Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe
-
Size
184KB
-
MD5
eb6956acaef5bb2588f0097ec796c8fc
-
SHA1
1ad1945da886feb60122fc476a908ba177b3d558
-
SHA256
97aeccd5c602743a46bb698d43a4c25c68deb8b177227c57ace3615822e082ef
-
SHA512
dd451c11c1ef4ada02f24a7f162418d8de30760a77139c0da7e2be43fd1e9c485c19e5ff9975e79007cbcfc52b3bb9268839bb4ccd2fde90aef7dd12219e117a
-
SSDEEP
3072:fEjFocLASAfROjVdy9a6zPby8f6ggte5JixFCPlj7lPdpFX:fEpoV3fRKdia6z4E0O7lPdpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2096 Unicorn-5504.exe 1976 Unicorn-5634.exe 2244 Unicorn-43137.exe 2596 Unicorn-57632.exe 2448 Unicorn-53548.exe 2792 Unicorn-25514.exe 2500 Unicorn-36309.exe 2208 Unicorn-8275.exe 1200 Unicorn-7912.exe 1812 Unicorn-3540.exe 2180 Unicorn-27490.exe 768 Unicorn-11153.exe 2776 Unicorn-58299.exe 1432 Unicorn-16944.exe 2152 Unicorn-16556.exe 2136 Unicorn-219.exe 324 Unicorn-12834.exe 1052 Unicorn-7640.exe 1912 Unicorn-53312.exe 2412 Unicorn-7640.exe 3000 Unicorn-47749.exe 1148 Unicorn-40479.exe 1680 Unicorn-41439.exe 2072 Unicorn-40536.exe 1772 Unicorn-48896.exe 2940 Unicorn-48320.exe 2092 Unicorn-36068.exe 1600 Unicorn-36068.exe 852 Unicorn-44428.exe 1708 Unicorn-12679.exe 1056 Unicorn-61880.exe 2184 Unicorn-15476.exe 2712 Unicorn-48896.exe 1160 Unicorn-27153.exe 2560 Unicorn-56488.exe 2788 Unicorn-60017.exe 1740 Unicorn-12523.exe 2460 Unicorn-593.exe 2520 Unicorn-53878.exe 2192 Unicorn-57832.exe 2988 Unicorn-57832.exe 2920 Unicorn-49410.exe 2804 Unicorn-41242.exe 2968 Unicorn-9124.exe 1976 Unicorn-5040.exe 1952 Unicorn-12461.exe 1920 Unicorn-49965.exe 2684 Unicorn-27511.exe 1776 Unicorn-7645.exe 2336 Unicorn-27511.exe 2908 Unicorn-33493.exe 2304 Unicorn-16773.exe 2540 Unicorn-36639.exe 2816 Unicorn-36639.exe 1892 Unicorn-36639.exe 384 Unicorn-54127.exe 784 Unicorn-45959.exe 2476 Unicorn-53743.exe 2872 Unicorn-1216.exe 1720 Unicorn-1019.exe 2600 Unicorn-56925.exe 2768 Unicorn-20745.exe 2608 Unicorn-3832.exe 2624 Unicorn-64382.exe -
Loads dropped DLL 64 IoCs
pid Process 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 2096 Unicorn-5504.exe 2096 Unicorn-5504.exe 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 2244 Unicorn-43137.exe 2244 Unicorn-43137.exe 1976 Unicorn-5634.exe 1976 Unicorn-5634.exe 2096 Unicorn-5504.exe 2096 Unicorn-5504.exe 2448 Unicorn-53548.exe 2448 Unicorn-53548.exe 1976 Unicorn-5634.exe 1976 Unicorn-5634.exe 2792 Unicorn-25514.exe 2792 Unicorn-25514.exe 2500 Unicorn-36309.exe 2448 Unicorn-53548.exe 2448 Unicorn-53548.exe 2500 Unicorn-36309.exe 2208 Unicorn-8275.exe 2208 Unicorn-8275.exe 1200 Unicorn-7912.exe 1200 Unicorn-7912.exe 2792 Unicorn-25514.exe 2792 Unicorn-25514.exe 2180 Unicorn-27490.exe 2180 Unicorn-27490.exe 1812 Unicorn-3540.exe 1812 Unicorn-3540.exe 2500 Unicorn-36309.exe 2500 Unicorn-36309.exe 1200 Unicorn-7912.exe 2776 Unicorn-58299.exe 1432 Unicorn-16944.exe 1200 Unicorn-7912.exe 2776 Unicorn-58299.exe 1432 Unicorn-16944.exe 2180 Unicorn-27490.exe 2180 Unicorn-27490.exe 2152 Unicorn-16556.exe 2152 Unicorn-16556.exe 2136 Unicorn-219.exe 2136 Unicorn-219.exe 2596 Unicorn-57632.exe 2596 Unicorn-57632.exe 2412 Unicorn-7640.exe 2412 Unicorn-7640.exe 3000 Unicorn-47749.exe 3000 Unicorn-47749.exe 324 Unicorn-12834.exe 1052 Unicorn-7640.exe 324 Unicorn-12834.exe 1052 Unicorn-7640.exe 1680 Unicorn-41439.exe 1680 Unicorn-41439.exe 1912 Unicorn-53312.exe 1912 Unicorn-53312.exe 1148 Unicorn-40479.exe 1148 Unicorn-40479.exe 2072 Unicorn-40536.exe 2072 Unicorn-40536.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 2096 Unicorn-5504.exe 2244 Unicorn-43137.exe 1976 Unicorn-5634.exe 2448 Unicorn-53548.exe 2792 Unicorn-25514.exe 2500 Unicorn-36309.exe 2208 Unicorn-8275.exe 1200 Unicorn-7912.exe 2180 Unicorn-27490.exe 1812 Unicorn-3540.exe 2776 Unicorn-58299.exe 1432 Unicorn-16944.exe 2152 Unicorn-16556.exe 2136 Unicorn-219.exe 2596 Unicorn-57632.exe 324 Unicorn-12834.exe 1912 Unicorn-53312.exe 2412 Unicorn-7640.exe 1052 Unicorn-7640.exe 3000 Unicorn-47749.exe 1680 Unicorn-41439.exe 1148 Unicorn-40479.exe 2072 Unicorn-40536.exe 1772 Unicorn-48896.exe 2940 Unicorn-48320.exe 2092 Unicorn-36068.exe 1600 Unicorn-36068.exe 852 Unicorn-44428.exe 1708 Unicorn-12679.exe 1056 Unicorn-61880.exe 2184 Unicorn-15476.exe 2712 Unicorn-48896.exe 