Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe
-
Size
192KB
-
MD5
f110a7956f1776c03fb5e41fd894e283
-
SHA1
d17f650b51743283fb8b64895a4fc1de21d69a68
-
SHA256
1df4317ffe8fe539e4d85bd4c12a096073473afb28dd1e4bc29aeab1754af60b
-
SHA512
40d46f1a830c4cd728f8c3dfb292481cb67c6cbaa7eb60e10e375955a4dbc61936f9d4ce9a5d468a4751f0545b09425287f93dcb8f9979b964d1f6a98e5e87ae
-
SSDEEP
3072:yih7oPatkdwunOjr/GM0fsOLfh7wMOefIBtYJqEOm5lHtpFn:yiBo7+unc/D0fsYA0j15lHtpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3024 Unicorn-60468.exe 2944 Unicorn-442.exe 2584 Unicorn-29393.exe 2124 Unicorn-42518.exe 2476 Unicorn-55133.exe 2428 Unicorn-58662.exe 2792 Unicorn-64041.exe 800 Unicorn-22686.exe 1644 Unicorn-20269.exe 1500 Unicorn-39812.exe 2672 Unicorn-15670.exe 2316 Unicorn-65359.exe 1440 Unicorn-28965.exe 1608 Unicorn-48831.exe 1064 Unicorn-48639.exe 1556 Unicorn-16521.exe 848 Unicorn-20051.exe 1792 Unicorn-20051.exe 2060 Unicorn-5613.exe 2112 Unicorn-13465.exe 2188 Unicorn-21996.exe 1528 Unicorn-17166.exe 1008 Unicorn-14788.exe 1868 Unicorn-63434.exe 1088 Unicorn-16865.exe 272 Unicorn-6511.exe 544 Unicorn-34545.exe 2004 Unicorn-35291.exe 1344 Unicorn-55157.exe 1632 Unicorn-59049.exe 876 Unicorn-6127.exe 1292 Unicorn-30077.exe 3036 Unicorn-18593.exe 1620 Unicorn-59988.exe 1756 Unicorn-14316.exe 3060 Unicorn-59708.exe 2532 Unicorn-2702.exe 2536 Unicorn-18292.exe 1696 Unicorn-22184 3024 Unicorn-35182.exe 2788 Unicorn-60476.exe 1476 Unicorn-3470.exe 2180 Unicorn-31504.exe 2640 Unicorn-31866.exe 2804 Unicorn-31312.exe 2204 Unicorn-37294.exe 1228 Unicorn-35479.exe 2604 Unicorn-55707.exe 2300 Unicorn-55707.exe 3008 Unicorn-64430.exe 1248 Unicorn-11706.exe 2232 Unicorn-52054.exe 2468 Unicorn-28702.exe 3000 Unicorn-62142.exe 2488 Unicorn-33061.exe 828 Unicorn-58120.exe 1660 Unicorn-12448.exe 2924 Unicorn-33637.exe 1616 Unicorn-772.exe 2456 Unicorn-14176.exe 2080 Unicorn-59848.exe 2700 Unicorn-29252.exe 2880 Unicorn-63268.exe 2920 Unicorn-63823.exe -
Loads dropped DLL 64 IoCs
pid Process 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 3024 Unicorn-60468.exe 3024 Unicorn-60468.exe 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 2944 Unicorn-442.exe 2944 Unicorn-442.exe 3024 Unicorn-60468.exe 3024 Unicorn-60468.exe 2584 Unicorn-29393.exe 2584 Unicorn-29393.exe 2124 Unicorn-42518.exe 2124 Unicorn-42518.exe 2944 Unicorn-442.exe 2944 Unicorn-442.exe 2476 Unicorn-55133.exe 2476 Unicorn-55133.exe 2428 Unicorn-58662.exe 2428 Unicorn-58662.exe 2584 Unicorn-29393.exe 2584 Unicorn-29393.exe 2792 Unicorn-64041.exe 2792 Unicorn-64041.exe 2124 Unicorn-42518.exe 2124 Unicorn-42518.exe 800 Unicorn-22686.exe 800 Unicorn-22686.exe 1500 Unicorn-39812.exe 1500 Unicorn-39812.exe 2428 Unicorn-58662.exe 2428 Unicorn-58662.exe 1644 Unicorn-20269.exe 2672 Unicorn-15670.exe 1644 Unicorn-20269.exe 2672 Unicorn-15670.exe 2476 Unicorn-55133.exe 2476 Unicorn-55133.exe 2316 Unicorn-65359.exe 2316 Unicorn-65359.exe 2792 Unicorn-64041.exe 2792 Unicorn-64041.exe 1608 Unicorn-48831.exe 1608 Unicorn-48831.exe 800 Unicorn-22686.exe 800 Unicorn-22686.exe 1440 Unicorn-28965.exe 1440 Unicorn-28965.exe 848 Unicorn-20051.exe 848 Unicorn-20051.exe 2672 Unicorn-15670.exe 2672 Unicorn-15670.exe 1064 Unicorn-48639.exe 1064 Unicorn-48639.exe 1500 Unicorn-39812.exe 1556 Unicorn-16521.exe 1500 Unicorn-39812.exe 1556 Unicorn-16521.exe 1792 Unicorn-20051.exe 1792 Unicorn-20051.exe 1644 Unicorn-20269.exe 1644 Unicorn-20269.exe 2060 Unicorn-5613.exe 2060 Unicorn-5613.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 1960 2880 WerFault.exe 93 2972 2608 WerFault.exe 168 2004 1756 WerFault.exe 204 2428 1516 WerFault.exe 182 868 1308 WerFault.exe 234 1968 740 WerFault.exe 211 1208 2212 WerFault.exe 318 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 3024 Unicorn-60468.exe 2944 Unicorn-442.exe 2584 Unicorn-29393.exe 2124 Unicorn-42518.exe 2476 Unicorn-55133.exe 2428 Unicorn-58662.exe 2792 Unicorn-64041.exe 800 Unicorn-22686.exe 1500 Unicorn-39812.exe 1644 Unicorn-20269.exe 2672 Unicorn-15670.exe 2316 Unicorn-65359.exe 1440 Unicorn-28965.exe 1608 Unicorn-48831.exe 1556 Unicorn-16521.exe 1064 Unicorn-48639.exe 1792 Unicorn-20051.exe 848 Unicorn-20051.exe 2060 Unicorn-5613.exe 2112 Unicorn-13465.exe 2188 Unicorn-21996.exe 1528 Unicorn-17166.exe 1008 Unicorn-14788.exe 1868 Unicorn-63434.exe 1088 Unicorn-16865.exe 544 Unicorn-34545.exe 272 Unicorn-6511.exe 1344 Unicorn-55157.exe 2004 Unicorn-35291.exe 876 Unicorn-6127.exe 1632 Unicorn-59049.exe 1292 Unicorn-30077.exe 1620 Unicorn-59988.exe 3036 Unicorn-18593.exe 1756 Unicorn-14316.exe 3060 Unicorn-59708.exe 2532 Unicorn-2702.exe 2536 Unicorn-18292.exe 2788 Unicorn-60476.exe 1696 Unicorn-22184 1476 Unicorn-3470.exe 3024 Unicorn-35182.exe 2804 Unicorn-31312.exe 2300 Unicorn-55707.exe 2204 Unicorn-37294.exe 2180 Unicorn-31504.exe 1248 Unicorn-11706.exe 1228 Unicorn-35479.exe 2640 Unicorn-31866.exe 2604 Unicorn-55707.exe 3008 Unicorn-64430.exe 2468 Unicorn-28702.exe 2232 Unicorn-52054.exe 2488 Unicorn-33061.exe 3000 Unicorn-62142.exe 1660 Unicorn-12448.exe 828 Unicorn-58120.exe 1616 Unicorn-772.exe 2924 Unicorn-33637.exe 2080 Unicorn-59848.exe 2456 Unicorn-14176.exe 2920 Unicorn-63823.exe 2880 Unicorn-63268.