Analysis
-
max time kernel
31s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe
-
Size
468KB
-
MD5
3fcd75e73d039408032b72d5b7db4ad0
-
SHA1
2d647d4f9e3abdd2358a77a5b130776fa729d9e2
-
SHA256
6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2a
-
SHA512
4f51ade3a6528985343d266640bc429e76fd9c0d74b1cf0fd3ddbf958de74c6c38831a89f7e554b5876298ad60deb6f60be519b45a7315eb4902f25c62c6b7b8
-
SSDEEP
3072:W1LhogbZaM8Udb/sPz5Wff1cihnWI8JnmHekVpb5C23hVeNQtlD:W11opBUdYP1WffYxPq5CcneNQ
Malware Config
Signatures
-
Executes dropped EXE 47 IoCs
pid Process 880 Unicorn-4225.exe 1640 Unicorn-44690.exe 820 Unicorn-8488.exe 1764 Unicorn-21058.exe 3460 Unicorn-55960.exe 3340 Unicorn-4721.exe 4332 Unicorn-42224.exe 4428 Unicorn-15297.exe 2808 Unicorn-27912.exe 4548 Unicorn-39994.exe 3308 Unicorn-15489.exe 2588 Unicorn-58560.exe 1840 Unicorn-61161.exe 5060 Unicorn-64425.exe 436 Unicorn-44794.exe 1656 Unicorn-8592.exe 3524 Unicorn-12121.exe 3152 Unicorn-63360.exe 3656 Unicorn-7440.exe 2476 Unicorn-19138.exe 1532 Unicorn-64617.exe 3500 Unicorn-54424.exe 2128 Unicorn-60554.exe 516 Unicorn-19330.exe 4284 Unicorn-33393.exe 1484 Unicorn-9153.exe 4948 Unicorn-32703.exe 4488 Unicorn-58354.exe 876 Unicorn-30320.exe 3320 Unicorn-20586.exe 1932 Unicorn-7736.exe 1900 Unicorn-60850.exe 1804 Unicorn-60850.exe 2700 Unicorn-42158.exe 3236 Unicorn-42158.exe 4952 Unicorn-29906.exe 1648 Unicorn-1872.exe 2004 Unicorn-51649.exe 3028 Unicorn-5977.exe 4304 Unicorn-5712.exe 2060 Unicorn-65384.exe 392 Unicorn-53569.exe 4924 Unicorn-48280.exe 1516 Unicorn-62386.exe 3420 Unicorn-34544.exe 1360 Unicorn-7247.exe 4456 Unicorn-35111.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 6196 5576 WerFault.exe 198 6028 4892 WerFault.exe 168 -
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64425.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33393.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53569.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9153.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34544.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55960.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20586.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5977.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61161.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63360.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21058.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58560.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19330.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19138.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51649.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15489.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65384.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 880 Unicorn-4225.exe 1640 Unicorn-44690.exe 820 Unicorn-8488.exe 1764 Unicorn-21058.exe 3460 Unicorn-55960.exe 4332 Unicorn-42224.exe 3340 Unicorn-4721.exe 4428 Unicorn-15297.exe 2808 Unicorn-27912.exe 4548 Unicorn-39994.exe 3308 Unicorn-15489.exe 2588 Unicorn-58560.exe 1840 Unicorn-61161.exe 5060 Unicorn-64425.exe 436 Unicorn-44794.exe 3152 Unicorn-63360.exe 3524 Unicorn-12121.exe 1656 Unicorn-8592.exe 3656 Unicorn-7440.exe 2476 Unicorn-19138.exe 1532 Unicorn-64617.exe 3500 Unicorn-54424.exe 516 Unicorn-19330.exe 2128 Unicorn-60554.exe 1484 Unicorn-9153.exe 4948 Unicorn-32703.exe 4284 Unicorn-33393.exe 4488 Unicorn-58354.exe 876 Unicorn-30320.exe 3320 Unicorn-20586.exe 1932 Unicorn-7736.exe 1900 Unicorn-60850.exe 1804 Unicorn-60850.exe 3236 Unicorn-42158.exe 2700 Unicorn-42158.exe 4952 Unicorn-29906.exe 1648 Unicorn-1872.exe 2060 Unicorn-65384.exe 4304 Unicorn-5712.exe 3028 Unicorn-5977.exe 2004 Unicorn-51649.exe 392 Unicorn-53569.exe 4924 Unicorn-48280.