Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe
-
Size
188KB
-
MD5
04714232812f7cbf8aa373269b10c34a
-
SHA1
33f8204c09da1dfd5684b41063b88123bfcedb7c
-
SHA256
295e4b3fbe8b3a95c2aa74bd0a5faececc88251cb36d2c6dbcde9cb6cb080ceb
-
SHA512
60e549d7baf0da98658ee566b25642181ba34cc9a85cf036d778fee8507c16516c4d9c1d0341a9ed21ec66692c9da7b101d2ef07f94ddb052b33ccefba4637aa
-
SSDEEP
3072:Tn95oCzGwtu19Ojb4k2/F760du1JnyWiiOxfRjfD8lv1pFc:TnDo+w19s4n/F7+JK18lv1pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2896 Unicorn-33632.exe 2984 Unicorn-63455.exe 2492 Unicorn-64010.exe 2868 Unicorn-26637.exe 2448 Unicorn-51141.exe 2620 Unicorn-43335.exe 2820 Unicorn-23596.exe 2160 Unicorn-15982.exe 1440 Unicorn-243.exe 1008 Unicorn-33108.exe 2348 Unicorn-13242.exe 2284 Unicorn-49574.exe 940 Unicorn-18141.exe 1652 Unicorn-37130.exe 1712 Unicorn-4073.exe 1244 Unicorn-37492.exe 1704 Unicorn-5417.exe 2948 Unicorn-50425.exe 1960 Unicorn-60492.exe 484 Unicorn-39325.exe 1084 Unicorn-15183.exe 1528 Unicorn-63445.exe 1092 Unicorn-56621.exe 3040 Unicorn-28033.exe 1968 Unicorn-49008.exe 2596 Unicorn-20227.exe 2188 Unicorn-7228.exe 1696 Unicorn-28670.exe 1224 Unicorn-48536.exe 1600 Unicorn-60788.exe 2856 Unicorn-48536.exe 3012 Unicorn-16081.exe 2828 Unicorn-12381.exe 2688 Unicorn-35947.exe 2292 Unicorn-35947.exe 1716 Unicorn-35947.exe 2628 Unicorn-45075.exe 2556 Unicorn-25209.exe 2504 Unicorn-45075.exe 2608 Unicorn-21592.exe 944 Unicorn-34025.exe 2940 Unicorn-61321.exe 876 Unicorn-57102.exe 268 Unicorn-54165.exe 1828 Unicorn-27409.exe 1212 Unicorn-57149.exe 1552 Unicorn-3672.exe 1644 Unicorn-11840.exe 2280 Unicorn-30590.exe 1192 Unicorn-17269.exe 2852 Unicorn-34482.exe 1724 Unicorn-4824.exe 2612 Unicorn-13677.exe 2640 Unicorn-5317.exe 108 Unicorn-47658.exe 2896 Unicorn-6625.exe 1936 Unicorn-23922.exe 1676 Unicorn-28368.exe 1928 Unicorn-40066.exe 2188 Unicorn-56957.exe 2152 Unicorn-9230.exe 2812 Unicorn-9977.exe 1356 Unicorn-22229.exe 2088 Unicorn-50263.exe -
Loads dropped DLL 64 IoCs
pid Process 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 2896 Unicorn-33632.exe 2896 Unicorn-33632.exe 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 2492 Unicorn-64010.exe 2492 Unicorn-64010.exe 2984 Unicorn-63455.exe 2896 Unicorn-33632.exe 2984 Unicorn-63455.exe 2896 Unicorn-33632.exe 2448 Unicorn-51141.exe 2448 Unicorn-51141.exe 2984 Unicorn-63455.exe 2984 Unicorn-63455.exe 2868 Unicorn-26637.exe 2868 Unicorn-26637.exe 2620 Unicorn-43335.exe 2620 Unicorn-43335.exe 2492 Unicorn-64010.exe 2492 Unicorn-64010.exe 1440 Unicorn-243.exe 1440 Unicorn-243.exe 2868 Unicorn-26637.exe 2868 Unicorn-26637.exe 2160 Unicorn-15982.exe 2160 Unicorn-15982.exe 1008 Unicorn-33108.exe 1008 Unicorn-33108.exe 2620 Unicorn-43335.exe 2620 Unicorn-43335.exe 2348 Unicorn-13242.exe 2348 Unicorn-13242.exe 2284 Unicorn-49574.exe 2284 Unicorn-49574.exe 1440 Unicorn-243.exe 1440 Unicorn-243.exe 1652 Unicorn-37130.exe 1652 Unicorn-37130.exe 2160 Unicorn-15982.exe 2160 Unicorn-15982.exe 1244 Unicorn-37492.exe 1244 Unicorn-37492.exe 1712 Unicorn-4073.exe 1712 Unicorn-4073.exe 940 Unicorn-18141.exe 940 Unicorn-18141.exe 1008 Unicorn-33108.exe 1008 Unicorn-33108.exe 2348 Unicorn-13242.exe 2348 Unicorn-13242.exe 1704 Unicorn-5417.exe 1704 Unicorn-5417.exe 2284 Unicorn-49574.exe 2284 Unicorn-49574.exe 2948 Unicorn-50425.exe 1960 Unicorn-60492.exe 484 Unicorn-39325.exe 1960 Unicorn-60492.exe 484 Unicorn-39325.exe 2948 Unicorn-50425.exe 1244 Unicorn-37492.exe 1652 Unicorn-37130.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1488 2616 WerFault.exe 135 2652 1948 WerFault.exe 178 2528 2572 WerFault.exe 134 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 2896 Unicorn-33632.exe 2492 Unicorn-64010.exe 2984 Unicorn-63455.exe 2448 Unicorn-51141.exe 2868 Unicorn-26637.exe 2620 Unicorn-43335.exe 2820 Unicorn-23596.exe 1440 Unicorn-243.exe 2160 Unicorn-15982.exe 1008 Unicorn-33108.exe 2348 Unicorn-13242.exe 2284 Unicorn-49574.exe 1652 Unicorn-37130.exe 940 Unicorn-18141.exe 1244 Unicorn-37492.exe 1712 Unicorn-4073.exe 1704 Unicorn-5417.exe 2948 Unicorn-50425.exe 1960 Unicorn-60492.exe 484 Unicorn-39325.exe 1084 Unicorn-15183.exe 1528 Unicorn-63445.exe 1092 Unicorn-56621.exe 1968 Unicorn-49008.exe 2188 Unicorn-7228.exe 1224 Unicorn-48536.exe 1600 