Analysis
-
max time kernel
31s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe
-
Size
468KB
-
MD5
e5989ca9cc2fbdc6f59ec12da1adbda0
-
SHA1
b665fd0495a7130cab270064bd2cc141599a3c47
-
SHA256
a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87
-
SHA512
80c2ec40ec7df279ce48f9c840a97356c8295938de33b36d1ac6ea787c2d7399f3f96ae24692949a96d1c5caf262c7673d99c4ba0892206221b7281db95a8099
-
SSDEEP
3072:/oCgocIuUc5/tbYDPgH5OfQbcJRh6EeZlmHda/CgMn3wuFnclul0:/oRoX0/tIPu5OfUjWgMngmncl
Malware Config
Signatures
-
Executes dropped EXE 55 IoCs
pid Process 3744 Unicorn-32114.exe 1640 Unicorn-46649.exe 4764 Unicorn-977.exe 4380 Unicorn-47521.exe 2700 Unicorn-24640.exe 4364 Unicorn-42460.exe 4820 Unicorn-14656.exe 3028 Unicorn-1740.exe 4972 Unicorn-27314.exe 3416 Unicorn-7448.exe 1528 Unicorn-2809.exe 4052 Unicorn-2544.exe 4460 Unicorn-763.exe 3624 Unicorn-4921.exe 3420 Unicorn-64328.exe 1904 Unicorn-8320.exe 4856 Unicorn-54293.exe 1960 Unicorn-37594.exe 4388 Unicorn-35548.exe 4476 Unicorn-41678.exe 1100 Unicorn-41678.exe 3968 Unicorn-61989.exe 4908 Unicorn-42123.exe 872 Unicorn-42123.exe 1760 Unicorn-53059.exe 3256 Unicorn-61724.exe 1824 Unicorn-60666.exe 1068 Unicorn-60666.exe 2828 Unicorn-51164.exe 4340 Unicorn-31563.exe 1796 Unicorn-18181.exe 4736 Unicorn-35263.exe 1664 Unicorn-55129.exe 464 Unicorn-13119.exe 2176 Unicorn-11828.exe 1932 Unicorn-57350.exe 1108 Unicorn-11911.exe 384 Unicorn-19525.exe 2880 Unicorn-60858.exe 4272 Unicorn-56774.exe 2924 Unicorn-36908.exe 3948 Unicorn-11335.exe 4328 Unicorn-27921.exe 1508 Unicorn-51813.exe 1372 Unicorn-44714.exe 3468 Unicorn-23225.exe 3308 Unicorn-26331.exe 1704 Unicorn-32462.exe 1624 Unicorn-18163.exe 532 Unicorn-36223.exe 1568 Unicorn-32462.exe 1920 Unicorn-64365.exe 1840 Unicorn-47159.exe 1240 Unicorn-20485.exe 2296 Unicorn-13385.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2400 4388 WerFault.exe 105 5128 2880 WerFault.exe 127 5620 4404 WerFault.exe 149 -
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27314.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36908.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51813.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18163.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2544.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47159.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44714.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11335.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37594.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14656.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11911.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61989.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-763.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61724.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31563.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-977.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20485.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46649.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26331.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35263.exe -
Suspicious use of SetWindowsHookEx 56 IoCs
pid Process 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 3744 Unicorn-32114.exe 4764 Unicorn-977.exe 1640 Unicorn-46649.exe 4380 Unicorn-47521.exe 2700 Unicorn-24640.exe 4364 Unicorn-42460.exe 4820 Unicorn-14656.exe 3028 Unicorn-1740.exe 3416 Unicorn-7448.exe 4972 Unicorn-27314.exe 1528 Unicorn-2809.exe 4052 Unicorn-2544.exe 4460 Unicorn-763.exe 3420 Unicorn-64328.exe 3624 Unicorn-4921.exe 1904 Unicorn-8320.exe 4856 Unicorn-54293.exe 1960 Unicorn-37594.exe 1100 Unicorn-41678.exe 4388 Unicorn-35548.exe 4476 Unicorn-41678.exe 3968 Unicorn-61989.exe 4908 Unicorn-42123.exe 872 Unicorn-42123.exe 1760 Unicorn-53059.exe 3256 Unicorn-61724.exe 1068 Unicorn-60666.exe 1824 Unicorn-60666.exe 4340 Unicorn-31563.exe 2828 Unicorn-51164.exe 1796 Unicorn-18181.exe 4736 Unicorn-35263.exe 1664 Unicorn-55129.exe 464 Unicorn-13119.exe 2176 Unicorn-11828.exe 1932 Unicorn-57350.exe 1108 Unicorn-11911.exe 384 Unicorn-19525.exe 2880 Unicorn-60858.exe 2924 Unicorn-36908.exe 4272 Unicorn-56774.exe 3948 Unicorn-11335.exe 4328 Unicorn-27921.exe 1508 Unicorn-51813.exe 1372 Unicorn-44714.exe 1624 Unicorn-18163.exe 3468 Unicorn-23225.exe 3308 Unicorn-26331.exe 1704 Unicorn-32462.exe 532 Unicorn-36223.exe 1568 Unicorn-32462.exe 1840 Unicorn-47159.exe 1920 Unicorn-64365.exe 1240 Unicorn-20485.exe 2296 Unicorn-13385.