Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
3709a1f3266f6b584671c612a047a620N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3709a1f3266f6b584671c612a047a620N.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
3709a1f3266f6b584671c612a047a620N.exe
-
Size
468KB
-
MD5
3709a1f3266f6b584671c612a047a620
-
SHA1
17f8387f92fbca9558c6f10da08cd02d90b87259
-
SHA256
dc6734aecf13404411a89f351d2040947e7c92e1cf40bb55df08694f91eedb18
-
SHA512
e763f5fcfa7c66a973eab399d8144b8ed9cb2e31c714af0929840ee92208dd3a8b8949f54a6c0cc57aaf14bb05849c833339e6a8fb560647ed6735ed062beff7
-
SSDEEP
3072:MnANoSCVId5UtbYBPztjcf8/iCcvPgpwVmHeevsMPK88L7yaq8l2:MnqoQbUtiPJjcf7cQePKlXyaq
Malware Config
Signatures
-
Executes dropped EXE 47 IoCs
pid Process 4792 Unicorn-59565.exe 3200 Unicorn-9378.exe 3416 Unicorn-24323.exe 4548 Unicorn-51371.exe 3308 Unicorn-8392.exe 2260 Unicorn-19253.exe 5060 Unicorn-37073.exe 4968 Unicorn-12318.exe 1668 Unicorn-40999.exe 1100 Unicorn-51213.exe 1964 Unicorn-51213.exe 1656 Unicorn-51213.exe 4844 Unicorn-49630.exe 4456 Unicorn-53714.exe 4908 Unicorn-7777.exe 4300 Unicorn-31753.exe 2948 Unicorn-46698.exe 4880 Unicorn-15224.exe 4392 Unicorn-53304.exe 880 Unicorn-65001.exe 2828 Unicorn-3548.exe 2208 Unicorn-3548.exe 2656 Unicorn-19976.exe 2340 Unicorn-60917.exe 1376 Unicorn-59526.exe 772 Unicorn-26107.exe 3948 Unicorn-26107.exe 1576 Unicorn-48400.exe 632 Unicorn-42535.exe 4400 Unicorn-39735.exe 3224 Unicorn-59526.exe 1108 Unicorn-34851.exe 4188 Unicorn-51279.exe 3712 Unicorn-37543.exe 4460 Unicorn-27259.exe 3608 Unicorn-53901.exe 4924 Unicorn-34035.exe 1332 Unicorn-23074.exe 4828 Unicorn-63823.exe 2332 Unicorn-5063.exe 744 Unicorn-51571.exe 2400 Unicorn-61691.exe 3440 Unicorn-54285.exe 1812 Unicorn-39795.exe 4660 Unicorn-56231.exe 2072 Unicorn-56231.exe 548 Unicorn-60315.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5688 2964 WerFault.exe 170 5484 5256 WerFault.exe 182 -
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59565.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39795.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19253.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49630.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59526.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37543.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60315.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3709a1f3266f6b584671c612a047a620N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9378.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53714.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63823.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31753.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27259.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5063.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40999.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51279.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19976.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53304.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54285.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46698.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59526.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53901.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8392.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26107.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 3252 3709a1f3266f6b584671c612a047a620N.exe 4792 Unicorn-59565.exe 3200 Unicorn-9378.exe 3416 Unicorn-24323.exe 4548 Unicorn-51371.exe 2260 Unicorn-19253.exe 3308 Unicorn-8392.exe 5060 Unicorn-37073.exe 4968 Unicorn-12318.exe 1964 Unicorn-51213.exe 4844 Unicorn-49630.exe 1100 Unicorn-51213.exe 4456 Unicorn-53714.exe 1668 Unicorn-40999.exe 4908 Unicorn-7777.exe 1656 Unicorn-51213.exe 4300 Unicorn-31753.exe 2948 Unicorn-46698.exe 4880 Unicorn-15224.exe 4392 Unicorn-53304.exe 880 Unicorn-65001.exe 2828 Unicorn-3548.exe 1576 Unicorn-48400.exe 1376 Unicorn-59526.exe 2208 Unicorn-3548.exe 3948 Unicorn-26107.exe 4400 Unicorn-39735.exe 3224 Unicorn-59526.exe 632 Unicorn-42535.exe 772 Unicorn-26107.exe 2340 Unicorn-60917.exe 2656 Unicorn-19976.exe 1108 Unicorn-34851.exe 4188 Unicorn-51279.exe 3712 Unicorn-37543.exe 4460 Unicorn-27259.exe 4924 Unicorn-34035.exe 3608 Unicorn-53901.exe 1332 Unicorn-23074.exe 4828 Unicorn-63823.exe 2332 Unicorn-5063.exe 744 Unicorn-51571.exe 2400 Unicorn-61691.exe 3440 Unicorn-54285.exe 1812 Unicorn-39795.exe 4660 Unicorn-56231.