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3024 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 28 PID 2872 wrote to memory of 3024 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 28 PID 2872 wrote to memory of 3024 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 28 PID 2872 wrote to memory of 3024 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 28 PID 3024 wrote to memory of 2944 3024 Unicorn-60468.exe 29 PID 3024 wrote to memory of 2944 3024 Unicorn-60468.exe 29 PID 3024 wrote to memory of 2944 3024 Unicorn-60468.exe 29 PID 3024 wrote to memory of 2944 3024 Unicorn-60468.exe 29 PID 2872 wrote to memory of 2584 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2584 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2584 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2584 2872 f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe 30 PID 2944 wrote to memory of 2124 2944 Unicorn-442.exe 31 PID 2944 wrote to memory of 2124 2944 Unicorn-442.exe 31 PID 2944 wrote to memory of 2124 2944 Unicorn-442.exe 31 PID 2944 wrote to memory of 2124 2944 Unicorn-442.exe 31 PID 3024 wrote to memory of 2476 3024 Unicorn-60468.exe 32 PID 3024 wrote to memory of 2476 3024 Unicorn-60468.exe 32 PID 3024 wrote to memory of 2476 3024 Unicorn-60468.exe 32 PID 3024 wrote to memory of 2476 3024 Unicorn-60468.exe 32 PID 2584 wrote to memory of 2428 2584 Unicorn-29393.exe 33 PID 2584 wrote to memory of 2428 2584 Unicorn-29393.exe 33 PID 2584 wrote to memory of 2428 2584 Unicorn-29393.exe 33 PID 2584 wrote to memory of 2428 2584 Unicorn-29393.exe 33 PID 2124 wrote to memory of 2792 2124 Unicorn-42518.exe 34 PID 2124 wrote to memory of 2792 2124 Unicorn-42518.exe 34 PID 2124 wrote to memory of 2792 2124 Unicorn-42518.exe 34 PID 2124 wrote to memory of 2792 2124 Unicorn-42518.exe 34 PID 2944 wrote to memory of 800 2944 Unicorn-442.exe 35 PID 2944 wrote to memory of 800 2944 Unicorn-442.exe 35 PID 2944 wrote to memory of 800 2944 Unicorn-442.exe 35 PID 2944 wrote to memory of 800 2944 Unicorn-442.exe 35 PID 2476 wrote to memory of 1644 2476 Unicorn-55133.exe 36 PID 2476 wrote to memory of 1644 2476 Unicorn-55133.exe 36 PID 2476 wrote to memory of 1644 2476 Unicorn-55133.exe 36 PID 2476 wrote to memory of 1644 2476 Unicorn-55133.exe 36 PID 2428 wrote to memory of 1500 2428 Unicorn-58662.exe 37 PID 2428 wrote to memory of 1500 2428 Unicorn-58662.exe 37 PID 2428 wrote to memory of 1500 2428 Unicorn-58662.exe 37 PID 2428 wrote to memory of 1500 2428 Unicorn-58662.exe 37 PID 2584 wrote to memory of 2672 2584 Unicorn-29393.exe 38 PID 2584 wrote to memory of 2672 2584 Unicorn-29393.exe 38 PID 2584 wrote to memory of 2672 2584 Unicorn-29393.exe 38 PID 2584 wrote to memory of 2672 2584 Unicorn-29393.exe 38 PID 2792 wrote to memory of 2316 2792 Unicorn-64041.exe 39 PID 2792 wrote to memory of 2316 2792 Unicorn-64041.exe 39 PID 2792 wrote to memory of 2316 2792 Unicorn-64041.exe 39 PID 2792 wrote to memory of 2316 2792 Unicorn-64041.exe 39 PID 2124 wrote to memory of 1440 2124 Unicorn-42518.exe 40 PID 2124 wrote to memory of 1440 2124 Unicorn-42518.exe 40 PID 2124 wrote to memory of 1440 2124 Unicorn-42518.exe 40 PID 2124 wrote to memory of 1440 2124 Unicorn-42518.exe 40 PID 800 wrote to memory of 1608 800 Unicorn-22686.exe 41 PID 800 wrote to memory of 1608 800 Unicorn-22686.exe 41 PID 800 wrote to memory of 1608 800 Unicorn-22686.exe 41 PID 800 wrote to memory of 1608 800 Unicorn-22686.exe 41 PID 1500 wrote to memory of 1064 1500 Unicorn-39812.exe 42 PID 1500 wrote to memory of 1064 1500 Unicorn-39812.exe 42 PID 1500 wrote to memory of 1064 1500 Unicorn-39812.exe 42 PID 1500 wrote to memory of 1064 1500 Unicorn-39812.exe 42 PID 2428 wrote to memory of 1556 2428 Unicorn-58662.exe 43 PID 2428 wrote to memory of 1556 2428 Unicorn-58662.exe 43 PID 2428 wrote to memory of 1556 2428 Unicorn-58662.exe 43 PID 2428 wrote to memory of 1556 2428 Unicorn-58662.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f110a7956f1776c03fb5e41fd894e283_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60468.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-442.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42518.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64041.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65359.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13465.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18593.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28702.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29252.exe10⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8738.exe11⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11172.exe12⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62641.exe13⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52556.exe14⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20362.exe15⤵PID:2336
