Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe
-
Size
184KB
-
MD5
feda6de509707bc17a9ec3436c29485b
-
SHA1
4ddb69a81d5d9cf4f8657619b432d8705b1a5c16
-
SHA256
d2ec7755d92852d9bb3fb7c93cd44b0c4348e7522786470473f515724ed2186f
-
SHA512
b8a3b9cc71947f54d9c3dfa24503b0e7ec53c458605de9cfa9d4c962bc4118667047dc8e29934f077a7a4fc5f1e0cc95c439086f866de2e0a6f2a48dd186fe82
-
SSDEEP
3072:2uhKo0sf7ApZcjYjvPcezFXnbU6hfpMtDTxmThZ/7lPvpFU:2uIo5kpZdj3cezH2er7lPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2224 Unicorn-32210.exe 2960 Unicorn-58655.exe 2492 Unicorn-14285.exe 2144 Unicorn-35936.exe 2740 Unicorn-26999.exe 2416 Unicorn-33544.exe 2872 Unicorn-47965.exe 644 Unicorn-31354.exe 2348 Unicorn-2443.exe 1068 Unicorn-14140.exe 2696 Unicorn-41275.exe 1104 Unicorn-238.exe 1504 Unicorn-39853.exe 2692 Unicorn-38614.exe 2228 Unicorn-43444.exe 896 Unicorn-20934.exe 2304 Unicorn-21126.exe 2812 Unicorn-29486.exe 3004 Unicorn-50653.exe 964 Unicorn-12630.exe 2452 Unicorn-8375.exe 2016 Unicorn-58728.exe 1992 Unicorn-49875.exe 2140 Unicorn-46538.exe 1556 Unicorn-24027.exe 2336 Unicorn-48915.exe 2132 Unicorn-12521.exe 1752 Unicorn-29241.exe 2264 Unicorn-8074.exe 1600 Unicorn-51546.exe 2096 Unicorn-30379.exe 2612 Unicorn-51650.exe 2896 Unicorn-26186.exe 2532 Unicorn-38307.exe 2428 Unicorn-3108.exe 2868 Unicorn-40803.exe 2884 Unicorn-42989.exe 1472 Unicorn-42858.exe 1916 Unicorn-38412.exe 1832 Unicorn-20274.exe 2712 Unicorn-24188.exe 2732 Unicorn-39372.exe 1656 Unicorn-45820.exe 2148 Unicorn-62156.exe 1904 Unicorn-47356.exe 2164 Unicorn-36042.exe 2352 Unicorn-14792.exe 2244 Unicorn-60848.exe 2460 Unicorn-64569.exe 3048 Unicorn-952.exe 476 Unicorn-38564.exe 436 Unicorn-59006.exe 2272 Unicorn-49229.exe 1456 Unicorn-1481.exe 1624 Unicorn-44699.exe 612 Unicorn-3858.exe 2916 Unicorn-41361.exe 1680 Unicorn-34523.exe 1748 Unicorn-10210.exe 1608 Unicorn-18488.exe 1596 Unicorn-44720.exe 2872 Unicorn-12047.exe 2516 Unicorn-59250.exe 2848 Unicorn-5368.exe -
Loads dropped DLL 64 IoCs
pid Process 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 2224 Unicorn-32210.exe 2224 Unicorn-32210.exe 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 2960 Unicorn-58655.exe 2960 Unicorn-58655.exe 2224 Unicorn-32210.exe 2224 Unicorn-32210.exe 2492 Unicorn-14285.exe 2492 Unicorn-14285.exe 2740 Unicorn-26999.exe 2740 Unicorn-26999.exe 2416 Unicorn-33544.exe 2416 Unicorn-33544.exe 2492 Unicorn-14285.exe 2144 Unicorn-35936.exe 2492 Unicorn-14285.exe 2144 Unicorn-35936.exe 2960 Unicorn-58655.exe 2960 Unicorn-58655.exe 2872 Unicorn-47965.exe 2872 Unicorn-47965.exe 2740 Unicorn-26999.exe 2740 Unicorn-26999.exe 644 Unicorn-31354.exe 644 Unicorn-31354.exe 2416 Unicorn-33544.exe 2416 Unicorn-33544.exe 2348 Unicorn-2443.exe 2348 Unicorn-2443.exe 1068 Unicorn-14140.exe 1068 Unicorn-14140.exe 2696 Unicorn-41275.exe 2696 Unicorn-41275.exe 2144 Unicorn-35936.exe 2144 Unicorn-35936.exe 2872 Unicorn-47965.exe 2872 Unicorn-47965.exe 1112 WerFault.exe 1112 WerFault.exe 1112 WerFault.exe 1112 WerFault.exe 1504 Unicorn-39853.exe 1504 Unicorn-39853.exe 1112 WerFault.exe 2228 Unicorn-43444.exe 2228 Unicorn-43444.exe 896 Unicorn-20934.exe 896 Unicorn-20934.exe 2348 Unicorn-2443.exe 2348 Unicorn-2443.exe 2692 Unicorn-38614.exe 2692 Unicorn-38614.exe 644 Unicorn-31354.exe 644 Unicorn-31354.exe 2812 Unicorn-29486.exe 2812 Unicorn-29486.exe 2696 Unicorn-41275.exe 2696 Unicorn-41275.exe 2304 Unicorn-21126.exe 2304 Unicorn-21126.exe 1068 Unicorn-14140.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 1112 1104 WerFault.exe 39 1888 2916 WerFault.exe 87 2444 1388 WerFault.exe 297 2428 2476 WerFault.exe 325 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 2224 Unicorn-32210.exe 2960 Unicorn-58655.exe 2492 Unicorn-14285.exe 2144 Unicorn-35936.exe 2740 Unicorn-26999.exe 2416 Unicorn-33544.exe 2872 Unicorn-47965.exe 644 Unicorn-31354.exe 2348 Unicorn-2443.exe 1068 Unicorn-14140.exe 2696 Unicorn-41275.exe 1104 Unicorn-238.exe 1504 Unicorn-39853.exe 2692 Unicorn-38614.exe 2228 Unicorn-43444.exe 896 Unicorn-20934.exe 2304 Unicorn-21126.exe 3004 Unicorn-50653.exe 2812 Unicorn-29486.exe 964 Unicorn-12630.exe 2452 Unicorn-8375.exe 2016 Unicorn-58728.exe 1992 Unicorn-49875.exe 2140 Unicorn-46538.exe 1556 Unicorn-24027.exe 2336 Unicorn-48915.exe 2132 Unicorn-12521.exe 1752 Unicorn-29241.exe 1600 Unicorn-51546.exe 2264 Unicorn-8074.exe 2096 Unicorn-30379.exe 2612 Unicorn-51650.exe 2896 Unicorn-26186.exe 2532 Unicorn-38307.exe 2428 Unicorn-3108.exe 2868 Unicorn-40803.exe 2884 Unicorn-42989.exe 1472 Unicorn-42858.exe 1916 Unicorn-38412.exe 2712 Unicorn-24188.exe 2732 Unicorn-39372.exe 1832 Unicorn-20274.exe 2148 Unicorn-62156.exe 1656 Unicorn-45820.exe 1904 Unicorn-47356.exe 2164 Unicorn-36042.exe 2352 Unicorn-14792.exe 3048 Unicorn-952.exe 2460 Unicorn-64569.exe 2244 Unicorn-60848.exe 476 Unicorn-38564.exe 436 Unicorn-59006.exe 2272 Unicorn-49229.exe 612 Unicorn-3858.exe 1456 Unicorn-1481.exe 1624 Unicorn-44699.exe 2916 Unicorn-41361.exe 1680 Unicorn-34523.exe 1748 Unicorn-10210.exe 1608 Unicorn-18488.exe 2872 Unicorn-12047.exe 1596 Unicorn-44720.exe 2516 Unicorn-59250.