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 880 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 82 PID 4228 wrote to memory of 880 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 82 PID 4228 wrote to memory of 880 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 82 PID 880 wrote to memory of 1640 880 Unicorn-4225.exe 83 PID 880 wrote to memory of 1640 880 Unicorn-4225.exe 83 PID 880 wrote to memory of 1640 880 Unicorn-4225.exe 83 PID 4228 wrote to memory of 820 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 84 PID 4228 wrote to memory of 820 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 84 PID 4228 wrote to memory of 820 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 84 PID 1640 wrote to memory of 1764 1640 Unicorn-44690.exe 89 PID 1640 wrote to memory of 1764 1640 Unicorn-44690.exe 89 PID 1640 wrote to memory of 1764 1640 Unicorn-44690.exe 89 PID 820 wrote to memory of 3340 820 Unicorn-8488.exe 91 PID 820 wrote to memory of 3340 820 Unicorn-8488.exe 91 PID 820 wrote to memory of 3340 820 Unicorn-8488.exe 91 PID 4228 wrote to memory of 3460 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 92 PID 4228 wrote to memory of 3460 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 92 PID 4228 wrote to memory of 3460 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 92 PID 880 wrote to memory of 4332 880 Unicorn-4225.exe 90 PID 880 wrote to memory of 4332 880 Unicorn-4225.exe 90 PID 880 wrote to memory of 4332 880 Unicorn-4225.exe 90 PID 1764 wrote to memory of 4428 1764 Unicorn-21058.exe 94 PID 1764 wrote to memory of 4428 1764 Unicorn-21058.exe 94 PID 1764 wrote to memory of 4428 1764 Unicorn-21058.exe 94 PID 1640 wrote to memory of 2808 1640 Unicorn-44690.exe 95 PID 1640 wrote to memory of 2808 1640 Unicorn-44690.exe 95 PID 1640 wrote to memory of 2808 1640 Unicorn-44690.exe 95 PID 3340 wrote to memory of 4548 3340 Unicorn-4721.exe 96 PID 3340 wrote to memory of 4548 3340 Unicorn-4721.exe 96 PID 3340 wrote to memory of 4548 3340 Unicorn-4721.exe 96 PID 4332 wrote to memory of 3308 4332 Unicorn-42224.exe 97 PID 4332 wrote to memory of 3308 4332 Unicorn-42224.exe 97 PID 4332 wrote to memory of 3308 4332 Unicorn-42224.exe 97 PID 820 wrote to memory of 1840 820 Unicorn-8488.exe 98 PID 820 wrote to memory of 1840 820 Unicorn-8488.exe 98 PID 820 wrote to memory of 1840 820 Unicorn-8488.exe 98 PID 880 wrote to memory of 2588 880 Unicorn-4225.exe 99 PID 880 wrote to memory of 2588 880 Unicorn-4225.exe 99 PID 880 wrote to memory of 2588 880 Unicorn-4225.exe 99 PID 4228 wrote to memory of 5060 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 100 PID 4228 wrote to memory of 5060 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 100 PID 4228 wrote to memory of 5060 4228 6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe 100 PID 4428 wrote to memory of 436 4428 Unicorn-15297.exe 103 PID 4428 wrote to memory of 436 4428 Unicorn-15297.exe 103 PID 4428 wrote to memory of 436 4428 Unicorn-15297.exe 103 PID 1764 wrote to memory of 1656 1764 Unicorn-21058.exe 104 PID 1764 wrote to memory of 1656 1764 Unicorn-21058.exe 104 PID 1764 wrote to memory of 1656 1764 Unicorn-21058.exe 104 PID 2808 wrote to memory of 3524 2808 Unicorn-27912.exe 105 PID 2808 wrote to memory of 3524 2808 Unicorn-27912.exe 105 PID 2808 wrote to memory of 3524 2808 Unicorn-27912.exe 105 PID 1640 wrote to memory of 3152 1640 Unicorn-44690.exe 106 PID 1640 wrote to memory of 3152 1640 Unicorn-44690.exe 106 PID 1640 wrote to memory of 3152 1640 Unicorn-44690.exe 106 PID 3460 wrote to memory of 3656 3460 Unicorn-55960.exe 107 PID 3460 wrote to memory of 3656 3460 Unicorn-55960.exe 107 PID 3460 wrote to memory of 3656 3460 Unicorn-55960.exe 107 PID 4548 wrote to memory of 2476 4548 Unicorn-39994.exe 108 PID 4548 wrote to memory of 2476 4548 Unicorn-39994.exe 108 PID 4548 wrote to memory of 2476 4548 Unicorn-39994.exe 108 PID 3340 wrote to memory of 1532 3340 Unicorn-4721.exe 109 PID 3340 wrote to memory of 1532 3340 Unicorn-4721.exe 109 PID 3340 wrote to memory of 1532 3340 Unicorn-4721.exe 109 PID 820 wrote to memory of 3500 820 Unicorn-8488.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe"C:\Users\Admin\AppData\Local\Temp\6c10a82d4a38b652751682a3501b27ec0f99261a47b49bb0b81bf421ce53ad2aN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4225.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44690.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21058.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15297.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44794.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20586.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3777.exe8⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28962.exe9⤵PID:5576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5576 -s 48810⤵
