Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe
-
Size
188KB
-
MD5
f9cff8a2b0fb817ac97da5264c7f7714
-
SHA1
e04653770ccd462fe5154ac73e31a98a9d44d400
-
SHA256
fd4f91526adedd755131816a12c4bd9fdd9901f9b85d513b997f8a25aa3b5bbc
-
SHA512
b6efc2230e2da4dc01f373e292617d65aa25bca98cb76161bac50f4a6b94d679820976f47fc9633359adaaaba7f803df6d78fe154cac55e6c0e1323f9a785ff4
-
SSDEEP
3072:48toNmjp+zxwQnHj58qrHKURi52vMyBfJflx3n+aHVlw1pFT:48qN3KQnd8MHKU7N5lVlw1pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2024 Unicorn-7944.exe 1720 Unicorn-31462.exe 2912 Unicorn-10487.exe 2580 Unicorn-51359.exe 2696 Unicorn-26663.exe 2692 Unicorn-28032.exe 2464 Unicorn-60544.exe 2352 Unicorn-14872.exe 2940 Unicorn-47737.exe 1476 Unicorn-12796.exe 2332 Unicorn-39761.exe 2200 Unicorn-26736.exe 800 Unicorn-17416.exe 2060 Unicorn-63279.exe 1652 Unicorn-42304.exe 1468 Unicorn-26160.exe 1952 Unicorn-65391.exe 2124 Unicorn-61629.exe 2052 Unicorn-41763.exe 844 Unicorn-12846.exe 1988 Unicorn-1149.exe 1176 Unicorn-53194.exe 1580 Unicorn-33328.exe 1684 Unicorn-4185.exe 612 Unicorn-55114.exe 2900 Unicorn-51777.exe 2740 Unicorn-63666.exe 2192 Unicorn-60329.exe 3008 Unicorn-5145.exe 1512 Unicorn-28581.exe 2932 Unicorn-34480.exe 2248 Unicorn-13505.exe 2540 Unicorn-43184.exe 2848 Unicorn-31486.exe 2596 Unicorn-18872.exe 2576 Unicorn-28960.exe 2840 Unicorn-9094.exe 2620 Unicorn-37320.exe 2488 Unicorn-41958.exe 2368 Unicorn-25814.exe 2780 Unicorn-45680.exe 764 Unicorn-36443.exe 1480 Unicorn-23977.exe 2320 Unicorn-43843.exe 1944 Unicorn-13090.exe 2768 Unicorn-43843.exe 1956 Unicorn-25897.exe 804 Unicorn-45955.exe 1112 Unicorn-26089.exe 1444 Unicorn-45955.exe 1452 Unicorn-9753.exe 948 Unicorn-29619.exe 2672 Unicorn-42961.exe 2692 Unicorn-968.exe 1688 Unicorn-35727.exe 1044 Unicorn-57278.exe 664 Unicorn-27943.exe 2748 Unicorn-59847.exe 2996 Unicorn-18623.exe 2812 Unicorn-7117.exe 1752 Unicorn-2670.exe 2348 Unicorn-61767.exe 2032 Unicorn-27175.exe 2460 Unicorn-869.exe -
Loads dropped DLL 64 IoCs
pid Process 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 2024 Unicorn-7944.exe 2024 Unicorn-7944.exe 1720 Unicorn-31462.exe 1720 Unicorn-31462.exe 2912 Unicorn-10487.exe 2912 Unicorn-10487.exe 2024 Unicorn-7944.exe 2024 Unicorn-7944.exe 2580 Unicorn-51359.exe 1720 Unicorn-31462.exe 1720 Unicorn-31462.exe 2580 Unicorn-51359.exe 2692 Unicorn-28032.exe 2692 Unicorn-28032.exe 2912 Unicorn-10487.exe 2912 Unicorn-10487.exe 2696 Unicorn-26663.exe 2696 Unicorn-26663.exe 2464 Unicorn-60544.exe 2464 Unicorn-60544.exe 2352 Unicorn-14872.exe 2352 Unicorn-14872.exe 2580 Unicorn-51359.exe 2580 Unicorn-51359.exe 1476 Unicorn-12796.exe 1476 Unicorn-12796.exe 2332 Unicorn-39761.exe 2332 Unicorn-39761.exe 2696 Unicorn-26663.exe 2696 Unicorn-26663.exe 2940 Unicorn-47737.exe 2940 Unicorn-47737.exe 2692 Unicorn-28032.exe 2692 Unicorn-28032.exe 2200 Unicorn-26736.exe 2464 Unicorn-60544.exe 2464 Unicorn-60544.exe 2200 Unicorn-26736.exe 800 Unicorn-17416.exe 800 Unicorn-17416.exe 2352 Unicorn-14872.exe 2352 Unicorn-14872.exe 2060 Unicorn-63279.exe 2060 Unicorn-63279.exe 1652 Unicorn-42304.exe 1652 Unicorn-42304.exe 1476 Unicorn-12796.exe 1476 Unicorn-12796.exe 1468 Unicorn-26160.exe 1468 Unicorn-26160.exe 2332 Unicorn-39761.exe 2332 Unicorn-39761.exe 2124 Unicorn-61629.exe 2124 Unicorn-61629.exe 2940 Unicorn-47737.exe 2940 Unicorn-47737.exe 2052 Unicorn-41763.exe 2052 Unicorn-41763.exe 1952 Unicorn-65391.exe 1952 Unicorn-65391.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2416 1580 WerFault.exe 50 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 2024 Unicorn-7944.exe 1720 Unicorn-31462.exe 2912 Unicorn-10487.exe 2580 Unicorn-51359.exe 2692 Unicorn-28032.exe 2696 Unicorn-26663.exe 2464 Unicorn-60544.exe 2352 Unicorn-14872.exe 2940 Unicorn-47737.exe 1476 Unicorn-12796.exe 2332 Unicorn-39761.exe 2200 Unicorn-26736.exe 800 Unicorn-17416.exe 2060 Unicorn-63279.exe 1652 Unicorn-42304.exe 1468 Unicorn-26160.exe 2124 Unicorn-61629.exe 2052 Unicorn-41763.exe 1952 Unicorn-65391.exe 844 Unicorn-12846.exe 1988 Unicorn-1149.exe 1176 Unicorn-53194.exe 1580 Unicorn-33328.exe 1684 Unicorn-4185.exe 612 Unicorn-55114.exe 2900 Unicorn-51777.exe 2740 Unicorn-63666.exe 2192 Unicorn-60329.exe 3008 Unicorn-5145.exe 1512 Unicorn-28581.exe 