Analysis
-
max time kernel
34s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe
-
Size
188KB
-
MD5
e834fa8b7d0a371a02a93d816dabab0d
-
SHA1
440e97d05cb080d182a9e93659115711e014bcac
-
SHA256
ea4e6117738867a230c28f47e23a70f614c5066f0908aaf5e4013fae4ed014ce
-
SHA512
c57d4676bfb251e647abfd1af32d637225532d7d45c53ed2c388d88843ef4c40d33ffd78d1889b143ed85603f56d947dfe77495cd03c7ee2dd363e48714c05cb
-
SSDEEP
3072:odW3omjtqPwQ1Hj68Bt95UReDU+M4pfv0lx3vEr8dlv1pFy:odeoP4Q1G8j95UWF8zdlv1pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2724 Unicorn-31464.exe 2612 Unicorn-36700.exe 2628 Unicorn-16834.exe 2076 Unicorn-6056.exe 2532 Unicorn-18309.exe 2384 Unicorn-29169.exe 1556 Unicorn-43606.exe 384 Unicorn-63472.exe 1936 Unicorn-40914.exe 2576 Unicorn-21048.exe 2020 Unicorn-36830.exe 2704 Unicorn-46150.exe 1268 Unicorn-63254.exe 2464 Unicorn-20830.exe 684 Unicorn-36612.exe 592 Unicorn-24914.exe 1588 Unicorn-44780.exe 2060 Unicorn-38065.exe 3016 Unicorn-18199.exe 1804 Unicorn-12745.exe 2888 Unicorn-10052.exe 1064 Unicorn-26389.exe 2068 Unicorn-6523.exe 1652 Unicorn-22305.exe 2208 Unicorn-2439.exe 2184 Unicorn-60405.exe 2176 Unicorn-56321.exe 2844 Unicorn-36455.exe 2496 Unicorn-59336.exe 2624 Unicorn-37847.exe 2660 Unicorn-65044.exe 2392 Unicorn-51723.exe 2368 Unicorn-22388.exe 2588 Unicorn-14774.exe 2820 Unicorn-65366.exe 1952 Unicorn-22942.exe 2248 Unicorn-42808.exe 1232 Unicorn-7997.exe 1904 Unicorn-28370.exe 2036 Unicorn-3119.exe 1688 Unicorn-33846.exe 2700 Unicorn-44707.exe 604 Unicorn-981.exe 572 Unicorn-46653.exe 528 Unicorn-9149.exe 1792 Unicorn-43960.exe 2904 Unicorn-49990.exe 2536 Unicorn-60851.exe 3024 Unicorn-27432.exe 1292 Unicorn-38292.exe 1708 Unicorn-58158.exe 2116 Unicorn-58158.exe 964 Unicorn-36368.exe 2952 Unicorn-3482.exe 2024 Unicorn-32284.exe 2052 Unicorn-12418.exe 2008 Unicorn-19695.exe 2104 Unicorn-27863.exe 2492 Unicorn-52367.exe 2604 Unicorn-14027.exe 2372 Unicorn-33893.exe 2260 Unicorn-9943.exe 2488 Unicorn-42061.exe 1220 Unicorn-27671.exe -
Loads dropped DLL 64 IoCs
pid Process 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 2724 Unicorn-31464.exe 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 2724 Unicorn-31464.exe 2628 Unicorn-16834.exe 2628 Unicorn-16834.exe 2612 Unicorn-36700.exe 2612 Unicorn-36700.exe 2724 Unicorn-31464.exe 2724 Unicorn-31464.exe 2628 Unicorn-16834.exe 2628 Unicorn-16834.exe 2076 Unicorn-6056.exe 2076 Unicorn-6056.exe 2532 Unicorn-18309.exe 2612 Unicorn-36700.exe 2532 Unicorn-18309.exe 2612 Unicorn-36700.exe 2384 Unicorn-29169.exe 2384 Unicorn-29169.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 1556 Unicorn-43606.exe 1556 Unicorn-43606.exe 1936 Unicorn-40914.exe 1936 Unicorn-40914.exe 2532 Unicorn-18309.exe 2532 Unicorn-18309.exe 2576 Unicorn-21048.exe 2576 Unicorn-21048.exe 2384 Unicorn-29169.exe 2020 Unicorn-36830.exe 2384 Unicorn-29169.exe 2020 Unicorn-36830.exe 2704 Unicorn-46150.exe 1556 Unicorn-43606.exe 1556 Unicorn-43606.exe 2704 Unicorn-46150.exe 1200 WerFault.exe 1200 WerFault.exe 1200 WerFault.exe 1200 WerFault.exe 1200 WerFault.exe 1936 Unicorn-40914.exe 1936 Unicorn-40914.exe 2464 Unicorn-20830.exe 2464 Unicorn-20830.exe 1588 Unicorn-44780.exe 2020 Unicorn-36830.exe 2020 Unicorn-36830.exe 1588 Unicorn-44780.exe 2576 Unicorn-21048.exe 592 Unicorn-24914.exe 2576 Unicorn-21048.exe 592 Unicorn-24914.exe 3016 Unicorn-18199.exe 3016 Unicorn-18199.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2004 384 WerFault.exe 35 1200 1268 WerFault.exe 41 2892 1920 WerFault.exe 103 1784 3960 WerFault.exe 226 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 2724 Unicorn-31464.exe 2628 Unicorn-16834.exe 2612 Unicorn-36700.exe 2076 Unicorn-6056.exe 2532 Unicorn-18309.exe 2384 Unicorn-29169.exe 1556 Unicorn-43606.exe 1936 Unicorn-40914.exe 2576 Unicorn-21048.exe 384 Unicorn-63472.exe 2020 Unicorn-36830.exe 2704 Unicorn-46150.exe 1268 Unicorn-63254.exe 2464 Unicorn-20830.exe 684 Unicorn-36612.exe 1588 Unicorn-44780.exe 592 Unicorn-24914.exe 3016 Unicorn-18199.exe 2060 Unicorn-38065.exe 1804 Unicorn-12745.exe 