- Program crash
PID:6196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exe8⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8401.exe9⤵PID:6668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33112.exe7⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53658.exe8⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-809.exe9⤵PID:6788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8607.exe7⤵PID:5668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7736.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4161.exe7⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55578.exe8⤵PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27544.exe7⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49626.exe8⤵PID:6616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47232.exe6⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47602.exe7⤵PID:5680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63481.exe6⤵PID:5752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8592.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10528.exe6⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47794.exe7⤵PID:6040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56848.exe6⤵PID:6108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65384.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38178.exe6⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39272.exe7⤵PID:7136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exe6⤵PID:6688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39257.exe5⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25594.exe6⤵PID:5828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23015.exe5⤵PID:6424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27912.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12121.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60850.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14633.exe7⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46642.exe8⤵PID:6120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4576.exe7⤵PID:5176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27632.exe6⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39050.exe7⤵PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28015.exe6⤵PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1872.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exe6⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23202.exe7⤵PID:6344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56744.exe5⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34146.exe6⤵PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8136.exe5⤵PID:6656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63360.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60850.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6081.exe6⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64322.exe7⤵PID:5880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28120.exe6⤵PID:5912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11104.exe5⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46642.exe6⤵PID:6128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1207.exe5⤵PID:5152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5712.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38178.exe5⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exe6⤵PID:6452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23575.exe4⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 4645⤵
- Program crash
