Analysis
-
max time kernel
91s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
a9def89bd2b8721e81d06099971eb15a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9def89bd2b8721e81d06099971eb15a.exe
Resource
win10v2004-20240226-en
General
-
Target
a9def89bd2b8721e81d06099971eb15a.exe
-
Size
184KB
-
MD5
a9def89bd2b8721e81d06099971eb15a
-
SHA1
bfeed148aeb25ac946aa864ee03732f8dcff46bc
-
SHA256
cb823d0c5a49f981386c8bddee6c998b48cfaa7faf7bbf4d343dcb663f4f0d28
-
SHA512
733fe9da00240861d378c173734c2e68e00e1251026ff81eac945091d0f1b89c96329c3100444c550677c602024867efd7d066859c8e70700dd5c99f814652d0
-
SSDEEP
3072:DhSjonmACfFmggjmMFpDl8SYpOlWtQil2zSxcfP6aylY3pF8:DhyoYtmg/MHDl8Y+klylY3pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1552 Unicorn-5381.exe 2664 Unicorn-17717.exe 2556 Unicorn-1935.exe 3028 Unicorn-38220.exe 2380 Unicorn-30606.exe 2864 Unicorn-15662.exe 1908 Unicorn-18459.exe 2628 Unicorn-53824.exe 324 Unicorn-16321.exe 2760 Unicorn-4623.exe 2856 Unicorn-47047.exe 2436 Unicorn-51274.exe 2824 Unicorn-41522.exe 1208 Unicorn-21124.exe 2892 Unicorn-60018.exe 2968 Unicorn-21678.exe 2940 Unicorn-41544.exe 2756 Unicorn-64657.exe 2936 Unicorn-18986.exe 2092 Unicorn-16547.exe 1708 Unicorn-4849.exe 2052 Unicorn-786.exe 1260 Unicorn-49795.exe 2268 Unicorn-58518.exe 1068 Unicorn-10708.exe 3008 Unicorn-12031.exe 1768 Unicorn-9338.exe 3048 Unicorn-60485.exe 1700 Unicorn-18061.exe 884 Unicorn-11284.exe 1476 Unicorn-34397.exe 3056 Unicorn-59608.exe 1988 Unicorn-15259.exe 3052 Unicorn-42456.exe 2344 Unicorn-13121.exe 2636 Unicorn-9592.exe 2464 Unicorn-23236.exe 2620 Unicorn-19706.exe 2996 Unicorn-51824.exe 2816 Unicorn-50454.exe 2780 Unicorn-12114.exe 2788 Unicorn-46925.exe 2848 Unicorn-48316.exe 2000 Unicorn-11367.exe 1896 Unicorn-20090.exe 1924 Unicorn-29650.exe 2200 Unicorn-45986.exe 2808 Unicorn-24750.exe 2508 Unicorn-24750.exe 1652 Unicorn-7475.exe 1684 Unicorn-55861.exe 2416 Unicorn-3775.exe 1420 Unicorn-24964.exe 1496 Unicorn-59582.exe 1980 Unicorn-27787.exe 1740 Unicorn-40593.exe 240 Unicorn-14719.exe 984 Unicorn-50921.exe 372 Unicorn-51476.exe 2324 Unicorn-26225.exe 1776 Unicorn-58897.exe 1612 Unicorn-31823.exe 2012 Unicorn-51689.exe 2120 Unicorn-51689.exe -
Loads dropped DLL 64 IoCs
pid Process 1648 a9def89bd2b8721e81d06099971eb15a.exe 1648 a9def89bd2b8721e81d06099971eb15a.exe 1552 Unicorn-5381.exe 1552 Unicorn-5381.exe 1648 a9def89bd2b8721e81d06099971eb15a.exe 1648 a9def89bd2b8721e81d06099971eb15a.exe 2664 Unicorn-17717.exe 1552 Unicorn-5381.exe 2556 Unicorn-1935.exe 1552 Unicorn-5381.exe 2664 Unicorn-17717.exe 2556 Unicorn-1935.exe 3028 Unicorn-38220.exe 3028 Unicorn-38220.exe 2556 Unicorn-1935.exe 2556 Unicorn-1935.exe 2380 Unicorn-30606.exe 2664 Unicorn-17717.exe 2864 Unicorn-15662.exe 2380 Unicorn-30606.exe 2664 Unicorn-17717.exe 2864 Unicorn-15662.exe 1908 Unicorn-18459.exe 1908 Unicorn-18459.exe 3028 Unicorn-38220.exe 3028 Unicorn-38220.exe 2628 Unicorn-53824.exe 2628 Unicorn-53824.exe 2856 Unicorn-47047.exe 2856 Unicorn-47047.exe 2380 Unicorn-30606.exe 2380 Unicorn-30606.exe 324 Unicorn-16321.exe 2864 Unicorn-15662.exe 2760 Unicorn-4623.exe 324 Unicorn-16321.exe 2760 Unicorn-4623.exe 2864 Unicorn-15662.exe 2436 Unicorn-51274.exe 2436 Unicorn-51274.exe 1908 Unicorn-18459.exe 1908 Unicorn-18459.exe 2824 Unicorn-41522.exe 2824 Unicorn-41522.exe 2892 Unicorn-60018.exe 2892 Unicorn-60018.exe 2856 Unicorn-47047.exe 2856 Unicorn-47047.exe 1208 Unicorn-21124.exe 1208 Unicorn-21124.exe 2968 Unicorn-21678.exe 2628 Unicorn-53824.exe 2968 Unicorn-21678.exe 2628 Unicorn-53824.exe 2940 Unicorn-41544.exe 2940 Unicorn-41544.exe 324 Unicorn-16321.exe 2936 Unicorn-18986.exe 324 Unicorn-16321.exe 2936 Unicorn-18986.exe 2760 Unicorn-4623.exe 2760 Unicorn-4623.exe 1708 Unicorn-4849.exe 1708 Unicorn-4849.