2888 Unicorn-10052.exe 1064 Unicorn-26389.exe 2068 Unicorn-6523.exe 2208 Unicorn-2439.exe 1652 Unicorn-22305.exe 2176 Unicorn-56321.exe 2844 Unicorn-36455.exe 2496 Unicorn-59336.exe 2624 Unicorn-37847.exe 2660 Unicorn-65044.exe 2392 Unicorn-51723.exe 2368 Unicorn-22388.exe 1952 Unicorn-22942.exe 2820 Unicorn-65366.exe 1232 Unicorn-7997.exe 2248 Unicorn-42808.exe 2588 Unicorn-14774.exe 2096 Unicorn-21594.exe 1904 Unicorn-28370.exe 2036 Unicorn-3119.exe 1688 Unicorn-33846.exe 2700 Unicorn-44707.exe 572 Unicorn-46653.exe 604 Unicorn-981.exe 1792 Unicorn-43960.exe 528 Unicorn-9149.exe 2904 Unicorn-49990.exe 2536 Unicorn-60851.exe 3024 Unicorn-27432.exe 1708 Unicorn-58158.exe 1292 Unicorn-38292.exe 964 Unicorn-36368.exe 2116 Unicorn-58158.exe 2952 Unicorn-3482.exe 2024 Unicorn-32284.exe 2052 Unicorn-12418.exe 2008 Unicorn-19695.exe 2668 Unicorn-46892.exe 2104 Unicorn-27863.exe 2492 Unicorn-52367.exe 2604 Unicorn-14027.exe 2372 Unicorn-33893.exe 2260 Unicorn-9943.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2724 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2724 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2724 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2724 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 28 PID 2724 wrote to memory of 2612 2724 Unicorn-31464.exe 29 PID 2724 wrote to memory of 2612 2724 Unicorn-31464.exe 29 PID 2724 wrote to memory of 2612 2724 Unicorn-31464.exe 29 PID 2724 wrote to memory of 2612 2724 Unicorn-31464.exe 29 PID 1660 wrote to memory of 2628 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 30 PID 1660 wrote to memory of 2628 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 30 PID 1660 wrote to memory of 2628 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 30 PID 1660 wrote to memory of 2628 1660 e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2076 2628 Unicorn-16834.exe 31 PID 2628 wrote to memory of 2076 2628 Unicorn-16834.exe 31 PID 2628 wrote to memory of 2076 2628 Unicorn-16834.exe 31 PID 2628 wrote to memory of 2076 2628 Unicorn-16834.exe 31 PID 2612 wrote to memory of 2532 2612 Unicorn-36700.exe 32 PID 2612 wrote to memory of 2532 2612 Unicorn-36700.exe 32 PID 2612 wrote to memory of 2532 2612 Unicorn-36700.exe 32 PID 2612 wrote to memory of 2532 2612 Unicorn-36700.exe 32 PID 2724 wrote to memory of 2384 2724 Unicorn-31464.exe 33 PID 2724 wrote to memory of 2384 2724 Unicorn-31464.exe 33 PID 2724 wrote to memory of 2384 2724 Unicorn-31464.exe 33 PID 2724 wrote to memory of 2384 2724 Unicorn-31464.exe 33 PID 2628 wrote to memory of 1556 2628 Unicorn-16834.exe 34 PID 2628 wrote to memory of 1556 2628 Unicorn-16834.exe 34 PID 2628 wrote to memory of 1556 2628 Unicorn-16834.exe 34 PID 2628 wrote to memory of 1556 2628 Unicorn-16834.exe 34 PID 2076 wrote to memory of 384 2076 Unicorn-6056.exe 35 PID 2076 wrote to memory of 384 2076 Unicorn-6056.exe 35 PID 2076 wrote to memory of 384 2076 Unicorn-6056.exe 35 PID 2076 wrote to memory of 384 2076 Unicorn-6056.exe 35 PID 2532 wrote to memory of 1936 2532 Unicorn-18309.exe 36 PID 2532 wrote to memory of 1936 2532 Unicorn-18309.exe 36 PID 2532 wrote to memory of 1936 2532 Unicorn-18309.exe 36 PID 2532 wrote to memory of 1936 2532 Unicorn-18309.exe 36 PID 2612 wrote to memory of 2576 2612 Unicorn-36700.exe 37 PID 2612 wrote to memory of 2576 2612 Unicorn-36700.exe 37 PID 2612 wrote to memory of 2576 2612 Unicorn-36700.exe 37 PID 2612 wrote to memory of 2576 2612 Unicorn-36700.exe 37 PID 2384 wrote to memory of 2020 2384 Unicorn-29169.exe 38 PID 2384 wrote to memory of 2020 2384 Unicorn-29169.exe 38 PID 2384 wrote to memory of 2020 2384 Unicorn-29169.exe 38 PID 2384 wrote to memory of 2020 2384 Unicorn-29169.exe 38 PID 384 wrote to memory of 2004 384 Unicorn-63472.exe 39 PID 384 wrote to memory of 2004 384 Unicorn-63472.exe 39 PID 384 wrote to memory of 2004 384 Unicorn-63472.exe 39 PID 384 wrote to memory of 2004 384 Unicorn-63472.exe 39 PID 1556 wrote to memory of 2704 1556 Unicorn-43606.exe 40 PID 1556 wrote to memory of 2704 1556 