Analysis
-
max time kernel
89s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
d66a91bbf74f92ec4b9240a41784a8cb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d66a91bbf74f92ec4b9240a41784a8cb.exe
Resource
win10v2004-20240226-en
General
-
Target
d66a91bbf74f92ec4b9240a41784a8cb.exe
-
Size
184KB
-
MD5
d66a91bbf74f92ec4b9240a41784a8cb
-
SHA1
a65f37c0e6229470d11f20ea00b81c8fec167386
-
SHA256
607f4fb4c48e6acddbcdba9731fbaa82eab6045025b836fcb8d747e36ae8046f
-
SHA512
d342867d58265bf9a97f2eb1f1851b1393aee20caea95973f94da6f509400fb987122d0b1f585860c074138047dd0e4fe699cc037f26fe835607adedefe1e3e0
-
SSDEEP
3072:ENPHomLyo+w/oOjTo3m6oJSLkwXMftfw67x8qEVfNlvvpFT:ENfoW7/ocoW6oJn1s1NlvvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1460 Unicorn-48493.exe 2652 Unicorn-49920.exe 2648 Unicorn-38222.exe 2724 Unicorn-49702.exe 2588 Unicorn-38004.exe 2464 Unicorn-37450.exe 2388 Unicorn-10252.exe 2832 Unicorn-64092.exe 2820 Unicorn-1892.exe 2768 Unicorn-23465.exe 2360 Unicorn-56884.exe 824 Unicorn-4279.exe 2800 Unicorn-29338.exe 1472 Unicorn-20808.exe 836 Unicorn-41398.exe 1728 Unicorn-2826.exe 2336 Unicorn-39775.exe 1716 Unicorn-62011.exe 1668 Unicorn-16340.exe 848 Unicorn-17046.exe 1880 Unicorn-21108.exe 1560 Unicorn-24830.exe 1144 Unicorn-26344.exe 2260 Unicorn-54378.exe 1940 Unicorn-42318.exe 1072 Unicorn-21898.exe 1768 Unicorn-34704.exe 2252 Unicorn-21876.exe 832 Unicorn-41742.exe 876 Unicorn-50465.exe 1704 Unicorn-709.exe 3036 Unicorn-58078.exe 1056 Unicorn-42785.exe 2672 Unicorn-59292.exe 2584 Unicorn-38125.exe 2460 Unicorn-31109.exe 2516 Unicorn-60444.exe 2564 Unicorn-39277.exe 2992 Unicorn-39469.exe 2996 Unicorn-31279.exe 2684 Unicorn-47061.exe 324 Unicorn-21680.exe 2828 Unicorn-7927.exe 2852 Unicorn-2774.exe 1824 Unicorn-35961.exe 1804 Unicorn-39168.exe 1128 Unicorn-10003.exe 952 Unicorn-55675.exe 1624 Unicorn-10003.exe 2660 Unicorn-10003.exe 868 Unicorn-64035.exe 612 Unicorn-26532.exe 2824 Unicorn-64035.exe 2328 Unicorn-65208.exe 2296 Unicorn-64331.exe 2928 Unicorn-31637.exe 2144 Unicorn-18639.exe 1900 Unicorn-23661.exe 2348 Unicorn-18831.exe 1980 Unicorn-40367.exe 840 Unicorn-36837.exe 1836 Unicorn-48727.exe 2268 Unicorn-3781.exe 1936 Unicorn-31815.exe -
Loads dropped DLL 64 IoCs
pid Process 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 1460 Unicorn-48493.exe 1460 Unicorn-48493.exe 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 2652 Unicorn-49920.exe 2652 Unicorn-49920.exe 1460 Unicorn-48493.exe 1460 Unicorn-48493.exe 2648 Unicorn-38222.exe 2648 Unicorn-38222.exe 2724 Unicorn-49702.exe 2724 Unicorn-49702.exe 2652 Unicorn-49920.exe 2652 Unicorn-49920.exe 2588 Unicorn-38004.exe 2588 Unicorn-38004.exe 2464 Unicorn-37450.exe 2464 Unicorn-37450.exe 2648 Unicorn-38222.exe 2648 Unicorn-38222.exe 2388 Unicorn-10252.exe 2388 Unicorn-10252.exe 2724 Unicorn-49702.exe 2724 Unicorn-49702.exe 2832 Unicorn-64092.exe 2832 Unicorn-64092.exe 2820 Unicorn-1892.exe 2820 Unicorn-1892.exe 2588 Unicorn-38004.exe 2588 Unicorn-38004.exe 2360 Unicorn-56884.exe 2360 Unicorn-56884.exe 2464 Unicorn-37450.exe 2768 Unicorn-23465.exe 2464 Unicorn-37450.exe 2768 Unicorn-23465.exe 824 Unicorn-4279.exe 824 Unicorn-4279.exe 2388 Unicorn-10252.exe 2388 Unicorn-10252.exe 1472 Unicorn-20808.exe 1472 Unicorn-20808.exe 2832 Unicorn-64092.exe 2832 Unicorn-64092.exe 2800 Unicorn-29338.exe 2800 Unicorn-29338.exe 1668 Unicorn-16340.exe 1668 Unicorn-16340.exe 1728 Unicorn-2826.exe 1728 Unicorn-2826.exe 2768 Unicorn-23465.exe 2768 Unicorn-23465.exe 2336 Unicorn-39775.exe 2336 Unicorn-39775.exe 2820 Unicorn-1892.exe 2820 Unicorn-1892.exe 2360 Unicorn-56884.exe 1716 Unicorn-62011.exe 2360 Unicorn-56884.exe 1716 Unicorn-62011.exe 836 Unicorn-41398.exe 836 Unicorn-41398.exe -
Program crash 16 IoCs
pid pid_target Process procid_target 1908 2612 WerFault.exe 100 2844 3028 WerFault.exe 101 1492 2328 WerFault.exe 81 2476 1824 WerFault.exe 72 2000 1768 WerFault.exe 54 2520 2600 WerFault.exe 98 1900 1120 WerFault.exe 99 936 2800 WerFault.exe 145 1616 640 WerFault.exe 139 2552 2012 WerFault.exe 97 2304 3056 WerFault.exe 180 1588 1624 WerFault.exe 171 700 2176 WerFault.exe 158 2956 2616 WerFault.exe 156 2208 2524 WerFault.exe 186 3016 2044 WerFault.exe 211 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 1460 Unicorn-48493.exe 2652 Unicorn-49920.exe 2648 Unicorn-38222.exe 2724 Unicorn-49702.exe 2588 Unicorn-38004.exe 2464 Unicorn-37450.exe 2832 Unicorn-64092.exe 2388 Unicorn-10252.exe 2820 