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3744 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 82 PID 3048 wrote to memory of 3744 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 82 PID 3048 wrote to memory of 3744 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 82 PID 3048 wrote to memory of 1640 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 84 PID 3048 wrote to memory of 1640 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 84 PID 3048 wrote to memory of 1640 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 84 PID 3744 wrote to memory of 4764 3744 Unicorn-32114.exe 83 PID 3744 wrote to memory of 4764 3744 Unicorn-32114.exe 83 PID 3744 wrote to memory of 4764 3744 Unicorn-32114.exe 83 PID 4764 wrote to memory of 4380 4764 Unicorn-977.exe 85 PID 4764 wrote to memory of 4380 4764 Unicorn-977.exe 85 PID 4764 wrote to memory of 4380 4764 Unicorn-977.exe 85 PID 3744 wrote to memory of 2700 3744 Unicorn-32114.exe 86 PID 3744 wrote to memory of 2700 3744 Unicorn-32114.exe 86 PID 3744 wrote to memory of 2700 3744 Unicorn-32114.exe 86 PID 3048 wrote to memory of 4364 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 87 PID 3048 wrote to memory of 4364 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 87 PID 3048 wrote to memory of 4364 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 87 PID 1640 wrote to memory of 4820 1640 Unicorn-46649.exe 90 PID 1640 wrote to memory of 4820 1640 Unicorn-46649.exe 90 PID 1640 wrote to memory of 4820 1640 Unicorn-46649.exe 90 PID 4380 wrote to memory of 3028 4380 Unicorn-47521.exe 93 PID 4380 wrote to memory of 3028 4380 Unicorn-47521.exe 93 PID 4380 wrote to memory of 3028 4380 Unicorn-47521.exe 93 PID 4364 wrote to memory of 4972 4364 Unicorn-42460.exe 95 PID 4364 wrote to memory of 4972 4364 Unicorn-42460.exe 95 PID 4364 wrote to memory of 4972 4364 Unicorn-42460.exe 95 PID 4764 wrote to memory of 3416 4764 Unicorn-977.exe 94 PID 4764 wrote to memory of 3416 4764 Unicorn-977.exe 94 PID 4764 wrote to memory of 3416 4764 Unicorn-977.exe 94 PID 2700 wrote to memory of 1528 2700 Unicorn-24640.exe 97 PID 2700 wrote to memory of 1528 2700 Unicorn-24640.exe 97 PID 2700 wrote to memory of 1528 2700 Unicorn-24640.exe 97 PID 3048 wrote to memory of 4052 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 96 PID 3048 wrote to memory of 4052 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 96 PID 3048 wrote to memory of 4052 3048 a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe 96 PID 3744 wrote to memory of 4460 3744 Unicorn-32114.exe 98 PID 3744 wrote to memory of 4460 3744 Unicorn-32114.exe 98 PID 3744 wrote to memory of 4460 3744 Unicorn-32114.exe 98 PID 1640 wrote to memory of 3420 1640 Unicorn-46649.exe 100 PID 1640 wrote to memory of 3420 1640 Unicorn-46649.exe 100 PID 1640 wrote to memory of 3420 1640 Unicorn-46649.exe 100 PID 4820 wrote to memory of 3624 4820 Unicorn-14656.exe 101 PID 4820 wrote to memory of 3624 4820 Unicorn-14656.exe 101 PID 4820 wrote to memory of 3624 4820 Unicorn-14656.exe 101 PID 3028 wrote to memory of 1904 3028 Unicorn-1740.exe 102 PID 3028 wrote to memory of 1904 3028 Unicorn-1740.exe 102 PID 3028 wrote to memory of 1904 3028 Unicorn-1740.exe 102 PID 4380 wrote to memory of 4856 4380 Unicorn-47521.exe 103 PID 4380 wrote to memory of 4856 4380 Unicorn-47521.exe 103 PID 4380 wrote to memory of 4856 4380 Unicorn-47521.exe 103 PID 3416 wrote to memory of 1960 3416 Unicorn-7448.exe 104 PID 3416 wrote to memory of 1960 3416 Unicorn-7448.exe 104 PID 3416 wrote to memory of 1960 3416 Unicorn-7448.exe 104 PID 4764 wrote to memory of 4388 4764 Unicorn-977.exe 105 PID 4764 wrote to memory of 4388 4764 Unicorn-977.exe 105 PID 4764 wrote to memory of 4388 4764 Unicorn-977.exe 105 PID 1528 wrote to memory of 4476 1528 Unicorn-2809.exe 106 PID 1528 wrote to memory of 4476 1528 Unicorn-2809.exe 106 PID 1528 wrote to memory of 4476 1528 Unicorn-2809.exe 106 PID 4052 wrote to memory of 1100 4052 Unicorn-2544.exe 107 PID 4052 wrote to memory of 1100 4052 Unicorn-2544.exe 107 PID 4052 wrote to memory of 1100 4052 Unicorn-2544.exe 107 PID 4460 wrote to memory of 3968 4460 Unicorn-763.