PID:6028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42224.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15489.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9153.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27322.exe6⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48074.exe7⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57882.exe8⤵PID:5716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13808.exe7⤵PID:6824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59065.exe6⤵PID:5408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58664.exe5⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17810.exe6⤵PID:6092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1696.exe5⤵PID:7064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30320.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3009.exe5⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62786.exe6⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49626.exe7⤵PID:6600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50897.exe5⤵PID:5424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54056.exe4⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47529.exe5⤵PID:5376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13128.exe4⤵PID:5380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58560.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19330.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43969.exe5⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39050.exe6⤵PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12063.exe5⤵PID:5236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34544.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53393.exe5⤵PID:5920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48488.exe4⤵PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33393.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57010.exe5⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23202.exe6⤵PID:6352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26584.exe4⤵PID:5340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35111.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47690.exe4⤵PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20984.exe3⤵PID:5332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8488.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4721.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39994.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19138.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42158.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exe7⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23674.exe8⤵PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29760.exe7⤵PID:6608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34840.exe6⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23866.exe7⤵PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43584.exe6⤵PID:3584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51649.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62874.exe6⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exe6⤵PID:6696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33391.exe5⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33186.exe6⤵PID:5532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57721.exe5⤵PID:6888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64617.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29906.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exe6⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49330.exe7⤵PID:5544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14472.exe6⤵PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10144.exe5⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47898.exe6⤵PID:6252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48280.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe5⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34338.exe6⤵PID:4216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exe5⤵PID:6704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37441.exe4⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25314.exe5⤵PID:6836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61161.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60554.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20232.exe5⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39272.exe6⤵PID:7144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2271.exe5⤵PID:6676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40320.exe4⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48074.exe5⤵PID:1108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48488.exe4⤵PID:5312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54424.