Unicorn-60788.exe 1716 Unicorn-35947.exe 2504 Unicorn-45075.exe 2608 Unicorn-21592.exe 2628 Unicorn-45075.exe 2596 Unicorn-20227.exe 2292 Unicorn-35947.exe 1696 Unicorn-28670.exe 2556 Unicorn-25209.exe 2856 Unicorn-48536.exe 3012 Unicorn-16081.exe 2688 Unicorn-35947.exe 2828 Unicorn-12381.exe 3040 Unicorn-28033.exe 944 Unicorn-34025.exe 2940 Unicorn-61321.exe 268 Unicorn-54165.exe 876 Unicorn-57102.exe 1828 Unicorn-27409.exe 1212 Unicorn-57149.exe 1552 Unicorn-3672.exe 1644 Unicorn-11840.exe 1192 Unicorn-17269.exe 2280 Unicorn-30590.exe 2852 Unicorn-34482.exe 2896 Unicorn-6625.exe 108 Unicorn-47658.exe 2612 Unicorn-13677.exe 2640 Unicorn-5317.exe 1724 Unicorn-4824.exe 1936 Unicorn-23922.exe 1676 Unicorn-28368.exe 2812 Unicorn-9977.exe 2188 Unicorn-56957.exe 1928 Unicorn-40066.exe 2088 Unicorn-50263.exe 1356 Unicorn-22229.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2896 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2896 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2896 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2896 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2984 2896 Unicorn-33632.exe 29 PID 2896 wrote to memory of 2984 2896 Unicorn-33632.exe 29 PID 2896 wrote to memory of 2984 2896 Unicorn-33632.exe 29 PID 2896 wrote to memory of 2984 2896 Unicorn-33632.exe 29 PID 1808 wrote to memory of 2492 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 30 PID 1808 wrote to memory of 2492 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 30 PID 1808 wrote to memory of 2492 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 30 PID 1808 wrote to memory of 2492 1808 04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2868 2492 Unicorn-64010.exe 31 PID 2492 wrote to memory of 2868 2492 Unicorn-64010.exe 31 PID 2492 wrote to memory of 2868 2492 Unicorn-64010.exe 31 PID 2492 wrote to memory of 2868 2492 Unicorn-64010.exe 31 PID 2984 wrote to memory of 2448 2984 Unicorn-63455.exe 32 PID 2984 wrote to memory of 2448 2984 Unicorn-63455.exe 32 PID 2984 wrote to memory of 2448 2984 Unicorn-63455.exe 32 PID 2984 wrote to memory of 2448 2984 Unicorn-63455.exe 32 PID 2896 wrote to memory of 2620 2896 Unicorn-33632.exe 33 PID 2896 wrote to memory of 2620 2896 Unicorn-33632.exe 33 PID 2896 wrote to memory of 2620 2896 Unicorn-33632.exe 33 PID 2896 wrote to memory of 2620 2896 Unicorn-33632.exe 33 PID 2448 wrote to memory of 2820 2448 Unicorn-51141.exe 34 PID 2448 wrote to memory of 2820 2448 Unicorn-51141.exe 34 PID 2448 wrote to memory of 2820 2448 Unicorn-51141.exe 34 PID 2448 wrote to memory of 2820 2448 Unicorn-51141.exe 34 PID 2984 wrote to memory of 2160 2984 Unicorn-63455.exe 35 PID 2984 wrote to memory of 2160 2984 Unicorn-63455.exe 35 PID 2984 wrote to memory of 2160 2984 Unicorn-63455.exe 35 PID 2984 wrote to memory of 2160 2984 Unicorn-63455.exe 35 PID 2868 wrote to memory of 1440 2868 Unicorn-26637.exe 36 PID 2868 wrote to memory of 1440 2868 Unicorn-26637.exe 36 PID 2868 wrote to memory of 1440 2868 Unicorn-26637.exe 36 PID 2868 wrote to memory of 1440 2868 Unicorn-26637.exe 36 PID 2620 wrote to memory of 1008 2620 Unicorn-43335.exe 37 PID 2620 wrote to memory of 1008 2620 Unicorn-43335.exe 37 PID 2620 wrote to memory of 1008 2620 Unicorn-43335.exe 37 PID 2620 wrote to memory of 1008 2620 Unicorn-43335.exe 37 PID 2492 wrote to memory of 2348 2492 Unicorn-64010.exe 38 PID 2492 wrote to memory of 2348 2492 Unicorn-64010.exe 38 PID 2492 wrote to memory of 2348 2492 Unicorn-64010.exe 38 PID 2492 wrote to memory of 2348 2492 Unicorn-64010.exe 38 PID 1440 wrote to memory of 2284 1440 Unicorn-243.exe 39 PID 1440 wrote to memory of 2284 1440 Unicorn-243.exe 39 PID 1440 wrote to memory of 2284 1440 Unicorn-243.exe 39 PID 1440 wrote to memory of 2284 1440 Unicorn-243.exe 39 PID 2868 wrote to memory of 940 2868 Unicorn-26637.exe 40 PID 2868 wrote to memory of 940 2868 Unicorn-26637.exe 40 PID 2868 wrote to memory of 940 2868 Unicorn-26637.exe 40 PID 2868 wrote to memory of 940 2868 Unicorn-26637.exe 40 PID 2160 wrote to memory of 1652 2160 Unicorn-15982.exe 41 PID 2160 wrote to memory of 1652 2160 Unicorn-15982.exe 41 PID 2160 wrote to memory of 1652 2160 Unicorn-15982.exe 41 PID 2160 wrote to memory of 1652 2160 Unicorn-15982.exe 41 PID 1008 wrote to memory of 1712 1008 Unicorn-33108.exe 42 PID 1008 wrote to memory of 1712 1008 Unicorn-33108.exe 42 PID 1008 wrote to memory of 1712 1008 Unicorn-33108.exe 42 PID 1008 wrote to memory of 1712 1008 Unicorn-33108.exe 42 PID 2620 wrote to memory of 1244 2620 Unicorn-43335.exe 43 PID 2620 wrote to memory of 1244 2620 Unicorn-43335.exe 43 PID 2620 wrote to memory of 1244 2620 Unicorn-43335.exe 43 PID 2620 wrote to memory of 1244 2620 Unicorn-43335.