Unicorn-1892.exe 2360 Unicorn-56884.exe 2768 Unicorn-23465.exe 824 Unicorn-4279.exe 2800 Unicorn-29338.exe 1472 Unicorn-20808.exe 1728 Unicorn-2826.exe 2336 Unicorn-39775.exe 836 Unicorn-41398.exe 1668 Unicorn-16340.exe 1716 Unicorn-62011.exe 848 Unicorn-17046.exe 1880 Unicorn-21108.exe 1560 Unicorn-24830.exe 1144 Unicorn-26344.exe 2260 Unicorn-54378.exe 1940 Unicorn-42318.exe 1072 Unicorn-21898.exe 1768 Unicorn-34704.exe 2252 Unicorn-21876.exe 832 Unicorn-41742.exe 1704 Unicorn-709.exe 876 Unicorn-50465.exe 3036 Unicorn-58078.exe 1056 Unicorn-42785.exe 2672 Unicorn-59292.exe 2584 Unicorn-38125.exe 2516 Unicorn-60444.exe 2460 Unicorn-31109.exe 2564 Unicorn-39277.exe 2992 Unicorn-39469.exe 2996 Unicorn-31279.exe 2684 Unicorn-47061.exe 2828 Unicorn-7927.exe 324 Unicorn-21680.exe 1824 Unicorn-35961.exe 2852 Unicorn-2774.exe 1624 Unicorn-10003.exe 952 Unicorn-55675.exe 1804 Unicorn-39168.exe 2660 Unicorn-10003.exe 1128 Unicorn-10003.exe 612 Unicorn-26532.exe 868 Unicorn-64035.exe 2824 Unicorn-64035.exe 2328 Unicorn-65208.exe 2296 Unicorn-64331.exe 2928 Unicorn-31637.exe 2144 Unicorn-18639.exe 1900 Unicorn-23661.exe 2348 Unicorn-18831.exe 840 Unicorn-36837.exe 1980 Unicorn-40367.exe 1836 Unicorn-48727.exe 2268 Unicorn-3781.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1460 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 28 PID 1388 wrote to memory of 1460 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 28 PID 1388 wrote to memory of 1460 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 28 PID 1388 wrote to memory of 1460 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 28 PID 1460 wrote to memory of 2652 1460 Unicorn-48493.exe 29 PID 1460 wrote to memory of 2652 1460 Unicorn-48493.exe 29 PID 1460 wrote to memory of 2652 1460 Unicorn-48493.exe 29 PID 1460 wrote to memory of 2652 1460 Unicorn-48493.exe 29 PID 1388 wrote to memory of 2648 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 30 PID 1388 wrote to memory of 2648 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 30 PID 1388 wrote to memory of 2648 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 30 PID 1388 wrote to memory of 2648 1388 d66a91bbf74f92ec4b9240a41784a8cb.exe 30 PID 2652 wrote to memory of 2724 2652 Unicorn-49920.exe 31 PID 2652 wrote to memory of 2724 2652 Unicorn-49920.exe 31 PID 2652 wrote to memory of 2724 2652 Unicorn-49920.exe 31 PID 2652 wrote to memory of 2724 2652 Unicorn-49920.exe 31 PID 1460 wrote to memory of 2588 1460 Unicorn-48493.exe 32 PID 1460 wrote to memory of 2588 1460 Unicorn-48493.exe 32 PID 1460 wrote to memory of 2588 1460 Unicorn-48493.exe 32 PID 1460 wrote to memory of 2588 1460 Unicorn-48493.exe 32 PID 2648 wrote to memory of 2464 2648 Unicorn-38222.exe 33 PID 2648 wrote to memory of 2464 2648 Unicorn-38222.exe 33 PID 2648 wrote to memory of 2464 2648 Unicorn-38222.exe 33 PID 2648 wrote to memory of 2464 2648 Unicorn-38222.exe 33 PID 2724 wrote to memory of 2388 2724 Unicorn-49702.exe 34 PID 2724 wrote to memory of 2388 2724 Unicorn-49702.exe 34 PID 2724 wrote to memory of 2388 2724 Unicorn-49702.exe 34 PID 2724 wrote to memory of 2388 2724 Unicorn-49702.exe 34 PID 2652 wrote to memory of 2832 2652 Unicorn-49920.exe 35 PID 2652 wrote to memory of 2832 2652 Unicorn-49920.exe 35 PID 2652 wrote to memory of 2832 2652 Unicorn-49920.exe 35 PID 2652 wrote to memory of 2832 2652 Unicorn-49920.exe 35 PID 2588 wrote to memory of 2820 2588 Unicorn-38004.exe 36 PID 2588 wrote to memory of 2820 2588 Unicorn-38004.exe 36 PID 2588 wrote to memory of 2820 2588 Unicorn-38004.exe 36 PID 2588 wrote to memory of 2820 2588 Unicorn-38004.exe 36 PID 2464 wrote to memory of 2768 2464 Unicorn-37450.exe 37 PID 2464 wrote to memory of 2768 2464 Unicorn-37450.exe 37 PID 2464 wrote to memory of 2768 2464 Unicorn-37450.exe 37 PID 2464 wrote to memory of 2768 2464 Unicorn-37450.exe 37 PID 2648 wrote to memory of 2360 2648 Unicorn-38222.exe 38 PID 2648 wrote to memory of 2360 2648 Unicorn-38222.exe 38 PID 2648 wrote to memory of 2360 2648 Unicorn-38222.exe 38 PID 2648 wrote to memory of 2360 2648 Unicorn-38222.exe 38 PID 2388 wrote to memory of 824 2388 Unicorn-10252.exe 39 PID 2388 wrote to memory of 824 2388 Unicorn-10252.exe 39 PID 2388 wrote to memory of 824 2388 Unicorn-10252.exe 39 PID 2388 wrote to memory of 824 2388 Unicorn-10252.exe 39 PID 2724 wrote to memory of 2800 2724 Unicorn-49702.exe 40 PID 2724 wrote to memory of 2800 2724 Unicorn-49702.exe 