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63823.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7757.exe10⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22569.exe11⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21918.exe12⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4123.exe13⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24155.exe14⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39267.exe15⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14469.exe16⤵PID:1364
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59988.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61898.exe8⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45495.exe9⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35462.exe10⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63656.exe11⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64471.exe12⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe13⤵PID:2324
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21996.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14316.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52054.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4934.exe9⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46922.exe10⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49740.exe11⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exe12⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 24013⤵
- Program crash
PID:2972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1286.exe10⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4182.exe11⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1689.exe12⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57263.exe13⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25157.exe14⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39267.exe15⤵PID:272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64326.exe14⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7427.exe15⤵PID:1168
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28965.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63434.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22184C:\Users\Admin\AppData\Local\Temp\Unicorn-221847⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35182.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28562.exe7⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18251.exe8⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46891.exe9⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44857.exe10⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12229.exe11⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exe12⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59394.exe13⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2653.exe14⤵PID:1784
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20907.exe9⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62366.exe10⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60176.exe11⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55114.exe12⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-999.exe13⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55603.exe14⤵PID:2628
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40118.exe10⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62016.exe11⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8534.exe12⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59292.exe13⤵PID:2044
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22686.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48831.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17166.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59708.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2547.exe8⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26653.exe9⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45094.exe10⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53885.exe11⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58218.exe12⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18201.exe13⤵PID:608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2281.exe11⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55603.exe12⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3535.exe13⤵PID:1964
