Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
b5b9c455f8a6e0d088135d24208594fa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5b9c455f8a6e0d088135d24208594fa.exe
Resource
win10v2004-20240226-en
General
-
Target
b5b9c455f8a6e0d088135d24208594fa.exe
-
Size
184KB
-
MD5
b5b9c455f8a6e0d088135d24208594fa
-
SHA1
10aa0fe21dfaaf182ed8b16181cf4aa04e7900de
-
SHA256
d20ad6364ec452a3903884dab2b1937274bbfeb1054347c73116393b7ddf1da0
-
SHA512
34c477b9042f313d9e28e66a9c5ad080259a80e7b49cf408979323977efc2129826f57dd42ff9b4e22e003e66e09a3052e6e6edfd4e91ff7edf2d5a7a7b99397
-
SSDEEP
3072:SQIKozE4f9A00OjCdTsWA8Fb5tI6ODfIf6Exg9rYQNlPvpFq:SQtoTq00tdoWA8gQ6nNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2732 Unicorn-44785.exe 1724 Unicorn-52159.exe 2628 Unicorn-36377.exe 2756 Unicorn-37852.exe 2508 Unicorn-64302.exe 2480 Unicorn-9626.exe 2360 Unicorn-15340.exe 2852 Unicorn-41167.exe 1816 Unicorn-24831.exe 1828 Unicorn-56949.exe 1804 Unicorn-48781.exe 524 Unicorn-15122.exe 992 Unicorn-47473.exe 1584 Unicorn-44588.exe 1660 Unicorn-28252.exe 624 Unicorn-8386.exe 2680 Unicorn-7639.exe 1104 Unicorn-7639.exe 3020 Unicorn-41058.exe 2760 Unicorn-43794.exe 2252 Unicorn-815.exe 1028 Unicorn-46487.exe 1384 Unicorn-55854.exe 1668 Unicorn-30534.exe 2044 Unicorn-44178.exe 3068 Unicorn-23566.exe 2204 Unicorn-34426.exe 1220 Unicorn-37956.exe 2052 Unicorn-14006.exe 2232 Unicorn-33872.exe 1064 Unicorn-32288.exe 2320 Unicorn-23819.exe 1736 Unicorn-43685.exe 1704 Unicorn-43685.exe 1136 Unicorn-34125.exe 1972 Unicorn-58075.exe 2744 Unicorn-60789.exe 1312 Unicorn-40177.exe 2740 Unicorn-20311.exe 2576 Unicorn-21703.exe 2180 Unicorn-65236.exe 2144 Unicorn-22279.exe 460 44645.exe 540 Unicorn-24779.exe 320 Unicorn-50867.exe 884 Unicorn-56897.exe 2008 Unicorn-37031.exe 2264 Unicorn-40369.exe 476 Unicorn-38977.exe 2684 Unicorn-30530.exe 2572 Unicorn-34592.exe 2692 Unicorn-7395.exe 2248 Unicorn-32092.exe 2952 Unicorn-61256.exe 860 Unicorn-61811.exe 836 Unicorn-36560.exe 440 Unicorn-55781.exe 1388 Unicorn-65340.exe 1376 Unicorn-53451.exe 1260 43130.exe 1324 Unicorn-18626.exe 536 Unicorn-31432.exe 2080 Unicorn-43130.exe 2300 Unicorn-38506.exe -
Loads dropped DLL 64 IoCs
pid Process 1720 b5b9c455f8a6e0d088135d24208594fa.exe 1720 b5b9c455f8a6e0d088135d24208594fa.exe 2732 Unicorn-44785.exe 1720 b5b9c455f8a6e0d088135d24208594fa.exe 2732 Unicorn-44785.exe 1720 b5b9c455f8a6e0d088135d24208594fa.exe 1724 Unicorn-52159.exe 1724 Unicorn-52159.exe 2732 Unicorn-44785.exe 2628 Unicorn-36377.exe 2628 Unicorn-36377.exe 2732 Unicorn-44785.exe 2756 Unicorn-37852.exe 2756 Unicorn-37852.exe 1724 Unicorn-52159.exe 1724 Unicorn-52159.exe 2628 Unicorn-36377.exe 2628 Unicorn-36377.exe 2508 Unicorn-64302.exe 2508 Unicorn-64302.exe 2480 Unicorn-9626.exe 2480 Unicorn-9626.exe 2360 Unicorn-15340.exe 2360 Unicorn-15340.exe 2756 Unicorn-37852.exe 2756 Unicorn-37852.exe 1828 Unicorn-56949.exe 1828 Unicorn-56949.exe 2852 Unicorn-41167.exe 2852 Unicorn-41167.exe 2508 Unicorn-64302.exe 2508 Unicorn-64302.exe 1804 Unicorn-48781.exe 1804 Unicorn-48781.exe 1816 Unicorn-24831.exe 2480 Unicorn-9626.exe 1816 Unicorn-24831.exe 2480 Unicorn-9626.exe 524 Unicorn-15122.exe 524 Unicorn-15122.exe 992 Unicorn-47473.exe 992 Unicorn-47473.exe 2360 Unicorn-15340.exe 2360 Unicorn-15340.exe 1584 Unicorn-44588.exe 1584 Unicorn-44588.exe 1828 Unicorn-56949.exe 1828 Unicorn-56949.exe 1104 Unicorn-7639.exe 1104 Unicorn-7639.exe 1816 Unicorn-24831.exe 1816 Unicorn-24831.exe 624 Unicorn-8386.exe 624 Unicorn-8386.exe 1660 Unicorn-28252.exe 1660 Unicorn-28252.exe 2852 Unicorn-41167.exe 2852 Unicorn-41167.exe 2680 Unicorn-7639.exe 2680 Unicorn-7639.exe 1804 Unicorn-48781.exe 1804 Unicorn-48781.exe 1488 WerFault.exe 1488 WerFault.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1488 3020 WerFault.exe 46 1760 2572 WerFault.exe 78 1704 2436 WerFault.exe 108 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1720 b5b9c455f8a6e0d088135d24208594fa.exe 2732 Unicorn-44785.exe 1724 Unicorn-52159.exe 2628 Unicorn-36377.exe 2756 Unicorn-37852.exe 2508 Unicorn-64302.exe 2480 Unicorn-9626.exe 2360 Unicorn-15340.exe 2852 Unicorn-41167.exe 1828 Unicorn-56949.exe 1816 Unicorn-24831.exe 1804 Unicorn-48781.exe 524 Unicorn-15122.exe 992 Unicorn-47473.exe 1584 Unicorn-44588.exe 624 Unicorn-8386.exe 3020 Unicorn-41058.exe 1660 Unicorn-28252.exe 1104 Unicorn-7639.exe 2680 Unicorn-7639.exe 2760 Unicorn-43794.exe 2252 Unicorn-815.exe 1028 Unicorn-46487.exe 