40 PID 2724 wrote to memory of 2800 2724 Unicorn-49702.exe 40 PID 2724 wrote to memory of 2800 2724 Unicorn-49702.exe 40 PID 2832 wrote to memory of 1472 2832 Unicorn-64092.exe 41 PID 2832 wrote to memory of 1472 2832 Unicorn-64092.exe 41 PID 2832 wrote to memory of 1472 2832 Unicorn-64092.exe 41 PID 2832 wrote to memory of 1472 2832 Unicorn-64092.exe 41 PID 2820 wrote to memory of 1728 2820 Unicorn-1892.exe 42 PID 2820 wrote to memory of 1728 2820 Unicorn-1892.exe 42 PID 2820 wrote to memory of 1728 2820 Unicorn-1892.exe 42 PID 2820 wrote to memory of 1728 2820 Unicorn-1892.exe 42 PID 2588 wrote to memory of 836 2588 Unicorn-38004.exe 43 PID 2588 wrote to memory of 836 2588 Unicorn-38004.exe 43 PID 2588 wrote to memory of 836 2588 Unicorn-38004.exe 43 PID 2588 wrote to memory of 836 2588 Unicorn-38004.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66a91bbf74f92ec4b9240a41784a8cb.exe"C:\Users\Admin\AppData\Local\Temp\d66a91bbf74f92ec4b9240a41784a8cb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49920.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49702.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10252.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4279.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17046.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42785.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64331.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37985.exe10⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16766.exe11⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9835.exe12⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3774.exe13⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52285.exe14⤵PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32419.exe13⤵PID:2324
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31637.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17041.exe9⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41932.exe10⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20412.exe11⤵PID:1704
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59292.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65208.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 2209⤵
- Program crash
PID:1492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21108.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38125.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18639.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23590.exe9⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31823.exe10⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23178.exe11⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38030.exe12⤵PID:944
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23661.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6127.exe8⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18061.exe9⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63727.exe10⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43167.exe11⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2700.exe12⤵PID:2220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36653.exe9⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1205.exe10⤵PID:904
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29338.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54378.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39469.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48727.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13994.exe9⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22228.exe10⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54459.exe11⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61911.exe12⤵PID:2916
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3781.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9863.exe8⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42264.exe9⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27739.exe10⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28388.exe11⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48331.exe12⤵PID:2724
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56197.exe9⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12051.exe10⤵PID:2664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31279.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56786.exe7⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60901.exe8⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30671.exe9⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47682.exe10⤵PID:1484