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2800 1476 WerFault.exe 58 3040 756 WerFault.exe 226 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1648 a9def89bd2b8721e81d06099971eb15a.exe 1552 Unicorn-5381.exe 2556 Unicorn-1935.exe 2664 Unicorn-17717.exe 3028 Unicorn-38220.exe 2380 Unicorn-30606.exe 2864 Unicorn-15662.exe 1908 Unicorn-18459.exe 324 Unicorn-16321.exe 2628 Unicorn-53824.exe 2856 Unicorn-47047.exe 2760 Unicorn-4623.exe 2436 Unicorn-51274.exe 2824 Unicorn-41522.exe 2892 Unicorn-60018.exe 1208 Unicorn-21124.exe 2940 Unicorn-41544.exe 2968 Unicorn-21678.exe 2936 Unicorn-18986.exe 2756 Unicorn-64657.exe 2092 Unicorn-16547.exe 1708 Unicorn-4849.exe 2052 Unicorn-786.exe 1260 Unicorn-49795.exe 2268 Unicorn-58518.exe 1068 Unicorn-10708.exe 3008 Unicorn-12031.exe 1768 Unicorn-9338.exe 3048 Unicorn-60485.exe 1700 Unicorn-18061.exe 884 Unicorn-11284.exe 1476 Unicorn-34397.exe 3056 Unicorn-59608.exe 1988 Unicorn-15259.exe 3052 Unicorn-42456.exe 2636 Unicorn-9592.exe 2344 Unicorn-13121.exe 2464 Unicorn-23236.exe 2620 Unicorn-19706.exe 2996 Unicorn-51824.exe 2816 Unicorn-50454.exe 2848 Unicorn-48316.exe 2780 Unicorn-12114.exe 2788 Unicorn-46925.exe 2000 Unicorn-11367.exe 1896 Unicorn-20090.exe 2200 Unicorn-45986.exe 1924 Unicorn-29650.exe 2808 Unicorn-24750.exe 2508 Unicorn-24750.exe 1652 Unicorn-7475.exe 1684 Unicorn-55861.exe 2416 Unicorn-3775.exe 1420 Unicorn-24964.exe 1980 Unicorn-27787.exe 1496 Unicorn-59582.exe 1740 Unicorn-40593.exe 240 Unicorn-14719.exe 984 Unicorn-50921.exe 372 Unicorn-51476.exe 2324 Unicorn-26225.exe 1776 Unicorn-58897.exe 2120 Unicorn-51689.exe 1724 Unicorn-51689.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1552 1648 a9def89bd2b8721e81d06099971eb15a.exe 28 PID 1648 wrote to memory of 1552 1648 a9def89bd2b8721e81d06099971eb15a.exe 28 PID 1648 wrote to memory of 1552 1648 a9def89bd2b8721e81d06099971eb15a.exe 28 PID 1648 wrote to memory of 1552 1648 a9def89bd2b8721e81d06099971eb15a.exe 28 PID 1552 wrote to memory of 2664 1552 Unicorn-5381.exe 29 PID 1552 wrote to memory of 2664 1552 Unicorn-5381.exe 29 PID 1552 wrote to memory of 2664 1552 Unicorn-5381.exe 29 PID 1552 wrote to memory of 2664 1552 Unicorn-5381.exe 29 PID 1648 wrote to memory of 2556 1648 a9def89bd2b8721e81d06099971eb15a.exe 30 PID 1648 wrote to memory of 2556 1648 a9def89bd2b8721e81d06099971eb15a.exe 30 PID 1648 wrote to memory of 2556 1648 a9def89bd2b8721e81d06099971eb15a.exe 30 PID 1648 wrote to memory of 2556 1648 a9def89bd2b8721e81d06099971eb15a.exe 30 PID 1552 wrote to memory of 2380 1552 Unicorn-5381.exe 33 PID 1552 wrote to memory of 2380 1552 Unicorn-5381.exe 33 PID 1552 wrote to memory of 2380 1552 Unicorn-5381.exe 33 PID 1552 wrote to memory of 2380 1552 Unicorn-5381.exe 33 PID 2556 wrote to memory of 3028 2556 Unicorn-1935.exe 31 PID 2556 wrote to memory of 3028 2556 Unicorn-1935.exe 31 PID 2556 wrote to memory of 3028 2556 Unicorn-1935.exe 31 PID 2556 wrote to memory of 3028 2556 Unicorn-1935.exe 31 PID 2664 wrote to memory of 2864 2664 Unicorn-17717.exe 32 PID 2664 wrote to memory of 2864 2664 Unicorn-17717.exe 32 PID 2664 wrote to memory of 2864 2664 Unicorn-17717.exe 32 PID 2664 wrote to memory of 2864 2664 Unicorn-17717.exe 32 PID 3028 wrote to memory of 1908 3028 Unicorn-38220.exe 34 PID 3028 wrote to memory of 1908 3028 Unicorn-38220.exe 34 PID 3028 wrote to memory of 1908 3028 Unicorn-38220.exe 34 PID 3028 wrote to memory of 1908 3028 Unicorn-38220.exe 34 PID 2556 wrote to memory of 2628 2556 Unicorn-1935.exe 35 PID 2556 wrote to memory of 2628 2556 Unicorn-1935.exe 35 PID 2556 wrote to memory of 2628 2556 Unicorn-1935.exe 35 PID 2556 wrote to memory of 2628 2556 Unicorn-1935.exe 35 PID 2380 wrote to memory of 324 2380 Unicorn-30606.exe 36 PID 2380 wrote to memory of 324 2380 Unicorn-30606.exe 36 PID 2380 wrote to memory of 324 2380 Unicorn-30606.exe 36 PID 2380 wrote to memory of 324 2380 Unicorn-30606.exe 36 PID 2664 wrote to memory of 2760 2664 Unicorn-17717.exe 38 PID 2664 wrote to memory of 2760 2664 Unicorn-17717.exe 38 PID 2664 wrote to memory of 2760 2664 Unicorn-17717.exe 38 PID 2664 wrote to memory of 2760 2664 Unicorn-17717.exe 38 PID 2864 wrote to memory of 2856 2864 Unicorn-15662.exe 37 PID 2864 wrote to memory of 2856 2864 Unicorn-15662.exe 37 PID 2864 wrote to memory of 2856 2864 Unicorn-15662.exe 37 PID 2864 wrote to memory of 2856 2864 Unicorn-15662.exe 37 PID 1908 wrote to memory of 2436 1908 Unicorn-18459.exe 39 PID 1908 wrote to memory of 2436 1908 Unicorn-18459.exe 39 PID 1908 wrote to memory of 2436 1908 Unicorn-18459.exe 39 PID 1908 wrote to memory of 2436 1908 Unicorn-18459.exe 39 PID 3028 wrote to memory of 2824 3028 Unicorn-38220.exe 40 PID 3028 wrote to memory of 