Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
7554a11f37eccd2640b3324ae50e602f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7554a11f37eccd2640b3324ae50e602f.exe
Resource
win10v2004-20231215-en
General
-
Target
7554a11f37eccd2640b3324ae50e602f.exe
-
Size
184KB
-
MD5
7554a11f37eccd2640b3324ae50e602f
-
SHA1
4134da55da19c3e6e513818a29d63e2038097df8
-
SHA256
c147dd749077d959f91482022dad4ab60a316601a4e5871af34dfc323df22387
-
SHA512
fc7d0f0bfee49b0bb649ff8fa8fe9d5486749cdb5ba099896d244ba73c45d81484ee47188d5897f473ff56bbab1e9a3ea0e092028277d8b347d0cc0cad19c5f9
-
SSDEEP
3072:rXICo0PoO8yEklj9P7zk18dunJ96jJzJLkLxgZjBBNlPvpFf:rX1ocTEkPPPk18nNpZNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2488 Unicorn-38180.exe 1928 Unicorn-30095.exe 2020 Unicorn-14313.exe 2788 Unicorn-58766.exe 3044 Unicorn-34816.exe 2664 Unicorn-54682.exe 3012 Unicorn-18886.exe 2196 Unicorn-3104.exe 1268 Unicorn-40074.exe 2708 Unicorn-36544.exe 2860 Unicorn-21600.exe 2436 Unicorn-36037.exe 2220 Unicorn-40675.exe 1360 Unicorn-42067.exe 844 Unicorn-27677.exe 2336 Unicorn-9202.exe 2412 Unicorn-48097.exe 2440 Unicorn-54874.exe 2272 Unicorn-5673.exe 2208 Unicorn-48372.exe 1116 Unicorn-20338.exe 1500 Unicorn-46234.exe 860 Unicorn-52264.exe 1792 Unicorn-37250.exe 1684 Unicorn-48756.exe 588 Unicorn-38450.exe 1708 Unicorn-1501.exe 2972 Unicorn-32228.exe 2916 Unicorn-12362.exe 2024 Unicorn-7723.exe 2172 Unicorn-2056.exe 1664 Unicorn-20530.exe 1444 Unicorn-57692.exe 1656 Unicorn-58247.exe 2768 Unicorn-12575.exe 2660 Unicorn-18305.exe 2792 Unicorn-42486.exe 2572 Unicorn-56130.exe 2464 Unicorn-61283.exe 2648 Unicorn-8553.exe 1540 Unicorn-40671.exe 2508 Unicorn-61646.exe 2832 Unicorn-35025.exe 2468 Unicorn-54054.exe 2896 Unicorn-47277.exe 760 Unicorn-18497.exe 1900 Unicorn-64168.exe 2020 Unicorn-14412.exe 1856 Unicorn-34833.exe 1868 Unicorn-47640.exe 2868 Unicorn-34017.exe 2980 Unicorn-45715.exe 2016 Unicorn-12227.exe 2324 Unicorn-12227.exe 2816 Unicorn-32093.exe 1096 Unicorn-32093.exe 1924 Unicorn-9534.exe 364 Unicorn-3312.exe 2116 Unicorn-26425.exe 1548 Unicorn-60188.exe 936 Unicorn-53966.exe 740 Unicorn-34100.exe 2928 Unicorn-35300.exe 2960 Unicorn-44791.exe -
Loads dropped DLL 64 IoCs
pid Process 1988 7554a11f37eccd2640b3324ae50e602f.exe 1988 7554a11f37eccd2640b3324ae50e602f.exe 2488 Unicorn-38180.exe 2488 Unicorn-38180.exe 1988 7554a11f37eccd2640b3324ae50e602f.exe 1988 7554a11f37eccd2640b3324ae50e602f.exe 1928 Unicorn-30095.exe 1928 Unicorn-30095.exe 2488 Unicorn-38180.exe 2020 Unicorn-14313.exe 2488 Unicorn-38180.exe 2020 Unicorn-14313.exe 2788 Unicorn-58766.exe 1928 Unicorn-30095.exe 2788 Unicorn-58766.exe 1928 Unicorn-30095.exe 2664 Unicorn-54682.exe 2664 Unicorn-54682.exe 2020 Unicorn-14313.exe 3044 Unicorn-34816.exe 2020 Unicorn-14313.exe 3044 Unicorn-34816.exe 3012 Unicorn-18886.exe 3012 Unicorn-18886.exe 2788 Unicorn-58766.exe 2788 Unicorn-58766.exe 2196 Unicorn-3104.exe 2196 Unicorn-3104.exe 2708 Unicorn-36544.exe 2708 Unicorn-36544.exe 2860 Unicorn-21600.exe 1268 Unicorn-40074.exe 1268 Unicorn-40074.exe 2860 Unicorn-21600.exe 3044 Unicorn-34816.exe 3044 Unicorn-34816.exe 2664 Unicorn-54682.exe 2664 Unicorn-54682.exe 2436 Unicorn-36037.exe 2436 Unicorn-36037.exe 3012 Unicorn-18886.exe 3012 Unicorn-18886.exe 2220 Unicorn-40675.exe 2220 Unicorn-40675.exe 1360 Unicorn-42067.exe 1360 Unicorn-42067.exe 2196 Unicorn-3104.exe 2196 Unicorn-3104.exe 2440 Unicorn-54874.exe 2440 Unicorn-54874.exe 2272 Unicorn-5673.exe 2272 Unicorn-5673.exe 1268 Unicorn-40074.exe 1268 Unicorn-40074.exe 2412 Unicorn-48097.exe 2336 Unicorn-9202.exe 2412 Unicorn-48097.exe 844 Unicorn-27677.exe 2336 Unicorn-9202.exe 844 Unicorn-27677.exe 2860 Unicorn-21600.exe 2860 Unicorn-21600.exe 2708 Unicorn-36544.exe 2708 Unicorn-36544.exe -
Program crash 50 IoCs
pid pid_target Process procid_target 2076 2708 WerFault.exe 38 2732 844 WerFault.exe 42 1644 1664 WerFault.exe 59 2028 740 WerFault.exe 91 2220 2972 WerFault.exe 54 1932 2868 WerFault.exe 80 3044 484 WerFault.exe 78 744 2468 WerFault.exe 72 2676 2832 WerFault.exe 71 2096 932 WerFault.exe 138 1120 2352 WerFault.exe 118 432 2128 WerFault.exe 139 2736 1248 WerFault.exe 105 2184 1748 WerFault.exe 104 2916 1464 WerFault.exe 106 1720 2488 WerFault.exe 144 1136 1552 WerFault.exe 168 1848 292 WerFault.exe 141 808 2712 WerFault.exe 149 1988 2208 WerFault.exe 176 608 2816 WerFault.exe 198 1652 2056 WerFault.exe 173 1032 1760 WerFault.exe 178 2304 1492 WerFault.exe 216 2436 2192 WerFault.exe 217 3224 1592 WerFault.exe 208 3308 2940 WerFault.exe 193 3396 312 WerFault.exe 233 3644 2116 WerFault.exe 203 2872 2092 WerFault.exe 244 3284 1900 WerFault.exe 252 3240 3128 WerFault.exe 263 2768 2808 WerFault.exe 227 3492 3980 WerFault.exe 296 3360 3428 WerFault.exe 286 4036 3992 WerFault.exe 279 688 2728 WerFault.exe 323 4080 3620 WerFault.exe 322 3856 2668 WerFault.exe 321 760 4092 WerFault.exe 365 4060 3780 WerFault.exe 345 1520 3100 WerFault.exe 344 2168 2580 WerFault.exe 358 2680 3472 WerFault.exe 346 3892 4008 WerFault.exe 373 3484 4048 WerFault.exe 374 4260 3584 WerFault.exe 393 4464 3772 WerFault.exe 396 4572 3876 WerFault.exe 392 4628 1300 WerFault.exe 417 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1988 7554a11f37eccd2640b3324ae50e602f.exe 2488 Unicorn-38180.exe 1928 Unicorn-30095.exe 2020 Unicorn-14313.exe 2788 Unicorn-58766.exe 2664 Unicorn-54682.exe 3044 Unicorn-34816.exe 3012 Unicorn-18886.exe 2196 Unicorn-3104.exe 2708 Unicorn-36544.exe 1268 Unicorn-40074.exe 2860 Unicorn-21600.exe 2436 Unicorn-36037.exe 2220 Unicorn-40675.exe 1360 Unicorn-42067.exe 2412 Unicorn-48097.exe 2336 Unicorn-9202.exe 844 Unicorn-27677.exe 2440 Unicorn-54874.exe 2272 Unicorn-5673.exe 2208 Unicorn-48372.exe 1116 Unicorn-20338.exe 1500 Unicorn-46234.exe 860 Unicorn-52264.exe 1792 Unicorn-37250.exe 1684 Unicorn-48756.exe 588 Unicorn-38450.exe 2972 Unicorn-32228.exe 2024 Unicorn-7723.exe 2916 Unicorn-12362.exe 1708 Unicorn-1501.exe 2172 Unicorn-2056.exe 1444 Unicorn-57692.exe 1656 Unicorn-58247.exe 2768 Unicorn-12575.exe 2660 Unicorn-18305.exe 2792 Unicorn-42486.exe 2464 Unicorn-61283.exe 2572 Unicorn-56130.exe 2648 Unicorn-8553.exe 1540 Unicorn-40671.exe 2508 Unicorn-61646.exe 2832 Unicorn-35025.exe 1900 Unicorn-64168.exe 2468 Unicorn-54054.exe 2896 Unicorn-47277.exe 760 Unicorn-18497.exe 2020 Unicorn-14412.exe 1856 Unicorn-34833.exe 484 Unicorn-38917.exe 1868 Unicorn-47640.exe 2868 Unicorn-34017.exe 2980 Unicorn-45715.exe 2324 Unicorn-12227.exe 2816 Unicorn-32093.exe 2016 Unicorn-12227.exe 1096 Unicorn-32093.exe 1924 Unicorn-9534.exe 2116 Unicorn-26425.exe 364 Unicorn-3312.exe 1548 Unicorn-60188.exe 2928 Unicorn-35300.exe 740 Unicorn-34100.exe 936 Unicorn-53966.