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2702.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62142.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32937.exe8⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4099.exe9⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39481.exe10⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35125.exe11⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26070.exe12⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18201.exe13⤵PID:2752
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14788.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18292.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55133.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20269.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59049.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35479.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63268.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 2409⤵
- Program crash
PID:1960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64430.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-440.exe7⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21759.exe8⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12023.exe9⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20211.exe10⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63329.exe11⤵PID:1308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 24012⤵
- Program crash
PID:868
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27549.exe7⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58899.exe8⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9548.exe9⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20029.exe10⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2421.exe11⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16760.exe12⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41259.exe13⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6168.exe14⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58353.exe15⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32749.exe16⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60071.exe17⤵PID:2208
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26951.exe13⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7336.exe14⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47007.exe15⤵PID:1736
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-786.exe11⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3252.exe12⤵PID:1140
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6127.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11706.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33637.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47114.exe8⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32553.exe9⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40524.exe10⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33231.exe11⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15676.exe12⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21654.exe13⤵PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5872.exe12⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32168.exe13⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38974.exe14⤵PID:2280
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-326.exe8⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4291.exe9⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8020.exe10⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27340.exe11⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21073.exe12⤵PID:828
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59848.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60383.exe7⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58925.exe8⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47114.exe9⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1466.exe10⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5794.exe11⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34954.exe12⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31607.exe13⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12333.exe14⤵PID:2864