2824 3028 Unicorn-38220.exe 40 PID 3028 wrote to memory of 2824 3028 Unicorn-38220.exe 40 PID 3028 wrote to memory of 2824 3028 Unicorn-38220.exe 40 PID 2628 wrote to memory of 1208 2628 Unicorn-53824.exe 41 PID 2628 wrote to memory of 1208 2628 Unicorn-53824.exe 41 PID 2628 wrote to memory of 1208 2628 Unicorn-53824.exe 41 PID 2628 wrote to memory of 1208 2628 Unicorn-53824.exe 41 PID 2856 wrote to memory of 2892 2856 Unicorn-47047.exe 42 PID 2856 wrote to memory of 2892 2856 Unicorn-47047.exe 42 PID 2856 wrote to memory of 2892 2856 Unicorn-47047.exe 42 PID 2856 wrote to memory of 2892 2856 Unicorn-47047.exe 42 PID 2380 wrote to memory of 2968 2380 Unicorn-30606.exe 43 PID 2380 wrote to memory of 2968 2380 Unicorn-30606.exe 43 PID 2380 wrote to memory of 2968 2380 Unicorn-30606.exe 43 PID 2380 wrote to memory of 2968 2380 Unicorn-30606.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9def89bd2b8721e81d06099971eb15a.exe"C:\Users\Admin\AppData\Local\Temp\a9def89bd2b8721e81d06099971eb15a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5381.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17717.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15662.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47047.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60018.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49795.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23236.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exe9⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64564.exe10⤵PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42041.exe10⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60319.exe11⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48659.exe12⤵PID:3052
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19706.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59582.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23423.exe9⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39349.exe10⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10480.exe11⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10127.exe12⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58901.exe13⤵PID:2784
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47003.exe9⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18431.exe10⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20050.exe11⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56910.exe12⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 22013⤵
- Program crash
PID:3040
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51824.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27787.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13692.exe9⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exe10⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2779.exe11⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57346.exe12⤵PID:2500
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54569.exe9⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42887.exe10⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65213.exe11⤵PID:2064
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40593.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64657.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46925.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26225.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26905.exe8⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60236.exe9⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20595.exe10⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55161.exe11⤵PID:1848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26748.exe8⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exe9⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53646.exe10⤵PID:1056
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4623.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18986.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11284.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14719.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32167.exe8⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18820.exe9⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22681.exe10⤵PID:1616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47963.exe8⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5301.exe9⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3625.exe10⤵PID:1480