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2488 1988 7554a11f37eccd2640b3324ae50e602f.exe 28 PID 1988 wrote to memory of 2488 1988 7554a11f37eccd2640b3324ae50e602f.exe 28 PID 1988 wrote to memory of 2488 1988 7554a11f37eccd2640b3324ae50e602f.exe 28 PID 1988 wrote to memory of 2488 1988 7554a11f37eccd2640b3324ae50e602f.exe 28 PID 2488 wrote to memory of 1928 2488 Unicorn-38180.exe 29 PID 2488 wrote to memory of 1928 2488 Unicorn-38180.exe 29 PID 2488 wrote to memory of 1928 2488 Unicorn-38180.exe 29 PID 2488 wrote to memory of 1928 2488 Unicorn-38180.exe 29 PID 1988 wrote to memory of 2020 1988 7554a11f37eccd2640b3324ae50e602f.exe 30 PID 1988 wrote to memory of 2020 1988 7554a11f37eccd2640b3324ae50e602f.exe 30 PID 1988 wrote to memory of 2020 1988 7554a11f37eccd2640b3324ae50e602f.exe 30 PID 1988 wrote to memory of 2020 1988 7554a11f37eccd2640b3324ae50e602f.exe 30 PID 1928 wrote to memory of 2788 1928 Unicorn-30095.exe 31 PID 1928 wrote to memory of 2788 1928 Unicorn-30095.exe 31 PID 1928 wrote to memory of 2788 1928 Unicorn-30095.exe 31 PID 1928 wrote to memory of 2788 1928 Unicorn-30095.exe 31 PID 2488 wrote to memory of 3044 2488 Unicorn-38180.exe 33 PID 2488 wrote to memory of 3044 2488 Unicorn-38180.exe 33 PID 2488 wrote to memory of 3044 2488 Unicorn-38180.exe 33 PID 2488 wrote to memory of 3044 2488 Unicorn-38180.exe 33 PID 2020 wrote to memory of 2664 2020 Unicorn-14313.exe 32 PID 2020 wrote to memory of 2664 2020 Unicorn-14313.exe 32 PID 2020 wrote to memory of 2664 2020 Unicorn-14313.exe 32 PID 2020 wrote to memory of 2664 2020 Unicorn-14313.exe 32 PID 2788 wrote to memory of 3012 2788 Unicorn-58766.exe 34 PID 2788 wrote to memory of 3012 2788 Unicorn-58766.exe 34 PID 2788 wrote to memory of 3012 2788 Unicorn-58766.exe 34 PID 2788 wrote to memory of 3012 2788 Unicorn-58766.exe 34 PID 1928 wrote to memory of 2196 1928 Unicorn-30095.exe 35 PID 1928 wrote to memory of 2196 1928 Unicorn-30095.exe 35 PID 1928 wrote to memory of 2196 1928 Unicorn-30095.exe 35 PID 1928 wrote to memory of 2196 1928 Unicorn-30095.exe 35 PID 2664 wrote to memory of 1268 2664 Unicorn-54682.exe 36 PID 2664 wrote to memory of 1268 2664 Unicorn-54682.exe 36 PID 2664 wrote to memory of 1268 2664 Unicorn-54682.exe 36 PID 2664 wrote to memory of 1268 2664 Unicorn-54682.exe 36 PID 2020 wrote to memory of 2708 2020 Unicorn-14313.exe 38 PID 2020 wrote to memory of 2708 2020 Unicorn-14313.exe 38 PID 2020 wrote to memory of 2708 2020 Unicorn-14313.exe 38 PID 2020 wrote to memory of 2708 2020 Unicorn-14313.exe 38 PID 3044 wrote to memory of 2860 3044 Unicorn-34816.exe 37 PID 3044 wrote to memory of 2860 3044 Unicorn-34816.exe 37 PID 3044 wrote to memory of 2860 3044 Unicorn-34816.exe 37 PID 3044 wrote to memory of 2860 3044 Unicorn-34816.exe 37 PID 3012 wrote to memory of 2436 3012 Unicorn-18886.exe 39 PID 3012 wrote to memory of 2436 3012 Unicorn-18886.exe 39 PID 3012 wrote to memory of 2436 3012 Unicorn-18886.exe 39 PID 3012 wrote to memory of 2436 3012 Unicorn-18886.exe 39 PID 2788 wrote to memory of 2220 2788 Unicorn-58766.exe 40 PID 2788 wrote to memory of 2220 2788 Unicorn-58766.exe 40 PID 2788 wrote to memory of 2220 2788 Unicorn-58766.exe 40 PID 2788 wrote to memory of 2220 2788 Unicorn-58766.exe 40 PID 2196 wrote to memory of 1360 2196 Unicorn-3104.exe 41 PID 2196 wrote to memory of 1360 2196 Unicorn-3104.exe 41 PID 2196 wrote to memory of 1360 2196 Unicorn-3104.exe 41 PID 2196 wrote to memory of 1360 2196 Unicorn-3104.exe 41 PID 2708 wrote to memory of 844 2708 Unicorn-36544.exe 42 PID 2708 wrote to memory of 844 2708 Unicorn-36544.exe 42 PID 2708 wrote to memory of 844 2708 Unicorn-36544.exe 42 PID 2708 wrote to memory of 844 2708 Unicorn-36544.exe 42 PID 1268 wrote to memory of 2336 1268 Unicorn-40074.exe 45 PID 1268 wrote to memory of 2336 1268 Unicorn-40074.exe 45 PID 1268 wrote to memory of 2336 1268 Unicorn-40074.exe 45 PID 1268 wrote to memory of 2336 1268 Unicorn-40074.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\7554a11f37eccd2640b3324ae50e602f.exe"C:\Users\Admin\AppData\Local\Temp\7554a11f37eccd2640b3324ae50e602f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38180.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30095.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58766.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18886.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36037.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48372.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57692.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32093.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exe10⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exe11⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exe12⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19255.exe13⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49545.exe14⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51787.exe15⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9680.exe16⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24813.exe17⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52265.exe18⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35986.exe19⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20836.exe20⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32351.exe21⤵PID:3840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12227.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56727.exe9⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65144.exe10⤵PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 30011⤵