1384 Unicorn-55854.exe 1668 Unicorn-30534.exe 2044 Unicorn-44178.exe 2204 Unicorn-34426.exe 3068 Unicorn-23566.exe 1220 Unicorn-37956.exe 2052 Unicorn-14006.exe 1064 Unicorn-32288.exe 2232 Unicorn-33872.exe 2320 Unicorn-23819.exe 1736 Unicorn-43685.exe 1704 Unicorn-43685.exe 2744 Unicorn-60789.exe 1972 Unicorn-58075.exe 1136 Unicorn-34125.exe 1312 Unicorn-40177.exe 2740 Unicorn-20311.exe 2576 Unicorn-21703.exe 2180 Unicorn-65236.exe 2144 Unicorn-22279.exe 540 Unicorn-24779.exe 460 44645.exe 320 Unicorn-50867.exe 2264 Unicorn-40369.exe 2008 Unicorn-37031.exe 884 Unicorn-56897.exe 476 Unicorn-38977.exe 2684 Unicorn-30530.exe 2692 Unicorn-7395.exe 2572 Unicorn-34592.exe 440 Unicorn-55781.exe 836 Unicorn-36560.exe 2248 Unicorn-32092.exe 860 Unicorn-61811.exe 1388 Unicorn-65340.exe 2952 Unicorn-61256.exe 1376 Unicorn-53451.exe 1260 43130.exe 1324 Unicorn-18626.exe 536 Unicorn-31432.exe 2300 Unicorn-38506.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2732 1720 b5b9c455f8a6e0d088135d24208594fa.exe 28 PID 1720 wrote to memory of 2732 1720 b5b9c455f8a6e0d088135d24208594fa.exe 28 PID 1720 wrote to memory of 2732 1720 b5b9c455f8a6e0d088135d24208594fa.exe 28 PID 1720 wrote to memory of 2732 1720 b5b9c455f8a6e0d088135d24208594fa.exe 28 PID 2732 wrote to memory of 1724 2732 Unicorn-44785.exe 29 PID 2732 wrote to memory of 1724 2732 Unicorn-44785.exe 29 PID 2732 wrote to memory of 1724 2732 Unicorn-44785.exe 29 PID 2732 wrote to memory of 1724 2732 Unicorn-44785.exe 29 PID 1720 wrote to memory of 2628 1720 b5b9c455f8a6e0d088135d24208594fa.exe 30 PID 1720 wrote to memory of 2628 1720 b5b9c455f8a6e0d088135d24208594fa.exe 30 PID 1720 wrote to memory of 2628 1720 b5b9c455f8a6e0d088135d24208594fa.exe 30 PID 1720 wrote to memory of 2628 1720 b5b9c455f8a6e0d088135d24208594fa.exe 30 PID 1724 wrote to memory of 2756 1724 Unicorn-52159.exe 31 PID 1724 wrote to memory of 2756 1724 Unicorn-52159.exe 31 PID 1724 wrote to memory of 2756 1724 Unicorn-52159.exe 31 PID 1724 wrote to memory of 2756 1724 Unicorn-52159.exe 31 PID 2628 wrote to memory of 2508 2628 Unicorn-36377.exe 33 PID 2628 wrote to memory of 2508 2628 Unicorn-36377.exe 33 PID 2628 wrote to memory of 2508 2628 Unicorn-36377.exe 33 PID 2628 wrote to memory of 2508 2628 Unicorn-36377.exe 33 PID 2732 wrote to memory of 2480 2732 Unicorn-44785.exe 32 PID 2732 wrote to memory of 2480 2732 Unicorn-44785.exe 32 PID 2732 wrote to memory of 2480 2732 Unicorn-44785.exe 32 PID 2732 wrote to memory of 2480 2732 Unicorn-44785.exe 32 PID 2756 wrote to memory of 2360 2756 Unicorn-37852.exe 34 PID 2756 wrote to memory of 2360 2756 Unicorn-37852.exe 34 PID 2756 wrote to memory of 2360 2756 Unicorn-37852.exe 34 PID 2756 wrote to memory of 2360 2756 Unicorn-37852.exe 34 PID 1724 wrote to memory of 2852 1724 Unicorn-52159.exe 35 PID 1724 wrote to memory of 2852 1724 Unicorn-52159.exe 35 PID 1724 wrote to memory of 2852 1724 Unicorn-52159.exe 35 PID 1724 wrote to memory of 2852 1724 Unicorn-52159.exe 35 PID 2628 wrote to memory of 1816 2628 Unicorn-36377.exe 36 PID 2628 wrote to memory of 1816 2628 Unicorn-36377.exe 36 PID 2628 wrote to memory of 1816 2628 Unicorn-36377.exe 36 PID 2628 wrote to memory of 1816 2628 Unicorn-36377.exe 36 PID 2508 wrote to memory of 1828 2508 Unicorn-64302.exe 37 PID 2508 wrote to memory of 1828 2508 Unicorn-64302.exe 37 PID 2508 wrote to memory of 1828 2508 Unicorn-64302.exe 37 PID 2508 wrote to memory of 1828 2508 Unicorn-64302.exe 37 PID 2480 wrote to memory of 1804 2480 Unicorn-9626.exe 38 PID 2480 wrote to memory of 1804 2480 Unicorn-9626.exe 38 PID 2480 wrote to memory of 1804 2480 Unicorn-9626.exe 38 PID 2480 wrote to memory of 1804 2480 Unicorn-9626.exe 38 PID 2360 wrote to memory of 524 2360 Unicorn-15340.exe 39 PID 2360 wrote to memory of 524 2360 Unicorn-15340.exe 39 PID 2360 wrote to memory of 524 2360 Unicorn-15340.exe 39 PID 2360 wrote to memory of 524 2360 Unicorn-15340.exe 39 PID 2756 wrote to memory of 992 2756 Unicorn-37852.exe 40 PID 2756 wrote to memory of 992 2756 Unicorn-37852.exe 40 PID 2756 wrote to memory of 992 2756 Unicorn-37852.exe 40 PID 2756 wrote to memory of 992 2756 Unicorn-37852.exe 40 PID 1828 wrote to memory of 1584 1828 Unicorn-56949.exe 41 PID 1828 wrote to memory of 1584 1828 Unicorn-56949.exe 41 PID 1828 wrote to memory of 1584 1828 Unicorn-56949.exe 41 PID 1828 wrote to memory of 1584 1828 Unicorn-56949.exe 41 PID 2852 wrote to memory of 1660 2852 Unicorn-41167.exe 42 PID 2852 wrote to memory of 1660 2852 Unicorn-41167.exe 42 PID 2852 wrote to memory of 1660 2852 Unicorn-41167.exe 42 PID 2852 wrote to memory of 1660 2852 Unicorn-41167.exe 42 PID 2508 wrote to memory of 624 2508 Unicorn-64302.exe 43 PID 2508 wrote to memory of 624 2508 Unicorn-64302.exe 43 PID 2508 wrote to memory of 624 2508 Unicorn-64302.exe 43 PID 2508 wrote to memory of 624 2508 Unicorn-64302.