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24750.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21285.exe7⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exe8⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe9⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24627.exe10⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24384.exe11⤵PID:392
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34397.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 2406⤵
- Program crash
PID:2800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30606.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16321.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41544.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60485.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45986.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exe8⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59769.exe9⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30792.exe10⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55784.exe11⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21140.exe12⤵PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5358.exe11⤵PID:2476
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31823.exe7⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39951.exe8⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exe9⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42887.exe10⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47891.exe11⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45546.exe12⤵PID:3060
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24750.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10703.exe7⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58077.exe8⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49925.exe9⤵PID:3028
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18061.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29650.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58617.exe7⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34025.exe8⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23776.exe9⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54777.exe10⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57346.exe11⤵PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19582.exe10⤵PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45794.exe9⤵PID:2816
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21678.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9338.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11367.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exe7⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6292.exe8⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31648.exe9⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2587.exe10⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11710.exe11⤵PID:1068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11782.exe8⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62177.exe9⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2582.exe10⤵PID:400
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20090.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exe7⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30792.exe8⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41757.exe9⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54113.exe10⤵PID:2900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57278.exe8⤵PID:2072
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1935.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38220.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18459.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51274.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16547.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15259.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50921.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3578.exe9⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35265.exe10⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34387.exe11⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27751.exe12⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18535.exe13⤵PID:2652
