Analysis
-
max time kernel
48s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe
-
Size
192KB
-
MD5
bfff0b4ef5263541283a6a947dcbdccb
-
SHA1
1bc746cff432ff9a536c38990636ce7ac9054934
-
SHA256
38714ae0bde0d7d85c69de042d1b62b91053dbf8733c00e748dec5414ddf78fe
-
SHA512
e953b7697550063c7dc90e99190d3bbf6820f229ac3e2ab7b3cbf46a1b89ee680eb7d20bc17038e47b93047c98e0c8d444c936a0790c808298adcdf08eced315
-
SSDEEP
3072:yvmZoPOyk9wQMOjG8Q9+sJOzih+eMjefzDtxJJExZNlHtpFm:yv0okeQMd8g+sJAL0xeNlHtpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2900 Unicorn-34563.exe 2628 Unicorn-18310.exe 2536 Unicorn-41422.exe 2876 Unicorn-39882.exe 2460 Unicorn-29253.exe 2484 Unicorn-35798.exe 1656 Unicorn-27677.exe 1388 Unicorn-46706.exe 2316 Unicorn-35845.exe 2304 Unicorn-54874.exe 280 Unicorn-31761.exe 108 Unicorn-19592.exe 888 Unicorn-30452.exe 3000 Unicorn-23676.exe 2008 Unicorn-31844.exe 2396 Unicorn-24230.exe 1004 Unicorn-48180.exe 588 Unicorn-52264.exe 3048 Unicorn-41334.exe 2596 Unicorn-24828.exe 3064 Unicorn-60193.exe 1480 Unicorn-4983.exe 1304 Unicorn-43878.exe 2752 Unicorn-52046.exe 2796 Unicorn-44433.exe 1964 Unicorn-55061.exe 2992 Unicorn-50977.exe 1692 Unicorn-5860.exe 2888 Unicorn-51532.exe 2700 Unicorn-62160.exe 2344 Unicorn-7484.exe 2552 Unicorn-51553.exe 2164 Unicorn-43940.exe 328 Unicorn-37163.exe 2728 Unicorn-62435.exe 2584 Unicorn-20011.exe 2476 Unicorn-35793.exe 2836 Unicorn-54822.exe 1744 Unicorn-25487.exe 1572 Unicorn-62243.exe 1476 Unicorn-47853.exe 2360 Unicorn-32071.exe 1440 Unicorn-51937.exe 2332 Unicorn-33463.exe 1776 Unicorn-33463.exe 548 Unicorn-52492.exe 1820 Unicorn-58735.exe 2292 Unicorn-38869.exe 1236 Unicorn-63374.exe 1268 Unicorn-55206.exe 2064 Unicorn-18532.exe 532 Unicorn-32267.exe 1124 Unicorn-18532.exe 572 Unicorn-32267.exe 2148 Unicorn-18532.exe 2012 Unicorn-58818.exe 476 Unicorn-38398.exe 656 Unicorn-38398.exe 1908 Unicorn-38398.exe 704 Unicorn-38398.exe 2720 Unicorn-38398.exe 388 Unicorn-38398.exe 3068 Unicorn-28092.exe 2908 Unicorn-38398.exe -
Loads dropped DLL 64 IoCs
pid Process 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 2900 Unicorn-34563.exe 2900 Unicorn-34563.exe 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 2628 Unicorn-18310.exe 2900 Unicorn-34563.exe 2628 Unicorn-18310.exe 2900 Unicorn-34563.exe 2536 Unicorn-41422.exe 2536 Unicorn-41422.exe 2876 Unicorn-39882.exe 2876 Unicorn-39882.exe 2628 Unicorn-18310.exe 2628 Unicorn-18310.exe 2460 Unicorn-29253.exe 2460 Unicorn-29253.exe 2536 Unicorn-41422.exe 2536 Unicorn-41422.exe 2484 Unicorn-35798.exe 2484 Unicorn-35798.exe 1656 Unicorn-27677.exe 1656 Unicorn-27677.exe 2876 Unicorn-39882.exe 2876 Unicorn-39882.exe 1388 Unicorn-46706.exe 1388 Unicorn-46706.exe 2316 Unicorn-35845.exe 2316 Unicorn-35845.exe 2460 Unicorn-29253.exe 2460 Unicorn-29253.exe 2304 Unicorn-54874.exe 2304 Unicorn-54874.exe 280 Unicorn-31761.exe 280 Unicorn-31761.exe 2484 Unicorn-35798.exe 2484 Unicorn-35798.exe 108 Unicorn-19592.exe 108 Unicorn-19592.exe 1656 Unicorn-27677.exe 1656 Unicorn-27677.exe 888 Unicorn-30452.exe 888 Unicorn-30452.exe 1004 Unicorn-48180.exe 1004 Unicorn-48180.exe 2396 Unicorn-24230.exe 280 Unicorn-31761.exe 2396 Unicorn-24230.exe 280 Unicorn-31761.exe 2008 Unicorn-31844.exe 2008 Unicorn-31844.exe 588 Unicorn-52264.exe 588 Unicorn-52264.exe 2304 Unicorn-54874.exe 3000 Unicorn-23676.exe 3000 Unicorn-23676.exe 2304 Unicorn-54874.exe 3048 Unicorn-41334.exe 3048 Unicorn-41334.exe 1388 Unicorn-46706.exe 1388 Unicorn-46706.exe 2596 Unicorn-24828.exe 2596 Unicorn-24828.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2140 1572 WerFault.exe 67 2620 2360 WerFault.exe 69 2724 3060 WerFault.exe 110 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 2900 Unicorn-34563.exe 2628 Unicorn-18310.exe 2536 Unicorn-41422.exe 2876 Unicorn-39882.exe 2460 Unicorn-29253.exe 2484 Unicorn-35798.exe 1656 Unicorn-27677.exe 1388 Unicorn-46706.exe 2316 Unicorn-35845.exe 2304 Unicorn-54874.exe 280 Unicorn-31761.exe 108 Unicorn-19592.exe 888 Unicorn-30452.exe 3000 Unicorn-23676.exe 2008 Unicorn-31844.exe 2396 Unicorn-24230.exe 1004 Unicorn-48180.exe 588 Unicorn-52264.exe 3048 Unicorn-41334.exe 2596 Unicorn-24828.exe 3064 Unicorn-60193.exe 1480 Unicorn-4983.exe 1304 Unicorn-43878.exe 2796 Unicorn-44433.exe 2752 