2932 Unicorn-34480.exe 2248 Unicorn-13505.exe 2848 Unicorn-31486.exe 2596 Unicorn-18872.exe 2840 Unicorn-9094.exe 2576 Unicorn-28960.exe 2488 Unicorn-41958.exe 2620 Unicorn-37320.exe 764 Unicorn-36443.exe 2320 Unicorn-43843.exe 1444 Unicorn-45955.exe 2768 Unicorn-43843.exe 1480 Unicorn-23977.exe 2368 Unicorn-25814.exe 1452 Unicorn-9753.exe 1956 Unicorn-25897.exe 804 Unicorn-45955.exe 2780 Unicorn-45680.exe 1112 Unicorn-26089.exe 948 Unicorn-29619.exe 1944 Unicorn-13090.exe 2672 Unicorn-42961.exe 2692 Unicorn-968.exe 1688 Unicorn-35727.exe 1044 Unicorn-57278.exe 664 Unicorn-27943.exe 2748 Unicorn-59847.exe 2812 Unicorn-7117.exe 2996 Unicorn-18623.exe 1752 Unicorn-2670.exe 2516 Unicorn-37263.exe 2016 Unicorn-17205.exe 2460 Unicorn-869.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2024 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 28 PID 1084 wrote to memory of 2024 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 28 PID 1084 wrote to memory of 2024 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 28 PID 1084 wrote to memory of 2024 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 28 PID 1084 wrote to memory of 1720 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 29 PID 1084 wrote to memory of 1720 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 29 PID 1084 wrote to memory of 1720 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 29 PID 1084 wrote to memory of 1720 1084 f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe 29 PID 2024 wrote to memory of 2912 2024 Unicorn-7944.exe 30 PID 2024 wrote to memory of 2912 2024 Unicorn-7944.exe 30 PID 2024 wrote to memory of 2912 2024 Unicorn-7944.exe 30 PID 2024 wrote to memory of 2912 2024 Unicorn-7944.exe 30 PID 1720 wrote to memory of 2580 1720 Unicorn-31462.exe 31 PID 1720 wrote to memory of 2580 1720 Unicorn-31462.exe 31 PID 1720 wrote to memory of 2580 1720 Unicorn-31462.exe 31 PID 1720 wrote to memory of 2580 1720 Unicorn-31462.exe 31 PID 2912 wrote to memory of 2696 2912 Unicorn-10487.exe 32 PID 2912 wrote to memory of 2696 2912 Unicorn-10487.exe 32 PID 2912 wrote to memory of 2696 2912 Unicorn-10487.exe 32 PID 2912 wrote to memory of 2696 2912 Unicorn-10487.exe 32 PID 2024 wrote to memory of 2692 2024 Unicorn-7944.exe 33 PID 2024 wrote to memory of 2692 2024 Unicorn-7944.exe 33 PID 2024 wrote to memory of 2692 2024 Unicorn-7944.exe 33 PID 2024 wrote to memory of 2692 2024 Unicorn-7944.exe 33 PID 1720 wrote to memory of 2464 1720 Unicorn-31462.exe 35 PID 1720 wrote to memory of 2464 1720 Unicorn-31462.exe 35 PID 1720 wrote to memory of 2464 1720 Unicorn-31462.exe 35 PID 1720 wrote to memory of 2464 1720 Unicorn-31462.exe 35 PID 2580 wrote to memory of 2352 2580 Unicorn-51359.exe 34 PID 2580 wrote to memory of 2352 2580 Unicorn-51359.exe 34 PID 2580 wrote to memory of 2352 2580 Unicorn-51359.exe 34 PID 2580 wrote to memory of 2352 2580 Unicorn-51359.exe 34 PID 2692 wrote to memory of 2940 2692 Unicorn-28032.exe 36 PID 2692 wrote to memory of 2940 2692 Unicorn-28032.exe 36 PID 2692 wrote to memory of 2940 2692 Unicorn-28032.exe 36 PID 2692 wrote to memory of 2940 2692 Unicorn-28032.exe 36 PID 2912 wrote to memory of 1476 2912 Unicorn-10487.exe 37 PID 2912 wrote to memory of 1476 2912 Unicorn-10487.exe 37 PID 2912 wrote to memory of 1476 2912 Unicorn-10487.exe 37 PID 2912 wrote to memory of 1476 2912 Unicorn-10487.exe 37 PID 2696 wrote to memory of 2332 2696 Unicorn-26663.exe 38 PID 2696 wrote to memory of 2332 2696 Unicorn-26663.exe 38 PID 2696 wrote to memory of 2332 2696 Unicorn-26663.exe 38 PID 2696 wrote to memory of 2332 2696 Unicorn-26663.exe 38 PID 2464 wrote to memory of 2200 2464 Unicorn-60544.exe 39 PID 2464 wrote to memory of 2200 2464 Unicorn-60544.exe 39 PID 2464 wrote to memory of 2200 2464 Unicorn-60544.exe 39 PID 2464 wrote to memory of 2200 2464 Unicorn-60544.exe 39 PID 2352 wrote to memory of 800 2352 Unicorn-14872.exe 40 PID 2352 wrote to memory of 800 2352 Unicorn-14872.exe 40 PID 2352 wrote to memory of 800 2352 Unicorn-14872.exe 40 PID 2352 wrote to memory of 800 2352 Unicorn-14872.exe 40 PID 2580 wrote to memory of 2060 2580 Unicorn-51359.exe 41 PID 2580 wrote to memory of 2060 2580 Unicorn-51359.exe 41 PID 2580 wrote to memory of 2060 2580 Unicorn-51359.exe 41 PID 2580 wrote to memory of 2060 2580 Unicorn-51359.exe 41 PID 1476 wrote to memory of 1652 1476 Unicorn-12796.exe 42 PID 1476 wrote to memory of 1652 1476 Unicorn-12796.exe 42 PID 1476 wrote to memory of 1652 1476 Unicorn-12796.exe 42 PID 1476 wrote to memory of 1652 1476 Unicorn-12796.exe 42 PID 2332 wrote to memory of 1468 2332 Unicorn-39761.exe 43 PID 2332 wrote to memory of 1468 2332 Unicorn-39761.exe 43 PID 2332 wrote to memory of 1468 2332 Unicorn-39761.exe 43 PID 2332 wrote to memory of 1468 2332 Unicorn-39761.