Unicorn-43606.exe 40 PID 1556 wrote to memory of 2704 1556 Unicorn-43606.exe 40 PID 1556 wrote to memory of 2704 1556 Unicorn-43606.exe 40 PID 1936 wrote to memory of 1268 1936 Unicorn-40914.exe 41 PID 1936 wrote to memory of 1268 1936 Unicorn-40914.exe 41 PID 1936 wrote to memory of 1268 1936 Unicorn-40914.exe 41 PID 1936 wrote to memory of 1268 1936 Unicorn-40914.exe 41 PID 2532 wrote to memory of 2464 2532 Unicorn-18309.exe 42 PID 2532 wrote to memory of 2464 2532 Unicorn-18309.exe 42 PID 2532 wrote to memory of 2464 2532 Unicorn-18309.exe 42 PID 2532 wrote to memory of 2464 2532 Unicorn-18309.exe 42 PID 2576 wrote to memory of 684 2576 Unicorn-21048.exe 43 PID 2576 wrote to memory of 684 2576 Unicorn-21048.exe 43 PID 2576 wrote to memory of 684 2576 Unicorn-21048.exe 43 PID 2576 wrote to memory of 684 2576 Unicorn-21048.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e834fa8b7d0a371a02a93d816dabab0d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31464.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36700.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18309.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40914.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63254.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 2407⤵
- Loads dropped DLL
- Program crash
PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12745.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59336.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58158.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65003.exe9⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10000.exe10⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21252.exe11⤵PID:3712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39574.exe9⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31937.exe10⤵PID:3748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41053.exe8⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17832.exe9⤵PID:1228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3482.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2739.exe8⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56833.exe9⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63486.exe10⤵PID:1696
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20830.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37847.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-981.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17365.exe9⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exe10⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe11⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49752.exe12⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48940.exe13⤵PID:3128
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14494.exe9⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe10⤵PID:2844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28225.exe8⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16462.exe9⤵PID:2704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46653.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27671.exe8⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30769.exe9⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exe10⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11708.exe11⤵PID:4028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exe9⤵PID:2092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41629.exe8⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe9⤵PID:2392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65044.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9149.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exe8⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30468.exe9⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe10⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41859.exe11⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46885.exe12⤵PID:1380