Unicorn-52046.exe 2992 Unicorn-50977.exe 2700 Unicorn-62160.exe 2888 Unicorn-51532.exe 1964 Unicorn-55061.exe 1692 Unicorn-5860.exe 2344 Unicorn-7484.exe 2552 Unicorn-51553.exe 2164 Unicorn-43940.exe 328 Unicorn-37163.exe 2728 Unicorn-62435.exe 2584 Unicorn-20011.exe 2836 Unicorn-54822.exe 2476 Unicorn-35793.exe 1744 Unicorn-25487.exe 1572 Unicorn-62243.exe 1476 Unicorn-47853.exe 1440 Unicorn-51937.exe 2360 Unicorn-32071.exe 548 Unicorn-52492.exe 2332 Unicorn-33463.exe 1776 Unicorn-33463.exe 2292 Unicorn-38869.exe 1268 Unicorn-55206.exe 1820 Unicorn-58735.exe 1236 Unicorn-63374.exe 572 Unicorn-32267.exe 2064 Unicorn-18532.exe 1124 Unicorn-18532.exe 2196 Unicorn-49643.exe 532 Unicorn-32267.exe 2148 Unicorn-18532.exe 1908 Unicorn-38398.exe 2908 Unicorn-38398.exe 656 Unicorn-38398.exe 2012 Unicorn-58818.exe 476 Unicorn-38398.exe 1720 Unicorn-24562.exe 704 Unicorn-38398.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2900 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2900 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2900 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 28 PID 2748 wrote to memory of 2900 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 28 PID 2900 wrote to memory of 2628 2900 Unicorn-34563.exe 29 PID 2900 wrote to memory of 2628 2900 Unicorn-34563.exe 29 PID 2900 wrote to memory of 2628 2900 Unicorn-34563.exe 29 PID 2900 wrote to memory of 2628 2900 Unicorn-34563.exe 29 PID 2748 wrote to memory of 2536 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2536 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2536 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2536 2748 bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2876 2628 Unicorn-18310.exe 31 PID 2628 wrote to memory of 2876 2628 Unicorn-18310.exe 31 PID 2628 wrote to memory of 2876 2628 Unicorn-18310.exe 31 PID 2628 wrote to memory of 2876 2628 Unicorn-18310.exe 31 PID 2900 wrote to memory of 2460 2900 Unicorn-34563.exe 32 PID 2900 wrote to memory of 2460 2900 Unicorn-34563.exe 32 PID 2900 wrote to memory of 2460 2900 Unicorn-34563.exe 32 PID 2900 wrote to memory of 2460 2900 Unicorn-34563.exe 32 PID 2536 wrote to memory of 2484 2536 Unicorn-41422.exe 33 PID 2536 wrote to memory of 2484 2536 Unicorn-41422.exe 33 PID 2536 wrote to memory of 2484 2536 Unicorn-41422.exe 33 PID 2536 wrote to memory of 2484 2536 Unicorn-41422.exe 33 PID 2876 wrote to memory of 1656 2876 Unicorn-39882.exe 34 PID 2876 wrote to memory of 1656 2876 Unicorn-39882.exe 34 PID 2876 wrote to memory of 1656 2876 Unicorn-39882.exe 34 PID 2876 wrote to memory of 1656 2876 Unicorn-39882.exe 34 PID 2628 wrote to memory of 1388 2628 Unicorn-18310.exe 35 PID 2628 wrote to memory of 1388 2628 Unicorn-18310.exe 35 PID 2628 wrote to memory of 1388 2628 Unicorn-18310.exe 35 PID 2628 wrote to memory of 1388 2628 Unicorn-18310.exe 35 PID 2460 wrote to memory of 2316 2460 Unicorn-29253.exe 36 PID 2460 wrote to memory of 2316 2460 Unicorn-29253.exe 36 PID 2460 wrote to memory of 2316 2460 Unicorn-29253.exe 36 PID 2460 wrote to memory of 2316 2460 Unicorn-29253.exe 36 PID 2536 wrote to memory of 2304 2536 Unicorn-41422.exe 37 PID 2536 wrote to memory of 2304 2536 Unicorn-41422.exe 37 PID 2536 wrote to memory of 2304 2536 Unicorn-41422.exe 37 PID 2536 wrote to memory of 2304 2536 Unicorn-41422.exe 37 PID 2484 wrote to memory of 280 2484 Unicorn-35798.exe 38 PID 2484 wrote to memory of 280 2484 Unicorn-35798.exe 38 PID 2484 wrote to memory of 280 2484 Unicorn-35798.exe 38 PID 2484 wrote to memory of 280 2484 Unicorn-35798.exe 38 PID 1656 wrote to memory of 108 1656 Unicorn-27677.exe 39 PID 1656 wrote to memory of 108 1656 Unicorn-27677.exe 39 PID 1656 wrote to memory of 108 1656 Unicorn-27677.exe 39 PID 1656 wrote to memory of 108 1656 Unicorn-27677.exe 39 PID 2876 wrote to memory of 888 2876 Unicorn-39882.exe 40 PID 2876 wrote to memory of 888 2876 Unicorn-39882.exe 40 PID 2876 wrote to memory of 888 2876 Unicorn-39882.exe 40 PID 2876 wrote to memory of 888 2876 Unicorn-39882.exe 40 PID 1388 wrote to memory of 3000 1388 Unicorn-46706.exe 41 PID 1388 wrote to memory of 3000 1388 Unicorn-46706.exe 41 PID 1388 wrote to memory of 3000 1388 Unicorn-46706.exe 41 PID 1388 wrote to memory of 3000 1388 Unicorn-46706.exe 41 PID 2316 wrote to memory of 2008 2316 Unicorn-35845.exe 42 PID 2316 wrote to memory of 2008 2316 Unicorn-35845.exe 42 PID 2316 wrote to memory of 2008 2316 Unicorn-35845.exe 42 PID 2316 wrote to memory of 2008 2316 Unicorn-35845.exe 42 PID 2460 wrote to memory of 2396 2460 Unicorn-29253.exe 43 PID 2460 wrote to memory of 2396 2460 Unicorn-29253.exe 43 PID 2460 wrote to memory of 2396 2460 Unicorn-29253.exe 43 PID 2460 wrote to memory of 2396 2460 Unicorn-29253.