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4792 3252 3709a1f3266f6b584671c612a047a620N.exe 87 PID 3252 wrote to memory of 4792 3252 3709a1f3266f6b584671c612a047a620N.exe 87 PID 3252 wrote to memory of 4792 3252 3709a1f3266f6b584671c612a047a620N.exe 87 PID 4792 wrote to memory of 3200 4792 Unicorn-59565.exe 92 PID 4792 wrote to memory of 3200 4792 Unicorn-59565.exe 92 PID 4792 wrote to memory of 3200 4792 Unicorn-59565.exe 92 PID 3252 wrote to memory of 3416 3252 3709a1f3266f6b584671c612a047a620N.exe 93 PID 3252 wrote to memory of 3416 3252 3709a1f3266f6b584671c612a047a620N.exe 93 PID 3252 wrote to memory of 3416 3252 3709a1f3266f6b584671c612a047a620N.exe 93 PID 3200 wrote to memory of 4548 3200 Unicorn-9378.exe 95 PID 3200 wrote to memory of 4548 3200 Unicorn-9378.exe 95 PID 3200 wrote to memory of 4548 3200 Unicorn-9378.exe 95 PID 3416 wrote to memory of 3308 3416 Unicorn-24323.exe 97 PID 3416 wrote to memory of 3308 3416 Unicorn-24323.exe 97 PID 3416 wrote to memory of 3308 3416 Unicorn-24323.exe 97 PID 4792 wrote to memory of 2260 4792 Unicorn-59565.exe 96 PID 4792 wrote to memory of 2260 4792 Unicorn-59565.exe 96 PID 4792 wrote to memory of 2260 4792 Unicorn-59565.exe 96 PID 3252 wrote to memory of 5060 3252 3709a1f3266f6b584671c612a047a620N.exe 98 PID 3252 wrote to memory of 5060 3252 3709a1f3266f6b584671c612a047a620N.exe 98 PID 3252 wrote to memory of 5060 3252 3709a1f3266f6b584671c612a047a620N.exe 98 PID 2260 wrote to memory of 4968 2260 Unicorn-19253.exe 101 PID 2260 wrote to memory of 4968 2260 Unicorn-19253.exe 101 PID 2260 wrote to memory of 4968 2260 Unicorn-19253.exe 101 PID 4792 wrote to memory of 1668 4792 Unicorn-59565.exe 102 PID 4792 wrote to memory of 1668 4792 Unicorn-59565.exe 102 PID 4792 wrote to memory of 1668 4792 Unicorn-59565.exe 102 PID 4548 wrote to memory of 1100 4548 Unicorn-51371.exe 104 PID 4548 wrote to memory of 1100 4548 Unicorn-51371.exe 104 PID 4548 wrote to memory of 1100 4548 Unicorn-51371.exe 104 PID 5060 wrote to memory of 1964 5060 Unicorn-37073.exe 103 PID 5060 wrote to memory of 1964 5060 Unicorn-37073.exe 103 PID 5060 wrote to memory of 1964 5060 Unicorn-37073.exe 103 PID 3200 wrote to memory of 4456 3200 Unicorn-9378.exe 107 PID 3200 wrote to memory of 4456 3200 Unicorn-9378.exe 107 PID 3200 wrote to memory of 4456 3200 Unicorn-9378.exe 107 PID 3252 wrote to memory of 4908 3252 3709a1f3266f6b584671c612a047a620N.exe 108 PID 3252 wrote to memory of 4908 3252 3709a1f3266f6b584671c612a047a620N.exe 108 PID 3252 wrote to memory of 4908 3252 3709a1f3266f6b584671c612a047a620N.exe 108 PID 3308 wrote to memory of 1656 3308 Unicorn-8392.exe 105 PID 3308 wrote to memory of 1656 3308 Unicorn-8392.exe 105 PID 3308 wrote to memory of 1656 3308 Unicorn-8392.exe 105 PID 3416 wrote to memory of 4844 3416 Unicorn-24323.exe 106 PID 3416 wrote to memory of 4844 3416 Unicorn-24323.exe 106 PID 3416 wrote to memory of 4844 3416 Unicorn-24323.exe 106 PID 4968 wrote to memory of 4300 4968 Unicorn-12318.exe 109 PID 4968 wrote to memory of 4300 4968 Unicorn-12318.exe 109 PID 4968 wrote to memory of 4300 4968 Unicorn-12318.exe 109 PID 2260 wrote to memory of 2948 2260 Unicorn-19253.exe 110 PID 2260 wrote to memory of 2948 2260 Unicorn-19253.exe 110 PID 2260 wrote to memory of 2948 2260 Unicorn-19253.exe 110 PID 1964 wrote to memory of 4880 1964 Unicorn-51213.exe 111 PID 1964 wrote to memory of 4880 1964 Unicorn-51213.exe 111 PID 1964 wrote to memory of 4880 1964 Unicorn-51213.exe 111 PID 5060 wrote to memory of 4392 5060 Unicorn-37073.exe 112 PID 5060 wrote to memory of 4392 5060 Unicorn-37073.exe 112 PID 5060 wrote to memory of 4392 5060 Unicorn-37073.exe 112 PID 4844 wrote to memory of 880 4844 Unicorn-49630.exe 113 PID 4844 wrote to memory of 880 4844 Unicorn-49630.exe 113 PID 4844 wrote to memory of 880 4844 Unicorn-49630.exe 113 PID 1656 wrote to memory of 2828 1656 Unicorn-51213.exe 115 PID 1656 wrote to memory of 2828 1656 Unicorn-51213.exe 115 PID 1656 wrote to memory of 2828 1656 Unicorn-51213.exe 115 PID 1100 wrote to memory of 2208 1100 Unicorn-51213.