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40259.exe8⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe9⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exe10⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48940.exe11⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5816.exe12⤵PID:3168
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20057.exe7⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61002.exe8⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe9⤵PID:1064
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21048.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36612.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51723.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43960.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48091.exe8⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61578.exe9⤵PID:2340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37628.exe8⤵PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58952.exe7⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18024.exe8⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe9⤵PID:592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10000.exe8⤵PID:2628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2439.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7997.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58158.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exe8⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9123.exe9⤵PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47743.exe8⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38963.exe9⤵PID:3292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4105.exe7⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43104.exe8⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22015.exe9⤵PID:3856
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29169.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36830.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44780.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26389.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22388.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49990.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64427.exe9⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 24010⤵
- Program crash
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55527.exe9⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64484.exe10⤵PID:324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9751.exe8⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59440.exe9⤵PID:1852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60851.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exe8⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32798.exe9⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31937.exe10⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8675.exe11⤵PID:4076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43658.exe8⤵PID:1080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14774.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49414.exe7⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4209.exe8⤵PID:2000
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6523.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65366.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27432.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10410.exe8⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe9⤵PID:2696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38915.exe7⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45050.exe8⤵PID:1820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38292.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26109.exe7⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43104.exe8⤵PID:1748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53965.exe7⤵PID:1472