1160 Unicorn-27153.exe 2560 Unicorn-56488.exe 2788 Unicorn-60017.exe 1740 Unicorn-12523.exe 2460 Unicorn-593.exe 2192 Unicorn-57832.exe 2920 Unicorn-49410.exe 2988 Unicorn-57832.exe 2520 Unicorn-53878.exe 1976 Unicorn-5040.exe 2804 Unicorn-41242.exe 1920 Unicorn-49965.exe 2684 Unicorn-27511.exe 2968 Unicorn-9124.exe 2908 Unicorn-33493.exe 2540 Unicorn-36639.exe 2816 Unicorn-36639.exe 784 Unicorn-45959.exe 2304 Unicorn-16773.exe 1892 Unicorn-36639.exe 1776 Unicorn-7645.exe 2336 Unicorn-27511.exe 384 Unicorn-54127.exe 2476 Unicorn-53743.exe 2872 Unicorn-1216.exe 768 Unicorn-11153.exe 2600 Unicorn-56925.exe 1720 Unicorn-1019.exe 2768 Unicorn-20745.exe 2608 Unicorn-3832.exe 2624 Unicorn-64382.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2096 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 28 PID 1160 wrote to memory of 2096 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 28 PID 1160 wrote to memory of 2096 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 28 PID 1160 wrote to memory of 2096 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 28 PID 2096 wrote to memory of 1976 2096 Unicorn-5504.exe 29 PID 2096 wrote to memory of 1976 2096 Unicorn-5504.exe 29 PID 2096 wrote to memory of 1976 2096 Unicorn-5504.exe 29 PID 2096 wrote to memory of 1976 2096 Unicorn-5504.exe 29 PID 1160 wrote to memory of 2244 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 30 PID 1160 wrote to memory of 2244 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 30 PID 1160 wrote to memory of 2244 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 30 PID 1160 wrote to memory of 2244 1160 eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2596 2244 Unicorn-43137.exe 31 PID 2244 wrote to memory of 2596 2244 Unicorn-43137.exe 31 PID 2244 wrote to memory of 2596 2244 Unicorn-43137.exe 31 PID 2244 wrote to memory of 2596 2244 Unicorn-43137.exe 31 PID 1976 wrote to memory of 2448 1976 Unicorn-5634.exe 32 PID 1976 wrote to memory of 2448 1976 Unicorn-5634.exe 32 PID 1976 wrote to memory of 2448 1976 Unicorn-5634.exe 32 PID 1976 wrote to memory of 2448 1976 Unicorn-5634.exe 32 PID 2096 wrote to memory of 2792 2096 Unicorn-5504.exe 33 PID 2096 wrote to memory of 2792 2096 Unicorn-5504.exe 33 PID 2096 wrote to memory of 2792 2096 Unicorn-5504.exe 33 PID 2096 wrote to memory of 2792 2096 Unicorn-5504.exe 33 PID 2448 wrote to memory of 2500 2448 Unicorn-53548.exe 34 PID 2448 wrote to memory of 2500 2448 Unicorn-53548.exe 34 PID 2448 wrote to memory of 2500 2448 Unicorn-53548.exe 34 PID 2448 wrote to memory of 2500 2448 Unicorn-53548.exe 34 PID 1976 wrote to memory of 2208 1976 Unicorn-5634.exe 35 PID 1976 wrote to memory of 2208 1976 Unicorn-5634.exe 35 PID 1976 wrote to memory of 2208 1976 Unicorn-5634.exe 35 PID 1976 wrote to memory of 2208 1976 Unicorn-5634.exe 35 PID 2792 wrote to memory of 1200 2792 Unicorn-25514.exe 36 PID 2792 wrote to memory of 1200 2792 Unicorn-25514.exe 36 PID 2792 wrote to memory of 1200 2792 Unicorn-25514.exe 36 PID 2792 wrote to memory of 1200 2792 Unicorn-25514.exe 36 PID 2448 wrote to memory of 1812 2448 Unicorn-53548.exe 38 PID 2448 wrote to memory of 1812 2448 Unicorn-53548.exe 38 PID 2448 wrote to memory of 1812 2448 Unicorn-53548.exe 38 PID 2448 wrote to memory of 1812 2448 Unicorn-53548.exe 38 PID 2500 wrote to memory of 2180 2500 Unicorn-36309.exe 37 PID 2500 wrote to memory of 2180 2500 Unicorn-36309.exe 37 PID 2500 wrote to memory of 2180 2500 Unicorn-36309.exe 37 PID 2500 wrote to memory of 2180 2500 Unicorn-36309.exe 37 PID 2208 wrote to memory of 768 2208 Unicorn-8275.exe 39 PID 2208 wrote to memory of 768 2208 Unicorn-8275.exe 39 PID 2208 wrote to memory of 768 2208 Unicorn-8275.exe 39 PID 2208 wrote to memory of 768 2208 Unicorn-8275.exe 39 PID 1200 wrote to memory of 2776 1200 Unicorn-7912.exe 40 PID 1200 wrote to memory of 2776 1200 Unicorn-7912.exe 40 PID 1200 wrote to memory of 2776 1200 Unicorn-7912.exe 40 PID 1200 wrote to memory of 2776 1200 Unicorn-7912.exe 40 PID 2792 wrote to memory of 1432 2792 Unicorn-25514.exe 41 PID 2792 wrote to memory of 1432 2792 Unicorn-25514.exe 41 PID 2792 wrote to memory of 1432 2792 Unicorn-25514.exe 41 PID 2792 wrote to memory of 1432 2792 Unicorn-25514.exe 41 PID 2180 wrote to memory of 2152 2180 Unicorn-27490.exe 42 PID 2180 wrote to memory of 2152 2180 Unicorn-27490.exe 42 PID 2180 wrote to memory of 2152 2180 Unicorn-27490.exe 42 PID 2180 wrote to memory of 2152 2180 Unicorn-27490.exe 42 PID 1812 wrote to memory of 2136 1812 Unicorn-3540.exe 43 PID 1812 wrote to memory of 2136 1812 Unicorn-3540.exe 43 PID 1812 wrote to memory of 2136 1812 Unicorn-3540.exe 43 PID 1812 wrote to memory of 2136 1812 Unicorn-3540.