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5977.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4576.exe5⤵PID:5200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exe4⤵PID:440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53569.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16170.exe4⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1281.exe5⤵PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46481.exe4⤵PID:6780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38952.exe3⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63658.exe4⤵PID:6412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55960.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7440.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42158.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5313.exe5⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24826.exe6⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38784.exe5⤵PID:5124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34840.exe4⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23866.exe5⤵PID:5956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19463.exe4⤵PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7247.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47882.exe4⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33186.exe5⤵PID:5528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20248.exe4⤵PID:6436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54353.exe3⤵PID:5284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64425.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58354.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27322.exe4⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62210.exe5⤵PID:5180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exe4⤵PID:5276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48489.exe3⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5033.exe4⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50098.exe5⤵PID:6216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45905.exe4⤵PID:6712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7263.exe3⤵PID:5400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32703.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44042.exe3⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46066.exe4⤵PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59065.exe3⤵PID:5416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34720.exe2⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54618.exe3⤵PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4993.exe2⤵PID:5388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4892 -ip 48921⤵PID:5728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5576 -ip 55761⤵PID:5512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5f05edd01e43e957f96078c5e37944ce6
SHA143a55b143be32e9355ab630f3405d208b33e3e92
SHA256f56a97f81290faa51832d71444b6f038cfa4f2b8a8166b9e944980cd8204e178
SHA51218a97fd3a0c3cc129106ae5eac9b5c93ff67d8c4f0172257a9b5395a9a67cbf181924fc9d02f49fecf004445e1fc993c7adda56ca49541da6b4016e96563a76b
-
Filesize
468KB
MD50cb6279dbc82dd1203d1d9b1c866678e
SHA1abc50604ccb2ddf163c75c8b04d382dc7b376188
SHA25646ffd9d1fcd51123e6f14b3e31325d36a5b3c7e5eed7cd52e5e75ad8deebea00
SHA512cfa13e640647f58a6d021f65dbc43f92d63f78512d9ce89626c1f4896920aaf0dce7df4572b10a2cf1f17234ce51934670fae6624d61bdffc7a0bd3b0f037090
-
Filesize
468KB
MD595f03c5383e70520dbb24b417aa7b51c
SHA1d2b9467fd631e2df93cee1e8aadf60cc2734458f
SHA256b1e85d51a89b33798745e7d03ee8b446e0060b8a704e988bd03849f5e0fd4ad9
SHA512ca0202e7e0a5f0279be6836be069069b44a58d902279dd27c652074361cc87f24ea4ef1759b38177b1030707898708400abab8c8107da28c6bc2a4c12a7b3bd9
-
Filesize
468KB
MD5533c2a4aae08be69cfdae13ccd34e722
SHA1680207d62a1d1c2c37a036e363c3e554b9767845
SHA2566e65653900aae04799ae89bbd33101d1618f539bb2a905281d4f87b327ad559a
SHA512805e71f8736c0201f40ba2fb2d6e7a96651201a6e4ca1621b5cf6bb968ee7e1f50205e3554a5581263003c887a13ace2627853eab2cc8f358f2231ed02b4990d
-
Filesize
468KB
MD5d013fccbe1c2980edbd64186758116e8
SHA13becdd3b292714968468dc2264116ce1bf00bc4c