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24914.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22305.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42808.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32284.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11718.exe8⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51272.exe9⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49752.exe10⤵PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62133.exe8⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-753.exe9⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57069.exe10⤵PID:4092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4105.exe7⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47188.exe8⤵PID:1560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12418.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54697.exe7⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63524.exe8⤵PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25184.exe7⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exe8⤵PID:3908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36368.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3550.exe7⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36882.exe8⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52933.exe9⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33433.exe10⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 24011⤵
- Program crash
PID:1784
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30747.exe6⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1260.exe7⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exe8⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19257.exe9⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8966.exe10⤵PID:2476
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16834.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63472.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 2005⤵
- Loads dropped DLL
- Program crash
PID:2004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43606.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46150.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38065.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56321.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33846.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33893.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36991.exe9⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exe10⤵PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exe9⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10237.exe10⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28806.exe11⤵PID:3876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64188.exe8⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exe9⤵PID:2576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14027.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63633.exe8⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44318.exe9⤵PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exe8⤵PID:2352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44707.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42061.exe7⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36991.exe8⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29866.exe9⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28242.exe10⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16185.exe11⤵PID:4056
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60104.exe7⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6731.exe8⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31937.exe9⤵PID:3772
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36455.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3119.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52367.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16571.exe8⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56762.exe9⤵PID:2132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35599.exe7⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14515.exe8⤵PID:332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9943.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34853.exe7⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44318.exe8⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56934.exe9⤵PID:3652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exe7⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46384.exe8⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6589.exe9⤵PID:3540