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe"C:\Users\Admin\AppData\Local\Temp\a7a991416b0b5aab0135cca8ea8839cc5cc210e0d6bf120e808fb70b504b9b87N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32114.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-977.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47521.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1740.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8320.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18181.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57625.exe8⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16806.exe9⤵PID:5644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57324.exe8⤵PID:5660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14023.exe7⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16998.exe8⤵PID:5828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51132.exe7⤵PID:5948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35263.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14537.exe7⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24590.exe8⤵PID:5996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34272.exe7⤵PID:5744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe6⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exe7⤵PID:6140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18076.exe6⤵PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54293.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55129.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28735.exe7⤵PID:5684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39788.exe6⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exe7⤵PID:6132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13119.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25721.exe6⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45586.exe7⤵PID:5804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58585.exe6⤵PID:5936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63473.exe5⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exe6⤵PID:6116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7448.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37594.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57350.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21829.exe7⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exe8⤵PID:5232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1963.exe6⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exe7⤵PID:5040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11911.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1709.exe6⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-204.exe7⤵PID:7140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19206.exe5⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45778.exe6⤵PID:5480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35548.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60858.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55186.exe6⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24289.exe7⤵PID:5468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 7406⤵
- Program crash
PID:5128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 7085⤵
- Program crash
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27921.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58393.exe5⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37610.exe6⤵PID:5440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26795.exe4⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2004.exe4⤵PID:6680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24640.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2809.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41678.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56774.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34766.exe7⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12612.exe8⤵PID:5404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15860.exe6⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21339.exe6⤵PID:6632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11335.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58393.exe6⤵PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36000.exe6⤵PID:6356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29595.exe5⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27205.exe5⤵PID:6660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42123.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44714.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35918.exe6⤵PID:1764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2155.exe5⤵PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26331.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64506.exe5⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57153.exe6⤵PID:5716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35040.exe5⤵PID:5856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22332.exe4⤵PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18539.exe4⤵PID:6668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-763.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61989.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32462.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22021.exe6⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7604.exe6⤵PID:6692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3224.exe5⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33068.exe6⤵PID:6508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36223.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54693.exe5⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19280.exe5⤵PID:6716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15890.exe4⤵PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61724.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32462.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22597.exe5⤵PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7308.exe4⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57921.exe5⤵PID:5140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21339.exe4⤵PID:6640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47159.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58969.exe4⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50630.exe5⤵PID:1296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41671.exe3⤵PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63994.exe3⤵PID:6520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46649.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14656.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4921.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60666.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2923.exe6⤵PID:5472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33483.exe5⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24050.exe6⤵PID:5568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31095.exe5⤵PID:5592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31563.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20485.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60806.exe6⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7199.exe5⤵PID:5528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47219.exe4⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37226.exe5⤵PID:5600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23640.exe4⤵PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64328.