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2224 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 28 PID 2892 wrote to memory of 2224 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 28 PID 2892 wrote to memory of 2224 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 28 PID 2892 wrote to memory of 2224 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 28 PID 2224 wrote to memory of 2960 2224 Unicorn-32210.exe 29 PID 2224 wrote to memory of 2960 2224 Unicorn-32210.exe 29 PID 2224 wrote to memory of 2960 2224 Unicorn-32210.exe 29 PID 2224 wrote to memory of 2960 2224 Unicorn-32210.exe 29 PID 2892 wrote to memory of 2492 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 30 PID 2892 wrote to memory of 2492 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 30 PID 2892 wrote to memory of 2492 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 30 PID 2892 wrote to memory of 2492 2892 feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2144 2960 Unicorn-58655.exe 31 PID 2960 wrote to memory of 2144 2960 Unicorn-58655.exe 31 PID 2960 wrote to memory of 2144 2960 Unicorn-58655.exe 31 PID 2960 wrote to memory of 2144 2960 Unicorn-58655.exe 31 PID 2224 wrote to memory of 2740 2224 Unicorn-32210.exe 32 PID 2224 wrote to memory of 2740 2224 Unicorn-32210.exe 32 PID 2224 wrote to memory of 2740 2224 Unicorn-32210.exe 32 PID 2224 wrote to memory of 2740 2224 Unicorn-32210.exe 32 PID 2492 wrote to memory of 2416 2492 Unicorn-14285.exe 33 PID 2492 wrote to memory of 2416 2492 Unicorn-14285.exe 33 PID 2492 wrote to memory of 2416 2492 Unicorn-14285.exe 33 PID 2492 wrote to memory of 2416 2492 Unicorn-14285.exe 33 PID 2740 wrote to memory of 2872 2740 Unicorn-26999.exe 34 PID 2740 wrote to memory of 2872 2740 Unicorn-26999.exe 34 PID 2740 wrote to memory of 2872 2740 Unicorn-26999.exe 34 PID 2740 wrote to memory of 2872 2740 Unicorn-26999.exe 34 PID 2416 wrote to memory of 644 2416 Unicorn-33544.exe 35 PID 2416 wrote to memory of 644 2416 Unicorn-33544.exe 35 PID 2416 wrote to memory of 644 2416 Unicorn-33544.exe 35 PID 2416 wrote to memory of 644 2416 Unicorn-33544.exe 35 PID 2492 wrote to memory of 2348 2492 Unicorn-14285.exe 36 PID 2492 wrote to memory of 2348 2492 Unicorn-14285.exe 36 PID 2492 wrote to memory of 2348 2492 Unicorn-14285.exe 36 PID 2492 wrote to memory of 2348 2492 Unicorn-14285.exe 36 PID 2144 wrote to memory of 1068 2144 Unicorn-35936.exe 37 PID 2144 wrote to memory of 1068 2144 Unicorn-35936.exe 37 PID 2144 wrote to memory of 1068 2144 Unicorn-35936.exe 37 PID 2144 wrote to memory of 1068 2144 Unicorn-35936.exe 37 PID 2960 wrote to memory of 2696 2960 Unicorn-58655.exe 38 PID 2960 wrote to memory of 2696 2960 Unicorn-58655.exe 38 PID 2960 wrote to memory of 2696 2960 Unicorn-58655.exe 38 PID 2960 wrote to memory of 2696 2960 Unicorn-58655.exe 38 PID 2872 wrote to memory of 1104 2872 Unicorn-47965.exe 39 PID 2872 wrote to memory of 1104 2872 Unicorn-47965.exe 39 PID 2872 wrote to memory of 1104 2872 Unicorn-47965.exe 39 PID 2872 wrote to memory of 1104 2872 Unicorn-47965.exe 39 PID 2740 wrote to memory of 1504 2740 Unicorn-26999.exe 40 PID 2740 wrote to memory of 1504 2740 Unicorn-26999.exe 40 PID 2740 wrote to memory of 1504 2740 Unicorn-26999.exe 40 PID 2740 wrote to memory of 1504 2740 Unicorn-26999.exe 40 PID 644 wrote to memory of 2692 644 Unicorn-31354.exe 41 PID 644 wrote to memory of 2692 644 Unicorn-31354.exe 41 PID 644 wrote to memory of 2692 644 Unicorn-31354.exe 41 PID 644 wrote to memory of 2692 644 Unicorn-31354.exe 41 PID 2416 wrote to memory of 2228 2416 Unicorn-33544.exe 42 PID 2416 wrote to memory of 2228 2416 Unicorn-33544.exe 42 PID 2416 wrote to memory of 2228 2416 Unicorn-33544.exe 42 PID 2416 wrote to memory of 2228 2416 Unicorn-33544.exe 42 PID 2348 wrote to memory of 896 2348 Unicorn-2443.exe 43 PID 2348 wrote to memory of 896 2348 Unicorn-2443.exe 43 PID 2348 wrote to memory of 896 2348 Unicorn-2443.exe 43 PID 2348 wrote to memory of 896 2348 Unicorn-2443.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\feda6de509707bc17a9ec3436c29485b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32210.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58655.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35936.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14140.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8074.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64569.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59250.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4637.exe10⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42401.exe11⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60520.exe12⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39400.exe13⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exe14⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9896.exe15⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3306.exe16⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8719.exe17⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58229.exe18⤵PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47814.exe18⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57171.exe19⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4488.exe20⤵PID:2024