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\3709a1f3266f6b584671c612a047a620N.exe"C:\Users\Admin\AppData\Local\Temp\3709a1f3266f6b584671c612a047a620N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59565.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9378.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51371.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51213.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3548.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17337.exe7⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49023.exe8⤵PID:5440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7175.exe7⤵PID:5584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54648.exe6⤵PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9042.exe6⤵PID:5968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59526.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54285.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30741.exe7⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exe8⤵PID:6308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38825.exe7⤵PID:6984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16905.exe6⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exe7⤵PID:6748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32140.exe6⤵PID:7036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39795.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14212.exe6⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exe7⤵PID:6756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28711.exe6⤵PID:6920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16085.exe5⤵PID:5324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exe6⤵PID:6716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4836.exe5⤵PID:6892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53714.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26107.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56231.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24519.exe7⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21935.exe8⤵PID:6828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59438.exe7⤵PID:6884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62022.exe6⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42547.exe7⤵PID:6740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7636.exe6⤵PID:6876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54648.exe5⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22381.exe6⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38271.exe7⤵PID:7044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14705.exe6⤵PID:5276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51637.exe5⤵PID:5572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42535.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60315.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3906.exe6⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35531.exe7⤵PID:6968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18851.exe5⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19797.exe6⤵PID:7016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3936.exe5⤵PID:3412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23756.exe4⤵PID:5256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5256 -s 4885⤵
- Program crash
PID:5484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19253.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12318.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31753.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50948.exe6⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18681.exe7⤵PID:5880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15264.exe6⤵PID:6096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37543.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17529.exe6⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6812.exe7⤵PID:5536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28519.exe6⤵PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34532.exe5⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6812.exe6⤵PID:5528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13309.exe5⤵PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46698.