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40370.exe10⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14647.exe11⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12374.exe12⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47699.exe13⤵PID:1756
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19483.exe9⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43153.exe10⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9276.exe11⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17440.exe12⤵PID:2924
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51476.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64564.exe8⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-817.exe8⤵PID:2940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42456.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24964.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51881.exe8⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7470.exe9⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exe10⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45566.exe11⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56723.exe12⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27580.exe13⤵PID:2700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14107.exe11⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63220.exe12⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64611.exe13⤵PID:904
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7506.exe9⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64974.exe10⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31472.exe11⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34736.exe12⤵PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37044.exe11⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11887.exe12⤵PID:1388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-999.exe10⤵PID:1180
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4849.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7475.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25431.exe8⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36635.exe9⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50698.exe10⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59676.exe11⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60418.exe12⤵PID:1604
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58129.exe7⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46749.exe8⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exe9⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64699.exe10⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56910.exe11⤵PID:1596
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55861.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exe7⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16983.exe8⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50937.exe9⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14066.exe10⤵PID:2868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48264.exe7⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53926.exe8⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26272.exe9⤵PID:1240
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41522.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-786.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13121.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exe7⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9800.exe8⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31648.exe9⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33973.exe10⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11887.exe11⤵PID:1908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11782.exe8⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19007.exe9⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44746.exe10⤵PID:2580