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61658.exe9⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exe10⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3065.exe11⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28606.exe12⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14177.exe13⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24033.exe14⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27588.exe15⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49817.exe16⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8857.exe17⤵PID:1624
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5368.exe8⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29386.exe9⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7092.exe10⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exe11⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47833.exe12⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2636.exe13⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22912.exe14⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47826.exe15⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57985.exe16⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28121.exe17⤵PID:1652
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51546.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62156.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55161.exe8⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63869.exe9⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36805.exe10⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34413.exe11⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9426.exe12⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11370.exe13⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44339.exe14⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33525.exe15⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20756.exe16⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7939.exe17⤵PID:1248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50653.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30379.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34523.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23360.exe8⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30507.exe9⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42539.exe10⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49659.exe11⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32597.exe12⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33547.exe13⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27961.exe14⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32201.exe15⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46550.exe16⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exe17⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 24018⤵
- Program crash
PID:2428
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41275.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29486.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48915.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47356.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42359.exe8⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exe9⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60600.exe10⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exe11⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1517.exe12⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17629.exe13⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45745.exe14⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exe15⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39096.exe16⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exe17⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52345.exe18⤵PID:2588
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48737.exe9⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9856.exe10⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45228.exe11⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33472.exe12⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12522.exe13⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38584.exe14⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45183.exe15⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34514.exe16⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30093.exe17⤵PID:940