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19126.exe7⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6358.exe8⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13618.exe9⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8865.exe10⤵PID:896
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64092.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24830.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31109.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31815.exe8⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exe9⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44477.exe10⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53800.exe11⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25155.exe12⤵PID:1944
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25353.exe7⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exe8⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29820.exe9⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13260.exe10⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33562.exe11⤵PID:436
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60444.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18831.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8711.exe8⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32752.exe9⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7209.exe10⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7884.exe11⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20734.exe12⤵PID:2948
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26344.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39277.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40367.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48862.exe8⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59342.exe9⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17428.exe10⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48891.exe11⤵PID:2980
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36837.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44586.exe7⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30671.exe8⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40557.exe9⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26271.exe10⤵PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1553.exe9⤵PID:2564
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38004.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1892.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2826.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21898.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47061.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24799.exe8⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56838.exe9⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32145.exe10⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15559.exe11⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2700.exe12⤵PID:2416
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58218.exe7⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43029.exe8⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51283.exe9⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51143.exe10⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53982.exe11⤵PID:2908
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7927.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25157.exe7⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exe8⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9866.exe9⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52129.exe10⤵PID:2736
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21876.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10003.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57663.exe7⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20658.exe8⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44672.exe9⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exe10⤵PID:2364
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-273.exe6⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47736.exe7⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33569.exe8⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60733.exe9⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-266.exe10⤵PID:460