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51120.exe7⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37549.exe8⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exe9⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40880.exe10⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40735.exe11⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56371.exe12⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6908.exe13⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29187.exe14⤵PID:1732
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5613.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30077.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14176.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25952.exe7⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44665.exe8⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52509.exe9⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43267.exe10⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43159.exe11⤵PID:680
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29393.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58662.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39812.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48639.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34545.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31504.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-772.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16227.exe9⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62127.exe10⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14592.exe11⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44533.exe12⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46801.exe13⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15650.exe14⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47334.exe15⤵PID:1776
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7352.exe8⤵PID:1860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31866.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40197.exe7⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10207.exe8⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10397.exe9⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32572.exe10⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3449.exe11⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58566.exe12⤵PID:1164
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35291.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55707.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25936.exe7⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-824.exe8⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4623.exe9⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40197.exe10⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46689.exe11⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23402.exe12⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39733.exe13⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6007.exe14⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46651.exe15⤵PID:1696
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16521.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55157.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31312.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33061.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30944.exe8⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40814.exe9⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59517.exe10⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4689.exe11⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39412.exe12⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3418.exe13⤵PID:876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10802.exe11⤵PID:2952
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40818.exe7⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-824.exe8⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22610.exe9⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41515.exe10⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62831.exe11⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61529.exe12⤵PID:2112
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58120.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19294.exe7⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exe8⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31513.exe9⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22816.exe10⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53895.exe11⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21400.exe12⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22739.exe13⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6908.exe14⤵PID:1352