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04714232812f7cbf8aa373269b10c34a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33632.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51141.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23596.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15982.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37130.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39325.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60788.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47658.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21675.exe9⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32251.exe10⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53203.exe11⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22566.exe12⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14257.exe13⤵PID:580
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40101.exe8⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exe9⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40941.exe10⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43946.exe11⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26702.exe12⤵PID:2388
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12381.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9593.exe7⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9700.exe8⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16447.exe9⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25321.exe10⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56634.exe11⤵PID:1684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35003.exe9⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1631.exe10⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49924.exe11⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59566.exe12⤵PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64397.exe11⤵PID:2348
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15183.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35947.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27409.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23922.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44316.exe9⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38255.exe10⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7121.exe11⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44506.exe12⤵PID:876
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24258.exe8⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58185.exe9⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52311.exe10⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36717.exe11⤵PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53800.exe10⤵PID:1612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28368.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41213.exe8⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42430.exe9⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63997.exe10⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41377.exe11⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10370.exe12⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2773.exe13⤵PID:1728
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43335.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33108.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4073.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56621.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35947.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57149.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40066.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56903.exe10⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32010.exe11⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34880.exe12⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16697.exe13⤵PID:2540
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56957.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13371.exe9⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13130.exe10⤵PID:1768
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25209.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3672.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9230.exe8⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53582.exe9⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10173.exe10⤵PID:1984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9977.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25619.exe8⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6042.exe9⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64345.exe10⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14620.exe11⤵PID:2952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7531.exe9⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6478.exe10⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46411.exe11⤵PID:1580
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49008.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45075.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34025.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11840.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50263.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15203.exe10⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19571.exe11⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55440.exe12⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41377.exe13⤵PID:2316
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50434.exe8⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3255.exe9⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58808.exe10⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57350.exe11⤵PID:2196
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37492.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63445.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35947.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54165.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6625.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64051.exe9⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1306.exe10⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-878.exe11⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7121.exe12⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16105.exe13⤵PID:2612
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39909.exe8⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2150.exe9⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22566.exe10⤵PID:3000
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16081.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34482.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46947.exe7⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25619.exe8⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40007.exe9⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31315.exe10⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43209.exe11⤵PID:2464
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26889.exe6⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30614.exe7⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6104.exe8⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42280.exe9⤵PID:836
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64010.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26637.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-243.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49574.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50425.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48536.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22229.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7040.exe9⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19374.exe10⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50967.exe11⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 24012⤵
- Program crash
PID:2652