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9592.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3775.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8347.exe7⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exe8⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31368.exe9⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11243.exe10⤵PID:2848
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53824.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21124.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10708.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50454.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58897.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39951.exe8⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31072.exe9⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7714.exe10⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28793.exe11⤵PID:2676
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31823.exe6⤵
- Executes dropped EXE
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12114.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12031.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48316.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51689.exe6⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32529.exe7⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46744.exe8⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22489.exe9⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56910.exe10⤵PID:2760
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD53912e80a1e7246b79bc2aa2d4f731bba
SHA13208a4bdf2452831dd9e364ba9533fb0678da78a
SHA256fd20900e3104f20afff8de3aebc25eadf858aaf54d23d10791793c8c978889a9
SHA512fdcd3bc4d88e94290976e8bae15d8d237156b0c542fd5b850c8e771ad213c982fa828a94236b6577834b42142d0b469a29e54ce82aa828c99ffd9646cc9c5057
-
Filesize
184KB
MD572f25083303d20a6233b4c3e04188935
SHA1f0142654a7e8581ac50ba58be4275e88ba0ca902
SHA2563e8cf716591767ed00e8da4190b3561b0b6b732fb1e2152619f2ab8571e11465
SHA51206585c1c7701267559c611a1a27447fd26e6aa3215c84d720cfffc4b96fb151d978329ecc178c79bd85827a7ad70800cc320f78a13f0365b784181b29acbc2ea
-
Filesize
184KB
MD54d256043433236333c818de7221c8d29
SHA1a53b1bcb9066bb34fa21ace081e12be83288af03
SHA256c3a411accd8c5518077f18dafcb9c4d8a81d403d6bb32ccc89d79b5512103bf7
SHA5120ec3d6dc41533e869dae111d6ac1aca1f6414aaaebe32132d6463e2d3d4f6cdf367b654a7b7212c8cf9e486d9d3fcaeeed4e16a24f0e059a76eb5c313070d051
-
Filesize
184KB
MD5b3b23ee635b29d2c54ec9154a2acfd23
SHA1abb77f62d4fbb469ed4adebf4fdb2f52353ba18c
SHA256479d03b66c10793ed4d5c922df652895a71bad94f4b99170ef41c476e377d937
SHA5120050768a7054388b89213c587445d0e6614ef1938aa4847143ccbfc4cf59cde9db6398a5b2476f0df43eb689bb0e33350185976bb98e9a7f8ffa0e5d4d18a814
-
Filesize
184KB
MD507b5aa426fe24db98ffc15842a37249b
SHA1109f98a29210d52e923d8309ece69f99a52d49c8
SHA2563f88f303fad5575ec87f67fe35c67edb19a9dd2b102f01f04d6db4bc74fa252f
SHA512b3af1b6b579b02c50ad7c228f2e3f175cb79b1a1f5a02c6a736b6ce7c7c0f4afa3159e932e4fb2c43d98e53d54ad56821c73ea3eaba05ef5c9ed3b2c1e14db63
-
Filesize
184KB
MD531e1447e77cdd5b8773cb4f7fd7ba0ff
SHA1ef5b515baed1aaf4f1ced873c526c21765febce6
SHA2566b737086977fcb969580cc6c4786d135aef0e799846942b366b69178f3e62620
SHA51264904f63d5e3f3a41d72d01530baa8327f939369827c12ce6cb9ec6e80b30203671a8e00514ec3fa9ed0c49c683d48fe4cf061295f95985b80cd3cb511df78af
-
Filesize
184KB
MD518c29265c9acee9a37e54b11726ef549
SHA1e024c18bce938032dd4b986f649789e5fb467e38
SHA256e2df3cee36ce1087e03151e5a024ecfb0c2e6cf82b8776ba92eb61a211bac071
SHA512879c174aae883128576f64d3fbf610881afbf45fb384dc945e6878a08a0eb8322b39fcec0dd5ebb9196c6a3b397c556b69a73046df89c9271c4e6558eb487c9f
-
Filesize
184KB
MD550c27f450813816203192dc2a2b9dc8c
SHA14e2b706f953bcece5311aca8bd042d6d554b7c3e
SHA256137a762114edfb9c74737b950596baafabafbce9fc3d649fcec50239e3f7a651
SHA512d50778e45e81bc1821835564762063bde43489a0b990f20f4bed9e572d2ad2b2faa16d25e2f08875457881bf67dbd6228d76c7665a90507b222e7e3b18ed7c71
-
Filesize
184KB
MD5b5637bdaf9cf03cc26704da1acdb0618
SHA1d5fbce023262c5a5a6a163964043fb12403afd76
SHA256853c230742f7850b8c57d0247823a5596128f3459466c938bb51e809fb125e78
SHA5121e6b0263500f3054bf8069428e1da900d91e4ebf8f1e053295dd95853513ccefa50e06f32a5c232ae3f91251bba8ecd9a805954097eb14a6eb77565cd8b3e8d3
-
Filesize
184KB