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36042.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12047.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29313.exe8⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36978.exe9⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35162.exe10⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45274.exe11⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45134.exe12⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45124.exe13⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11572.exe14⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32746.exe15⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25175.exe16⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60227.exe17⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38702.exe18⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4426.exe19⤵PID:2080
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44978.exe11⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29030.exe12⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29264.exe13⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55315.exe14⤵PID:2400
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe7⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18582.exe8⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15045.exe9⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55907.exe10⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exe11⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58199.exe12⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27951.exe13⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27780.exe14⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19719.exe15⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54664.exe16⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61665.exe17⤵PID:2252
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29241.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45820.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58290.exe7⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50688.exe8⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3065.exe9⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59996.exe10⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1024.exe11⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38788.exe12⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29990.exe13⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exe14⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13963.exe15⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30596.exe16⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7617.exe17⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46803.exe18⤵PID:2932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26999.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47965.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-238.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 2406⤵
- Loads dropped DLL
- Program crash
PID:1112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12630.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51650.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-952.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47953.exe8⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20139.exe9⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53120.exe10⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-780.exe11⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11413.exe12⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52135.exe13⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-638.exe14⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45195.exe15⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13451.exe16⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41916.exe17⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62863.exe18⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11208.exe19⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62682.exe20⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35646.exe21⤵PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40777.exe20⤵PID:1132