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfff0b4ef5263541283a6a947dcbdccb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34563.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18310.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39882.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27677.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19592.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24828.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51553.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51932.exe10⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65035.exe11⤵PID:292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26695.exe10⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exe11⤵PID:1952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18532.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24029.exe9⤵PID:1424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43940.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe8⤵
- Executes dropped EXE
PID:388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60193.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37163.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41626.exe9⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6919.exe10⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32426.exe11⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62135.exe12⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62631.exe13⤵PID:1500
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18532.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29675.exe8⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44340.exe9⤵PID:340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31272.exe8⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51268.exe9⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45062.exe10⤵PID:2652
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30452.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4983.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62435.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58818.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51548.exe9⤵PID:2396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65403.exe7⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12326.exe8⤵PID:1976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20011.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe7⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36726.exe8⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50453.exe9⤵PID:2576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32267.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17122.exe7⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41299.exe8⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exe9⤵PID:1340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52591.exe8⤵PID:1260
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46706.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23676.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5860.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47853.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10816.exe9⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8543.exe10⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7749.exe11⤵PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62321.exe10⤵PID:1144
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32071.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 2407⤵
- Program crash
PID:2620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7484.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33463.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1257.exe7⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exe8⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3499.exe9⤵PID:240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47033.exe8⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exe9⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47854.exe10⤵PID:1440
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49643.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61963.exe7⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 1888⤵
- Program crash
PID:2724
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29253.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35845.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31844.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55061.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33463.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38869.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51034.exe7⤵PID:1568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24230.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52046.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51937.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28092.exe7⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44423.exe8⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31377.exe9⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11538.exe10⤵PID:3044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45253.exe8⤵PID:996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24562.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51548.exe7⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20412.exe8⤵PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47609.exe7⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51268.exe8⤵PID:2480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52492.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30422.exe6⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17231.exe7⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22358.exe8⤵PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22912.exe7⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17179.exe8⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59405.exe9⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21212.exe10⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43560.exe11⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46461.exe12⤵PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41422.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35798.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31761.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48180.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43878.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35793.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37459.exe9⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52700.exe10⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exe11⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27906.exe12⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2309.exe13⤵PID:2236
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32834.exe9⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65118.exe10⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45420.exe11⤵PID:2432
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18532.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53494.exe8⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64480.exe9⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37439.exe10⤵PID:2732
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54822.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38398.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53411.exe8⤵PID:1632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32267.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38035.exe7⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39161.exe8⤵PID:1028