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb6956acaef5bb2588f0097ec796c8fc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5504.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5634.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53548.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36309.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27490.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16556.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40479.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61880.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49410.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45959.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19458.exe12⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11647.exe13⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4473.exe14⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11951.exe15⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30312.exe16⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16706.exe17⤵PID:2360
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63549.exe13⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48703.exe14⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe15⤵PID:2736
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exe12⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39964.exe13⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe14⤵PID:296
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5040.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3832.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37823.exe11⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35309.exe12⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3949.exe13⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe14⤵PID:2500
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48500.exe11⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50602.exe12⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33535.exe13⤵PID:836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64034.exe10⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23441.exe11⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe12⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe13⤵PID:956
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47749.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48320.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60017.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36639.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64382.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42675.exe12⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exe13⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41666.exe14⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25559.exe15⤵PID:1756
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4418.exe11⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23623.exe12⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42092.exe13⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61568.exe14⤵PID:2588
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16773.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62903.exe10⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3077.exe11⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11048.exe12⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53955.exe13⤵PID:3004
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12523.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36639.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20745.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13318.exe11⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10036.exe12⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53944.exe13⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37619.exe14⤵PID:3036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2615.exe11⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32538.exe12⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23530.exe13⤵PID:1692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46546.exe10⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34977.exe11⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10446.exe11⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe12⤵PID:848
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12834.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36068.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12461.exe8⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3949.exe9⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe10⤵PID:2428
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49965.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56925.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17979.exe9⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47753.exe10⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe11⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25004.exe12⤵PID:2264
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20679.exe9⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10472.exe10⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41703.exe11⤵PID:948
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3540.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-219.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41439.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44428.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41242.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1216.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14470.exe11⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24401.exe12⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe13⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe14⤵PID:2636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61328.exe11⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23623.exe12⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe13⤵PID:2556
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9124.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47143.exe9⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27198.exe10⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65039.exe11⤵PID:1588
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8275.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11153.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30423.exe6⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exe7⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15075.exe8⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46129.exe9⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16706.exe10⤵PID:2152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37394.exe7⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe8⤵PID:1776
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25514.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7912.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58299.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7640.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36068.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-593.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6110.exe9⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9517.exe10⤵PID:2276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57832.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54127.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34891.exe9⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52252.exe10⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11043.exe11⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38195.exe12⤵PID:2884