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34851.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56423.exe6⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21395.exe7⤵PID:6108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11643.exe6⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32473.exe5⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29095.exe6⤵PID:5792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9198.exe5⤵PID:6284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51279.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60507.exe5⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60097.exe6⤵PID:5228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59246.exe5⤵PID:5936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52074.exe4⤵PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63767.exe4⤵PID:6340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40999.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26107.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-808.exe5⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8566.exe6⤵PID:5544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64544.exe5⤵PID:5612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7585.exe4⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10512.exe5⤵PID:5632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18772.exe4⤵PID:5704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48400.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51571.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59521.exe5⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46055.exe6⤵PID:6244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2069.exe5⤵PID:6812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31487.exe4⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56361.exe5⤵PID:6168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15804.exe4⤵PID:6820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61691.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12266.exe4⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52614.exe5⤵PID:6868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21611.exe3⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5790.exe4⤵PID:6548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40177.exe3⤵PID:6936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24323.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8392.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51213.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3548.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8976.exe6⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42909.exe7⤵PID:6956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60844.exe6⤵PID:5976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15753.exe5⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9042.exe5⤵PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59526.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-808.exe5⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14596.exe6⤵PID:5672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54046.exe5⤵PID:5784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21320.exe4⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34741.exe5⤵PID:6972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14907.exe4⤵PID:5948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49630.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65001.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63823.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30165.exe6⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 4647⤵
- Program crash