- Program crash
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-629.exe10⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51133.exe11⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25041.exe12⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62093.exe13⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49836.exe14⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19961.exe15⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38155.exe16⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17408.exe17⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9509.exe18⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56943.exe19⤵PID:588
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8839.exe14⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15981.exe15⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36889.exe16⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30615.exe17⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54032.exe18⤵PID:2388
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13343.exe11⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exe12⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35171.exe13⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64802.exe14⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7345.exe15⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26754.exe16⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60817.exe17⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19925.exe18⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46274.exe19⤵PID:1908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58247.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20478.exe8⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38310.exe9⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29478.exe10⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 24011⤵
- Program crash
PID:1136
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20338.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12575.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9534.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49602.exe9⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2259.exe10⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exe11⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21341.exe12⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exe13⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4169.exe14⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48082.exe15⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29904.exe16⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27522.exe17⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20527.exe18⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exe19⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49071.exe20⤵PID:2748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26425.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exe8⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42669.exe9⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21969.exe10⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55959.exe11⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44086.exe12⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54304.exe13⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1232.exe14⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59343.exe15⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21788.exe16⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32452.exe17⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe18⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16508.exe19⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61344.exe20⤵PID:2692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54914.exe17⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4385.exe18⤵PID:4544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40675.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46234.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18305.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32093.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9856.exe9⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62897.exe10⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54065.exe11⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3769.exe12⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57734.exe13⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3074.exe14⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54216.exe15⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32182.exe16⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65041.exe17⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13518.exe18⤵PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 37618⤵
- Program crash
PID:4260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 37617⤵
- Program crash
PID:2168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 37616⤵
- Program crash
PID:3856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 37615⤵
- Program crash
PID:4036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 37614⤵
- Program crash
PID:2768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 37613⤵
- Program crash
PID:3308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 38012⤵
- Program crash