SHA2560397885cd6692265b9e9db8a57397b42909237c439144c0d5935f341d1c0b9e4
SHA512174f6a3f38856f2c6e366552c83fb3b6f4f001225b8cd6f34b2eff1237e96d44fe60a01ad04f122fbe57a0c4a50d4e504f06cf3884872b0a4ec1c28f0bebcb10
-
Filesize
468KB
MD5a76db261c45ef2e93451021ffb4e4e29
SHA136ef2eb411307f4aecaf21b22a6641b1b92f74ac
SHA25612160e400baaa6cdd7873cc9829996eaedeef729a9a28a8ddc9b8d008fdaf0f9
SHA5124c836979233f8a104f8d5a53da631bc757287686a1398a3fd9216388bcc27cadaea12b07f85ee4bf0ba7ffaf37bf11552e2090170d3721e50b253ec16a861b6f
-
Filesize
468KB
MD5440584075915562a65be942ef0dc94d0
SHA1bd48dc063eaaf22cf1bc784855f230e6421ff4ca
SHA256eed5d888167fd170b881d3133ff941866f56ded2fc899bf665faa2b908b8c03e
SHA51261e37f66f8edea5675eab28c760350411d800ff78f4479f2dd04f3d61bb029344026fffb216fa50c5f1edba12b38dd7b9c9588b93600c3cb93f2a79d74433b9d
-
Filesize
468KB
MD51b42baddd8a676732a70d7447776795d
SHA1b669e20baf2a086e9093e3e9b5d3d8e2dbc7e9a2
SHA256dbcc8a6aac8d6db8f22a35b99c44f06950c40a18c5690f60826f23a9ea90ddff
SHA512fe9ffe26cde895395e800c583c6fb682c27c8c29543f2c387ce47271e4e6ddbee83705cf5951d8dd66a61cba122c8628aa01ba42adcf17ce4a995632cb172884
-
Filesize
468KB
MD526ff6df7cdbe501d20b035c6fdccfde6
SHA1a47490706f1d9e9b9a51fa053f0803d1d54189be
SHA2561f1ea9a8a86e7fed0191f8220a11559e74d84d3b94a45068cc56540ee67ec859
SHA51237c18e4f819a76dd10aaed45f72cd00951f9aa2a724e3c9bf2595d500ef97940812064e623c867411a580d160b6454030180d9e83f35ab07e1f1d46c4160670d
-
Filesize
468KB
MD5f7e1ab685168d6203322ddc1a5d7839b
SHA17954d2cfd9e37c129a9d6f8641a8b369430c845b
SHA256af81791df653b71b85058aaa733130533b86551561030623ef8f14c9530cd50f
SHA51281ea3cd6aad2c36b6f22f679c24c186dfde11d4f69be233b6d700706e523523ca8a3e5bce654cb086b4633d3e276d8e622774aa75becffba65ef0582f935ef4c
-
Filesize
468KB
MD5f98bea084a4a60d4c180182501c1f41e
SHA170ee9206a2c1312413a3799a8c4e794676043432
SHA2569a380717f38b104d0b0d317c531ffc7b3c65b2f9635d2ad1bd3dd003d22efe47
SHA512b98ad2f01876a6782dd7f665f62db66ce038630a06674487955db5fed0b15117fcf5504572801f94d5dee37c0d40d52d8248c36c11370c408753a08a40cd1afe
-
Filesize
468KB
MD5ad6948b3a764b0375c7b71d1bd3ceefc
SHA1df2bf7199cf8a6c48457227db15efecb7804fa63
SHA256997dcf7e76b19279ebbb6d0fa5234db11a047d70f96de6eb827115818f625916
SHA512f8c19b303231804a8e17a5b1f1c7241d8b66c3a8afd1839488865f01697161b9cf52913626c0450fef6d4c6e82dbf48987fa610c8b29c4cff8bdcd5d7a3d5740
-
Filesize
468KB
MD53f90691b359b912ef0218b623f328831
SHA16c2aafbc3a65c573c3596f5a1c92b4b421136528
SHA2560ffc6e8101d04e59cb4e1550a50987d18f0bb8adc4af46736b32440827d362fb
SHA512a57734d493993ad696bd4e62039299a2fc9e03f7500388f2b2270ded1ea5be2d64539491359f412fcfb6520340cf47020ec6a1725f64fa3400886347936a91c4
-
Filesize
468KB
MD5336c69f889485a3d93662a62378405ea
SHA16ce7d680c8dd089cd92497f26f7b2cfda4e29b07
SHA256bdba7c34c0c8a537b9246e2e9f4fbd7156435771ab0fad46974e77ddf6cb32b9
SHA51295fc1d459ea6f440351aa2ff4244cc88b359b7c6e87e11be6af233471fd7375e1403244fb5071aa30454cc67281d1c831546fa2639f86c5fa290256e9500e1f6
-
Filesize
468KB
MD54d81c1c4aab5ec444be2e769adfb3568
SHA184a8f1ad022d0603c39fe88d4e41440e6f01fdf0
SHA2566354c673c85f56d980798c2ada8ef6b1b7658ee67b60d2c04817825ddceb3fe1
SHA512c8c4683a7567a698ccfc6721fb0e3ebf36f55f17dcc95eea080fa1b4c8bdd9dddf722ce5d4a64fa4572eb05917f4eaa4028c643c02aefbd15129eb40853a2a7b
-
Filesize
468KB
MD54d21a34a58a74bf20b03274fa6e80ffb
SHA1b653bd9d8d4ae07a28c327b1695ac45f37c36460
SHA256abb608cea2ee5200a9d390bba8bcce2dc677cc7e441d7d21108d7198e98c9f37
SHA51215cef231256e2f9acea0ea81c7d85b610184ee3726c3925198ecb9ab835dc340cc8f93d78ac407280880ee1efdfe0a76a8bc79332867587c13ef4ab460efb04e
-
Filesize
468KB
MD5f514680c1e7711704c230c4df40d9aab
SHA1d58dfde1efb973e8b1488a313ab7bc2e256c8304
SHA256b1453d93cd0f8d75c113bd672fff41a61030c701f301e74d30cc73f95b1053ef
SHA512b2b5528d1f1a330c134a43222382078ad1d11758c5b66bf9cbfc73ddf288f53b84431fcb961864a497cf7af128df42d95b600f0fa0d2c5417322e8b7eedd63f6
-
Filesize
468KB
MD5978829a6c2e4e272db7496ac596bf436
SHA1a56be3e6353b6371a2866e941f83dc902ba2d761
SHA25637771cc2222bf27a171f56240f250c98d8a7335277127a92d30a55bf9bc26a65
SHA512f36938e2490cc366e2a9f22d92b4a2f5c2f00f524c83110bcb938c6b06f026e31bbf9411cd1eea024657badc155c9a01c83a8a2466ef1c757356b03ab8f5113d
-
Filesize
468KB
MD565810ba183365478bcba9d157eaaa49d