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17161.exe14⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24033.exe15⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16815.exe16⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58198.exe17⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43419.exe18⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exe19⤵PID:2372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38564.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38825.exe7⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11181.exe8⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52710.exe9⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49659.exe10⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9896.exe11⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52263.exe12⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16623.exe13⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33289.exe14⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exe15⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19803.exe16⤵PID:1976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39853.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8375.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26186.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10210.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34160.exe8⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8768.exe9⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44311.exe10⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43633.exe11⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14947.exe12⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exe13⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47971.exe14⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6565.exe15⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16460.exe16⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57866.exe17⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21157.exe18⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exe19⤵PID:588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64384.exe18⤵PID:1140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38307.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44720.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exe7⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20139.exe8⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1366.exe9⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14319.exe10⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3020.exe11⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52263.exe12⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19825.exe13⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41887.exe14⤵PID:3044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14285.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33544.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31354.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38614.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24027.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38412.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18488.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12151.exe9⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7092.exe10⤵PID:2576
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20274.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48415.exe7⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-579.exe8⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18227.exe9⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2627.exe10⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34211.exe11⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45228.exe12⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35745.exe13⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22710.exe14⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52357.exe15⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18706.exe16⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60643.exe17⤵PID:2168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12521.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39372.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59006.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15109.exe8⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33901.exe9⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55694.exe10⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36655.exe11⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44738.exe12⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exe13⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11220.exe14⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51867.exe15⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2002.exe16⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46995.exe17⤵PID:2292