PID:1988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19290.exe11⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exe12⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 22013⤵
- Program crash
PID:2304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 38012⤵
- Program crash
PID:608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 36811⤵
- Program crash
PID:808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 37610⤵
- Program crash
PID:2916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12227.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46997.exe8⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50453.exe9⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21694.exe10⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2591.exe11⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51164.exe12⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40625.exe13⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21440.exe14⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61616.exe15⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55726.exe16⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25296.exe17⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17197.exe18⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35257.exe19⤵PID:4164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42486.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3312.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25015.exe8⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46945.exe9⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36721.exe10⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exe11⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 24012⤵
- Program crash
PID:2436
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3104.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42067.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52264.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56130.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60188.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9254.exe9⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11750.exe10⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17610.exe11⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7661.exe12⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16235.exe13⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21637.exe14⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59291.exe15⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1486.exe16⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33687.exe17⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42042.exe18⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31.exe19⤵PID:2572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34100.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 2448⤵
- Program crash
PID:2028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53966.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50370.exe8⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31232.exe9⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64838.exe10⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12980.exe11⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55632.exe12⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60443.exe13⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28897.exe14⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50080.exe15⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3012.exe16⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35885.exe17⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31173.exe18⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54738.exe19⤵PID:5024
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52430.exe10⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1107.exe11⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31279.exe12⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39587.exe13⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26671.exe14⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26282.exe15⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52680.exe16⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15391.exe17⤵PID:4124
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37250.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61283.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64656.exe7⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49602.exe8⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61382.exe9⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49846.exe10⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25773.exe11⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6862.exe12⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38247.exe13⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65378.exe14⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 24015⤵
- Program crash
PID:3492
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17967.exe10⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exe11⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30464.exe12⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48466.exe13⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe14⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37361.exe15⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26282.exe16⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44237.exe17⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45231.exe18⤵PID:2416