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9cff8a2b0fb817ac97da5264c7f7714_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7944.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10487.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26663.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39761.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26160.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63666.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43843.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27175.exe9⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40076.exe10⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14456.exe11⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21193.exe12⤵PID:1968
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17205.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13355.exe9⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54633.exe10⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6206.exe11⤵PID:1784
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23977.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59847.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45230.exe9⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exe10⤵PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5240.exe9⤵PID:2132
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60329.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43843.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40225.exe8⤵PID:2112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65391.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13505.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45955.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22846.exe8⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3237.exe9⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28567.exe10⤵PID:2620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8701.exe9⤵PID:1716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-869.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39526.exe8⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4003.exe9⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44270.exe10⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exe11⤵PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5240.exe10⤵PID:932
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26089.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17466.exe7⤵PID:1624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12796.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42304.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55114.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45680.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9105.exe8⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47531.exe9⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29361.exe10⤵PID:1516
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25814.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44554.exe7⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58779.exe8⤵PID:852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51777.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36443.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18623.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32593.exe8⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35142.exe9⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exe10⤵PID:1660
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7117.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17824.exe7⤵PID:1120
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28032.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47737.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61629.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5145.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45955.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37263.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47502.exe9⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47155.exe10⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exe11⤵PID:1296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18514.exe10⤵PID:1572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21580.exe8⤵PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1061.exe7⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17589.exe8⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exe9⤵PID:1592
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9753.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27943.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57320.exe8⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58908.exe9⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43566.exe10⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exe11⤵PID:2644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39042.exe8⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18998.exe9⤵PID:1308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37454.exe7⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52585.exe8⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exe9⤵PID:2156
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34480.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29619.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65514.exe7⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14030.exe8⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21385.exe9⤵PID:2760
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41763.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28581.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13090.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23697.exe7⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4611.exe8⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45422.exe9⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exe10⤵PID:692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64145.exe9⤵PID:800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25897.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20735.exe6⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4611.exe7⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exe8⤵PID:1652
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31462.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51359.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14872.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17416.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53194.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28960.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2670.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49811.exe9⤵PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29945.exe8⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8747.exe9⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46081.exe10⤵PID:2656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23645.exe7⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39526.exe8⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exe9⤵PID:2676
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9094.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-968.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50330.exe8⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58908.exe9⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61348.exe10⤵PID:1808
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45649.exe7⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43886.exe8⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28567.exe9⤵PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8701.exe8⤵PID:1620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33328.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 2406⤵
- Program crash