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18199.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60405.exe5⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21594.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19695.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29015.exe8⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28906.exe9⤵PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31598.exe8⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41501.exe9⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2780.exe10⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exe11⤵PID:3360
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56212.exe7⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51464.exe8⤵PID:2672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46892.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18709.exe7⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14515.exe8⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30902.exe9⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10891.exe10⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64337.exe11⤵PID:3708
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28370.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27863.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45351.exe7⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14515.exe8⤵PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60187.exe7⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2780.exe8⤵PID:3684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe6⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8869.exe7⤵PID:2208
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD580ca4d4f40fabab03aee085655d86e3c
SHA1cc2dbaa61ba0e5fc59b91e5a755d3369f3d16d09
SHA256acf57237aca33914ee23afdfaf4f089ce909f59a8ad3b375abb1471dd3edecc4
SHA512ffc7d14607802a8e53d380a9888c97dc703a4b37a25ce5cbc021bb65176663ce62dc06deabae868e9089b5d9d3ad0ef9a571d2471b094098beb2c97fe374fcb6
-
Filesize
188KB
MD52ffbe0ceb6f34b1c4823ffe871e855ac
SHA102553587676c916e570aca689faff4b6e395434d
SHA256208f76d5f5a98590be256c5fc87bb40d32ddba976e89c701d646086da7bae9d6
SHA512742b437b8a6a6273396af5626726d9157e88b7a7669d25621c2e5514d9fcdab869f1580795d36f285ff67c98cbd4df93ade88c634f0178bdd77c29a9260f4d7d
-
Filesize
188KB
MD52d6a8c1a6ea3270423188a4c1993e1e0
SHA1b2b62f9e36ce4cff706ae9b7ab01442a83c4ea86
SHA2562e8a71e837cac400df7739626abc11e5949771ff1e1fa6fb57df06c9703e6eb1
SHA5127fd0a5ab17e64b11081ab156ca267f5c6a3ce3e3ba27e9b5bf244ba338d453210c1e36e13c232612fb1255cb44ddb918cfe9afb40482da8a5a7165534f4f7cb5
-
Filesize
188KB
MD506ea9c45df3b816471b8c7d6e64c7ffa
SHA1489bc6670e242c2c9ce4bb97e131580650fd5e30
SHA25600d7c9eb8bc85358382e05bfd6caceadfcaac05b5ca595b909498b005a6d721a
SHA512f275fdc979e8f31081611ca1e6cc6313580317796527ff238b79ea351ca3c5bedc304eb69c159882670721e3f37645691d98ff5c3e0425e8fddca981acebb5a1
-
Filesize
188KB
MD5c8abb7836fa5cd200910f94bc7687283
SHA129bf936921093563e4df5bec1d954255be5b4e50
SHA2563390be7897a6b7edef3c3c4a2f3a97d02e3337885fdc30e575616b81968b8e4e
SHA512b34e9462183b8a0b20873c411b42e7ab0c256f2a4c2c4a623b1921fbf762cdabb07594096a8b90754ebb3abd245098437d37da4123453c0162b0eaa2cdb56dbc
-
Filesize
188KB
MD5629a93dd645081e68853354e379c5d84
SHA10eafc6ebd026d2699e13bb5098a9bada584bf065
SHA256c88f4e91d4a036fdfa43a70f86e046cd0006c8dad39478ab41dcd0d6e95d947a
SHA512fa544b87e422279cb87885607d880352c9960fd196e9876e7746ff0531f4d6b9d652a1212bbdb238334b6380dba842683d3b966791f454a2f3c33c8288993420
-
Filesize
188KB
MD5f911e04eba307b2b2209af17ba25707a
SHA1f07354e88cf020793509e4fbda0ee328e0da8fc1
SHA256758d62d6d7477e5048d3b2cb0a03541c0ffbe3eedea22886a9218b27480e5225