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19721.exe13⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35799.exe14⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6546.exe15⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28812.exe16⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16508.exe17⤵PID:2172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34816.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21600.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48097.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1501.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47277.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35300.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56727.exe9⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33842.exe10⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57682.exe11⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37210.exe12⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63463.exe13⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14283.exe14⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7817.exe15⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51839.exe16⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19354.exe17⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9343.exe18⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29471.exe19⤵PID:1948
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42891.exe8⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11859.exe9⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60396.exe10⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51133.exe11⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56006.exe12⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62093.exe13⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14558.exe14⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27143.exe15⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34538.exe16⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3256.exe17⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53508.exe18⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1925.exe19⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3399.exe20⤵PID:4728
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32399.exe16⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19925.exe17⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13134.exe18⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28288.exe19⤵PID:4924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44791.exe7⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58263.exe8⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51413.exe9⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45378.exe10⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21362.exe11⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65274.exe12⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6063.exe13⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41061.exe14⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1310.exe15⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64356.exe16⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29663.exe17⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27904.exe18⤵PID:4832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64168.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36068.exe7⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16546.exe8⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37432.exe9⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40718.exe10⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exe11⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10666.exe12⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52441.exe13⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26287.exe14⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31051.exe15⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9509.exe16⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53648.exe17⤵PID:3184
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2056.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18497.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16224.exe7⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exe8⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26909.exe9⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12129.exe10⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13904.exe11⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-256.exe12⤵PID:312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 312 -s 24013⤵
- Program crash
PID:3396
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54874.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48756.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40671.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36307.exe7⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65144.exe8⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 2449⤵
- Program crash
PID:432
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61646.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exe6⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exe7⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61382.exe8⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30028.exe9⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24019.exe10⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21528.exe11⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26017.exe12⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exe13⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10417.exe14⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65233.exe15⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5926.exe16⤵PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 37616⤵
- Program crash
PID:4572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 37615⤵
- Program crash
PID:2680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 37614⤵
- Program crash