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b9c455f8a6e0d088135d24208594fa.exe"C:\Users\Admin\AppData\Local\Temp\b5b9c455f8a6e0d088135d24208594fa.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44785.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52159.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37852.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15340.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15122.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43794.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43685.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32092.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exe10⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25258.exe11⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16919.exe12⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57946.exe13⤵PID:3220
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34592.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14624.exe9⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe10⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31999.exe11⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16513.exe12⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23608.exe13⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40406.exe14⤵PID:2108
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 21610⤵
- Program crash
PID:1704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2369⤵
- Program crash
PID:1760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23819.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30530.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22793.exe9⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe10⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31999.exe11⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16919.exe12⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15138.exe13⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2606.exe14⤵PID:3628
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27815.exe8⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46970.exe9⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51049.exe10⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-390.exe11⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63244.exe12⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15869.exe13⤵PID:3260
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46487.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58075.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36560.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25891.exe9⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42414.exe10⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21366.exe11⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56005.exe12⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46908.exe13⤵PID:3104
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53451.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe8⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44033.exe9⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52476.exe10⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exe11⤵PID:1656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8490.exe9⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40328.exe10⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43940.exe11⤵PID:3452
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47473.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-815.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43685.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41568.exe8⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exe9⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15044.exe9⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62450.exe10⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exe11⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15522.exe12⤵PID:2716