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49229.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37180.exe7⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29194.exe8⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3065.exe9⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59036.exe10⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52586.exe11⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27686.exe12⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47214.exe13⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27417.exe14⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36683.exe15⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43964.exe16⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44701.exe17⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61411.exe18⤵PID:2872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48380.exe16⤵PID:2012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43444.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58728.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3108.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43044.exe8⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11767.exe9⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47824.exe10⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10359.exe11⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exe12⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47278.exe13⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14691.exe14⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24490.exe15⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25334.exe16⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exe17⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23378.exe18⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exe19⤵PID:804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58629.exe18⤵PID:2468
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8731.exe8⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30507.exe9⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9173.exe10⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12409.exe11⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50043.exe12⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9576.exe13⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60687.exe14⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46466.exe15⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32746.exe16⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3156.exe17⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16974.exe18⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5770.exe19⤵PID:764
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2824.exe10⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14179.exe11⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9844.exe12⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11370.exe13⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27780.exe14⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38434.exe15⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6745.exe16⤵PID:1640
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60848.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2831.exe7⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3205.exe8⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32150.exe9⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61543.exe10⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4771.exe11⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9896.exe12⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42237.exe13⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2398.exe14⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25718.exe15⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10886.exe16⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25205.exe17⤵PID:944
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40803.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2011.exe6⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50709.exe7⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50429.exe8⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11885.exe9⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51123.exe10⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exe11⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30748.exe12⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19249.exe13⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22589.exe14⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21479.exe15⤵PID:1060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2443.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20934.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49875.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42989.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44699.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64943.exe8⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6163.exe9⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10058.exe10⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17553.exe11⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22774.exe12⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20359.exe13⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63784.exe14⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 18815⤵
- Program crash
PID:2444