PID:4080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14313.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54682.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40074.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9202.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7723.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34833.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42913.exe8⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25290.exe9⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27724.exe10⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57246.exe11⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14096.exe12⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52171.exe13⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12337.exe14⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61102.exe15⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55394.exe16⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35799.exe17⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exe18⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7021.exe19⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49071.exe20⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61152.exe21⤵PID:4884
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-526.exe15⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24533.exe16⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60817.exe17⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11097.exe18⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45231.exe19⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56876.exe20⤵PID:4964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48403.exe8⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45767.exe9⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42062.exe10⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33448.exe11⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exe12⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28565.exe13⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39997.exe14⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58876.exe15⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10417.exe16⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38342.exe17⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58326.exe18⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53648.exe19⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33550.exe20⤵PID:4640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 36819⤵
- Program crash
PID:4464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 38818⤵
- Program crash
PID:3892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 37617⤵
- Program crash
PID:4060
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34017.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2407⤵
- Program crash
PID:1932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12362.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45715.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45435.exe7⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42669.exe8⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57142.exe9⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63572.exe10⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54584.exe11⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10557.exe12⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24668.exe13⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24616.exe14⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33272.exe15⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32452.exe16⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58718.exe17⤵PID:3752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5673.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38450.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14412.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47106.exe7⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31512.exe8⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45622.exe9⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33126.exe10⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16235.exe11⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6862.exe12⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42716.exe13⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37968.exe14⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15898.exe15⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4963.exe16⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4766.exe17⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12942.exe18⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36627.exe19⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16420.exe20⤵PID:5100
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11138.exe12⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7241.exe13⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31035.exe14⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4750.exe15⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11564.exe16⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54551.exe17⤵PID:2936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21678.exe6⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22960.exe7⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20002.exe8⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34797.exe9⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25773.exe10⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exe11⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27470.exe12⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63515.exe13⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13650.exe14⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64901.exe15⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 20016⤵
- Program crash