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60666.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61361.exe5⤵PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13063.exe4⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56769.exe5⤵PID:5732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31287.exe4⤵PID:5780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51164.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13385.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48554.exe5⤵PID:5516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12352.exe4⤵PID:5544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23998.exe3⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 6404⤵
- Program crash
PID:5620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51724.exe3⤵PID:5668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42460.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27314.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11828.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1216.exe5⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24782.exe6⤵PID:5144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe4⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45202.exe5⤵PID:6124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42123.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23225.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27174.exe5⤵PID:452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6975.exe4⤵PID:5692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18163.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26105.exe4⤵PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22825.exe3⤵PID:5156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2544.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41678.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19525.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26406.exe5⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exe6⤵PID:3460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43488.exe4⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17766.exe5⤵PID:5280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36908.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58393.exe4⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54138.exe5⤵PID:5928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25477.exe3⤵PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53059.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51813.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64506.exe4⤵PID:3912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47848.exe3⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50630.exe4⤵PID:5980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21339.exe3⤵PID:6624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64365.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2176.exe3⤵PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28408.exe3⤵PID:6516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14689.exe2⤵PID:5152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4388 -ip 43881⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2880 -ip 28801⤵PID:5576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4404 -ip 44041⤵PID:5852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD51cf6d84353f93a41ba0b726d36164eae
SHA13df08162ad056eea6dd7c00a877e3ef092ca73ca
SHA256f2b0c74c7c1b4431cecb3674f679d97f2606de6aede0176ac0778277de30201a
SHA512a1049640645fd3878d7f2b966c5f7390d59cc986d157c1828e24a92b34dba45c899ed66546009cab2796262551dad6faeb901cd5d46613153fd17fc01f9ab583
-
Filesize
468KB
MD52d8b2a57f26308fedf4949ceab48a2db
SHA195b2a0d99d40550d2bedc4f0d72b8cb605c1f809
SHA256c4e311c69ed1cc016b4c840253fc066cf6a148d7aad96760e335cce35f932565
SHA512a9e91a9fbbcef1f5f4d0cf6c26ec84380d318b0dc88d888d0c1faeeae8cb7c01b1155a25c565278c33de593487c0d6c7544d41e8bae5f41bfe7694d8fc9304c1
-
Filesize
468KB
MD5923895d15a661c50869f1b251d358dcd
SHA1463ebc56d29269ab1360fedd0ffe5ead5f96c33b