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41398.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58078.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10003.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8436.exe7⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63452.exe8⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65393.exe9⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 24010⤵
- Program crash
PID:2304
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56838.exe6⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12959.exe7⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24818.exe8⤵PID:2752
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38222.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37450.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23465.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16340.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42318.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21680.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6127.exe8⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61197.exe9⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20744.exe10⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53084.exe11⤵PID:1620
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2774.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24882.exe7⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51410.exe8⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6057.exe9⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16852.exe10⤵PID:2444
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34704.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35961.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exe7⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65473.exe8⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12990.exe9⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60868.exe10⤵PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 23610⤵
- Program crash
PID:2956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 2369⤵
- Program crash
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38817.exe8⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15944.exe9⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24818.exe10⤵PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 21610⤵
- Program crash
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58813.exe9⤵PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2409⤵
- Program crash
PID:700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 2408⤵
- Program crash
PID:2552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 2367⤵
- Program crash
PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4632.exe6⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62157.exe7⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60795.exe8⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21320.exe9⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53214.exe10⤵PID:336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 23610⤵
- Program crash
PID:2208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 2169⤵
- Program crash
PID:1588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 2368⤵
- Program crash
PID:936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 2367⤵
- Program crash
PID:1900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 2406⤵
- Program crash
PID:2000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62011.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-709.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10003.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exe7⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16465.exe8⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13919.exe9⤵PID:1188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8851.exe7⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36566.exe8⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48725.exe9⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29336.exe10⤵PID:3476
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20030.exe6⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2007⤵
- Program crash
PID:1908