PID:760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36544.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27677.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32228.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35025.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49327.exe7⤵PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 2408⤵
- Program crash
PID:1120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 3767⤵
- Program crash
PID:2676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 3806⤵
- Program crash
PID:2220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54054.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9856.exe6⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30033.exe7⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37537.exe8⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21450.exe9⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11413.exe10⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14558.exe11⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51455.exe12⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5591.exe13⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50080.exe14⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exe15⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38674.exe16⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58334.exe17⤵PID:3660
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 37611⤵
- Program crash
PID:3284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 37610⤵
- Program crash
PID:3644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 3809⤵
- Program crash
PID:1652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 3768⤵
- Program crash
PID:1720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 3767⤵
- Program crash
PID:2736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 3686⤵
- Program crash
PID:744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 3805⤵
- Program crash
PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exe4⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38917.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14241.exe6⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32280.exe7⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28191.exe8⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41185.exe9⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7054.exe10⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59400.exe11⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44190.exe12⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52078.exe13⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10609.exe14⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14413.exe15⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57867.exe16⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exe17⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62906.exe18⤵PID:5056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 37617⤵
- Program crash
PID:4628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 38016⤵
- Program crash
PID:3484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 37615⤵
- Program crash
PID:1520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 37614⤵
- Program crash
PID:688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 36813⤵
- Program crash
PID:3360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 38012⤵
- Program crash
PID:3240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 37611⤵
- Program crash
PID:2872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 38010⤵
- Program crash
PID:3224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 3769⤵
- Program crash
PID:1032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 292 -s 3808⤵
- Program crash
PID:1848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 3767⤵
- Program crash
PID:2184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 484 -s 3806⤵
- Program crash
PID:3044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 3725⤵
- Program crash
PID:1644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 3764⤵
- Program crash
PID:2076
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5d56bc9ced782a8bf4ac2e2337eda1f77
SHA17e7e126bcfb3a5d04175ed70668cdb4cc09caa7f
SHA25615bdf327cd2c23912405cd577a9bdcaed83342604ea5954207a21e230658c4dd
SHA5120ef1a9879642c2c3220261523e7463c95e16f550c4d033ee39c6db3dbe02a5410654ffd72eed72a6dbbb426858f941308992d245848b3ea4db92233dd73e48fc
-
Filesize
184KB
MD5b5cd3dd66fd86be8609441939b6150bf
SHA190632191905ef8b9ae49479bb2985ac948ea98e9
SHA25663e32fc38b1a9cada7382a66c5031ae3169e96c5397ca5b850b30229ab7c27d9
SHA512bbdaa58face189011084a4218241811907fa00229d651068c174830f7a7f029e93feac294a9101420ea3748495e4cdb432dc39b6c0006bdd23f70356be3b3512
-
Filesize
184KB
MD5c8474919b7a662cae6ef1abfe6c5ab17
SHA1ccc3f095e5d1103b9e5c219828054dd0f782cb07
SHA25682f5d9037159f8537e24a4dcbe3a7df82bd26eef0c6e44d2e0162f17fae804bf
SHA512a712e80c5858e64839ff4f12db24ddb1a6fc35606f130248aa40b3bee8c7ca460f42deed5f3c25708f45d10cea08a66a1f6b37109ab03e6a6b8126c11728a119
-
Filesize
184KB
MD58b081904b744862597ce01d5cff6b5d3
SHA13bc61c3844b0253c7718303cffd214b0aae0d947
SHA256bdc50153696a18de8029f8fdb3e50d2c75c4c550becb6f9e5589b003d06586a7
SHA5123fea8860b1a423f48644b13878124d1481d12fab81fdeb9e2d84c13a43f420fdadc1d306e565ebfa0f1308b7f2fae45459b26a8e9cf29fe520e96889e86f5927
-
Filesize
184KB
MD53310655c96e0d331a92c4df27d8588a9
SHA15ed1fd9b7b8ca3ff07cf1d7e5818bb26a9bec7d1
SHA256ed50aaa80625e7150fe7c55281e27a9397ec3762f13a0f2ca7c28fa117d2a6f0
SHA512ca892a735f497cac5f4607bc4b095b4747c40fd2597781c11f7ce8383582cb7a4bc955c1cdfe1eb188543c57a53a40d44488515d2f687465c1ee529c179d4775
-
Filesize
184KB
MD509426cc34423054d8fb6dbbfa1a105d4
SHA15cf2dae47ac64eadccd3da50e491058ff8ec50d0
SHA2565beb5e3066d3fd2d1a0fa88b500c4e1be8e48b186b89f623e5dcff07c33304fc