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44433.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25487.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51034.exe7⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51657.exe8⤵PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44044.exe7⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52700.exe8⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37001.exe8⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51268.exe9⤵PID:2952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16778.exe6⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4869.exe7⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5829.exe8⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10956.exe9⤵PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11511.exe8⤵PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24557.exe7⤵PID:1972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41334.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62160.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58735.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36644.exe7⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56125.exe8⤵PID:2304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37198.exe6⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47464.exe7⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2814.exe8⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6919.exe9⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4198.exe10⤵PID:328
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48486.exe7⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55544.exe8⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35585.exe9⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25505.exe10⤵PID:1080
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55206.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3971.exe6⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32834.exe7⤵PID:1536
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54874.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52264.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50977.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8226.exe6⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exe7⤵PID:880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63374.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57064.exe6⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19369.exe7⤵PID:2608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51532.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62243.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 2006⤵
- Program crash
PID:2140
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5a00c113ae25775310e818d0f784f204c
SHA1dc226969911bb9d87c79a1055cdeb0b890a2a7f0
SHA25611925bdf9edde023a563eb2957c18dabbcac34fd1117cde95d744655f4c962c1
SHA51238dfab2a74b0cee41d625add6058521e56e8829d3b4b7b6a351fc736b9ca4ea20166842aefcf490844def5bbb9d3c3277d16c3528a9af65db4c806c033179434
-
Filesize
192KB
MD59b08c4e001ca7532550ab5c0b4fb0930
SHA11fbd6e48e955f1ee683e3eb6391baaa4f6efc345
SHA2560e8ac0ba64097659a1c66b87d553f6bd90eb739079b6948be746c95ab43fa2f3
SHA5122b23557126cb1859ed15270143fcb97f38a807124258e0fdd219b0d54a2f6e2efe5b90acd24381466c1cc8dadc6c85583befa4f250d3fedcc9acd346d247f1b5
-
Filesize
192KB
MD54826c32d34ee10fee1288245a618d72d
SHA1febacf15f546b234a6ce644cf4892b7805d6f06e
SHA25639a4e4f01f817314d76480e37dfba77e26c3501b7ef9f924883bc90729f7d508
SHA512b863ab8415963b31c5792cf897f722e5d9e249451feb60e9ae20f72301c6b6f31341e1d646fd78fbc7c3f5c2bcefd3f84b4bc735d66a009029ab98b1a899d8fe
-
Filesize
192KB
MD585bc2fe5dcba9f4a20272e226ad72fef
SHA1728b323aac97de3b5f3d4d6789ded56accc14f3a
SHA256f8796c27733a2df7c1f9d84b6ab6e906e08f2f54fa16ad0ddefb2a92b8ea8b74
SHA5128994ecf3d38938cad7217e7fc6c6475cc8f0bd1485dd1ba32160a9ec2ec42e346e1251746f0909e03c60e2b480a3f51e397b76811e65072977f340d5882191b9
-
Filesize
192KB
MD56de5cfa340b35859cb1f765ce52e4c12
SHA19c4fc927645c4c4ad9cc78a95d3197ef2774b614
SHA25636d513b65df77d262b4b199b5a0d8e0f2d59bf38879a2e41aa4685a42e2d9684
SHA512d7f8d8856324e49a329032ccf3e23d86d1c0c1a3aa2696e922ba6ecf6231d667e99fad99dc10beb2b66031e6f8781e986444b56ac645e33223e7620d6ac8f59d
-
Filesize
192KB
MD58a4ae4bd9c6f12e41c350c4d760cefc1
SHA157fe327758688bf207a733a9fafed153b11be179
SHA25694fb37721112a5df4b591e4b10f70f55c8de21640f6a04d353fe6501e0190253
SHA51208c89f8f9e9a1d804a739688406f5ace5c3429816454fb77e4058ea4ad5ff1e5c420e2bd3a65b4dcab9f3f6ac53decf46577a75b2e40057454b46a5d74ba4f4a
-
Filesize