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34125.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7395.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22793.exe8⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe9⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6835.exe10⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exe11⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46908.exe12⤵PID:3116
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41167.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28252.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37956.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40369.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43130.exe8⤵
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe9⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46882.exe10⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47344.exe11⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52938.exe12⤵PID:3144
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51853.exe7⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe8⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41428.exe9⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45315.exe10⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58309.exe11⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29803.exe12⤵PID:3600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exe11⤵PID:3212
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38977.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43514.exe7⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33374.exe8⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17993.exe9⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15720.exe10⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5709.exe11⤵PID:1724
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14006.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22279.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18626.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe8⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32684.exe9⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64448.exe10⤵PID:2824
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49907.exe6⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exe7⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63820.exe8⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59985.exe9⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18289.exe10⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25829.exe11⤵PID:756
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9626.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48781.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7639.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33872.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50867.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61412.exe8⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe9⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27313.exe10⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43177.exe11⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3571.exe12⤵PID:2136
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21702.exe7⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe8⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39181.exe9⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24682.exe10⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9025.exe11⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52938.exe12⤵PID:3152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34172.exe9⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41781.exe10⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48107.exe11⤵PID:3740
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37031.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10649.exe7⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25206.exe8⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3711.exe9⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24682.exe10⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17277.exe11⤵PID:3036