PID:5688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2131.exe5⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19365.exe6⤵PID:6516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5063.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10320.exe5⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38079.exe6⤵PID:5864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22681.exe5⤵PID:6708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39001.exe4⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64529.exe5⤵PID:6148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64648.exe4⤵PID:6772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19976.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56231.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3906.exe5⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58691.exe6⤵PID:6996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49516.exe5⤵PID:5896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27595.exe4⤵PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31270.exe3⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8374.exe4⤵PID:5768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6242.exe3⤵PID:5992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37073.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51213.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15224.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27259.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7798.exe6⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8758.exe7⤵PID:5720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51462.exe6⤵PID:6520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53470.exe5⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33755.exe6⤵PID:6376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36417.exe5⤵PID:6732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34035.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61083.exe5⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61000.exe5⤵PID:6300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46785.exe4⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5406.exe5⤵PID:5152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15063.exe4⤵PID:6264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53304.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53901.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18105.exe5⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48385.exe6⤵PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61000.exe5⤵PID:6316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33049.exe4⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52469.exe5⤵PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9198.exe4⤵PID:6276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23074.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32303.exe4⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11436.exe5⤵PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45048.exe4⤵PID:6780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23870.exe3⤵PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62397.exe3⤵PID:6532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7777.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60917.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31535.exe4⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18681.exe5⤵PID:5872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48592.exe4⤵PID:6004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38311.exe3⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-206.exe4⤵PID:5820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16634.exe3⤵PID:5904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39735.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-808.exe3⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8374.exe4⤵PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60844.exe3⤵PID:5960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1985.exe2⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26849.exe3⤵PID:5840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exe2⤵PID:5492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2964 -ip 29641⤵PID:5228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5256 -ip 52561⤵PID:5680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD55c85f4e6b67f99044dddfef7e6c690f3
SHA133ee1c7b76a7431c102b61f955849b7c3761f9a2