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63910.exe7⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39199.exe8⤵PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41361.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 2407⤵
- Program crash
PID:1888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42858.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3858.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50387.exe7⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42785.exe8⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49521.exe9⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3385.exe10⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13271.exe11⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52680.exe12⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38672.exe13⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22570.exe14⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19109.exe15⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18702.exe16⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49558.exe17⤵PID:2568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46538.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24188.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1481.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63521.exe6⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46651.exe7⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exe8⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59036.exe9⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57293.exe10⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40348.exe11⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55444.exe12⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17521.exe13⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54887.exe14⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63398.exe15⤵PID:832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD539146402c707e9213660f0a8e0b38bb4
SHA197389de9d60a28b7e5227e5b867144ffeff7b4dc
SHA2560e6fb67aa5b37ff9ad1d92c1daae9625fdc603232c08f50ebc98e28e0a6334cd
SHA512b6ce78f6c36a7df61087a2a04d761565616f9818ffc0d2c5341ae2b7e56b9f277e9a2ecb4cdbfe865510a13a5f4d39736758eb5d6ad3030c8517bbac6b1718c3
-
Filesize
184KB
MD52840111d62be847dcb8a5341fdfead3e
SHA1897af1109c90a9a21058534a77da78206f74fb32
SHA256100bf36a3b95473ad3408eeb50a09428256e0cba109c6de8a9e01567623ab5e3
SHA512381f414ac61831307c23acd33e98d965963e524120a8362d0f0be1eb9b14ee9d6f3abbff130595d9ea91dae683ef48750623406772494009b8c589a531269fd3
-
Filesize
184KB
MD5a36d969c085eee6c763545d2959fd24f
SHA15419725e1a11c0e3dd92e6ac5cfa102b4ae09bdc
SHA25629ea4458f73ab003c59fa44d6b8a76da37d7162a013e8e2f5e8752e37b28d511
SHA5128588f6d6b960ce07ddcfda21d72d26cb688ce2ad7d8daaeda34cb9d7b99d6af232a0a454fbadd887281e5a90bbf068f97ef26a617b473ff00200c58eb50543c1
-
Filesize
184KB
MD56c5dda04bc2f7e63371a805225c1b61e
SHA1eae1559ec55b8772e0592c3110b64e9adadd1c36
SHA256b4848706aa63b814689abff03c38d796c8bd63b7e038705ac96a0811122d5f95
SHA51234fae016979e16a3590dc142006f475c5962f3d885af11f9b9a23528b79468c53a4fdc959a22375d19f8deb99ebe2d314520ee6d9dc358363331ebeacce6f047
-
Filesize
184KB
MD56b9f429ded6766cc69971288c4532ae4
SHA1f1ca73abc6cf171508132793af421cc62c450882
SHA256bac1d3c4a9a9cebf74b195503e7f86aee1cc39c774a32cd2af12981910e92221
SHA512566c6bb40802cc8eb17332a7e698d90fa35b531bd96a67ef27e43ffeb2ee85b59b305f56f0150e58f76b008ef7cc7361c6ff594bf30047771765aab9626192d8
-
Filesize
184KB
MD5c11ed98a2503aa2cabb05c2ce82039f8
SHA181f76ff3acd216851f4e9876082da26593a7d6b4
SHA2564c23cff13553fabb4a69c5a421702b81596e9d42d30b0268fc1d42656d37771a
SHA5123e074d1fdd6526daa36b103417a38576c42391bd39358af984a2743ad051b0edefb8e6bf2d4c8548c4ea747abbf3c83ff5aa81e11a3cf776e27624c22daa2467
-
Filesize
184KB
MD5c442a349ce5fc90c70680c35dcb9eb1e
SHA1b202d36e94912b9d774bd72b8a02cd3195295c07
SHA2569138a4fe42020d69728d2a8f8f959771f0d7360f93b2e7b507a6641b2e4210cc
SHA512ec0cee9814bd56e0895ecb0c5fc0ba70409c791d6477c6c0e32f9d679c8a305a7e5ecf78546b31a9e126910fb58ecac71ad539613be6ad915fa02eee35f2114f
-
Filesize
184KB
MD567973ae1d92516ab1a56adc58fbafefd
SHA1ebafb9b3ac7bfa9639c30bbe29f32f6b58b3ad29
SHA2568ae44b011a5dfa42aab85c353643d33a87e255ef9ef947d9e67a2e0c65bc4c30
SHA51204717c665e9d67b6dc7eec4df48ffd7d561094437d2b8f03732d44fb287a156af05d65c77e870cd418889901f3c33a362822159a2cb96388cbd2c89e540dd986
-
Filesize
184KB
MD56adb257be7bc9c1edac36e3cbe7557a2
SHA16824ba7c3ec88f982b0398e2bb9613c8271a98eb
SHA256df9d46badef1bb4ab4172131fdcd88bba28e21031f5f8838d4c01bda1fda6dad
SHA51283a9b45c01738f6f22ef36ec91ee1871e327aecc89dd022b8b8ebbcc420ee9a57df4592b42b66f215cc74972573cc1e1802e9e0d9070a6bca9ef438ad99c6444
-
Filesize
184KB
MD517adcf1fe739a56ec8ea053f15d7164e
SHA195784c96f99276a2492153eaa5d702bcf6941648
SHA2567888b305884348c899089a57ecddff20c8b14b4a170a7dc7e82a407a3ecb9e7b
SHA512f0e6fae5b7a126b8c86ddd59a638a42306c9078fbc48d6d11377a6119f6c9982e9f349aaba45af0e49aeed960bbfa083455e0ff4485371db10620205cc292c27