PID:2416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4185.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37320.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35727.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34653.exe8⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62463.exe9⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43502.exe10⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25106.exe11⤵PID:2160
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14787.exe7⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4611.exe8⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44078.exe9⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28567.exe10⤵PID:936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8701.exe9⤵PID:2824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57278.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57813.exe7⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exe7⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45614.exe8⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18474.exe9⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54364.exe10⤵PID:2608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64145.exe8⤵PID:2356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41958.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61767.exe6⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56246.exe7⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22087.exe8⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exe9⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43528.exe10⤵PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23662.exe9⤵PID:2796
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51949.exe6⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24287.exe7⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64145.exe8⤵PID:2372
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60544.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26736.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12846.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43184.exe6⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3128.exe7⤵PID:1068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31486.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42961.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49946.exe7⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36984.exe8⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45396.exe9⤵PID:2152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54585.exe6⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58908.exe7⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28401.exe8⤵PID:1044
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1149.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18872.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8913.exe6⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40076.exe7⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38105.exe8⤵PID:568
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD58c8b373d75915c995f3c2e8d6793408b
SHA14e0498c0706769b77dc18a3c2ba7d0e4229867c8
SHA256191081b8cb28ff2dc1f1134f87684a1fce570cc2a6ec0ab9287d36269d10521d
SHA51204ecb7112b79a734d81cae15bcad849585f97e4b99d02b9dad579cf55d2648770a65ce583bb87de8fd94c57ae4ec70762eb6ec9ccfc6ed99225e4cb1df01b97b
-
Filesize
188KB
MD5571199e5701d4cbb66146d9f8d30e52b
SHA15998b94979ab38b5bbd2ac11d92a744ff6c51800
SHA2567fc87bc9ce4682da5559ef383031ed6b8a5d14ed4538e9ba6ecd5e23cb844670
SHA512872bf01f37e8934e7029e267dcbe53c2c2e14b67f6e68c70b647472bdf8f77fd707d085707510f78ff38c7fcd4329910674702a09c311d8d6536f4e68d4cf60b
-
Filesize
188KB
MD54aed65e3bc3307b6b42d698065c4360e
SHA11fb01ad8a2d42540887e1fe024e22360c78c3a83
SHA256fcbef14036fc57ddd801a3ce9e3be080aa6bb0da79202826802134d9bdce0ad3
SHA5122336e7ddf9a5fb12f91414e3b3866407c93c41d4eca690728d7524ca3636d9581743cd47bc5079859f53a45f87754bd6212acee2525f03018a052cf044aa0217
-
Filesize
188KB
MD57aa8d667190a0c7a089e4a24970f88aa
SHA116d79eab2486bb9297c729207298446c625ec5ad
SHA256d6baa496554806c95ef124a7ac3caa48be340bd349253a880d91d0a65e8a173e
SHA512bf701130f96e26dc654d5e9692beb018a496dc449c125e44255553f038d785a192b5f89a9187a5cd3e6d6ced606ea61389af153e8cc917db8bc5a7da64ad702c
-
Filesize
188KB