SHA256dbaef1d63256613b1846f9b7910e92cbc168b7d04a7797e35aa3d5cab363ff7e
SHA512859339dbedcfe462f1793cc641e5ee10cde3e95dd1b5ba5fa621da0d06ac1674687e23f67fe63e26034fc2ed8caffff58bbad8f8b4c1ac704371008d82d670a9
-
Filesize
468KB
MD50f72a45ec797222b470a19b50c0aac23
SHA1a238e625f1ba72d5e989f036ded3b1996fe25ceb
SHA2560cba95d66b4bdce45d2dfeca8df724b7d412c35b9ed40ab8326ef6dc10cd2503
SHA5124198395ae927abe1b142c369b42f08447cc7161333ff5358b2ab14fbb88f38d1b53929a5769d15e207550d98c92210fd3ec56ac179e44a5b89ba24d4363336ec
-
Filesize
468KB
MD504e6150be0b81b59d537cfff8b6943f5
SHA1d4113990cf585fe79babcfee31c34f716e57b89b
SHA256511bede761f30b5c85db61fb16f3d9258d52e92fd08337fc275fcf072193cfbc
SHA512dda1590d0e10ab961845e77f6bb5adfa3d672317ac27415806487fdc55afffc436c265c9d3e3d38a5c08a4d2fd972161f72d26676197779d752e241c8c8fa66f
-
Filesize
468KB
MD5fddc1117216b160742e3f6a8b3fae94f
SHA141b9755d1bde48631ec7b3a7c6e829634e5636ac
SHA256cb8b68f0d2b9af001f155db94e1ec61d0aa7384cadd3c227bb1bdc3c57fa9b64
SHA5127ae16c4e2f55ff5e5a49ff15c2181e689ff7d8017fe0a2b5e19247c77c18682576ef4f4d9b53f474abe7518904280c3bad44cd9c67dcdbfec44653347ea6b88f
-
Filesize
468KB
MD56926f4fe0b78d23bc05b7e4e8c579f77
SHA1fe75c872941d92fadc47fff49cc90a49f85ee8ca
SHA256c5fe9d860681034c52c22efb62e09fa3fa035921c61d4283298d5e8b4b07e8f4
SHA512e7a4d8d42b622b186b15e059b177cde47e60ac626254901e10960955d70728345cf0e7611c001ebceca5b05118219fd4243cdc21986f49fe82c2c9733816a72f
-
Filesize
468KB
MD55c3af736de402e95f1ff00fcefcddea1
SHA1c7b4c39168f0e5715776cf592469243514805c3e
SHA256b4db9fdcd74e1b6ac884576c315344857ae92fad6061eeb01253003176d4acc7
SHA512dc436511b5aa33ef57c2585830a2558def8ef005214f971fd401bdb77e90e985d84ba8586eab40fb2eb69b8905e6425d84f2663d74016da15583bcdba6d2066c
-
Filesize
468KB
MD54d6f14da7e0366e57197d1249f795361
SHA1399cbf1397f6c6c401ad7ba5295fb7622c54c248
SHA256ad66c0b66f8346fd361f5f0c24e797100c5084793d9dd80b29385b621805876d
SHA51299e62756336e62936420b0ea66b24234e4ecdab8f20978fa80243ad3d86b30d517819ab7845cdcdb1bd6cc1e64c43d0074b8a19362cb0053c3985317eb62afe1
-
Filesize
468KB
MD5c9dac935e10a0008c73840dffb2493ee
SHA1e05d7b738e7ede845cd7bd6e870877ebc73dba7a
SHA25633a74fe3fcf9f511c61a9ddf1673376587557932d82d67b6956210a4abd5fa52
SHA512fb3a0555c2163e24c9cdae4c9265f9b5e1c23fe66a736cdb3ac7e4651f40674d1dbe1ff79d8bc50d3a48e1e1b7e075cb7991447ebf238a63cd141fed40fc5019
-
Filesize
468KB
MD5138d729a9691d2d0026da41924b8dff8
SHA125fa05b75957fa982b7a992083beabaff80ea69e
SHA256ed49f030e44a86ca3af93ffb7e2388d8905f934b4c221b19956a1c74fdfd7ba4
SHA5126d888cacc8e5cf21b277d9c7820962385eb080f7fbc49853698dee141b34b661b18f8115ac11cecb46cf62f33d766b99470ca0033a4cd9ae06274358d305aa5f
-
Filesize
468KB
MD5e8803578f120c6e90082c9c5223ba161
SHA1caa1b7f0521d8412f47b05cd4911daa166c2bd9e
SHA256d3fca22e5311caad7a0c3a956139b85307c8a65a0dddefa0264761a3a1f641b9
SHA512a2e618e8e25d83a3dbfd36d2006c61b7e5d7de85e2fc77d14aca5174dac8dc2ad6db2c95e760a9bf40a0e207e65a611b3614d63e0d42695f94c7c2c5021278d5
-
Filesize
468KB
MD5f71ccd86277a1bc450cc75313adc7080
SHA15b5fc4d4e7665a55087fdc58734f1f1ef1f1b3c5
SHA256407d9ed91e0655ec378bf8976c57740a10eed2dfc9301c29a590d61b0cc3165d
SHA5128e75eadf9a0cecc854a7d4070563b84bcf8b1de9c0c062e2ac9040d93c0292cd8b50fcf699aff2781bbd72eb8be4504443192e8839c9df6542800b1bc0c9f248
-
Filesize
468KB
MD59fd47e45af270506e338159398cc4ef9
SHA1c06b4ef5ec0b5b11a4fdd5633c102673a9c68812
SHA256f6e29232e7cef1fc14179f3310f34438910987cef8c2c56dc4668d910370693d
SHA5127b4d585f4dc6e9dd4e2e9fc1e1f526600b1ec66068629185819a24a1800a9c9655e73e83898057ed07acf8754b64099fccd8c5c5686a8e042117f290c9b396cd
-
Filesize
468KB
MD545171268bb192645b3235dd1afb09383
SHA157290a7c95ec15b9f739d4a05545daef5cb6c82c
SHA256cfe855a38153db68e83336ee47eb55fcb0803e845033c1556ca12c7e7c0e1308
SHA512dca0362816dbab9d0e64a2d9bcc945af4b14493868c689c233fe09374e403f8932cb70936ae4ff2b487e0ab8d8687973576e2794bc28ce9d9a25b7e6e2a90139
-
Filesize
468KB
MD56132e737bcee7f8d008b812749b82d66
SHA1aba620c5883ac46f00c8aa79ac38b3731dba64dd
SHA2563f506509a9db453df000de1801b518c27d04ec05e467bc50b8a6d2f7847156ef
SHA512b4cdf20e54bd6636ddc841954db7c9c8db750923bf4b35cbace20b3245e0f63860c0757e1fb87ad4937c9f5c7f72de8c09409cba8a2cc4f9ca267f8cfb39c99e
-
Filesize
468KB
MD549a5a6bd9e8effa090ddaeef49f649d0