192KB
MD50a660d40e1c6019e0ff36f4759bb6f0b
SHA1305691e15b6d7280de8e5b822e1716f9a44a564e
SHA256bdd18dc09edbed5238793681ccb69d36ac467710ba0865e527d7fc7b02b6a70c
SHA5126984b2c8d7dc6160323ced4218f8442a945efb02998610207e01043c3ebf8e62ce9fad594e002dfac67ee3da202bceaeadb76b793ed90bcae151c9fd5fe92d7b
-
Filesize
192KB
MD507e7777d92b30f09233d11fea98d1f26
SHA1b8cca92be831afb98cc9d12a1f48d2c55e2f4145
SHA2562e5aa48f6847479f9c7b6f22f9d0aeeb227346768c0849ca530c519f094c7571
SHA5125d55394cbfb64ce55863528abc409ba0ba71499374cd44743f1d2d3a37968092cb8f2a13347b60a75a87af9c0d26a2a11395270934e494b99cbb154bb128ac6d
-
Filesize
192KB
MD5a3a1c78eb64c50ece6910d6911c80242
SHA1e60178fc1a9b6278dac2629b1cad314e5f68a6d8
SHA25649cecd4ad1c98060665c652a317a3d700aa2639f039ef22758022d50c0bd6497
SHA512a6b4676842dda5fc41d675bf5554b47f2eae367468fe67d0a6d7bd92aa42871f99ca24301f219059f78a3ce590649cdc13790d61797bbf5b15fcebe851a23ef3
-
Filesize
192KB
MD52a3bf207896eb8b3e66a829c775a7db7
SHA1f5d38c3ee9e4edb5f8ecbe987cc3bf219f1d8c26
SHA25674d3d8bc3575207a762b2a1e0ceab343d8147c2b1be5b095bc7c0a4db6e0e444
SHA5127b94533de9f4ec0fd25ad9ccc95b41692d7d102208119b802e32c6747dd6a4662ac3f1aecae226ff70704f97cfcd1009e69b7b7636dd8cce5b744a6b0d7dc30d
-
Filesize
192KB
MD59e6d4f05f0c75330134dd11a7a7b48f2
SHA13ac79e26dda62de290096321bf372f35dc7b20a6
SHA256a16542b5788bb4a1180c7daedcbb9de1d844cd91a8ae3e892c5202f3a4eef79b
SHA51226f242879cc3b129585464aeff27b046f70e25c2de318dcdca9ac8c5ff8f6bde3dd347708f99dacc02d0cc02a879ee1388bc9f5bfb4aacecf3bef4a32368f5ec
-
Filesize
192KB
MD5bacbdbf0339c1b1cc6b71d97a3b40249
SHA13c52b231a553084913f7b945d1350c4fd2a186b0
SHA2560df3e8e93b11a8147073983667be7d59a38c699ac09daf1bc6654ec5c249e902
SHA512279e46f5107feedf2987da52f8f218b908eb379fcbc606c94770f76f365112f779ce6b21827ddb9aa424bac24c527a8f568f6f31d554b4fc3175a08e0ba8cba9
-
Filesize
192KB
MD5e149f4689aa5439dc4119654836022b9
SHA1b0306f54e2ff41304229806554a2b95db297457a
SHA25668086e9ec72e58d177ec22609b5121386a21b3e7cfaa7292fc9a484c81cf2e04
SHA512a84cd2ed6b1378c30d9f225360fcac3e7d90017938650103ef7ce093572e44a1285609a314bb74ecad7318fc1ffa37d07283eeb0c2a817fd99b8150bdcd437f0
-
Filesize
192KB
MD5892d442accb54e2c08544e0289a2e41f
SHA15b634eee7f792983a2bd2162c20b24968c4a44b7
SHA256b2b5e47de3126e88c33b9d245d94acea19b8a980774fc7252772aff921e127d7
SHA51289c205cdbf90c30a0dd3942cc447b556ef08f1b175d170309c14dc7197e309fdb21c40d12609e0d9fdad2856e583b510f73b73de3dbfde6814304752f9df9614
-
Filesize
192KB
MD5c1627b51e28eebd2927866871198676a
SHA1ef0bd17eb0dcacb376233aad6eec4a5d5f809921
SHA2568db89c12ec7366f288d1a144cf44bc1d0966d2e303f2e702077bf82250abbf85
SHA5125d9ee7e1de052ca33511bb0f1f4aae2a0346b02ee294e2a9a626d9917329086bae2b166a1120a6b6cba0d7920f65460d0cd028f67949aeb5a3ff122ace5fe417
-
Filesize
192KB
MD56fa3bd2344d44c6a4587c6b39b251db9
SHA16d7e38c0eaa1bc62f0aea25c53064bd310627313
SHA256b02b3cef67e970efc0f676b7b31c6d587b036b1fa24adc14724adc40c9863686
SHA512faa2a35e6c17f17b6dce8768c88b81ffcedf6dc80ee365eda65f823a30a1f211c7e9e1f3365a3d8a27320b4c72c6bee17c4a2660f5c83bd009f2b3af0554ab0c
-
Filesize
192KB
MD5e1fefb9d2c52cb8fdd8446987fcd40e6
SHA1e0a5bc03c1d2f8e4820531b0693f21627f3e9059
SHA256eb8356f372b4b846e0a956ab194db86fd9bcfbf348e82f1262c63493224f0840
SHA5127f857de844e1581af172440091c323aff0742902f59573f2aa18503946a7ed8f23e60fc607ca7c0afadfca05d86eb52269ed4102c898f6007f3ac69522be1344
-
Filesize
192KB
MD5d1383ecf5632541717f0e3579c49024e
SHA166f7d43d5002cbc44a2e41e10562befbd3483f92
SHA2568f1a6ac3eca6d9d5a500c541e91a88630c45deb73ebd3b0bcc774c71d92bf3a1
SHA512236ab5ab180b9a8a5be7220dd6f79e73f4cf359026d7571ac680cad4621466bed2f1e148fe50aa565fbd41746338fc8efc282319c00adb15d801a38b9fa8425b
-
Filesize
192KB
MD57d79a8310c9bd66a9d5a197828b6fb0d
SHA10dea55a084ea946e147d65eac9b6bc9652a6246f
SHA2566a9c114159de5bf915c1007a54bb4559691a3d7469eb8d296cde880732ed4634
SHA5120078de1d141eaf18b7779dbb11d8734293fdb678f22319f0a109484f61ab2fecfaa956d69e2a440195772e9d1dcb842d6733e210a5e4da1c8c6a8350c7199cff
-
Filesize
192KB
MD5a02c11ebc51aef88d83feee2104820b0
SHA15f0d857953d0451f0549203f3cfb9ab85562bd20
SHA2564c5ee69f180b2cc6241d5a722bc1ee00d612563e8f9e8d892f195d026f41202d
SHA512953ab13c96c804a8e3e3e409e6a8e43054883689e06b29783221f84a1f7ae682f6139ed0f4d3f4ae6eabbcab21da8eaea9bd6a1aa14cd71935134b3f661b522f