-
Filesize
184KB
MD5eb574936f1560788dbd5f67cd2bf6874
SHA1bc3188c59754822da8325e830b30542ae3537524
SHA256f66fcca236ff2243fdd2d7cdfbbd2fe32f936085391261d753b3eb111594a169
SHA51204204bb098d421a54905b3c285ff0f966eb0a70033f28c03c1c3a67d3e74370d702f0d45186b9780cbc977a9d87e5b60d75776b14d494a35f32193533717f2d6
-
Filesize
184KB
MD59c316dfacde6bd4d7c44aa73d3e000c7
SHA18a2d9ac62a796993d799604e2a5695f372091039
SHA2567f1d057cd369fccb307ba6c2f639c2aeb125d14f2a79d694e6e530131d415ec1
SHA512e3d4da2e4c2d5088ca7d3d9737fd57ffe38104edd3fadf1c7677b19b82a04a8c4dfc1ab51e711c080887a6b04ce08abaf152e574e010a504653f4c238e6392ff
-
Filesize
184KB
MD5db57d2bf9322418c39ba85b24b8dfc25
SHA15ca24870839eca863ac9417970c9d6ab01a58882
SHA256ff6d01129e10b53a5970bc0269f46ac9089a887794c0eadd8bba11452ac14bf6
SHA5120c61ca1f2e107c8893c18ab6927c845d656fad25d451b5e5b11d8235140eae502dbc36823ca26a4309b25a6db91d90495823642a34a17a165d4ee4b4554a5744
-
Filesize
184KB
MD53c4bc97ca49f33179a18b8ea0fe82247
SHA17e662152b79847b2b9999a64eaed4c8e853d67c3
SHA256f32e6c180e99f37dcdf4826b016dc6457dd9e9c6dea021bd4599ff5f29142887
SHA512dbf8e6980f7ed8c74ac26c7081b8352d0ffbf6f1b57770abd6da177ac0ae1fe74deed34ef2be414483c90a119b479975033965ef34665e7cdbf1cd58c440f6ab
-
Filesize
184KB
MD52c1a2a8444f4f2e459e256f606e1c4ef
SHA17a8178ad115019e0e634cb43a3892e8603e76870
SHA2562c5cad9f754340dab317a581146dc79c73f5e168a60b79e7657cbe67e9237bb4
SHA512d21d0098e9b47307a6b03374f7ba2aa983754c4fda7ffca4f9c55bd45202e6e770e7126075e3687b4c8c0f9448ac6a10603fd0e103d8b1272f287dcb71890a09
-
Filesize
184KB
MD5f30889ff6eb7ffe91eb506050489339b
SHA10e71d48e58b3635dc91aecbe870a7d74f57daf9e
SHA2566c448d25b59122069f3ddc95e24114a3f649100366bbd869236de2dd05c311dd
SHA512eb6e17f809a58ef3d4a03f9550f7fc48e73a185d518459ede3f917cf542c5a7a3d0da0bbf9683fa674f620f01d1d125efd84ccb3c2f007f48f7e157d350d3c9f
-
Filesize
184KB
MD5ddac41ebde99190dd19c043a6872180d
SHA15950848795ab50e50e325f75f0580122a3cfb776
SHA256bcf626ccc830f46d02f05c22f75628bd14c9847af2d67c96dc6b27b1e5b1f396
SHA512ea755619f9c6c237beec59e040dac46c60e92508c8d921c4478cbe73cb9fbf94ce6dcb45c8919d06e0b9a21ba06ddcdb3afd7f5773cab9da90e4885d76eed4a2
-
Filesize
184KB
MD5aa555d4f2b42ee67fe8a1abb9c738b8d
SHA1e48ba0d377cd3261206a7b7a9df040b879b33ac2
SHA2564e02cec53671e4aed52f02221690601c122f182be56305f78f00327fe38a678d
SHA512f8ce7fe5f4ba90a2bb1805a8435f5c8b3f5c334a0a88852d3fb7866cfb523a0f1bec1b2fb0379817e98074707090412a8adad51ceeda9ee49ec150c41572af31
-
Filesize
184KB
MD5d8e4c1353ca0f6efc02e7420d6a89103
SHA1ae11197d0bf8e99446d8dd46d5de8725f6b303a0
SHA2563ffad51f2c9f27fec11222e33582e2727d7ea17355f4641db39d2d60ebb3af74
SHA512912b5b8e836df4b4ce46732a21188fabff12304f651177ccd4e3c2440785f58ca7e0b0b6c2b72726c1115dbb897dbdaf64a47dafb670968894df9df97a7e6dc8
-
Filesize
184KB
MD5bfdeace2e44fcc7d5487779f04386ff5
SHA115b11f72b15b9f741f54ab1ca11319a9c0d37d8b
SHA256cde8f4ef9551756a9380f8a907404488817af1e74286465e55282166b0a0c300
SHA512bca9c493919d3855d1d0bc58b5413479f0487fb82853f4e7607a83fb5bf943ec29c8229efc0e511d8bf4411fa62df3cf1f477a90ae3cfdcf891369a097bc8ebe
-
Filesize
184KB
MD526577db5f853c7440a5bfcb586da959b
SHA1be9b582505b3c94ee1b7513fe1e37104ef8348e0
SHA256da09ec37a5c1e9a843a10a00d7bc97738eff3c26a07a2f6b0d20193600433093
SHA5126a37231647f38cdf0df399bc133dc4304ecd04ecf42c36116b967b5bccf8268f2660acfd823e2a2f4bc084cfc63010f6b46b7280b2211ef8639fc0553582605d
-
Filesize
184KB
MD5a4aa404a55444a545d8257f7847b8212
SHA14fe511cca837dd4ffd0097f5f420fd474a5fe167
SHA256d4fa830a004dc1eb828848b534c97140f0ef7ac8792d5fd0e149ae725d44f607
SHA51290caf7dd38a1e96f99ad18602d300609d57ee336b8fb7fc0c17a9de1f4c74d3c27744ddc1968c4967ac1181b6eb957a42b7734b30c1a161f94e2506dc12bc66b
-
Filesize
184KB
MD55115f88fcd8d50ce8ab29e2a01be508c
SHA1c367bf12078a60f0fe73de530d2e51b55b952bca
SHA25698c1160701b119c4fea9b446665699d1596cccb913a85c9b642356fdf376ed02
SHA512707f7b8bf0e41c1fe8608f10d514a3de3e04008490d0ba9a766cabd7d3e822f9d7ab18bdf270f361d55d61d6bef76313a1fea397ed2367f50f020218dfc8b041
-
Filesize
184KB
MD5141086723134c28a9025ce384f9b4cba
SHA10d2c70f7d26bfb29d3b89a28627e0e672ff98531
SHA2569b9efa69522f44d28dc8c0e3849bebd941b71136b434672861b8e651918a7831
SHA5122d50470b5aaa0b9d36b7d93f12721fd5170e5b9f4a05185e69bb38656d389040526e83bf732d319c6e0951e8044add1a6c8313d2b6db629d75d8cae0d4b1175f
-
Filesize
184KB
MD52a96d0c8aa98eef9e9df08f833bdc8a9
SHA109f6be1a1b0cfde1416554f237f8ad0ed6063f3e
SHA25669ad15cf0dbea527a0e95ee517a91d8f11666d0bbb9c3b8e59eec53a2725cce0
SHA512bdcda84c31a9e50d6b775290d5f36adc694d8a2f9e6bf0732f6c658b89c63dfedfdda265c708750f331925a596df12c4f7120df059a2050f5508fc1281dab8bd
-
Filesize
184KB
MD51ccd2891cf0ffbbfb993575aba3be021
SHA115a9e6dc4275a4a3fbaa60116a00d34b5f639ce7
SHA256c23a4b88179ead0d1fb83045caa62ae2eae86ad0141ca12946bb57074516a065
SHA512617ce8a371a0f5c3df622ff5354720c76b782395ffc9893fa9b33e4ba069e350b82efcfa38fdef6b10ed807c680b9b677fd4c7c5ad41079bb0f54351c6b01bfa