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37294.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24670.exe6⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53964.exe7⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25428.exe8⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18402.exe9⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1466.exe10⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60911.exe11⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32318.exe12⤵PID:1740
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25629.exe6⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35329.exe7⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37488.exe8⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31837.exe9⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38246.exe10⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37076.exe11⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38778.exe12⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10060.exe13⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32178.exe14⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15645.exe15⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21068.exe16⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3556.exe17⤵PID:1500
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39524.exe11⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8020.exe12⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32183.exe13⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35359.exe14⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19786.exe15⤵PID:2100
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43086.exe7⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23721.exe8⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51990.exe9⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62758.exe10⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18655.exe11⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14469.exe12⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55362.exe13⤵PID:1156
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15670.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16865.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60476.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12448.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exe8⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50072.exe9⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31162.exe10⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exe11⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39564.exe12⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34907.exe13⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9484.exe14⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18800.exe15⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56654.exe16⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5263.exe17⤵PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exe16⤵PID:2980
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31908.exe9⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19528.exe10⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14678.exe11⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 24412⤵
- Program crash
PID:2004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4491.exe11⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24726.exe12⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32700.exe13⤵PID:1856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 21612⤵
- Program crash
PID:1968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 24011⤵
- Program crash
PID:2428
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3470.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47171.exe6⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exe7⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7524.exe8⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27037.exe9⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25976.exe10⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65052.exe11⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42256.exe12⤵PID:3068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1642.exe9⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37512.exe10⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45006.exe11⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62105.exe12⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2025.exe13⤵PID:1228