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28670.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4824.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44316.exe8⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25619.exe9⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64495.exe10⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 24011⤵
- Program crash
PID:1488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5455.exe10⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63608.exe11⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26712.exe12⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35752.exe13⤵PID:2380
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17050.exe7⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39516.exe8⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58185.exe9⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24640.exe10⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26131.exe11⤵PID:2324
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60492.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48536.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57102.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5317.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11259.exe9⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7803.exe10⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6042.exe11⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62555.exe12⤵PID:548
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62167.exe8⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64687.exe9⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 22010⤵
- Program crash
PID:2528
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18141.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28033.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9593.exe6⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34306.exe7⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44843.exe8⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32010.exe9⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61932.exe10⤵PID:2240
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13242.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5417.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45075.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61321.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13677.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59775.exe9⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31081.exe10⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14739.exe11⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10712.exe12⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe13⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4236.exe14⤵PID:2100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12144.exe11⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28741.exe12⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45840.exe13⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53235.exe14⤵PID:2412
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40978.exe8⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13260.exe9⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54968.exe10⤵PID:2020
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21592.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17269.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4570.exe7⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59936.exe8⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exe9⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65056.exe10⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62119.exe11⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55674.exe12⤵PID:1808
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47502.exe6⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29649.exe7⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44133.exe8⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46411.exe9⤵PID:1724