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53312.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12679.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53878.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1019.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41715.exe9⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45340.exe10⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13217.exe11⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60825.exe12⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49378.exe13⤵PID:2304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1904.exe10⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17738.exe11⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe12⤵PID:2828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-778.exe9⤵PID:2840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57832.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24611.exe7⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-415.exe8⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46269.exe9⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46129.exe10⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe11⤵PID:2004
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-970.exe7⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exe8⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25330.exe9⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe10⤵PID:2256
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16944.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7640.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48896.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27153.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27511.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30423.exe9⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13217.exe10⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34785.exe11⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11043.exe12⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4391.exe13⤵PID:2860
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33493.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37439.exe8⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45532.exe9⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exe10⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25273.exe11⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe12⤵PID:2204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43512.exe9⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe10⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48937.exe11⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57676.exe12⤵PID:1328
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-970.exe8⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53726.exe9⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe10⤵PID:2312
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56488.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36639.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58243.exe8⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58526.exe9⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exe10⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35262.exe11⤵PID:2876
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43137.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57632.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40536.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15476.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53743.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10194.exe7⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7296.exe8⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21059.exe9⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32538.exe10⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe11⤵PID:972
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64644.exe7⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33332.exe8⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe9⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe10⤵PID:2696
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7645.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54543.exe6⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe7⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50550.exe8⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28091.exe9⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe10⤵PID:2104
