
184KB
MD5f0c1edf5c81e92315a9dbea382e92d22
SHA17b0b723ab0d3e7997a1be11fbcd451199f58f2b9
SHA256a2a314a155155ac3e28d161474e887b3954e1dcb57f0476d71ada0dd3553ae1e
SHA51268d20fa55c21a8389c360dcaa32457aa74584861f6aa6d3ef8d88c8be9a6ae140641c58981089d53e065fbefdfafe64f759713f94ee55fee9a8a1b57d12a74e9
-
Filesize
184KB
MD555c38eaa522d2bb55298319ffb7e08c7
SHA188ca285f8e2bb13cb0540cf8af25422a524a4db6
SHA2568b97499b090bf0faaeddd9a233c78895b64309f4b17f3514edae7256dab98b65
SHA51296bb94da49dd19a7007ae5d663908ade65c0b17c2863786265ce491a44bba254e06bd7334f9c348d92521cd6d6c0fb98955f68a826ca666051403a8266ef18aa
-
Filesize
184KB
MD5dc6e9e7ff1a30614da1d5e38f9452d7e
SHA10f937cc05121ae53315dfaff4ea3bc94f1bbd56a
SHA256f3bf2b317445f8dea93fbea2040801bda72a51ae80c38176360c367a9d1b3416
SHA512040535bd46d78428c15a3f35edecd6c04bf7754907c2fd16af0d2929773af42448c07eb5b17cbd72a8a2f876170f966334e043269ca65e8c2a8c1d7defa053f0
-
Filesize
184KB
MD595ff27894c6a76e4ee9bb6be201d6610
SHA15d676e40f2d3c21141d3a346da5d5c7990e90e70
SHA256a385af1b8b253b7ba214511a3fd6d44adc6319f85ab75e185520a3bad3c2f593
SHA51261b962df838a13ceba0fc33c5a60d839a06eabfbb40c1a086a5b7b6995e6f405b5fba8a9d299ff40dc1c0a4503ce62e7e9737bbf94caf6f51e8bd2ed1e751836
-
Filesize
184KB
MD5521c3fac1940ca1571ebbe18e45eecb9
SHA128b059a97818f48c48f1862b021eecb03816af57
SHA2562468ff12a24465b88ffd27cedaf11a1e276432bc4622afa9fb88a0cdaf590750
SHA512bfd37ff6c9b3f11797958c44032d594ab5d794e4ed9c84691ddf5f33c4f1ecda6b6047abe72d87d5e56453dd39b6339e3a9099e15012089fb110714c895e7c9e
-
Filesize
184KB
MD51a1bc2eba269df9f58e1d05944bc2786
SHA180296544cfac53847715a9af8be0857d19ff1882
SHA25670cfb7f8a602230da084ce043b77a78f5e3c575bdecd267c952826fa7f093ef3
SHA512c7322d5f78c7038f7cdb5a28e34e9ff4897198e0431ff2fb6fd3bcee981f83ad90e368ffad20910ffd8ea16ced9f0e3e4dfc5ff864ed794185edc9858ba01385
-
Filesize
184KB
MD5b8c45c3a32c66baba689486e7e30c12a
SHA1fed5f4c361109237eab8e1b4d2d3701fd03cdfbe
SHA256421a46de6d8707cb7e0e2a5961b374003d437a8d44bddd10d190bf13aef8f871
SHA512f72274f3fc6add7508e15d8b960572a1dc987e478f9e0baf80984462774a8f2bb2c1d452cbfb1256019aa779c2ff018a5cf99410c406f26c01d97fd26e131780
-
Filesize
184KB
MD53b8e91f5b9ff02bdd5eb66fb7060ca4a
SHA186a2b28c806bc2aead0496ec61ca613b5ccf416e
SHA256e66e084063d61deb252a6d9b441c9be3cd8e554bf559de5ac6ce116599dbb943
SHA512d53fd50a4e8f62c20f65e564e55726de1fc27159944f8f102afd6a1d81f0b3dc31fa5ee00843391f9b1ad5c54e5d45de2af50b2d6d3744ec951daf10b6302566
-
Filesize
184KB
MD54b495dbe3a5b9b1a49f2135ad3696666
SHA16baf71a7b897fbbb760b0fc477dac2ec57766c54
SHA25691003b0d50ec4d5e807b17c9c0cf4d9e2fb2e162d6362cf38cbd8b232d20b949
SHA512ff3cccbc6a7986977d799cbce7b21bebaaf16a0daf0eeba250ffba80ef2e0d55dcb1ffffcb39364a7057fc37b54ab2004f3407ab715a248f36309a377c54ffc4
-
Filesize
184KB
MD55e39ef34aa8a23a395c3133bb73812c9
SHA1cf68a74fc3e8a5b3114df545f3daba63cfcb0f60
SHA25652d329c5048cc022398bcce8b5b3f4544cc60bdb159ceabbfae84e0808ea1f5e
SHA51236b345ff752fc3704de8d3bae033e62d61ac54b2bd7b8a2bfab86a1cfeaa1af591635f09f3eaf585a884d1c1d38e5db36fc6ddbff44c0b5c83a7a690bce8ece7