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56884.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39775.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41742.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39168.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16107.exe7⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60733.exe8⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28279.exe9⤵PID:592
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55675.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exe6⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exe7⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54791.exe8⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34854.exe9⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50775.exe10⤵PID:772
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2367⤵
- Program crash
PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2058.exe6⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12764.exe7⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38071.exe8⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51143.exe9⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2700.exe10⤵PID:2460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2061.exe7⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2840.exe8⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24771.exe9⤵PID:836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51138.exe8⤵PID:1496
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50465.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26532.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20030.exe6⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 2007⤵
- Program crash
PID:2844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54409.exe5⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16608.exe6⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62710.exe7⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19919.exe8⤵PID:868
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD52518a054c2f27280de3d9211fccb1c06
SHA10d89995ecc17754e9f6c3642ebb23c99bdd90652
SHA2562bf8c2e041e787d387f736d2872d661bce63188c3389847cb4d46de6d45ac90e
SHA5121653457dd4e245ff9132c8bb2cf6cd9e3fa8c8d186378de950691578f611f4f563592ade3fe592f753ee10abdd8671b3feaa8fc7cf7b919fe134db06d63539a8
-
Filesize
184KB
MD5ba18522723b9a007d4d32764188c38f7
SHA1ab3b3aa32991d41f06f04c7cd2f9a464c8c14852
SHA25637dbbcc94b22c152470e4b5ee057b1cfb1702c8cee59f10b84a867e0b9c81a28
SHA5128ec597802e646be0ae3e5b88924f43496b7f905052de40b5f76b33f940f819e5dc6d9d3c20e05b3a78e395f557fcdad8c6c3b29800a8aecb609a7d2e7aca4c2d
-
Filesize
184KB
MD56e56aa3bf752a7e4b7a73d77129daf6b
SHA143ee295811539ab9acaf35759023c28f21d2053e
SHA25607746047d1debf29867e56a8e0080cf99bf89ef322b20a03711152fd8bb08834
SHA51232c31cf816dd995810561cd982ebd9ce98968b1d416553f994e94a7d9ff09958a0495eb958d5155e3e8ddb7c2f11e59101ac402356c3eac0d7e40d4fdbc31027
-
Filesize
184KB
MD545cca07861556da061be3d84f7c31196
SHA185c3e936977ff04231e8fc9f569ad0dbaa81474d
SHA25675683e1002e1723d31d5df23e0b4eab1d39753394e55a1dae8b270ddd93b0f2b
SHA512bb1381b6ca2249c71b3e1a6218f4292344759dd201382d1cc1c6e2bef4f6d26e9c049bb67045ee95d19f24856777a983aa63a6c8955b4576f7808c7d614c3456
-
Filesize
184KB
MD5b5a0e904a8e11760548a5d92630f9268
SHA1a5ff39a3ef23c4a6e77ad8e419d2446c779e89bd
SHA256db3e8a7f30c8b27b296709bb0ddb66a432ca23863e3ea3abe72b3ef1f3014943
SHA512c6a07e3c121d7974744f24cd63719b79b120d81c523574b020a395274cd7cf669e2105d3ba509546f9681a6494cb1752e17b5a36b76a960a6d7bd41900f121b8
-
Filesize
184KB
MD5cf3754fbc421e17f3532998aca25be63
SHA1121b8c66226105736785625fe1fcdab1c685ba40
SHA25601f3dc2d7fc52dd8a04935200531d10441ae839b4b836bfde7be85ccab5aaebe
SHA512c813f3bceba2d956061b8d3d17c0462d3a15e3c41198f6549a6cbe1318a0d061781897ee1794a417ff1532bc5f0ac3085b84ff50bd5bdbaf07725789c10c75f6
-
Filesize
184KB
MD5caab82edc3eef45e12dacdd8aa7b0162
SHA17a4606a245109815eaa1151e5446138d8599b47e
SHA256b7a739ea9b1217d9d1481067f8faceb39588f6f5938bf108650f24ad0e2fda54
SHA51296070d970a871716eb59f744c9410ba4f745d03ffc66892dd81dbf1cb97bd46d4636e836106c1173be11176701de3e96a05d714355af33e5b93a65ffadfa9672
-
Filesize
184KB
MD54465913bb9c7838f65faf9d1d145c978
SHA18bc5de4c0b9489e0a9d1dc761b17f66cb981b730
SHA2569e8eeb9a287253877245df5ab51f2abdb90bfd7a268c27d7cd9abec252e970e2
SHA512c4a15f735b96455f0974bf9b6a06b39a43a19b48becf1fce1a0b01e66c4b68b3595d7ea010556adfeb9e58e9c11e2291d74b4727e00f43dc7fdc55bde0acccd9
-
Filesize
184KB
MD50e3ef83fe06478b28b7ce59dd6d292cd
SHA1000e0d4167f3cadb2fd9aa409965828c54535d60