SHA1af57223f5da0c2a720431335dcbc74fe03da7442
SHA25623f71c98f3fca41f14ee4e5f3da47fabc7b63b52caddb197e050423cb5c57a1b
SHA5129c63d5c464c25b7288c4fc6e415cc38c47a9194787b685bdb9ab8342c9faf8f08539b693a5d052c60aa4953314f52e0bd96cf45a3c9f20f82eab2d8eddc2502f
-
Filesize
468KB
MD55569256d2f5918349c85f8cb2dbc6c67
SHA14de83af63ab013334609abadded5f70acb6df31e
SHA256272cca2934a395794dac2d88a66c30d4ae10fb57403439c21cf0ef1723620b95
SHA5125644c5086a94ff75c7db0371f2a5f9e5ccd6f94c81303fe15cff6ba8efb310d449e0fd7cf95974248e65a5d94afdaa5283933b477704497109a050085ea9c191
-
Filesize
468KB
MD55264e2eda4315ea37cf4a329fa19d8c9
SHA1182ed18303f200186f127bf51a8d0a021477a034
SHA256ce4b39ea562a8ed4458c43f1c4d651ab363c1b12540dd3241378a646b6234eb4
SHA5126ed73ebb8714c6a9f1f265a38c9674c841e9bfe6bcf63b57e287f17c7749ce30c36bb3de30d06bef837b23c6708f2f14a343b9e36380f98a2af71006879a7fdd
-
Filesize
468KB
MD591863d213258955da210a867fc5cd7e2
SHA1f2bdb94caa791fbfd12c2ec355a0cbca72d90e95
SHA256e17297fdbb6180442cc8af6cf969035c00b415c4a903ce5619268f09620275f4
SHA512db2727c0ee288aa3554efa6ae1557767438824471eaf8b7e1ac8a16d6c07a00b523b1ea10dd31d0547fb909f26cd728ec4f60aa63bda1a271674690b976e130a
-
Filesize
468KB
MD52a4021eb57e90ab20f25a10a3ca60dd4
SHA18be42a4d9ad74976ac8c910098825532b72946dd
SHA2561931f38d35ca31f697821f3cc17ed3a7b9a6b16ed704eef319c54629386fe630
SHA51283a869691f3a66cef06fbf68822e19dc6be8c2715cccd5a18658e117ca586cf76375f489673eccb26a0cdff77f80f9f7c0702b66e46bddb2883fa8528b441c60
-
Filesize
468KB
MD5977bdcbfc6018d05ea1df4cce7526ec3
SHA1f11106dd7374cefdbfef825644615e51e22e40bd
SHA256fa82be796e9df337bb4501938b11a9460ab77904c42b8c240228215f33f306b3
SHA5123573b0c5d11b93e24509bdd3ae2b3a236ec84b9b3a2d8cc820061c255f23ae02bb1a3b94f67488e3da249e3723548163607b152555841cdd4838c66469d99c94
-
Filesize
468KB
MD55f5bfab87a96b8ae980d516ac5cd40ba
SHA15f71b1629471a7a20792d746ef1b8570cc5bfb67
SHA25612e532679781e4d27194ebba2df761f92d011b3a460e4e806d7eeba58254a8e5
SHA51249214120328fa1a27a9d01a01f8c2873b36ae15edb669e961b0dedc832713bbeff85ee250fd57118a7bf79d886a724050fe5aef398e43235d8fc6bd8b2438c03
-
Filesize
468KB
MD522dcfcb8cf96de36babc6b268d29a165
SHA114e3794ef33887db7b023da0d957524928cb3380
SHA256cabc7b0e1c47dbec6796d6602cf5dacc5f79a9cb1bb6fc702b12064e0822b1bb
SHA512b10b5c0e539d2fe5f86d23a6da97112224e9fb75e3b60947a18815a801e06401d20b3721f6c8e6519ca5b5a63417347522ce66689c550798f23e01137998ab18
-
Filesize
468KB
MD56f7b56eee8bed8139a2668924b025e29
SHA1224180fed7a06c2f5d952888c4b90e8cc8320b21
SHA2561d1174bd24c70d8b5b9e25a5faf5ce78c7a1ca8c720a3bbc9a364ec2fc471aed
SHA512a5e33f33edb1af721abd7ca54f5a6334c8241fa211f2c609e75771401b5762eea5bfb9684c3ffb7500245b77f75176a519fe28faaf299451fd17830ec5897032
-
Filesize
468KB
MD5a891a85d4ea36552f7efac891ce7e0b3
SHA1bce661b20b7cd7e5d9f127eed5eeb5f7d4ad413c
SHA256f3dd730bfeb50098fb39279c4b3cbded8d657a21c1895c2058a57f137c2929be
SHA5126fdadd598cbb6781a43e264f3ff718c50a5418b999756e28420216bd1ebba773a841b799affd41ee37107d14bb79a310f19f3b4d047087b6eb3b773cf726d0ea
-
Filesize
468KB
MD567fa2f58f881831bf5e2f7977146c362
SHA1b911b58f1e86d8d5e3fe89efd054c90219d187c6
SHA2564462755de8591c6b27b182166413870458f5ccd9c4c30d941bc664148eef95f3
SHA5126e924196e1c6b9a3c0f6b37320406f0d3a1507a5af60aefb2dc160d33874ba4e4f822aaf4632c04a735da7848a00151d5e44fa21ec8c0d82417f6ab677a357b7
-
Filesize
468KB
MD57f2758cac035e9f24da626a89397a1ff
SHA1b5c94315fbc0e8a483c9eeb1e9daff5a3913b3f8
SHA2569631f1b174ea8e035fc23d68e45ad02cff1150890b5d2e47a8a35f3c5bd26581
SHA51248419ba7f936cff2c3de05bb89dc053e995b7031958f6af8c1ae90975f8e2a864c3a13c7ff478172f4d2244dc2d23acb1ace0d1a0541bcc4c3f81f8cd96fdd78
-
Filesize
468KB
MD5b749e36850a571f78f78bf3e5bf9a13b
SHA1e4cbc09dd6380c03ad4ab5863c53336a9e6c1513
SHA256bf42440d9e2e840ef2a940ea5be9a86fe9d6d20939cd17e278dc27b5d43846d5
SHA512fceee45fc16090abbb04e24b552dd5007c9a2392f934cddcdfb8124bda19c612e118abcca149407274c848bed848f1623a39731864f6eea216f5c369745e7aa2
-
Filesize
468KB
MD570cf338c173962b9df2731216c7cee10
SHA150c6d312e690ed1aaa0772c0b251f405a107ba25
SHA256ba508db2f9b1b61e13e7d5faccd6f0ae1667fd10f087d81ca08f59eff9c83c1e
SHA5123d565cf677c5c2131b098bc3d9b14105517c123cb0b0acd0ca03270213d9801e69b61673a62b3c591097037568234a47ab8bc8ac62bf897e83cc17ebb6f7c1dc