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55381.exe7⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5869.exe8⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49871.exe9⤵PID:540
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16922.exe6⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exe7⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64307.exe8⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12751.exe9⤵PID:3048
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48896.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27511.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32286.exe6⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36152.exe7⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4281.exe8⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6331.exe9⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15558.exe10⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe11⤵PID:2504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52003.exe8⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28283.exe9⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4946.exe10⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20544.exe11⤵PID:2072
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50145.exe7⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6196.exe8⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31698.exe9⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57022.exe10⤵PID:2276
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4226.exe6⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52465.exe7⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18159.exe8⤵PID:1560
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5e045476c39016e060860040e52d79c05
SHA1f5254214db2c99703501594f1335f7851c134d05
SHA256fa1bb3e98745432ad9df009660f238be3411832aefdeab4b24a593037ba36844
SHA512337fcbdc2dde03f3f9c0a06c0077edcb376fc936cdff1f3a189c51b64aaedc4525994b486b5ffe717a88c8255be22f10a28f8599d051d1c7208f583e71a02a9b
-
Filesize
184KB
MD52bd6bc99e7f920c1817f399d8e9961a3
SHA157515d8ec71df17c6f6b0fc33824c7b94d01f9f3
SHA25613401cc627edb5cacbbb3fe76abe9bf60ee667797710b72d480e752bbd04fd0f
SHA51260053e053530fb837c3744cbcdd9443668117ea03a2eed1225386ef839ab7a1420e025697f2d9183295235f47e5aa1013e0021803c53ebef12e27ed84a4f954c
-
Filesize
184KB
MD5e1edc7c7a8531bce862eb69cd6f48e36
SHA195fbe8acbb5d426a7af283b575a3facfecdc26a1
SHA2567c882fda127a953d2d6505d53bd216064262cac7c5077a5f21479a0909741bb7
SHA5129b389ae259176d1cd4d0eab3ad7c861154714d5693f32a05a9b0f2a329b962946ca6de087c2fc97f217b4275c8cb0e7380f7786e49a6084cf56e37c3a5e2e554
-
Filesize
184KB
MD563d49c674586dc845d8c9542e712f49e
SHA1cfe3c5746b84de6ed2f19cbb54eaeaa594a21daf
SHA25697313851990f7c5169d933afb691129d843957b56b76c2e0f0adaa17008dddb4
SHA5126ad10b170ecc0dfde148057735d841700ecdfa64d0129a83ae57e506eb2fec6e92f16748c304d0e0f0f152e38723c03473df43b3225c3aec63d2eead8246c817
-
Filesize
184KB
MD5ef7477f86a7b98a55d1c52b051834b37
SHA18409104e3084791376a90b3319e008bf46c189f8
SHA25659443044eb7d870c9b09454fb483b7237070d747f696cc5ff4158d8b87971e84
SHA5126b6ea747d20a928e64582ba9bd2cc5b8079cd9a277b292d0d681e47068f3c4e8fe07151bd153a7c3e3744dd0c747f20e63888aa29ccd96d58f00a0f5d1b3e875
-
Filesize
184KB
MD5e8a35166b58ba002f2c7be155aba757c
SHA1ce3d4b7739709cb21d4c828bddfe436b12402ef9
SHA256f1b12a17fc8700b430a6311b4a998ab26d4647c6a87b343dc82094dbb68a4cf8
SHA5127ced1001a3336794b25dd5cf34a68341a5af0171894ebfd024fdb5c9af26b42343acbde830e20777e41a0bdc3fc1b1ff55d065d7039c3aae14612d4bd0eab76c
-
Filesize
184KB
MD5f64e205de61c41a30d226d5a16ad0b00
SHA1deeb4381747b844c342a682a76f4efd08febe421
SHA2567c50f290f945545a29a7ffcc80533e46c4f1bef79df995e2eb028166ac1a6633
SHA5129063a3aad30be68e98b69b743da2cd7ced798f921fb2ab3dd2df9cc92c6f7f9cf9d985ae838155bbe16c903f10bee644d35763b5844c66d2e940c375b78e7bf2
-
Filesize
184KB
MD53e145e540035df8f589ddebf17e15e49
SHA1bc43cc42d51a9a15c8078d7cc0a281f20a0af704
SHA2567d4f1b869b95dd4a348cff88ac134e5b5444e57997857f639b8180bd65e9c2a1
SHA5123edb4457bd14e3fa8d104e69536c8eb4833f15b42bb5dce8291d04f3fa3075490ff60bd3c8ef7b636c10f9d7d45cf9c697f371c9c6db801a42ab6d9962a732b7
-
Filesize
184KB