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20227.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30590.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42479.exe6⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46130.exe7⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8792.exe8⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8460.exe9⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37677.exe10⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1875.exe11⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62150.exe11⤵PID:2824
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1809.exe5⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5471.exe6⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63790.exe7⤵PID:2492
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5a41581a0a3172d9b2c4a4f661d210034
SHA1b1f507eb4f1cd5a6c3801d396a0f1936ffbe6492
SHA256361ce9d650a6b6fda4550efa599e46a9563fb3730dfdeaa5c7b3360e7e084674
SHA512d27f0efb23e86806b88b5dd821976268a049f7d43f3e6d9d16caec70793d783b50f200d50544e56b4ebc70a82b061f8678cf50021a986502cd5c117655709fd3
-
Filesize
188KB
MD5244452a57921fc52590977a3ae1d6bf3
SHA1d8fbed8095f642945651d40911fc6444650ad14d
SHA256038efbbdb8fcbe2bdba9f91c8928a0a507a5d4a4f0f7168c5296a49cc2f6b12d
SHA51263756ccbeede0e3263e4c5ef9786b1e489e35e3205d65353437f54fb9b837f5a6905b8c0987a3f5652dad3870516cdba1867f065ab918f3f4ab3bd0a2224913d
-
Filesize
188KB
MD55e69c04b3ee0c69e1a6d2261712d3d6f
SHA11021f42a1ab6caddca5bc3957ec5eabbbcbe2aa3
SHA25683f5933ee77eff478acbd5ab96b4689b2c68ff4acca58a96fe97307da2c4cd6a
SHA512fd744b41a68b1537719a4fccf782314f8a4bbd210a50c2507fcba024af34fe64c62ee9fbab6bfbe8ff4172bd0f4fcdb8197604133166107fadb7afd997c0aebc
-
Filesize
188KB
MD5b6b2d6afb212e2978b1c175d5d272aa4
SHA11c3e67e91edf60741201dd46985b21ef0a8cbc4c
SHA256a80b48bb3863817a5710551f2406f8a606bb551c23d0756e583473751e101781
SHA512e4ddbde9c5e621cda9783da5f8f10973e495b4f61249fe655ceb82c74ff6e2a01d50baccffe35131f239cfb2873a38fe3045313a086fd2b424516815c14066e5
-
Filesize
188KB
MD5390c18a9ae65f02fb5ca6a300355e0cb
SHA1621fd35dc1f1665b3f9382de18285b51c6c83677
SHA256e3b2762e71b7861321c3556e7e8e22cafc47facdfbdd6a8b09d7b5458cddad24
SHA512d4f66a1e06afd916e90260fb4ecc29db1cd16d892b279587f92ce41b1ea4fcace8b9f3a470ad39ff99f7476757c5495f7c65a53b6564b076de94ae13c82f7a25
-
Filesize
188KB
MD5b9645d22e38f00db99b787ef29cadd6a
SHA1f3dbf734f0ca1df7f998fc33f8baa70ed8f9ae96
SHA2567aed9ebe6a5828dc63294a77568cd23a2095764b24ca5298eed4b1d4cf0b570d
SHA51290474cf1f7697bdc8299de1d362aad3f9f2eb98f3c85ef167e6d2fda60b6a5b65277b17cb05812e80f4caaf970b6257618a3e748ec5de4a363ae8b97789f8579
-
Filesize
188KB
MD5ed0a9c671e026f0987a9a38df2a220e4
SHA10b60eeab68f5d82ee2a4bf17c82e58ba98d629fe
SHA2562dc9bb1a6c6a2a53e3a714bf47cd7ca9bf572d667bf6a3002c3f46313a1309eb
SHA512470ae30657c1e570dbcdc19316c88636c335ae8019488118253fe0ce6bf72fe456a59385c043e5776f3c5852053f4f8e1398fd505bc9f4fd28ed261ca3eeb765
-
Filesize
188KB
MD56ef8a0c99aacf07b0108dd8aed4ea1e9
SHA1812543663d9c559887208a19dae6fb7bb0d8f7ea
SHA256f71b4df1cdf9f9476786d2d60f8249d5f43a4664fafc176f061f356dab3d6ff2
SHA512c6735dca65c4574e919902f2654f0e96a1b73d8e078bba828225b97a042e831a4a4b2d067aa308e3365f6dcfa68e66465c138e675749f560800c6291fc856345
-
Filesize
188KB
MD578b8e2794aec08598e771c2559f2f066
SHA173422d4a1aeb93e88e2af51a096eac5ab87e3b4a
SHA256757165deadb61107d76b2d5995f6cf3782279ab4c1eb05d4631d163780a7e9a0
SHA5123e0ed84b86866f2e68f4931bd7bd56eb4f093b7043ea2470629a2f15601148ef1cc532f0c8456764a59546a86aedcdcffa55e56a8f4e53ee4b71815746b6666b
-
Filesize
188KB
MD53746be97e69692f5e434501868e99f67
SHA101d8292349a49bde4d45e5f427d4ca7b3037734d
SHA256b8250537dcd59e52985df6828b1a25e84faeb7aff9724c841758a3939d42d695
SHA51232a1b48ec7cb5251c06488b16ea68a842f75903dd26ff20759055687c7b42a3a6dfcb424ffb3b162da9aad362583647771b5af66409fa5fa3e5bd59e7ff9b667
-
Filesize
188KB
MD573cd26395bf3176fe8576c5ca3c42cce
SHA1a6c1650e5c79669702b8203ec7cd8a90643ead89
SHA256207a5cdc5cfd2586462e82d89e60cc902f92263010e8d914d4a1e172b677d523
SHA512f732d80b1c9640f6d53b730bf8043b911a825dcbaaddf348c5c8947827b5dbe3d6b949d0a4b2243105818ba232338b250156c26d27d67b48ff19c9a96aa9ece7
-
Filesize
188KB
MD5619e3e8d6fc02339cf1101aadf126e25
SHA1e50569e38a0b4e27ce47c047ac5f4a1326bc3859
SHA256ed48ebf42b3a654f226b139513cd3d92e41674b9486a4240b3bf48d1ac899fb4
SHA512642912505449b0022aef6474938dfc7c2813f09c963111d76f5fb4ea648b15891c2e8fdffbc4193bf034c2978ca5ca51852bcb033df647a38874ade80bb71398
-