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32288.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56897.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10649.exe7⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62647.exe8⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exe9⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45315.exe10⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19052.exe11⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30209.exe12⤵PID:3940
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14769.exe7⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41428.exe8⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1241.exe9⤵PID:592
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exe6⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54095.exe7⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16156.exe8⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33727.exe9⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16618.exe10⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58117.exe11⤵PID:1028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38827.exe10⤵PID:2596
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41058.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:1488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36377.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64302.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56949.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55854.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60789.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38506.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58755.exe9⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2232.exe10⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exe11⤵PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1500.exe10⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58117.exe11⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11734.exe12⤵PID:3888
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31432.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29591.exe8⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60997.exe9⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14157.exe10⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3462.exe11⤵PID:2288
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20311.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65340.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe8⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17334.exe9⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24682.exe10⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9217.exe11⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4417.exe12⤵PID:3132
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30534.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40177.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61256.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34635.exe8⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48584.exe9⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33997.exe10⤵PID:2376
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23103.exe7⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41428.exe8⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34987.exe9⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24821.exe10⤵PID:2816
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8386.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23566.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55781.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37794.exe7⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28408.exe8⤵PID:1660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24779.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43322.exe6⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60805.exe7⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10291.exe8⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16919.exe9⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64448.exe10⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exe11⤵PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24904.exe10⤵PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35044.exe9⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33634.exe10⤵PID:3420