MD55df5318e95a10b4f58eb77c2d17fcc52
SHA1d933f0f2cc54abe6014b967b9dee64d834f0c193
SHA25677203ebd82dfca9bc23dea2e5c46bfa50a04540fdb86749b661fab4b288fd4f1
SHA5126a863dd39dd16d499bf5721c334fb1e03c66d2879dca7c488b0122e741c2c122b9fb3b27f29daf8dad888e076a421a2725cc73eb1e61bcbb671a8f095c92608b
-
Filesize
184KB
MD508ec56708b25e23fd5779e9cc959e27c
SHA166728ceaec35b764f7796f0c07b5e11920ab3647
SHA2565d3d0b24bbe322a2ee68c6d171b8d64b30b7ad58e2dca7805682e266004a6836
SHA512b27a61831c2b56f08c7bb24e374ccf5f374f9057d49093750767afbf7225f9387153a4446b50e033453839c003556464e6d0bbd2673bb21e631b42337ef8246a
-
Filesize
184KB
MD55816ad18a16613c91afacc471529d75b
SHA12c15357a99f4832493a968411ff38c4098fb86db
SHA2565c470cdb2628bc68d0f5f3669bf78f148f0cc3fa238f06b3fd0ab7ea2fbb2529
SHA512a26cdd601eab40491e4a8e913e5cca4177d44c14bd585251d298e1ca5f38aa9c41d582527bbbb1d7eaa23510bb7164eab14090720507e4caba067e39ee8ead4e
-
Filesize
184KB
MD5bebb760fb167fa37f44290d8a732b379
SHA16466838484e6561cb5b353aa1528bcd5f02dda48
SHA25695d02848886ac2995ef58945193a0c3273c721e41c82d54190c755f17f026aac
SHA51258dfa7da15e911db2ef40b2152e352ffb6a5e1395be6ec487f37870c63742599c08f646930645a2f0c8062102c1346d8f866a71d55bf4b22f7693fd6834960d9
-
Filesize
184KB
MD50403086d914509e21d100a436b350c81
SHA18371a12e8aac9689ab3fe79250069e0be799885a
SHA2563a054dfb62c6269d5fc73b64a19f91ab4b67deed9fed180870f393797da3b453
SHA51275fb5e59619c1c42d0a177c5d2e41e22186b9b6c5d6f6785857f78261916ac09436b4b0ba0eaa9301001176c2c3fce9f24c9b295335fee1d5afacf324e08bcb2
-
Filesize
184KB
MD579508b0ba4e11645e2f9c80c0778017e
SHA17e6a163c8cb7dd62b0f6d76f2aeb833833ef4e5c
SHA256aa3f34de2913116c2ffb400e0866c3f86c311f2a12b4056997d2998282cb48c0
SHA5129c83504370b5faa948098f7be89ccd4bc1c48d064dd71b42131d4a629657d16af529c849ac6b533873ab0a36a953f9efdf37dca165bf49c9b6f1b6559a6d62c1
-
Filesize
184KB
MD501780f298bb51f94743ea9c2255416a6
SHA1988daeae5c082b039871d0afe8db82997782dc8a
SHA256054769c23f933593670f840e98d2cb146032e6bab84f65c3d17bf4392aedbea3
SHA512e417f273ff122cd60cded98bf6bdec39a39f0a86c918bee09a70f48b79711314e4fe47a8e024ce001be64cdf579547228d27f281af14b5d9fa4fce19e965f44b
-
Filesize
184KB
MD5ded7345ebb2a4e8cd5a6d9e43ad7f4c5
SHA18e2e0f8491c02f584fe1570fe2c185414ecb867b
SHA2565425e4f1b15c8b729532b378fc24831cd705083b338f7679d103bcfe120b39bf
SHA5128512b07f5555656f75b49b241754e43fdf1bfe7dace7cd2ac3588cab583eab36f096aed9a05be6c15f1d58ebca7c55c165670ed2896c0742f3c082fa20085f66
-
Filesize
184KB
MD5ab5cccac93debe773ef935dac3e7bbd3
SHA1cd38300d25e008653f1788197bb0332bc7097f4c
SHA256e808cd087d7763a58853eb7828a401fdd7353371637ed289acf3c8d06ded8b91
SHA512b316ba4ceb08e365a0d67a39cd0dca54052cd94011c50fc412d09981644c9f18a4c8d8d97b4435f3be7a3f8e874b29c067884be85ce295b35b0b482d70783683
-
Filesize
184KB
MD5698335c3ccb98d2a93c272081058129b
SHA1dbf838553d44d72e778a3af295240dbedb43d6d1
SHA256aa2903a2d7c6e836533a208b6a55842b752d48d2ed3d2b22160408811c13bfb3
SHA512c8215800f8a6b72ede4d63d541b19b7d66302ac74d35ad4e13fce9b82eca909c71daae4ce32c61f649d4a2bc5ffe9cf579c781dd99845ef1d9822ce24ca47d7a
-
Filesize
184KB
MD555f4cda8a009e2a40b03f200be44d6ce
SHA1e28f6bdae94c314d237338bfc85fd1cbb38839e6
SHA256a05bfb75df4effad62e32d04e745f35d4998066157e1c3acb7fb14fd44953864
SHA512f1ae3beb9f82edc13ce45c9aae97b59948f6d770501e7baacac342b0ea05a331ff57783c8b0555077e4a22032d11dcb6f0e02b88b4953c66af2c81773ff5d85e
-
Filesize
184KB
MD544f65ef157432c23a83b24fd2c695f7a
SHA167967d650095fbdd438fd965511259b3b4fc4cc5
SHA25692a4de7ff7cf7c28564aa0c0148facb8b55b8e3fcb7feb0c7ec82018a8eb583f
SHA5126d28934365e34aac983c634a260333f8b82990aaa89b8ca9ba29e74c09ea4babf6d99a911f8537a34b97c2bd9d452655f8bb400bcd05127d018276af85cd4b4f
-
Filesize
184KB
MD5e51085a7142d718be3f6c3d943e5b0fc
SHA126b69616822cb7a1579390b03046abea408fafe0
SHA256786260b25d68a089caaf95e7871138a14722507ca3d7e6db23157b13a121fb07
SHA5125beccd7b2252b0371ede42dcb939e82ba58a5f301fc9ea95c12bd1e5c0ee6f984276af0b17568b72765a5250c82440d8cafda81522b3202b547e5ec56ed02e84
-
Filesize
184KB
MD5d26ce2101cdca5a3424ec060cdaf83bb
SHA1ca19ddc327b87c4a8a306a3ad44270d41dc66379
SHA2569d59d4a15bf973fcd091150e09618cf4757a01107eede334c41a62b44d1d441b
SHA512323f0d1e177f8a0a54f15c53079ff8518bc740fa9a5564a0562264b364b75a52c76345a5e80b30919319b615c4eeee7f4f66d4a24952978844309651e35cf9f5