SHA2566fe6f168442faa6dd4c215a050b45b21eac51d3dc322fc16b4e9c26ab65ff949
SHA5126406f8258f062e63840f167898085a85f3753f5994550241b9dfeca3d34ccacfbd25f22f3ecf282d11ae6093494a0589ac3fff5f6b838611540a3e189f5dee96
-
Filesize
468KB
MD5a7190646e7e9c9f833ac28ea16ce1baa
SHA1d18dcaf7b16d1bcc92d89467331b461995f9e3ec
SHA2561b8df4ca9716d7932946a6d14f0dfd93157bf0ca3390ddcfbd4805d346e565f4
SHA5122ae912f98f5fe65d517b92a7c0d72b074cbe47c45120b33ef15aedc057ebb19eaa6ad64f00cb99d2f0d58e86f67c95496284c30fe3a05eff0bdfdfc41fbad4fb
-
Filesize
468KB
MD5063f3cf9cfda1f44ae0159f326807aba
SHA1daacc74239ea529d122e53072b197918ca3fbaa0
SHA256b62006cc9196761cb6d040d5f74d6894718a82c953f8ac5f290d5aa73c79afe8
SHA512ebe8c8fde1374c33e133bd6ffcadb13d7e902120072f38a28d64508c6e34ec704e81cede1b3cca9881e25cbc0108c79cc055a593fe2b8551861d73a835f7b389
-
Filesize
468KB
MD568285e251b033b94e26254fa4a4c87f2
SHA19c67b144438aeb6e9065fe6449585cdce0dfe1b0
SHA256c5c27400abb6cc26d086d03933b6966003f4c37bab920c23eb82bf329513e65a
SHA5129cd04e5999dd209fedfc417e95bfc2aba68997fccf0467d4017e47b7f109b38dcef69bc21150da78e26b995cd92b51ea431b80a95fd6b1ba68afc7ebfae40fcc
-
Filesize
468KB
MD53125f520c0aeb5d9370a85d75b522aa5
SHA16d7280ed74005e34a75736d93348115ff3d4dbfb
SHA2567afcb4ae569412d7375cff04cb6209c0777000428446a25bd1c7882b7659b436
SHA512b7f4d63befb2a0ba5817718b2e33318e1a3fceebddf0076a7104c1c2dbfcc64f8c96b939b19d963918e11b35108e866f5a1ba15c6c32c5f015af916f421c47c9
-
Filesize
468KB
MD5e5a59ac0aa41e172732b1c5af0852bac
SHA121bdf39f48fe49d0ea305e6ddf3152cf2f732a1d
SHA25660f84ccf07ec178e5a71f91c7944212cd24bb6df181182f1dcf10987f8787b89
SHA5128205f7c2c0932ccbbe0e0e91fedc0b3bce69f92ee69e12dd78a63b57cc8c00318f8b37725511e20527be72c3c8457a051ddbac08d8f290418931ae9014325bfd
-
Filesize
468KB
MD5766974a3352e7bb4bc91592292032690
SHA1ae07cb925a4cae369bdc779cf885351c3ad82f9b
SHA256c7bea61cdbcfb12fe5f04ce6d2062aab6cef54ebd481901f140d18be2aeae612
SHA5122e0c4f3030e153a089dace96d0cd4ca76fd4f0408736f3c944cea4e5f50288f113770d139ea251b6a63f333f0481e7bba0c8dddfd902bb4a4779983bf3b35f18
-
Filesize
468KB
MD5f6986ebda184b28bd25fb60dbfb73918
SHA1f15deef632ca2dde885d93eabff8b1f05371ff0b
SHA256b76b2968574192548a0c3f0e8ab1bfbf7f52429fb7f550efc0a828adc4658352
SHA5121db76c6451f8bb598d605d83f36728bfcdf394661e4525dcbc2fcf3b37c8091bd841b81b4d4b1a3cf653dc4f4bc38a36fa5bbe563a5ae7776a1b3a14476bb67b
-
Filesize
468KB
MD5ace84dac689ffa5462f2838ac7f83d8e
SHA16d53060844086ef48ca1f9e865675c8ea3acb352
SHA2569d5dcb4da944d29e8f257554345900797ca2576e7eb8b9ead4e7cf467255b7a1
SHA51200d511140c9e1ca9d72a49016c01d29ddae66cb6ff22b5d27b585337ebb5afe628fccf993f9616adc6093533be80abaa366676709f15eeb0bc85f87293ce3829
-
Filesize
468KB
MD5cafe4d19751b1d12d45c677f60d98f4b
SHA19b56ffb32d01a756af28fd62bb9e90b532ddf040
SHA25632856d681eb5a75210aee8d71da6cf7aa9178619f19428feb5fdfe7ba358bfc7
SHA5120065dfc81861d2f90b4c51f8d701d6717b4622c14f78573a387b9b5e8af7de744b14a0c14176d560bcc9fe0a18a243bccc9bcdc78dbe21ddb308ccb3a757dfde
-
Filesize
468KB
MD5fdfd2461519e24fb0c416ea236d57b29
SHA1f5799921571eb867f6c72250d9625c4c9f167b34
SHA256d30feb9fa9d9048c5c91bce59a55cab8ad45701d91ec39cec8b91611704d4194
SHA512e916cdd53a013556d7db6ff281ac71151256c1f5aafa5ba0269fb6e84f056ea15f5cfb5ca326c72af2f5484915198c239d25d0f6b1e8c43f8af50086571e0af8
-
Filesize
468KB
MD5658c77a053125bf72e838362bbb02c90
SHA139869e60497e2f33cca95f086ae7b9aa606955fd
SHA256484ee1c44319a6a9e3f1bb3493213801d4ae11d5b78d09bb740930660c593024
SHA51298efc216faf07402e8d38fd8e4b93481e253933f9f009e3569d34edfe27f2361323b7eb87b87c16825a54a9c56b2f507d112ff18b83e46f6a5aaa9d549b86f0c
-
Filesize
468KB
MD5920b935fe8fa374d40a13860f641aac4
SHA12c868ecdb0b8b6ca3f1b5388ac80bcdff117ccb7
SHA2562b416df452fb3aeedc7099a0b90af064316ee8509c798f6a45d2bed8ba774409
SHA512751468f0e6f1222c685a5da954854fe8bf2bbecde984b32cefdf2ab7237c4921d3b3db993fe7d59e066b5f1f228ce7fd25e4ba3b5429a44b450257cb810ad8e4
-
Filesize
468KB
MD57aec9c6421548395d059149732f2634c
SHA136a88db50d76908fc8038cd5f30a8347d09fd7d7
SHA256344fb979bad581ec265ea73eef4e3f97982e90cea7e99d140ef89608bd7deef5