SHA10c2345b50b84c70239f3c54785b7395844d9f3c9
SHA25636013646d2517fd9ad79079efa318d1c619adfc745c25fafcbe4a267ca07f7bb
SHA51291025866096f9084efc31551753f18a8d3016df6dc27f2ef77d4211622e448820b3171d611be959ad09fccf1004dc62d21edc7837382889382c81c0ed075af45
-
Filesize
468KB
MD5bd0d041b24bf336c2e0458bbf4f7c281
SHA143811fc702380ca6f7ca61fe342830c89811da65
SHA25668b060d7fcff5cdb6dc331d730f5a57cc27fb676e12d94320292c1b6aab8580e
SHA512076aa9bb954b74d20b9d50dc93b6d3d0e9e39fc73e783d700f216c563cc9f719a294ce42cdda5169ffdd18817b62fb0126c5dff11c2f9451aa9d3016f6b0fe47
-
Filesize
468KB
MD54e5725bea70a431237d6dc609f01cdb5
SHA130581a3148562618b546892f42da47d7351c68e1
SHA256aa2d2b4a661f97963b3506b076205967a795f8f518c3a93447dddf5aaeab54df
SHA512d534feac5947e282677eb4fa2f7876a615c7b4787ce8498065a1949ed52ae3470278d32ec717dc4aaa0af6e6f9fc6a1495201741004c213176a283b1eb419187
-
Filesize
468KB
MD52fa22e5a911f4902511a7b5205e01c0f
SHA19c245fdcf9b7b6e15e30fd689d5b58c725b1fc29
SHA2562826753cb8143aae21a5f39e2e8cd952e1f5163d59a7ef20a101ad7c15dce6a8
SHA512f54e3aa25c2645cb73281de9e77da9cb016702e0eadf59bb877ac852a6a9b0d503ebbae8edc980d2bbd644efd51e289f3b290d0d618b805208bb51f689dcaef1
-
Filesize
468KB
MD573eae597e5aa3b793ffbf6bf652984e4
SHA10ec790ff210979cfbb699ec331f5ee9cf46383e6
SHA256bd7e023c0e145418731f526e3cd4ce2f60ccbd61290ec50f80c1ff753212a737
SHA512519091c20cce080307a579b9220cb4ae6a4fa1901cba9ceb3efaf715fd414f2238dca4e1d963a6cf26bf045ae314d1de57bc4947827ff8ba08fae009915a1e48
-
Filesize
468KB
MD5a56e8ce7ab10bcb194b7946249961e2b
SHA1e0f1edfcb0540761e5ea67178a49909d37096505
SHA25675f2b32152e5f4b1e41c6c660a93bbd86aa6bef8a120f3deec72f4c713353382
SHA512b0c48c5c33687f2c4dc0d53765898b4335889c377ead5f9153f896c2724a9f88131f367b09644d9ee8f3f33d2b5153f4110b61b6cf8b7a37846409d5e71907ed
-
Filesize
468KB
MD5ccf595b015198e237b555f8bcd9ddb5b
SHA1b370f6741e7894cf5305c374ce436d5af808d57e
SHA2564cd2a6e0ed03c1ff566a187382f705df48da058f7a84a60b1a42eff3ac4b1319
SHA512635a99139347005ec9240c5a77ae741bdba1fe8cae1a84934eef35f352787b22a80966034081fada475458f6f572685cfff78a388d3de8029e7f50db49772ce1
-
Filesize
468KB
MD540971130ff5bfde19b91d8a22fea7aa7
SHA1b46ed7103f5b883c0f5ea5ba62f8909d064c0759
SHA25633c0ece8fd9cc13f463f3132ac70d1aa696200d6c114873381dd8f90d23cd221
SHA51293f552da110d60a51802cb996cd55dc492a3649c16a4c9567683c72743f2a116b0b96cc422b17493863910b3a1f8e84e4ea339087d50214eb89fe6a42e28b01b
-
Filesize
468KB
MD534b6a35ee7a0b5f1a441a8d2596b0d62
SHA1dd462dc4d632211879c9527b28589c732f048d3f
SHA256e704baad5493cda62c6fb763a11e79da087c277aeecd34bf67ec819c06bca4ec
SHA5126367e96368bd4667218bf7307faea15f7fd93a1d3f0d92982aee7c67155d9e72768fefba5e2626e04898ee015d6c63ef21d25a1162bf4779b9698e99d0fb06d8
-
Filesize
468KB
MD5815e91a7861bdf5f6e966ecee8a6d9ab
SHA14ad8a004f9f4ca034b9046bb274016f3cbdfbc80
SHA25640359cc9348b263cc440152840ff5e9cc70a19d9ca96e8ebc8def41b1b742fcc
SHA5128b2860f1c2fbcd1a27f2774804435f2818cce3b95dce80904a8fcb8c5c859979ee7e096218234991ae82cd7e335936b4ca71c121c819b20f0c669e00070f5c3c
-
Filesize
468KB
MD5d9dcbab73a046a6a6565ed7ca3be616d
SHA1a1db2a94dfae878ccd4aee66d3daa60a0ac8bf8c
SHA25692c501135529b03817c75c9d11805b7d650761a244ebf6c48a8fc015051ff450
SHA51221fa17a0618bc30f395e3b9cd06fdbc1fe2bdaec2ad2984b5a59fa724e4dea6d4bce17d70006dd3887b0d76745047f9f0a5fd6a3b6dccb0c01d74bff010a363a
-
Filesize
468KB
MD57d06f2251a7f41398dc99a011710abe7
SHA1d03cd3d3e9ac48da6e179644a96f15f5728df8fd
SHA25631e6ea7c91756af90cb18fa80083e16efe20e993dc6858c599dabe3b1320be46
SHA512999663869a974e5c0adcb037163a19c75330729d0daa9d1f040115b77d51f63a1b1b08f19c41503020ac0ce378d078bafba12bf18f262cbd1189b9d04d9a4a84
-
Filesize
468KB
MD5a252228253259670fc268e7a8658e3aa
SHA1a182c7e3fc6c36c65709eddf456c60245134cbfb
SHA256178c1b4c4f816b886de8774bb5b985f2126ed5b37a3c2f26c92a08bdab53eef0
SHA512282651bd4e61f27fd5e1b136c3c72ec435423d755790fb47d84f26bd29fe04c56df5ffaa04a825d3cd9f6809049dca26331a8a760b3803a861efad5c4b4f9cf4
-
Filesize
468KB
MD5e26c7d753b036a4a257afef04b4628b8
SHA14848a211e6d45698d9b2a0fdf278be95b43067d1
SHA2568ce686c12f25fd62594827c06a11f92ecbab8751038f442784cf6763ac753898
SHA51292dff77b2445dbcd9671adfeee80aeaaaf4e79a6e8727f51e3faf2892f5b585df63879db7aea846cf542879fa63a25378eb7aa2c6c7afa6bea943fcee7516ed1