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6511.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55707.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27414.exe6⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55775.exe7⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7280.exe8⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22102.exe9⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55322.exe10⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56121.exe11⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19687.exe12⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21400.exe13⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6957.exe14⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61908.exe15⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 18816⤵
- Program crash
PID:1208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37766.exe14⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exe15⤵PID:792
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25861.exe11⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30865.exe12⤵PID:928
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20279.exe7⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60425.exe8⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32141.exe9⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20652.exe10⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56308.exe11⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44954.exe12⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18800.exe13⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55011.exe14⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15312.exe15⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4303.exe16⤵PID:804
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12644.exe11⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exe12⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38258.exe13⤵PID:1952
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD50bb8048693e6f00f193917aa1f845b87
SHA19ec6ea1ea582e4a4628dc08ba742c0b773e8b104
SHA256054fb3107c3c8f2f46ffc53f698a4ff76405286ca87c32b04f87c550456d4bf3
SHA5123b9faaf8be9f379fe45481baa85579142f2fca79fa9818e124afde4b919e2a3e9e8a5e025abbabd79ee0a71d4c2aa212534665410bc96e250d9c60c07cc174ad
-
Filesize
192KB
MD51e41d0b4bca71cb55be3fc59067217e9
SHA1cdfe8f28c918f15bdbef6cbf3cfeb7d21b5c9b69
SHA25633e32f1d59949d6390b887b5e88d4cc4e731176f64ca73f9f4f7818c6a2b5d28
SHA512ed4fe771bc9b5b39d8e10a78dc105033e54cd1e33ca95faef68b5afab3ee08a657c692d262b616bc52629b2758040b60492153765ad5680ea2818473578ff054
-
Filesize
192KB
MD5b83fe8e3ad62ca9624379985be92c67f
SHA1bf912be14d0eb23fe89c90116db4a7e2832b9325
SHA2561181fcce024ad17250554b7d5fe2fbe9300ecf0d4a362e09544f2d518a84651c
SHA512bba59f92b51eb5367789625931c3422c5567f4cff57c98cf6dff370bd981da5f04b7a7c2837e8c498b3db05b4241d341251795526aa53dbc3b0b462aad0ff176
-
Filesize
192KB
MD50cd00ec95d76393f6ea84a75e5062ea1
SHA12b99a64e222d09621b78e09606810431b392433f
SHA25623e13c8d919fb9089ff445a6c6eb60d03cedc6c691aad43120b5b46470c62b26
SHA51299a7e337f725a9bf1f8936ef6a3fd7fb0a6d9e6b9b664920e19cd09115ede2cb6c5ac6a6969b41eef3dfc077aac0a6186ef4eefa16987407294c7b77803595c4
-
Filesize
192KB
MD5f8270ef1d977e00976ebd9aed4f037e7
SHA1e777231ce96a7daf22e1706c1aa75ebbc263f997
SHA256b0c38ba6186756f4b1a440cec2556ea795e7b3fb761d330cd13dedd61a374e8f
SHA51210d70b5f7da7727fb9c83607e7c8cbd850454f7315e6b545ca31cc407bc8135e1a151a19858b1ca745b653ddde5ea88969fb0be2612bf84d1084d714038a80c6
-
Filesize
192KB
MD537d131863e51ea3cfa15f62d19277e05
SHA1bc87dbc37d45e915767219ebb253c18b984548dd
SHA25603af028ca80bd2cfecccb6ead5c3251ca20b5fde8ef157f9da96eafc93656773
SHA5129ca097352bd0ce6c75286d15445de1a423f7284aef52c45f6d980fce4216c13a934ed0981d0e9d17abaaf508fc7ca31ffeb7364e5536c6bd7581e4630cf9f9b3
-
Filesize
192KB
MD561f5e617df99ec309bb6b5aaee7bef3b
SHA11184277143d89004a1d715fff7c9f7cc740b2e01
SHA256a5d753c3ccba60024b242077a870167fff6288819020ed75b0df5d42ce5c028c
SHA5125fbe8c79ef49f8028d586efe31a893ba1f264ac14e0f06ec7643a2259371176915644e55bb0f079ed91e938d82755a41751bc537b2d070f40b26878e529aa675
-
Filesize
192KB
MD54cc10714e326dec3f8fda447261a0ccf
SHA145fdcdcdb49a6bb2e1e4c27cc6bdc4dc7820035d
SHA256331600041cf24d2c777e8ae4ac1454da3ee16f7a8dc65c27c69905d7596acd07
SHA51202a5bf0d821d3526a5ab4005d2074185bf6b94fdacfa20e2bab28831d58eb856f8424ef8eef25268eebfdf5a0dae85dd62d56561626ced4e660e633443082f05
-
Filesize
192KB
MD5cf7618e1a753e8aba3ebf38515582720
SHA1934babe482390172f0ee1d1c1964146b0a42864a
SHA25605fb50435f6de7a27f2734aa380b05a9cbf8ffe253cea7363e6c6eacb874f24a
SHA512d2c94cdecaaa27bad5e2e8dfc760c9d2ab3884fd4235746213317519ed586bd7136d2a323896e01e0dfafe0e861a9bea23b3565122fceeba1f447534e857847f
-
Filesize
192KB
MD5012dc755c3d58f9545db0378971d0cca
SHA13cbcc9b9e9fb7a2390ae763051731f68f73b454c
SHA2568564635f28a1e0d471f5acb696ccd54b7fc5de5f86e24379e87a2eef5c259619