MD54d56879e7564dc43e015c480b150e820
SHA14a4966a6d0fec8db7914bcda19d3943d03fb946d
SHA256c92cdfb41f75df3fc43656da2b91564fe93103455cb5984e52387ed2e2b7f7fe
SHA51231d78f9a72581e119d8781aa4488cebe38855dd59567a80e0787f1e5bcd17c18b8ef78010dfcd1079484f3a2bc1f56f28dcf8d3120632067fa59d8b291bbdac2
-
Filesize
188KB
MD5a60823d107186a366956125b835fd23b
SHA12037af9b2a44b67f2c846ee1ab42271447721f88
SHA25616dcacf17aef4f71760b2b84f460dbf7817eec9545bf1e1d5c409a1484e9957a
SHA512e96a555ab3af1b978a2514f3f3d2da06441d5832e9dc78ec7d0c25716dacff85dda0759579cbb7ea580d2c1472f14907a29393dc0861b083a6b47fec5b75cd9f
-
Filesize
188KB
MD5f47932281107703a36012867ab3bf118
SHA19aa9be274abeda1032f41ce85ca1a32f8110cd27
SHA256a8b7e9210e86832cbb49c13f5e68bbc77e9255f27946cc8eb1f9a12532180e09
SHA5121246e27d81d6f46804d4258d59207e017d46dbc22a802765a63fe29302ef9369dc730002575fbf44b3682890acce1c241a7304281ad262a3bf3c5b03e9cd3bc9
-
Filesize
188KB
MD5cc748f0e16a525e58e2672cd67c26d15
SHA16e8965d13472b72df25932bdac8f41046f48d8ce
SHA256b612589df742f50bc9b9bba88a2cc1604ac310d5dd5315d713990bdf4a0ba7aa
SHA512ceee020e9b82c12be1919b94603fa7a8c03c69b280b5aaa0116f5d43b9c973abdaac4c0258ecb6f7b67b394ae37a0f240afbb1a638b957498140db291f745634
-
Filesize
188KB
MD521d0d7f6ba073043965a51f7e37fd0d4
SHA1d5769ab89852aaf35675cd7f88e979b198082362
SHA2563a1275fad8fd6a2dab2ff3cb0c4e203ba0e194ce240e8311879d4fd7590201dd
SHA51258d102da7e934d37fb820f36de9baee9ee3e5a91d4e0aed1518b3fcd339739806def8babef2a310c7d77e9873151bf8e7a53a99bddca96b29636764f7543a1f7
-
Filesize
188KB
MD52ee8f4a61e30435f53bd9e23844b8330
SHA1c2c517e4bc84f88a5345c37ba5dd8dbf46803710
SHA2567569f1055b643250830b270a43d2a76920e8d559fcd62b03a527ee78aefa4258
SHA5128c435dc80cfb34ff413be05001d2cca6ad1c24257cd7403ced3cf3c4f4e7930710fb0f1869eb66e38f5b862e8009227db6a79e013b9d790fad7934c4fac5f417
-
Filesize
188KB
MD594c8898306233769a0026f4697689168
SHA1ca1aa95ab750f9a24328dbb949dfc42642a46233
SHA2561b5b5824d0dc02ba1fd69a5832584b37df3eb84b66c5e6d6ee3cb3ad168bfe4b
SHA512e6f460392655efba20b1aab44cff2da98e911a1502607fdcd2fa757c16185cfa384a1a341c3915daceec9161bf22b06ab0436e91a6609b7d06e337dbbf3e9959
-
Filesize
188KB
MD5d5c98e5dc8a41d5fb485a488aa348f69
SHA13c7605194da74a873b20c7551a5b6c02746d4f00
SHA2567f0fe0390c07d9bcd7e5da0ac901085f0679bf97845a0b2fb233ac57fe2a0bd2
SHA512172f80da7012e6600206c7bd1e5aaff3bcf6bb5dbc3c5e56ce5b05ec9bfb346fa238f66dc70011e06daf7c5d9318605965da5739d6ffb401a53411ce3568569e
-
Filesize
188KB
MD566ed775e5ead72de8cdeaa9bfef7588f
SHA1f3957bcbc5a77afc1f93bfddbfec8f36148cdf88
SHA256b4e71238aaaebcb3158fea3bd243d3a68f76034aa6d14cb2fa273402f59a5f67
SHA512bb7c2012ac084462b99fe44f17ea32911545f3336c03cc3210a08fcfdca1663937facd85081236e33c95ba881e8279b777c53f2d3af210ddbb6cdc8493a2dbf0
-
Filesize
188KB
MD5689514552aa6ac4921d6ab2c023e0d7e
SHA17216f89400ec228b2027138c42fa5a84076f3d6d
SHA256fa709cc167776ee43befa0753118c0526c484fb0cec131202039404919c1373b
SHA512f4875a798948054e6dd45fb583a035166ba32c6d38278658465afdd1a1c54ebefb169b915707e9dd095d47b811a2ddc7f350fb89fd1f16e30cbb40bda35870e9
-
Filesize
188KB
MD5fe47aedca50be89844d3718a017df74e
SHA133a1e3ab728d8070e49d03a879f9eb22d1cffce1
SHA25656a915390008214c0fcb10f338b44eb47a24bcadd74c7abc24c5e60230ac53b9
SHA5123a235f71c4a4e3375b7d455222c38cca96629e8cdce39d1d8d5aa05b2208e5af26e0d3eb5786221bf14194a7ac1f5d9a24503a4a5d2859aa0f632028358b77dc
-
Filesize
188KB
MD585344585aa03b2cab956aa4812fa0e69
SHA1df3e154fd7f22b0dfe3685c6c975495b29785a42
SHA25647c04ebeb4ba2495acbb4d9c1b90e75861a51ce8d903a55521743a4715d87433
SHA51270318dadcac3754c13b212ed53993ea8b9c3ecd65c54951380b084fc26b69537312bfc4d7b99276b6c9ec8b176c1045e8327f5fc14590156f972396e2c20d729
-
Filesize
188KB
MD580cafc9d2515ddf1e90c259c842123db
SHA199514adf124e9e876304dc5866131914e47567cb
SHA256fc47ff37b6e4fcb511fd17ddfea18fd8b0017eb0dc1343ccece8510917d26e08
SHA512d053879de818c6a20fc74471de7784fefa41aada799d5e116a11c4ef482cdc20da822841087c5fb3e69335ffe559b8c20ac6db635a5c1cdaa930f3844cca56b3
-
Filesize
188KB
MD5ce7c318a72a5896ca97bc30671791ae1
SHA14ba089263c0ab60be99ca92f28d3e8df95d80927
SHA256b4365fc40b1774938bd59da2f603b0e8ab711a7feac377bd424d5f68fba48bdd
SHA5126df25c69bc2e8b17afd15bc9e87cf35b47a66502e15188943cfa211a2f676910cb65d2866cc0996aa727763aab9a11bf349d65c5006f9851331cf9bca0471c33