MD53ebcb7e6c344b8d8a92f3457a5a2a9f2
SHA1986d647d8f5c76f3863ad01b4180c9b95a6c965e
SHA25628f86abc0ab046ca2c8b2294c138e7b500c3ba465173c7a3ef13b6ee1f96cac5
SHA512172f6bae3a90ac66108b519820eefce6bebe9295e7719c19beaf49aed2a11ef36ec8d16f6bb542abb5b5c38663c9956b9ea163a84212c52dbbbabf6d9dae7ac7
-
Filesize
184KB
MD507d000fc5d4e7e8824efe096845ac649
SHA18bad093859e2b5c78be3897b22afb886b4d07f0d
SHA256ee3d13b0eee5ca1d7f74c8fcef50da06d18c105309d924a13ff4ec36882aaa86
SHA512f0a20be93a2de3c3571bee70cc1da0d974ba592bccd8f7d6675c4c4d6686cf95b0847c57cad0af82069c7a1e427155f00412384a692f78a770d560bd9de6099f
-
Filesize
184KB
MD5dae9fc81d577e6e300c53a08b83afdb1
SHA1f2b0dba0c7d6216dfc52c8229b28f926a7aa6465
SHA256c2d65dbe8fe701aa3b8ad2ee88f8d92ef699f177af5896d39ad2da1ed37e1cd6
SHA51245eef0448a87a63960db5c2cdeb70338c42798656aa3f57b504aa0ea0a73defef5498ea7e6efbacfae406358be56380f6029aab9507b97f57160f273ec31f43f
-
Filesize
184KB
MD55854a1c88dd8251c0927ad30c1d1cc34
SHA18c88cf91137c3427a55b6a763f7620b7299e97b1
SHA256dd2dc01f5ba8e9ff1304be0a653ce33e42a41dfa4bad4e0dd65f68214499b7f5
SHA512018463870e78173b56350423b13e293fdd4aefb50118e9a6ea2f39f3ea3b3ecf6ab023bcddd9adf50aeee919b3a604445e3af94b00ca62cd2a3a4218172a3b5b
-
Filesize
184KB
MD55d86b9b3b2d9620027fda78cd076b6ad
SHA1adf740e7bcd1a8354b63e83dff01e5e0b4561fce
SHA25634a858555af946e1fd3b12628535c1d8849716099aa9673e8c7a6463292e5430
SHA512ba0b9eb5b4b3969a85387a00a7e79e00ccaf4e7a84f09eeca3ad2d5bf6dbaf7946c99c3b61c22ca2354203dc472fc1d7cafc70e91e4b7ca28cf1eac37096d405
-
Filesize
184KB
MD5ebbc126139b1d3a8a64bedb20237e2a7
SHA1e63dd13c80c11afc23b2998c59315c8f0ef46771
SHA25664e31239d0be57bf9882d818faeb03890dbb32830de9053b2b23fa8b517a513a
SHA5122ae903d166da91df294424f0bafca314653493187a5344d48ab12ba298ecb15ca476cd9e76ba2f911ebfb767c57e7b6869efa8ff4bfa8cbbc56774976b0f8994
-
Filesize
184KB
MD5af00b89320abd3dd744f3d992f6105e6
SHA1ac1dfd5b6758e577d402ed96e6bdd4d9120444f8
SHA256254e6402f1b20b32f33f9a69c10f26a0eb0060fdccd251977685fc852c1e2312
SHA512c3675fc586c59e52d57e6869d793b78f47b33a7308277fc5f858b11d6511f73c72bc788585b92a275340140d7c076a3b601e9d11ffa171eedca17ae0d27d0d88
-
Filesize
184KB
MD5624b35776597505238744bdaf50646d8
SHA1860db0776cae872c65f2fe647f983e5bfa7e98ac
SHA2569710e0fd19309ee03d4a181cab29a0463b7535efd6feb6df1d6069de81859f63
SHA5123a1d98b172325350a93fd907ab504d6187b86f83144fec87c5015b196a93c6b2f8cf14f514f908881f9454c3fa77b4f70791dabb77fd4dc682fa9fc3d3be9ddc
-
Filesize
184KB
MD5c2034d0c5f973aaa563593ed35f43d75
SHA19b2dcc9b767914c11a833bcac4af0393c8b6cfd5
SHA2565e6fc9464e06e0764708f5d98377e2608af21f8e2b2ced74810ae86633bee7e9
SHA512e6e74165b61067c19cfca713e1497cf5c3e5a9c59c686c6ba97ba6cbdf44748ccc57a468516165cc7b943204fe3ed5613698ff13ef91a50a7f46c6d719bdcd71
-
Filesize
184KB
MD525f571a67f5ccf25242d7059f26ae86d
SHA1ff4cc5341f0ea697f4ff1fc30d8f879da49e4fa2
SHA256e4f1d3c67da9e0a3cd4fa9b0325021c16be294c7a16dba234e584062d716856d
SHA5128e39060bdb37eaccec71415ad83c6446eec69dd694346ba323f6c9446cfd0dabaa96380c010045b18a77bdef3f6a6d075016d360808765068585d491eab10768
-
Filesize
184KB
MD58989a9600dab56bbffad5828bbb40dad
SHA15b8fe979613e4eb1a0658bff1ef5f382cb13aa13
SHA25667005af7de402a7a5493cda4b42c7b43f9c8aa02d9d8c0a4b17eb89b908c65be
SHA512d6b8b12a29717100240a7e48718190d4cd6e63dced426cb30912d51a7fcb45c15e6b3f521c552df2bd51b0a82210402ab92754a9892b7a1ffc5236a62867ed47
-
Filesize
184KB
MD5c6f13d178ecec6d28e57055fbfbf0199
SHA1bc512a3e6722d0ef22141f9b5c500b352a765144
SHA25681ec6c9525cc5f2f8ce76ea90f0c0035058cf52942dfbddb72063fed24b0f830
SHA5129776e97244cb775220ca9e2a4fa4b5e473300b5541a00b9cf9e804cc63b2453979731a95fa002fb0228c176ec338a9298559c0b00bea60b1bb5329c7d85f9e9d
-
Filesize
184KB
MD5f2a8a45970f7edfe2f2d25227b809c09
SHA1dd2f56b21bc483a02bfd792a4e0224004860cc7c
SHA2567ccb334217f0196f1b318771d30775dfc73a3841474288ecfde7e52e0cfa94b5
SHA51217b906656d40b86d95a23f8b88b5e7b321ab74f524bd77343b3ac877737f2cfac144bdea01e37ecf6e484ab713b749e0eb71e0920a936435a272ee6044d1d8f5
-
Filesize
184KB
MD52a2036c37541332ee044b11d3b3fcf47
SHA14e2afa1d3352a69c33303bc7a809e415fd29ca78
SHA25620bffb9f2fbac603f2be2fcfc240c1e477e2ac48bd1f6b300a3f51223262323a
SHA512c82f46ceca634e309ba273e1952e06f4d6644384b8007cd1987746f318de33355febf2f1f302020fea31cdad132d962096040cb49b2b846f240e7d7e52b1d163