Filesize
188KB
MD5c4ce493d57bd0520b253afaac9f62944
SHA118dc4f56126822814bd1d7ee7047e4807fc1dec9
SHA2564233fe688f02815a77814e563bb6ad1438b81d9aaa8ab37ea416ef4f239deb4c
SHA512cc25c5ca3715251969a8f264b93dda19d3a5e5f63d851ab6666066e206c556ba7d83646eca9147d31318a08e8564158c8b6b20aa1adcf9955d4734b8de32397e
-
Filesize
188KB
MD58f8855b85ec4aa2880d6db9a8b5a072e
SHA1434d04fb7192ed4f136bc2479858382ea5ac5110
SHA256d8b00b2d46ee0fd83399681cb53f8f9465382c8d114b66aac50881d044cc1056
SHA512e5eca49686ba7c112d4ba9e325f8073b4aee7e9fbb70d87e6f2fac751ac0350a566db8b6a1b6f441cf762bebce9cf75882e43becf0ac39bdadc40a73cdcd6506
-
Filesize
188KB
MD54e86f5bdf7831e012364ee4fe9576648
SHA11eb2e20614e21f95df55cdacc44d0182d266e096
SHA25656023e2fbc3fea8337eca7104454d0cf698c292d9bc6a939efe688e76f0226f6
SHA51298b0a3bc43464766f1bc6357d402a6c53d5712cabf81bb427aad095b64ce81d7e6de1f06bf3be3d6a1d78180437e4fd10641a2bb07e249ba17cdb20b6f101441
-
Filesize
188KB
MD5c402ebce208d3c096ced4707311fd2e2
SHA124c032ccc4dcf2bfbb69ab63d3d1c11f3f8993cb
SHA256e25574988b4a94162086e24b35847fcbefc5060be3445d42d6c4e832399d5a4e
SHA51265c40d4cbb88515285fcef7db26a1f873798d584cbff741a6ef262ecc2a23b8180377224ecf13de59230bd5a488f24c6d89404d7180b060f29f76467fd49af85
-
Filesize
188KB
MD5c665d999e5f747a68bc8c3c7fcd697ac
SHA1fe7ae8434a48a09a6fe456c54d2076525dad5dc1
SHA2560679dbbccbd28338f451ff0d1ec8ea5e9426020d6dc3aab84401514fa028afd8
SHA5128aa6ffb0ef79eb768ad5a1cc675c1efb614b20eeb747f15076667f6dd2ffed97705f35cb6757f79c7288c855ce61b86f72eefd18a55483ee1b27f7a289dbde49
-
Filesize
188KB
MD59c797ca0f903dd6d4faa1c3042fc63b9
SHA117ca57254a2eb83b26a4053aad9a02d793724670
SHA2567070cd1c9ff9250508271f11218c84086f15e648c570bc63516553b486c760e0
SHA51262f00aa5f800a8ab826d883b3c2357face936a12f2495cf9959c2cc006037b64238d82e1781ad541c764d54e84905e5419ff701a36ae43a7b37dc75d37ac6d75
-
Filesize
188KB
MD595e9933300a95d9c9e99c19d9d299f88
SHA11fb48e48210f36f89ca91e18e1ea4cab39d51304
SHA2567154e34b961e61e0e2b5e304da27b751ec16a6204b013d98d993ed7cbb9f8ba6
SHA512edcc1217276d30f1be809278175cedc9fd4b26e82be6d33d06013970146ba209e16315551aaa6c5ab038bc64bd0480d9ab4af379906047dd01e4a16df5647ead
-
Filesize
188KB
MD5de787c7099d39b538cf150ed0b6d6a54
SHA1e723f185a36b3498518e298eac27d6fe2b44b273
SHA256a4a4d6e00107d4d9664d9142ab1bc45e682c6293d5eb28044e40b3c24a54da61
SHA51289810d501f51fb2b5dc8f95d5d87ef54c1bf5f46010342d54487671c4875f32e44c5f1edeb4f22f099f931ab79fc15ee310fd98c238d6c0ccf67f2c00eae2871
-
Filesize
188KB
MD569101f461847656cb25a660e0c9da26a
SHA1d05316dfb6ba928a6f41872bbe760a352897bd01
SHA256ca17ab9994dae2cb4741f701b6890d1c9beac4b9fd09992f44d111089aab2da0
SHA512887474854c3685f8dcb0916cce2c3f5acff22a3d54bea5c573033aed1674da3e3e8a093f652b8e3a2d873fff86b926c669abbc99c4c713924c90a9abbddba5c6
-
Filesize
188KB
MD579ec43d0fd6c4ed69acde843770eb350
SHA151bc50f4a8b469e7ca40b2b3768b55e97bc8b970
SHA256393409f03e2c58dc06bab4fd4a478b91877bf14e13d334a4f84f65b9ff88bbb1
SHA512b483a6a88c829e05822e350311cd101288f258826a93c5ca69282bceb13e6ac1dc2b0f3fb51f99f1504aaf2895be7812124ebf91da7a198318e90c00b96abcd8
-
Filesize
188KB
MD59cd46a7e41e28fcb23f0c695f58e92be
SHA19b5a619affd42959514e83f0b596fd08778c9a41
SHA25641433efc2d13cc8f7f906816b4b568bb59fecfba6cd9376bbfc37db7e5306959
SHA51215b221c93f2a06d0763a30e78cde3382a8e73a8cd1ebccaddfe81f20b6ff40a0c0c6ad787ea2ebce5f4f9f709145dcd81cbe6b084e056801c8c3e927ef2a28ed
-
Filesize
188KB
MD5f7fa7877db5964084be1d040476038b0
SHA165b23fe836305825b61f09e47d5fc3ec9b0e2bfe
SHA2561973b885f50b14abf2bff0c4bff460cdbaedcba1c15a507fd4cd49e4292445bf
SHA5122daf2a4e982f09c7d5ea263757ecc916fb6f9aa6ea32c7199c0fcca93f8065cdc09c99594123f9a24fbc4530b1d011089ee8659137eddda27db8c95f3153e4c3
-
Filesize
188KB
MD5b260c2b9775779b077e0f335ae18ba89
SHA17622b7eeda15ca01f45426e5198cf11ef0aa4f42
SHA256d6591c6ef55d6580514e4792f64715136ae8ad8449f17782da4eae67314cb1c0
SHA512eb33cc755b9522733b01b20c5ba98366629f908f653fa2b90f08bef3a68ccd90610cf943df234cce6a72095da93329ad50e81d104eafceba15c6118fb12b090e
-
Filesize
188KB
MD5c3b80cc14883c31392e0a804dfa9ad04
SHA12d4748ce67b5d7ce2d5eb3b17339cb89bc671ba8
SHA256eb497b9835ac36669aee3dcd491a8f521124e24cc8afc7ec46be127f58c6561b
SHA512e6b811825feee5afba8a7de76bcc1485351f66be2e1dc2ee57498d92d80f3268cf66b1d3acddc7f1f136fa8d198694df84816b77776f502eee6de4ec3f189b02