SHA5127bea6d07675413131f602f7a627a329b4e5c9c7e51caeba70d3be771059c09984636554f792f5304e0da0274347992289555ed5a30939e2ff7740eada2184b42
-
Filesize
188KB
MD57a5d79aeabdaa107888f57702daca0be
SHA1dcd65334805ca2cb9fdc1f35ea52fb52509b940e
SHA2564740321a35a664274d52eabe895f00636040f0e3d21335e62ce42bd227536dce
SHA512d72f93bb312ee689aa54b28f0e17dc95014ebc4d83837a96a770c92827c6be61787889b419079e065aee5432508089ec023256d9b959594862c66052914d269b
-
Filesize
188KB
MD56f713404fc183f95ea4972fd6eae3040
SHA172c3d7ef96643f1f451e51c2f61555b2d93b7595
SHA256c83feacf2d5116a4e563d7607d2330f91d8514117a87d815d1412074bea8d37b
SHA5122afbcbd98e0aff23891686f0291afb973a1c872caf0d72b478c55e91c5bed19aed385066c08879feea2e46b67636949451b3e582ce24e68c42b693063ae65184
-
Filesize
188KB
MD5b57d516329f65af9c0bf03e485313bb0
SHA19c6081b8daa4f4ce33c2bebdd1f6c7d83bc7e46b
SHA2565ec49334c96e5d6a6bbf9e3afa352745f7d7bfe67ec6802753ad92238ff95316
SHA512e4a3562a3316d5d0f29b303d52bb23dcabc556657b3ba1e6f701ee8231e6eead3333b95158eb95763a1b2a6ee8ac4d4ca2e3c8eda489adc86570b2d44447ac10
-
Filesize
188KB
MD539e894cf7923549d911141d6eae4f824
SHA14b1d4d63e3450d4175873d2b77bbafe2c1a68a58
SHA256c78c19aafc080964ef01243e23bce1bfb8f120f7083c7e3a1bc9a659e4578995
SHA512f4ad1dfbadeee9d23e0b4a522291268e78effc678ca452a9b3ccc1d70c92de0ebc2d8fb73da07c731b8670253dd796fe9223381d40911dbc6ca5a91b30868d25
-
Filesize
188KB
MD5634fe25498591f1d1904b1e344f0b748
SHA10997a78f5c9254846c46774b865291331cac26ae
SHA25671bf9e7a53621a7fafe12f25c0b5608dd2684cac7606f5e962b83d84549f4c14
SHA512a46993f28cbb7f34d298d470e75ff5b6269a36444c3a025d0ad02f6207374e0b6c7c96406ead4070f66cee9cc1c895ba93aef71bea6ca053ccec45a99a1ae7a6
-
Filesize
188KB
MD5acddfc8ef9895c8ee70f7abd649d89b9
SHA1173b6a03406e1da254f53b242850e3195816d01b
SHA256dfba8c3128dc83852ef072f19bf2d42eb859debb55d262eecb01f7491fb53488
SHA5122224ce929727e1e89bc406dd38c6e98ea693e02dced5f7fda30ec113eebd14cd5c49d6d34361cf4aae84b51fbacfe34a4e872fc41a4f183e706cdc1d9f827c3d
-
Filesize
188KB
MD53d804f777339539a49a8965ed93b6c2e
SHA1bc0a9073be0a22584c850265d0bb740a9a1362bf
SHA2560cf59a86622469521d95fea2ba61ce63d0d8067811298764fcb809e882b4f540
SHA5121039da0c5418c08008ecc5c5f1e0bcc77430bb4524692a9c93556488f58b4af522bfc67f1829379dfbe99fbcb6604315b77cd8246a2705a594dbfbc51b43f73c
-
Filesize
188KB
MD59cf281f4847e262fbdda86853b2f4fcd
SHA1da0219cd2fc8302bdec4c975eeefe83fd6ee4d2d
SHA2561dd32d414d196d2ced8a789bf943ccd3591a5b0735ec62750151d6cc556c541b
SHA5128f3cbddf29c356e5e0b36115665b526052ad6ff8c7d8e74a80aeb12a16698c1d90c362878ebb875e7bea925f55f9c93702aa6dc49692315fb304e577f960a897
-
Filesize
188KB
MD5fc20a05e529b18cfb5f74a7d6295d51b
SHA1094acd04b3d7021cbf6e41c9974fdd162caff122
SHA256fdcccce171e39e3351fd333e7fbd32d60617683d715cd7975ce7f01b312ea7f3
SHA51269d88b51cad46b33178dfd2ef08f4429dfb8d66ae128c4051ceb300b50f1a357781460cd4d7ab0ef87fa9267d4f0c1ea69df6241b6e4f1d252abdde04b279b99
-
Filesize
188KB
MD507b79c9d5965b9825094b8f45a4e0510
SHA1cea2e8e5ec8e182f957cac87be6d886c0a354e10
SHA2563f6036fdeb807978c1d93ea805a89418aa8a18e4ebb996c03c9e86d0001268ca
SHA512ca4f15fbeb10e4636321b3d8ba0bb231293c5369f4b0832ef3d3e25683d63c78a5d21a8db6c8617376a08c4491cc4082615de7fa0b126ebeb875a76dd31043f6
-
Filesize
188KB
MD5268a68e0f4d4f930c74929f529548ba5
SHA13967ec4b4e10c804ce755ee5d15187b7c1884cdd
SHA256dfb4b20d4e75c400858051227cd64c21297b87289686553f48c7c4833a1f3e21
SHA512a7d6a6e612709d35fc1daf6200b6ce386bde69b40653ad86c50ffd6a20e6493c0b92bc0270abe630d480ae301362449aa342280004ace0991bfdd08d1dc24cc2
-
Filesize
188KB
MD5599d307b92e2632b8c13b02b7997b701
SHA1c21672f4b3754386efd46385897f0043831e2020
SHA256235618a76d23c2448ce70ee47678d379eb05b348cd5121420ef9f99f714e4c10
SHA512308279691f1823c4f4fbeae408229c02e32735a8b54e04efdbdbdf5d117180defe11389884b1574385ca8fcf767014f31f8b23b37886dab029354183e10dde78
-
Filesize
188KB
MD5c4bf8793aae36273b7fb178a352e2b84
SHA19d87c6ce5e2fa5d6408bd9bfd11e107754d15aed
SHA2569044a0dfb69f87d0ac84d596334ddb15ed2719e375791f7382c4a21f397c8670
SHA51220635664d30585a213b292d6871f4e68d96c603dcced1ebb9699263e7ebfced539b567b7f4800b944c439278c54de2f939be8f7b2a444d5062ee5e2092876df7