SHA5121fb6e6b1713cafa701ab14567f27a6174eb742bd5ea9d1927ae7ac18c7d90586767ce6e961e4cf3767a2ba569477c2727535e99dda03100b480713ee7eb77e81
-
Filesize
468KB
MD570b2f9528d8670e894b8900697c23266
SHA1f5c8f4560550a3a1dedd5846ee1ab19291e956b3
SHA256a50c2e723abd89949f56cf0766d9f25dc473f634a622ae6c51feaf47b23d81f4
SHA512d8fdfed28d70c0b4ac14264c79b1e0b4886ee95f13028e6f42b3de1ad62480aba8ae62f008f50f98856e1dde31d3e9639cf032a422cc3c6a64ba162dd3611e6a
-
Filesize
468KB
MD547d5537b26ebeb0fb5c3cb672a2311a6
SHA18505bd7302cb15fca364c3a942d83a77f404fa63
SHA256164e6865a700c0754367866a98153a82f21c2f1f9c46eff34f28fba3c03c1b02
SHA5129588aa6b9baa9287bf35e21abda3421e9b950fae4e9556ccfffcaf694ebdea13e0c63102a2d5706363cd7b13f85b5cf459661857b367227fd56888c4c53af651
-
Filesize
468KB
MD5a12ae8f15f1b63ad706ef65c60f6d905
SHA1f5d5ce03a248e79f90f8a0fd5efd32d2bd3f2b8d
SHA256d1bee757923cfd259e9dfe75ceabe52ebf20b539567ee56819c8e25eabd8ccc8
SHA512f1188e3a7edd3702636bccda0c12ab6e88e0dbc1026af2512ad836e114ebf725d093fbbf6250514b22fdfd7574eeb4f863f738101e8aa2da2ae1a0a94e32fe8e
-
Filesize
468KB
MD5a2f530b40c122d7431cddfa6508d17af
SHA1390dc43543b94f09d07345615c374f9f1111b900
SHA2569b7e4a5fe89a03bbc8e35b33348b8eab4c425f01a7418d9f4bc2a92e8870778e
SHA512bff832a09e140a6e62c504d256eca3ccd558b561e14b08458f18b5e357d238842014b04b550c3769887e49e2664942857af4d8d6995a253ad59ff08d4ac2fb79
-
Filesize
468KB
MD585c9357420da7a52ba255ecfb130e852
SHA18be761e374bc2b4536abf2c19be5785af66bdcbf
SHA2566ea9c776c114caf436c703261e751719af3b1232c335ce7ff9284477308f8ac7
SHA512789e8a4fd09de5bd5db7d195bfc0623308c4b493652012f99277a87392137f6bae601ebcf3c210c49047631b7a6e1792e14140abf2f22067806d1467015bf122
-
Filesize
468KB
MD5b53d3186c371d6313d1195b92b92ae78
SHA11d917a5ad0dc96860910463f4c644ac08bbd0635
SHA256ad53fa4cf6572ad055809c0d8fb9eb7366212d18626a85d72bf44597fa528ec1
SHA5125663ea07553c9cc2ef6a66a4a4ffe2bf3e0e44cdd1d6b8bde8ea99c26c0287662078de9910fd2e9b9b032fd1973000c2591483648d0a5e94f8eb24b993d57285
-
Filesize
468KB
MD5c77f8a33b70b060c9ed62307c1787fa4
SHA18af7679dfbf15381abebd4c45731418174d6b996
SHA25623f4175a7713e9b994aaee9560d3c8f69239ac86d24a2f1e099b025413203998
SHA512b0daa1681bf6c8c6ba0e7c799e9f1054c58605a335bfa4d6335dd6e59cca05b370a33ed2aa281d678c2548d075a881c1c45bef2aa0297de0b178d1d9b0809e5a
-
Filesize
468KB
MD59eb683a78f7466779274e164150bfad3
SHA1f0b80fbd28545683bd137c780b0f20841394ace7
SHA256f4a91af3d534c8fa6e06e8c0a489ca2386106a9e4a56f73047a45c49cdcf7afc
SHA512122d5db4091da6df723272e1815bc12679d61db480d5b2d47e023f15dad4fa9c28ee82e5b2570df69ee6cbcf9f5daf642775c60912ffb3cd04591420a35429c0
-
Filesize
468KB
MD54b3073ee3301545d0fdb84ab321d6877
SHA15e95f7ec47a30d40ed8b863343ce1ad95f55bcdb
SHA2568d8cdbc8ae951839d073f0c102379dcaf371c2dc747b67be524ceed6d9aa5527
SHA512ba7fdb98bc0bacc07af044a8e293283322e9b0ae79eb044e4ffb0e5ee66e309c3ac5b2c4cceb9abae875d3fc1c2574df36b2274221b0abb0a013aedf664c167b
-
Filesize
468KB
MD55c3f5db7505f1ded64c5d02e3574c6da
SHA10f648170e9e0656d31927439922b0ff41f9cdee1
SHA256d1b72ea3348b9768fe8bf004c5688aeae4db26002caa70f9d351e61ff4a9c8ff
SHA512a6cfa0ae4562d768540d9fea215d37652361cdd645092fb764744455c513e6d3c43f2194926d5c4ec3aa031ebde8805f32b5d359830090b65f2a8003b3b2d353
-
Filesize
468KB
MD564d7c83576a9017ca5d25a0585974033
SHA16416fe7142639a641863f59fa4f6d01e6d39c212
SHA256ffc0c888058a0f471dfb92bda9f93d8976f59e56d85ab2de7daff6c4b8548fb9
SHA5128105120733718b1ac8405e16b84f542c4c8fc65ef82dd436ed7f55f920d1ac56d69b914ae82095ac522a015b1d225d536eb55694af1ee88b3d5b0fb6b02d134c
-
Filesize
468KB
MD5c3eed7605e25fd052884d9de7e5ec253
SHA177da4ef6ed32eb453521d97cabab5837890765a9
SHA2569ea15bd5da4cea34b140bfffd407c947885044f4ca88d727fd5a6afad27ae342
SHA512b39d096a6655d4678947dc4c183e6b3dcf1bf9ab005962fbe9dc170243e4e2e812e298956b78e74474bbc6b836a2a19bab789eba2f2988dbe51dde59f882a8f7
-
Filesize
468KB
MD5be0ee36ac9b78fe4a7aa0919d7da6153
SHA1aa262b1217a66b06bf3bce0fc41c4756c43ee943
SHA2560a818d613daaf21103a89c0bd901534e19befb164cd044ba711009c4d610a4d2
SHA5122a3f43ed5c909b0bc85f992711f51843dc5bab00dede9a5070aca4fb7a3ea7ce905c960a10603c46b359e5415fb110d9eda4b45fc9d96bb2112a78e5661db442