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24831.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7639.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44178.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21703.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58288.exe7⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe8⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exe9⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36763.exe10⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54033.exe11⤵PID:2552
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65236.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25232.exe6⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38802.exe7⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1656.exe8⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64448.exe9⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44770.exe10⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17436.exe11⤵PID:2484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43378.exe9⤵PID:2576
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34426.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\44645.exe44645.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:460 -
C:\Users\Admin\AppData\Local\Temp\43130.exe43130.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\56809.exe56809.exe7⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\28216.exe28216.exe8⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\12019.exe12019.exe9⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\64064.exe64064.exe10⤵PID:872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\38889.exe38889.exe6⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\23888.exe23888.exe7⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\17962.exe17962.exe8⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\48107.exe48107.exe9⤵PID:3752
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\706.exe706.exe5⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\38802.exe38802.exe6⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\18019.exe18019.exe7⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\33727.exe33727.exe8⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\34298.exe34298.exe9⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\11734.exe11734.exe10⤵PID:3900
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD53682c45642daf09fe5e88c3e247b2644
SHA122177f2a7a187f157043e71a5da612329d37bf4c
SHA256bcbec051255e0e6571136f47885fa218bad4854c34cdcbe4e34949ff78fd6919
SHA5128f46c22f8f699191af401d70ba6d4abd8fbb678b8dc1074348d01dda1ef522f762c9a130f399d2685f2b4403011fe88439206fce6f551b604b7c3acb31698cf1
-
Filesize
184KB
MD5fd68f9fc25bdadc2e534233b685a6a00
SHA1b6a05cc090e993c2bbcc9d2bdcad3f00c29990f9
SHA2564c9d7de3da170803d1447336c71dbdbaa715ed62cc62a1d0436cc05b99e2c357
SHA512ea065a72cb6493473c92c4248c708197a29292799b1ebd1bfe183f4d3df228fac7516af875f03eacdab5ea2799f8630583e00f7d9f766988eb2f444b2abd3f05
-
Filesize
184KB
MD5dffa2e59d720f3fcdf828e6a096cea35
SHA16658a844874dcd640c03a640a0d04c03f7ab163d
SHA2569e05237189e4064e40ffbda91ae05061ca7801d4f039fb85a24282daa77ab155
SHA512b303b5a7012eb26cec447b45f91257d49551cfef4d850016f7ddcbb18da0cfc62bfb0878538259afe94fc0ecdabb1f3986d37a513b450de5ca041be749cd607f
-
Filesize
184KB
MD589fcbf03c8d9bf6948b1b1f2837d1642
SHA17ca4867e00924caab5de2a62701e8a11a357bd06
SHA256b524ac1547ac538c55b6ef4800a75737649c8ff97da4b509b5e356e360c75ea3
SHA512821689373cc37fad16089dbff4ab37db982a49db119a1ac03cdb88041b02a596be50bbe1c213b45e7bab16da3a359be0e7d1a1c07d68794bbf445e17de689846
-
Filesize
184KB
MD5b2d0d45b5f47bf4559a22d4eb4aaa1f0
SHA1bb354dfbcaeb2320c69005cb1d9cc45fe75ce963
SHA2564353e671be62771cc71fbfab44c78c0fd9ac9bd50cc97cd606d38c9a0812b41c
SHA512300df1e777843341a74882ef5432dd3d460fb93905625af40c1d367b1d984fbcd05b323f397fb55375dd2a64f7088de2013e990c6ace5956b097389015cbe886
-
Filesize
184KB
MD5e03226d7d7e649afee5f37bb6c8290dd
SHA12b3991534d0185475c6149e9d4666e6c54cd1504
SHA25667807d42e8f577a0eed25e7d8f4619ba4c827e7cbea9f2f9b77ae9e3afbb49e0
SHA5129c17ac1532318f6fe9a58224c7ac02e0bf4c747ab93a73fafbf6228065d1b0c87c6c8230963354761cbb9af393f48477418b9ac78dce05f926276f6a4b733f40
-
Filesize
184KB
MD5c48bfc4b027912571c7b26332887df3b
SHA1a07ed31895ddec91a2c98b52ec9ef300bd0a09f7
SHA2562b9d22d4994e7bca7b09c36590fd3ce98b43d62912197024b5e6be467669e49d
SHA512fba6c2689c2db8178d3d2c38c555faf2b0e5f7c8b34e17594713f3cce6395e1325cecf4609a31631985b0114560531c25a799230226b66482309caea160e1b52
-
Filesize
184KB
MD5c21ae792cb9294c7bfb7d09c517a70a9
SHA133105b6b7c21df9004a3204f4b6f6507e7fe4352
SHA25611fdb0da4d502fa76153d33d3eda962be3502fc107259bb01a63be048eee8ab8