SHA512895ae6fbac7d38e7e0b66e7dc4facebf42081d856f995df85d60a2c8a4183d003729164a5930b67b0341d82a3d44b2728d57da2dab40489b9917419b08205bf9
-
Filesize
184KB
MD5299d51edf72b099d39e9cd660eb8d17b
SHA15c38d9d4a0420d12df226e2dfb46489cf89f5266
SHA2561547c55745b89d81189ee3b9d294cc5fc35c6b123af9d2297ee5604d3232a222
SHA5123a5c3973a8e13226a61f6ecc7c7e22357bd59ce56b4eece17d1462f567738fe0ba7a39123d5d9e01158108b31ccb1afcb0ab5485c4dbe01bd43802f7c17d38d2
-
Filesize
184KB
MD514048fb37e974a1093ec441429515df5
SHA117c49eed9073387dd08e9789eb929c503e4dc382
SHA2567c5b5039e3367583ec714fe1fe6d2d5e252c0b087b6987c485c4ebfbd119ca63
SHA51288e4b225c97104a6e7dfda75b26f602ba437a451ec0e676bdf8522b1ca44f744e144b133108e3e6a1dc037470ed7e9c9a654588330fd38dd3c37495c879de9de
-
Filesize
184KB
MD5e6eb13d5086cc975abe8d58fe53df496
SHA111dd0e01a1a4fbd015448fcfe51e0c4a3e6a44ae
SHA25615ffa5a1576ccde00366fbe15e6dae476e14649b64098203171ed3886e7f4e0e
SHA512f44b5b15d550570e4a88f14a66af4145ab47d152e84b7f303479c160826805edd88044184055552a226e45458f768e881d2dd0621db68666ebe8b56abff2d063
-
Filesize
184KB
MD5e2c25b8e0ea40e4c7bbee535cdee0784
SHA126ea9338030589897ae98ef7ade18fd3e74815a5
SHA2565e7e61dde88e4e9c14bcbcb26ffb1f2be9b009433bfdd1b9bcfd88b9f7ed12f2
SHA5120e4aef6c47e3e1dc1925b66440bdf9cf4fd4a5e7f2f2f0f3a4d2ef4377e6e474d1d3e6910f55391b0c3450e85c6388c0e8541abfce0e55605e918dac809d9f6a
-
Filesize
184KB
MD540e355a27087e71683c4854d49ff8ded
SHA15e695fc24b2f21fc2d88c319dd8af11e5b638f26
SHA256a78ca115f359a688b60f35a58556ee9054e0570c8e771bbd269ea206b178596d
SHA5126a09c9b42932403d9bb945472e4bee979ce00c62a6dc756e98dcf5cf79f02f48fee57d11f639fc04248b44176967570e069e0f1f56f0be14336071b3fcd7d0b6
-
Filesize
184KB
MD5cc2f3700d9ec5faf8c7de1fbf15b3622
SHA168d591f6555e4842c74fb24c3e6a4c5f97949ca1
SHA256ae6f9c8b44690cb974ca3d750ed46cc3efad0ea74eae7a4ccd240b30e5c814ce
SHA512e99624a35280b5a89726e20aebed7b008c4e9ac7c6c051b00cf26287a8fdc57392b7048f88479c9f128d53ccaccc693df204446436bdddcefff8eccd7c6cb959
-
Filesize
184KB
MD5b1b7bdf3a8595fc8c7b5035b2f1d97b8
SHA129ce9e42b815c5ef0048076245cd4bf761672efa
SHA256e96237272306c2b5f038f991b79ba78bcf987c2172f22da985041faa1523f1b4
SHA512b39f97a93a15188e7fff485a4fb225ca044cca72a64e6db15156625569bd81fdee8e9da4b3625687932f55ab69081e316f4f58b65c9b013d394aeb8c57df9f63
-
Filesize
184KB
MD50c46cf43daf246c7acdb78cb41e1560b
SHA1c12d39ff677021d495054409a7b572a3fa02ed38
SHA25686f498dcc2c3778d4a56eb809049d475bb6aea6bdccecf4186baffc10f23b7c3
SHA5126597c83299b2c46e9c088cd12816b888399cc9bc0aa13e85e9e32dd6897678e30ce536afd8573058cb70c6549fd0537fdc3b514b28d31d269231f316bbc5b2d7
-
Filesize
184KB
MD5294a83b2c71eb24f9e54043305998b94
SHA1c365ab975dfbee8d6d0856bfdc2d42d6c303c1a7
SHA256fa94b47c9e74522d8938c74a298fcf96fbe93365e61b8d3bd9db1cbfd5ba978b
SHA5125b7a50310080a2133e289a7c6fd1683f46cdc3fdf06b1eec5f18b3b59b2baa1b62c74ccebb1ff57503c384c1dd0f9fbd61eb8f97b83fc94191750eb7859dc391
-
Filesize
184KB
MD507b3df545d4719386801247946484b1c
SHA14f56f7f0f28749232e20e7c7948702a5157a5e8a
SHA2566ecf6eef3dac6716ce54f67ab0f098e853b6b2be0cb899f1c18bfc250a603dea
SHA51207b81dec89a47c66767e842648ee0f1d70702a6f5efd1e2911dd5f808bf0291d133f16054ec046c9c3f6e51ae1cd7e5caf13113106c94af33aac526e561e0bc0
-
Filesize
184KB
MD5d6eb9e2ba7ee434e3461eabe60e82aa3
SHA1ff386a4a5aaa9930dc12dfa76fe89c49b617efec
SHA256caa495b1510cc4f3f2289c7802d0b653dc89604e58508917a12ca4af97032ff8
SHA512e9e9a789c69ca4ef71d176acca3359f4554cdc73ab4e5d91036204ea9e89f2088ece05865755ac21e25c075b9126730debb7976b6d4d836e6771ef6df26cf205
-
Filesize
184KB
MD5ceefafce79cde3f08cd94c96b7814613
SHA1757f20e931f983a70ad4f902861f93339c7b3bb3
SHA2567840c75d48bd53914028ac06eb7b0b52b56b2728165060afa1e41da6ec587383
SHA512f6250032d018a7c61b6060f8f67ba3b267675b690a016c8843f44b046dca8d0e7a5e84684af5c1a24c9a17f0821810a8f10e56e10e201d76b6d04c23a2dac0ed
-
Filesize
184KB
MD5ffe28bee257a3668b0066c5fd17aa081
SHA1f6c29feae3a9a28fb2be72d8d27257303be579a9
SHA256ce20bdb75c257cad3d1a2642ebb49c91151135321eb50401b3c77f369d97b9a4
SHA51258f8bae49783ec7d7c30e90f2af4bd8bb18a233b5fe505bf5ea025ab473a34129d3c6cae35855be60b55ac0e707944f983079d046ec0e11822d47646422cb2dd
-
Filesize
184KB
MD57d2460055a1d05a3531cd03dc986769c
SHA149fda6e1e04a9e99abebca3b9d122f4051ff159e
SHA2568c916405afc5d0879e8e2e6ffc67b7d5b8163e8a6c3580073b81d7dc603dc4e7
SHA5123915518e1b69683bdba8731cf56d1c39b145230c646756827e8d39add4618f772ab37802adcc8611dbf07d720272bda9327a4f3bfc9dac7a42243bfe8d7d27d4
-
Filesize
184KB
MD50d00ae3bdfdc789d26201f642ab13340
SHA10d010c0edab13c5e3071bb83e0b28f06a1ebf1cb
SHA25686e3811c5dc585518a303ce43c20554572bf48bc3886f20aec6fc22114478025
SHA5120e41a6be7c9c323ffba865ba7a139e46a6a3e38fc38adced2db071af7e4bbaf806afd91e6a06708b24f054df9fabd7557cd67e67e08af8a51816c3c39eaf6c02
-
Filesize
184KB
MD5ade9b2d81c7170a471c69dc1febfe251
SHA1542e1874f57c3daf86d8fd85a5d7d27cdabc8d73
SHA2560e7c4d5b032520098367df2a8b88eb6119f8812f54ed6f916bd831f5cb868401
SHA5124643b1d5ba90d6e4a530d9c84e1329d5c7ce63aeb8913e767af287014a17729286930bf078170927e8f3730339382034ac92769aa641858c95eb99dc1248ece7
-
Filesize
184KB
MD5e1b7d7ded9d86b1614b0f98169686c4f
SHA195debb5611ea1bebe824c4aad361aa9b801b65df
SHA256c9f5ed660a083b60bcf212c905d6e713e284f4b0b047ebfeb5a501d259ea84a1
SHA512e45ce91375de709d5523588687e718d426c06944472efa71a171dbe41da66eeebde446ae758a22b7ef98e3e156ec5897b9012ae205f6b96ba2ae0409422ddba0
-
Filesize
184KB
MD506533587cf94d60b8e231d5b6d421622
SHA1eb04acaa5bdcfd6249deb003c4164ff251b70927
SHA2562c101aa8786c29d89c7ab0ca12bc863fee76421f19058fb72db277cc9d0afc31
SHA512baab6209d618a2c9e53fdd17494b926bddc9b6d141693b413ad74f4b385d3091b02083035a4e495448c562163ff92b954544bbce1409c7fb7532ae092f104b3a
-
Filesize
184KB
MD5c35a1eac4a98ba4726b2ffdc75f220e9
SHA17f710cda9dcd7705258fcac5a6955239fff5c5e3
SHA25678b8cb8c3c2b42761adec49ae6aedf33bd969cb96554d1eb7b11def5c872ac6c
SHA512d9f94b17ebed75fc7c441d0b6ca427f02ac9ed4b27eb23ee9cfe7580d2065a70e908a293f89b298465d1586cab371f1be006dc08969b0018dcff5dfcc422d31c