SHA256383f1e9dccbbd10dcf644d5d43075aa48be24b9307be401d5c8215ed5d07a757
SHA512100bda690c09a0128c727a42ba1ee51165dd17c875b6aff5a55a2bc65a3063447d003ce6bcadec44f2ad25ca570dda8f7d6bf7927020e89c191baafa6223322d
-
Filesize
184KB
MD5a320b379fb94b21131cee28497b0fdd5
SHA18c416ede74ce9348462d70f5effc32d5621fdcfe
SHA25616333320e79288b8051043c9b439d94d9885071210526c236b13ec7a9700db70
SHA5121b1caf202bbb75783e536d52ad35b58fb03c3e36665002db1eed6b0d906161e42970c6c7393c455fdb0c6dbf7365a067b2928adaafe1ca96d0545b2e7733d61b
-
Filesize
184KB
MD5276dad87dc7e1435e7e3d32d81b62165
SHA17b99d1485976954d7c41e84509d3748735196b3b
SHA256d368d2d9eb0bb3fb82137b642c250f8d07426d384588e26e843244df3682e1b6
SHA5127b75f2f9b33c284b42a44a2e3ed612a26682a3451a47a84954e13c3d7f972e1b4788a8689cb36c31634279f207effe6578f728a8d36f52bf055ef6ab960e4a00
-
Filesize
184KB
MD5ee2f2d3c683567f836f7e153f11010e7
SHA100a058abd730dd4374dc94af2f59a402650cfbe8
SHA256aa7dc0837b764d08e8d5c111cfc4c8290463129929efb17ff0facc388e2c8916
SHA512426a451f0c8d5992c9d690b29ac643d8c06c78f3718eeb4fa3b940aea6f52cc364b981f1d445aa15edfd235c7a66ee1e65260b593077444be5f651fb33c03d99
-
Filesize
184KB
MD5dba6e0021adb29de8182cc084ae6bfcc
SHA1f1328f8c7a228c742d1eca42955e3da603b6b97e
SHA256028227bce75227260cc0cc65ae8036a8e00ca53b177e7b4269453c31d4e1138c
SHA5125c3ff0707a398797a4c61576d6ba53841dd3b7d6d71bc00c5c54e20d24ca018d53bd672c216b64187ae395b7e0866c05fa5ddac88bb616aebb4409a1e039717c
-
Filesize
184KB
MD50d3b75fbe59b1e84f1971563254a35eb
SHA1c8e0b75b923a1579e51e08911e38207416687bae
SHA25655d95d58d833734e28b308140ba89eb8880ef24038282f5ea21aeacddb34cd06
SHA51270f0146d935a29cb87f711a6bdc67a639e0c55e9b9e16fa0b9beaf796f6cc9cb70f7a0947fdb3b9a78700fae582680fb18009838c27959f3f6e92ab6f6e5b75c
-
Filesize
184KB
MD54e64f9a330fce6c5fb54b6cbd70ba884
SHA115b02b9722156afb89dca1c26ad9251517dc8325
SHA256d077e65d99959b669d418c1b2636d2e540c2a00aaed1c173955b3271f955bdab
SHA5125f65747e07bb54a26d939cbbd0a0b8fb852fd85c2dd778bcd321651d8358fa98c5ccc8a76698989feaf2f0319c4fe7867469e13602667d65caf99a7439716af5
-
Filesize
184KB
MD596da087a4576caf8d3288c0d680590d9
SHA1b5be2b5480f52f285dce46d9041c840fe3f74794
SHA256a53c562d89509fd86bf98d375c29eddbd6db946c6073cdbe1e4d94cff1a7ccc7
SHA51227ef712a8639ee1d1ae129a91c6dc42fcfdc83128a0345223072d2afbf01e0bf609064e4a984302265d1a4b911ffcc3b0e5caee3f7e9676d847e95a8900c57a8
-
Filesize
98KB
MD5739d7da878fefe14398eccca986fade8
SHA171509b455408402ddacb3bcf29a04b8dca7d865e
SHA25604de975b9f5d6a26da4cd1a7670c7dca00e39806108e60a7d1b9ec8dcf97a88e
SHA51245a1f74cc1bcf1486adb59deb076beeb6690984a7de9bdbecc3dc97f00a443e3d3254d70e8da0931509cc83b099de731064c3853b6c4b429b5a7c992e2f124ab
-
Filesize
184KB
MD5d209b25b4d536eb848e726cc3c4bdf1b
SHA1820114d487a5f46e0b94ffed20bf2c9eab249d92
SHA256d092f37dce230a8d68a5fedcdad45ed7087c8fce674570c9836297857ac1a62b
SHA5121a08b9ce3d0547c4befecf6206abaa6f2d0281e466b0761ffb97559e5ce809db2012fb54e86c413d796692cf9a4d1805f88b3b3361b8d640511e84f5cb7c1e92
-
Filesize
184KB
MD5d053c728f42d5f1006c1f65956ab2141
SHA1dd5d3da2caa36433bf221818310aef8b8e7ce311
SHA25614c7833ed9a368d3e0d29dad44ee24e3b32bd6253b88a9aecbce967331b3bcbb
SHA5126fb58845126688bae3000b67659d77e13f91031482862cc02e4a70afb56075ef208073ad2e27c46b02848896d093a3ea173bc1a7206703144fbb2913fa23cd42
-
Filesize
184KB
MD5d7358b0bc401a4aee2b04e111a551c30
SHA18cab89f0f70bce2f0d937d41f5a0c7dcc3719f6c
SHA256bb4ec4c7256dc2e33a6f1de6c24bed1d8534728fdb8be7eafecf975e6d6a16d5
SHA512995163a8f45340b8c86cccdad04dcec279a53e7dd68a6c298af3a01f1517862f508472c16bfc9f50f20479ddb1290d0b550e3f921e71dc01f431c3f165d2f353
-
Filesize
184KB
MD5496ea187cba8328c15df3de738f2a5ac
SHA1d7f6bd57e2a906dc011cc1763b873ce716b5c0ad
SHA25666d3e73377df95e36c74e334c9b15494349e5a69f08d894bb8f87c110785ad9f
SHA51245f318f06b737ca41873519ac7653b717383ccc6f777f0c56632f674b3e9aaf08698ef6debbddd6a94db6ef6a0f06c491528c5a21a21e3a34de02c20c35d41c3
-
Filesize
184KB
MD57ea8e716337cdaeaeb20f9eb8344dea1
SHA116a9aa26ac2f9bc729d1f44d478c85525b120066
SHA2563dda35a626d90726fd1623b62d65c83cc8df7710520db571ff6d4d982761b275
SHA512c65a4a67129652c840c615f80aba3c0d23bd58351184cbf03e41316cbbaa11fe34cbfc4d3eed31ef7790a31d80b63725c93d10549562bb6dabe3e870ad483582
-
Filesize
184KB
MD594415d0b39bbf8bcef465928c1178b47
SHA1557fe3b4d786109522b3688da11f61b80ece8545
SHA2562f7553d1865425a3ddde921a8f7ec4412af4b4e86b706512989d04e7e07408d3
SHA512477848860f072a97746c006ea72e0c1447ca065c763b287f2f79c04bc42e86b8fe9fd6b74d00de84692e549fcffbed0a48eb0316df962202146bfbc79af89388