SHA512ef8182fd077934ca4c96aa86802ae07948f958505d1eb5cb3bcb846e588bad7bc3dea3f0b37261653105b9efd2ed0c6107e3e0c08045d710b6590323d080f4f0
-
Filesize
192KB
MD5bb24f4d7aa8333c6fb5054b7f2a73c05
SHA1adcc71c8e1bedc164cc1681a7c1801b7c9a88b8c
SHA2560489b24f47b6a42a6eb450c6090bcf3c63201f17ded1da6dd6bc6f35773dd408
SHA512298a8c8310992a14f464f7430877079e14d77aec3033755ea32c40769ce2c44dff4c61a0453ac54db33541625f0604e2737bf6c9220a71652850b605cf522016
-
Filesize
192KB
MD56f347f60d03c19278e2ba2f5dcaa10ce
SHA1fc973cedd6eedd585850ee08b474e86fa0006d54
SHA256ee9c70317a4785bd1edb569c9f65d80fa3eb96cdeedd90abf94833f2dd2067b5
SHA5126f9d75b623833c4feac160258c6ccb2eaf4de836178d0a129b070ba1bbf672edd87295a15cc3276f342ae982428d4c7371a6d171d7ba397580d5579267720d2f
-
Filesize
192KB
MD5512d4eacd11b001b6984d8b729d8810f
SHA18ad0aa3f75b3087fd991efe7dc169918d9d99a09
SHA2563f24e88e867c5ee22347bf18d95e2fee6ebea166511bd8968c250bbc038681c3
SHA512a2c4c8522fb4c95d1cece3736d4a11debfa7c89b00d63782966a77aa3964b8e1f1ec9fa90ec1d21f95ab41b700050c232a66a135f133c3da9b516ab5503bdfb3
-
Filesize
192KB
MD5e7078af63a1fdc7fcdfd7e8a48c1662e
SHA1b6e38e4abdef416fb12ff6438e199a538d058244
SHA2561a1fff989323eec28c5481ec6f58e406d5fb234b5fe8089949b0d183c3717d88
SHA5123b97be97624b19bc9af42c141879b4e2c0a72f2a56bb6526de45a5940dfab6c96127955031aa802b37cc4e125f77176dadeef3b9ca2c2ab30c5c3ff622f62e9e
-
Filesize
192KB
MD51478a8d1f3c4c63a5958a9769ac01761
SHA179f58010eee6ebea468725e5bcce002b76ba6ce6
SHA25633b8bcd41648a9fc6896a97e2dd7b2251b1d16ad1d724121703f3786bf9af531
SHA512b3ff3459cea642cce54134df19dec7545c6449bd4b66cedb582253f29a6e4edbe7ca5fea25be968dbeac1cb5300268c69dccea7526acd289c0415fae74efe314
-
Filesize
192KB
MD5a76e9470789206707dd45e0aed466e7e
SHA154813a40dc661f4b83e027fd4a5423cf65dc9fd6
SHA2562beee6536d716b69df6829e4e372f2fc4d7a313b88654ad98b49ec2fa929c968
SHA512fcde9d993c6b34880e1410e180557b5ee6e93b77db2a04f6a6a6c9254f24037bdd30654ce1bc3d95f59362ba3f413dc3d164fdc772e768f7600894d459151289
-
Filesize
192KB
MD53311b13a813527cd4f2e845127a298f3
SHA1ab8206992e31654a9f7684526a50ee3e67573741
SHA256414f587968eb5fd9e78e1e5b7b95866eadcba576cd9a2d5dc763ce1cf4d2679c
SHA512cced46bd12e464e982a32ed79d5b3af1613c96e43d241f183d6e6c6ec728b4c72e22a911d36bcc5531720317adb5e1b985abd57d0b9d3bf6d098f646c78df649
-
Filesize
192KB
MD597a917d3b3c9a8d4c30a58c7fb70d9fe
SHA14d41d254946d4cf60427fd6faa21252469b41dc3
SHA256d635bcc0ecb55e69a5b939b257efc3d3224d578e2cca89ace312743095bafb36
SHA512a349dc8da87758964d6b212362070ae7a57f02c6956c57a8f7b109d8b1eaf1d510bed55115697a96e57f74ccc3f8001091a1f0b4bc5efc4cdf76dad3e61754b7
-
Filesize
192KB
MD52b17299ce8431c591e5be88a2176958d
SHA11bf2e65de4af1f5a0bdfca803a43e3d6ab643c39
SHA2563e33d35d9ccf8c95db9ef65f19fa09ad33b8c217bb653daf7103a358f2cfda60
SHA512856215ae859762543a6d283ff21e693734aff0977389a476bcae40c9a976e91484c8c11fb7baf1b8221a428af36783aa4e92f8105ff0f755bec33fd0750894dc
-
Filesize
192KB
MD5c06d1e95310c25caa476fa8c2432eb8c
SHA1e74fe541f589efc638b71d529f6cfbd7c0cf8656
SHA2564bc42fb5daf1a36753c38951a129d53beaf31f92edd4bf7b5994a360436681bd
SHA5122733e51c2f34c9fea8d59a8a5f6e4eee38b747f1b6a439cb2d92a5153e7a415d324b1d88d83b7016e3e54c81be0ff4d709f0da380fa897737bcbe3d5bd27cf4a
-
Filesize
192KB
MD54ef45dde6fe08be657d24863060e459a
SHA1c6c8f191a1076fcb5fabad9d192f97392b9fb8c3
SHA256e4bd9dd2a351a5e9491debea890c5fe404375718de51b68a1bd4600286747c6a
SHA512d59a6b5e8c9bb1992235c05763ce44031838c1175ebbdb87da321645bb046220cf733689b82fb78b44865ee59d8853b884e4284638c4db1ac9db7d67fea8f358
-
Filesize
192KB
MD5212cb015ca7af8ba860af3fceed2fc44
SHA107f916449d82f0f201e35072def47102853bbbe9
SHA256a6537a4b71ec78bb6189a4586decaa3d3995aba0d634fd2f0bc45f514b820513
SHA512551138beb79f67ccac1aa8dc30ded23db710e39b8d54f34a0440a8e897405b6d86ddf4949213fc87ed60a2956e2888a200b148ced3cd0bd90e2e4e9303e624b0
-
Filesize
192KB
MD5fea970763c331d2bda03817b98cf436f
SHA166212b28bfb1260a4449ca4251d19714d36bd5b0
SHA2561dad0ced24f3d6d31451ddb56516f138b1af7b093002caac6e6c9bcae1ea5a3b
SHA5127493081ac5d4cd0181578dffb0c29e5c5f3164954f5ed42fb9464fbc2d6d430643bcc04f09ff5c90e804a8923d16713b26ccfd4e713c85dcb451458c2a86553a
-
Filesize
192KB
MD5862e2e6913b0c0ab938434c50c27a5f3
SHA11a2bc47a5f20dbf3df8d24f47fdba2a8dfe44826
SHA256da4ffdc683cb5e3c409d56cd20b31f6be26b34436359ff3d0663ae584169f4cd
SHA512124ef7802ab9b02caa55975a26145a3fa4ead6cc7e2706346677b4d6546102dab43f6ad743ca4c2b128daa6dec31262f46743260071d2d365fd563a6423f9987
-
Filesize
192KB
MD5a59fa1ca7227d35ebe0b55d11d587e14
SHA1d84b1aa97246f92f6747555734e2298d3f7578fa
SHA256bb6486376c7bcd252f4b822445fec25b3dd5c9b8aefbede6b60e70bf906bff90
SHA5125a65e4b807e289ab63f9926f877cab3b7dc97e1e31e1a8240bbdd3b6c27c9e8ed23520a08794a0314eb840c52888888fab26edc3a4e0cda1edcf25f665de6c49