SHA51247059e87d93dbe6c4d80a5e581000d4fdbd58e90d713fbc49f791eb6df627d2054f8245932b4e027a6f280908eb506bff9fda401cd81d82420a67cf1d2ef87fa
-
Filesize
184KB
MD5ff7400eb1222911833a6b207ca6199b1
SHA1aa7df47ed44d485afd41caaf810e7bfde4302ed2
SHA256bb8fc9fffbeb0cf08b673b85e3c5e7d51521faecb54d3d6893311194a1ca0b7e
SHA512048f77088a01929f2b7f19a03459a4b4e3c204dc3017698001e5b5ff5a25f5b9804a8cc2291a8dd342d3ffea47f7562d3928c587628b13692a3a2377f82fde10
-
Filesize
184KB
MD5f3c198d36a8084270ff29ea1b0ecf3c4
SHA1a245d2c1a4977d82575fd10ce6941ffc167e8231
SHA256f677e91e1774c59e62a2462427612c210e4a93bb5c25f7e2a4264f05f7ca3f2a
SHA5127b4cc9137d11159d34412e9248aac0ecea1a52c0e010966a9d5ba1f6b8b2526ff5ae935fea837e9ba64fc50449bb1c6ce7fc3a084a4f2bba13b83bc60aa550aa
-
Filesize
184KB
MD5a0d9394544ab259a65754bfc1634ecd4
SHA18b70e2d0b3674ac55604f5e7438a31310d7cc950
SHA25633dc2879a936768d3a99a895b341a92f03355a8d5d4c3375575ec056b5b072f5
SHA5127e32278a29c0d18bcb88a860b476f924b61e0bd73c101768d6461b34b8a8526f33c4bd30ec6604561dd4b4424f990523f8211a2f00d382afde1695e42df7751e
-
Filesize
184KB
MD5e63bfaa71fe0559bf18602b100864dfb
SHA1488b01004dc0fb890cffeb641b2d60a743793722
SHA2565312075ed2fde81560c44c9f75b5427649a5b4e7b9728bf5b0fa18c897220796
SHA512f42c9a50269cb10f02c25c707fc501d3af05c1276b125fb3321233788ad2f8dbc702259253a4e73957f1c592727eb721d9d995c16af1a5abb01eec47917aabdc
-
Filesize
184KB
MD559d7c10b391ba19c8dcc4cc5a3d608a6
SHA1ee1167fc4b6904e6205c3a482d41049f4de97c34
SHA25653566ec04808f18b087e651e0375848f81ca835fdb07a859468a44772991f262
SHA512d15677be44f8e112a996badeb0e932c62a986c2f69d0fd227fd91d4272d82dcb9c8770aa0017e6d672fa6e84e30c0932d4f28887d2d3b127525580bea5a4532d
-
Filesize
184KB
MD5b3b5194ac3c9d9c3e8857e70788935ba
SHA183a0b62585da3fb320504c1ef5d8e426a8d77732
SHA256ff8ca055e7114b8911fdc971cbe481c019e067b2bf93ef846fe83d1d0d58ff0b
SHA5127dea292fef5bbdafd0e26a359719b5c771d97985b6ee599c9115dc3cb2c37e63183db801f12530ee6ab988573bfe2dc4f1ff07ddd449aa288c28c1a9c8182e01
-
Filesize
184KB
MD5ff5d1bbd9ccb7e7917d6d1df9a13f899
SHA16afa9d5f6579d36a0555b77bb6ddb533fa8bfda7
SHA256d6ae191d09bbfbe3c9549569ba3ea937d5395f3d5fbe22cb30c1a074b824f0ce
SHA512a3eb2cc031fc1c72268f0e23fe464b7f559a1ac4b916291d6306a8b6db773946e3aa04ab57e26465186a96952f1922bf3537955a4259d3fa65c17f3bb5710e82
-
Filesize
184KB
MD587e1bf47c8e40f52460b475d186b0385
SHA1557c44d46becf913bef32068ebfc4d8e51a4ee7d
SHA2563d99514a52808596000bb552aaa07269bec5d8482099bd05a6500200b651a8bb
SHA512ba1307fc7ab6176fa201fda2e6af5b80d0abccbdc5de2337d03d0a205c58376c427996184ba6e138ecd0760645fe8a5d8a17b4fe7b473d0b0f762ad7efd407c8
-
Filesize
184KB
MD58f2326a4568445c2c996d0afe7f4e945
SHA1a8fa3d356d7e06a2eaa21556717be1f4302a04ef
SHA256ef60b8ad454bb8fc5e4b223d8648570e25da66a99a8b5185bc80c71d3a8b10a0
SHA512b2475faac82d159ddf0790d31e7de446f4b05491a4bf023264bd24b692dc1dd8be2a92f1cc9bcf95827bdcd1955142b7ea6c874e1f01ca8b0cf839744b0d923d
-
Filesize
184KB
MD580e6eb29e964c61f3e198fe0d61e82f7
SHA1ec64f51fa1ba65e734c9b9ed24a29ccc2e3d6a5c
SHA2565c6394597cf18fd42255eed18f90e03d0e58bdda7f7f5b68137117d02b6a95dc
SHA5129b57a5cd40782dbc7d26a68e87f96e1e22420f993268551fd59f5744c3b56618b173cfea5049de50b6dfd2991babd59a054be30d5ceb670b24e39355fc1d9c16
-
Filesize
184KB
MD5dfee899bb04e106b8c634c4401c4411d
SHA1bb5196b0edb40af74aae9ffcacdb3be5bb5c087f
SHA2560e3161986e2adf2cc47bb777d63ab0a13157cf6b81fef2623860247309cad0e4
SHA512d2541b8d719e85ba0fd3d078ee40df0312ac222f43b11cb8f49c308dbe07f687cc967d98f5e6bf737438c3ecfc86bfbbee681dc05f3f8787aa82ca023a88d60f
-
Filesize
184KB
MD5218a2372c1d7752a1b86aaa624021181
SHA19d4a44b9b03c2f8728f97b7cfe8eafba4518a1dd
SHA2569e28c717a2c61846bb03b1e89d4304dd8181ed59dd28253708d5b3258a2a04d3
SHA51265f75a0a33ee1073705cc830aea0c2fe6624d235117876959a099eb92f031ec0afe43f63fa008b13207630dc99b6c762bbf466cbe58749ea1c958b0cdaf8f94d
-
Filesize
184KB
MD5274e81b0ee7be93c7e8608199337414f
SHA1155da188300470467f5d20fd59b2860194cc7aba
SHA256d550626439add5b70f2b13008d7cccf85c1232d15dd1445aa706a77429e45325
SHA512342dd3ed9002a2ac6363db119a97b4449100efd56c7607305e546494fea34f3a7e002e73509cf44d080ff762c6059720729bb7868e6e9c75039244296985d321
-
Filesize
184KB
MD55e8394338f23d08a065a881bff540073
SHA1f578aa0ece1e7afd5e61b24a4c4c12de67e2721a
SHA256273c5836478ddacc57f9ba3413ec631747779650ef23fc38ce6170cead07f5c9
SHA5121979fd002d3c46ae7b04613a1b102694ff0f73832bfa6734acea795b5b815bad66cc189d2558c85966e91f16fe6f2204065484f32f662e32901115f674b95e8f